Search dblp for Publications

export results for "stream:conf/pkc:"

 download as .bib file

@inproceedings{DBLP:conf/pkc/AlamatiM24,
  author       = {Navid Alamati and
                  Varun Maram},
  editor       = {Qiang Tang and
                  Vanessa Teague},
  title        = {Quantum CCA-Secure PKE, Revisited},
  booktitle    = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia,
                  April 15-17, 2024, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14604},
  pages        = {193--226},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-57728-4\_7},
  doi          = {10.1007/978-3-031-57728-4\_7},
  timestamp    = {Wed, 24 Apr 2024 16:58:28 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AlamatiM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BaldiBPSWW24,
  author       = {Marco Baldi and
                  Sebastian Bitzer and
                  Alessio Pavoni and
                  Paolo Santini and
                  Antonia Wachter{-}Zeh and
                  Violetta Weger},
  editor       = {Qiang Tang and
                  Vanessa Teague},
  title        = {Zero Knowledge Protocols and Signatures from the Restricted Syndrome
                  Decoding Problem},
  booktitle    = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia,
                  April 15-17, 2024, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14602},
  pages        = {243--274},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-57722-2\_8},
  doi          = {10.1007/978-3-031-57722-2\_8},
  timestamp    = {Wed, 24 Apr 2024 16:58:28 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BaldiBPSWW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BaldimtsiKR24,
  author       = {Foteini Baldimtsi and
                  Ioanna Karantaidou and
                  Srinivasan Raghuraman},
  editor       = {Qiang Tang and
                  Vanessa Teague},
  title        = {Oblivious Accumulators},
  booktitle    = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia,
                  April 15-17, 2024, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14602},
  pages        = {99--131},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-57722-2\_4},
  doi          = {10.1007/978-3-031-57722-2\_4},
  timestamp    = {Wed, 24 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BaldimtsiKR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BartoliC24,
  author       = {Claudia Bartoli and
                  Ignacio Cascudo},
  editor       = {Qiang Tang and
                  Vanessa Teague},
  title        = {On Sigma-Protocols and (Packed) Black-Box Secret Sharing Schemes},
  booktitle    = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia,
                  April 15-17, 2024, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14602},
  pages        = {426--457},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-57722-2\_14},
  doi          = {10.1007/978-3-031-57722-2\_14},
  timestamp    = {Wed, 24 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BartoliC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BenzBEGMM24,
  author       = {Laurin Benz and
                  Wasilij Beskorovajnov and
                  Sarai Eilebrecht and
                  Roland Gr{\"{o}}ll and
                  Maximilian M{\"{u}}ller and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade},
  editor       = {Qiang Tang and
                  Vanessa Teague},
  title        = {Chosen-Ciphertext Secure Dual-Receiver Encryption in the Standard
                  Model Based on Post-quantum Assumptions},
  booktitle    = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia,
                  April 15-17, 2024, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14604},
  pages        = {257--288},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-57728-4\_9},
  doi          = {10.1007/978-3-031-57728-4\_9},
  timestamp    = {Wed, 24 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BenzBEGMM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BhimrajkaCV24,
  author       = {Nidhish Bhimrajka and
                  Ashish Choudhury and
                  Supreeth Varadarajan},
  editor       = {Qiang Tang and
                  Vanessa Teague},
  title        = {Network-Agnostic Multi-party Computation Revisited (Extended Abstract)},
  booktitle    = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia,
                  April 15-17, 2024, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14602},
  pages        = {171--204},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-57722-2\_6},
  doi          = {10.1007/978-3-031-57722-2\_6},
  timestamp    = {Wed, 24 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BhimrajkaCV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BrunettaHS24,
  author       = {Carlo Brunetta and
                  Hans Heum and
                  Martijn Stam},
  editor       = {Qiang Tang and
                  Vanessa Teague},
  title        = {SoK: Public Key Encryption with Openings},
  booktitle    = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia,
                  April 15-17, 2024, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14604},
  pages        = {35--68},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-57728-4\_2},
  doi          = {10.1007/978-3-031-57728-4\_2},
  timestamp    = {Wed, 24 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BrunettaHS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CampanelliFFLL24,
  author       = {Matteo Campanelli and
                  Antonio Faonio and
                  Dario Fiore and
                  Tianyu Li and
                  Helger Lipmaa},
  editor       = {Qiang Tang and
                  Vanessa Teague},
  title        = {Lookup Arguments: Improvements, Extensions and Applications to Zero-Knowledge
                  Decision Trees},
  booktitle    = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia,
                  April 15-17, 2024, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14602},
  pages        = {337--369},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-57722-2\_11},
  doi          = {10.1007/978-3-031-57722-2\_11},
  timestamp    = {Wed, 24 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/CampanelliFFLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CampanelliFK24,
  author       = {Matteo Campanelli and
                  Dario Fiore and
                  Hamidreza Khoshakhlagh},
  editor       = {Qiang Tang and
                  Vanessa Teague},
  title        = {Witness Encryption for Succinct Functional Commitments and Applications},
  booktitle    = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia,
                  April 15-17, 2024, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14602},
  pages        = {132--167},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-57722-2\_5},
  doi          = {10.1007/978-3-031-57722-2\_5},
  timestamp    = {Wed, 24 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/CampanelliFK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DuttaGJ24,
  author       = {Moumita Dutta and
                  Chaya Ganesh and
                  Neha Jawalkar},
  editor       = {Qiang Tang and
                  Vanessa Teague},
  title        = {Succinct Verification of Compressed Sigma Protocols in the Updatable
                  {SRS} Setting},
  booktitle    = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia,
                  April 15-17, 2024, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14602},
  pages        = {305--336},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-57722-2\_10},
  doi          = {10.1007/978-3-031-57722-2\_10},
  timestamp    = {Wed, 24 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DuttaGJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/EscuderoTX24,
  author       = {Daniel Escudero and
                  Ivan Tjuawinata and
                  Chaoping Xing},
  editor       = {Qiang Tang and
                  Vanessa Teague},
  title        = {On Information-Theoretic Secure Multiparty Computation with Local
                  Repairability},
  booktitle    = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia,
                  April 15-17, 2024, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14602},
  pages        = {205--239},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-57722-2\_7},
  doi          = {10.1007/978-3-031-57722-2\_7},
  timestamp    = {Wed, 24 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/EscuderoTX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GargGL24,
  author       = {Rachit Garg and
                  Rishab Goyal and
                  George Lu},
  editor       = {Qiang Tang and
                  Vanessa Teague},
  title        = {Dynamic Collusion Functional Encryption and Multi-Authority Attribute-Based
                  Encryption},
  booktitle    = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia,
                  April 15-17, 2024, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14604},
  pages        = {69--104},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-57728-4\_3},
  doi          = {10.1007/978-3-031-57728-4\_3},
  timestamp    = {Wed, 24 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/GargGL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HanLG24,
  author       = {Shuai Han and
                  Shengli Liu and
                  Dawu Gu},
  editor       = {Qiang Tang and
                  Vanessa Teague},
  title        = {More Efficient Public-Key Cryptography with Leakage and Tamper Resilience},
  booktitle    = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia,
                  April 15-17, 2024, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14604},
  pages        = {3--34},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-57728-4\_1},
  doi          = {10.1007/978-3-031-57728-4\_1},
  timestamp    = {Wed, 24 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HanLG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HofheinzHKKU24,
  author       = {Dennis Hofheinz and
                  Kristina Host{\'{a}}kov{\'{a}} and
                  Julia Kastner and
                  Karen Klein and
                  Akin {\"{U}}nal},
  editor       = {Qiang Tang and
                  Vanessa Teague},
  title        = {Compact Selective Opening Security from {LWE}},
  booktitle    = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia,
                  April 15-17, 2024, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14604},
  pages        = {127--160},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-57728-4\_5},
  doi          = {10.1007/978-3-031-57728-4\_5},
  timestamp    = {Wed, 24 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HofheinzHKKU24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KwakMS24,
  author       = {Hyesun Kwak and
                  Seonhong Min and
                  Yongsoo Song},
  editor       = {Qiang Tang and
                  Vanessa Teague},
  title        = {Towards Practical Multi-key {TFHE:} Parallelizable, Key-Compatible,
                  Quasi-linear Complexity},
  booktitle    = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia,
                  April 15-17, 2024, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14604},
  pages        = {354--385},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-57728-4\_12},
  doi          = {10.1007/978-3-031-57728-4\_12},
  timestamp    = {Wed, 24 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/KwakMS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LiYX24,
  author       = {Luying Li and
                  Wei Yu and
                  Peng Xu},
  editor       = {Qiang Tang and
                  Vanessa Teague},
  title        = {Fast and Simple Point Operations on Edwards448 and {E448}},
  booktitle    = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia,
                  April 15-17, 2024, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14604},
  pages        = {389--411},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-57728-4\_13},
  doi          = {10.1007/978-3-031-57728-4\_13},
  timestamp    = {Wed, 24 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LiYX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Libert24,
  author       = {Beno{\^{\i}}t Libert},
  editor       = {Qiang Tang and
                  Vanessa Teague},
  title        = {Vector Commitments with Proofs of Smallness: Short Range Proofs and
                  More},
  booktitle    = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia,
                  April 15-17, 2024, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14602},
  pages        = {36--67},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-57722-2\_2},
  doi          = {10.1007/978-3-031-57722-2\_2},
  timestamp    = {Wed, 24 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Libert24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Libert24a,
  author       = {Beno{\^{\i}}t Libert},
  editor       = {Qiang Tang and
                  Vanessa Teague},
  title        = {Simulation-Extractable {KZG} Polynomial Commitments and Applications
                  to HyperPlonk},
  booktitle    = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia,
                  April 15-17, 2024, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14602},
  pages        = {68--98},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-57722-2\_3},
  doi          = {10.1007/978-3-031-57722-2\_3},
  timestamp    = {Wed, 24 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Libert24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LingZCHQ24,
  author       = {Yunhao Ling and
                  Kai Zhang and
                  Jie Chen and
                  Qiong Huang and
                  Haifeng Qian},
  editor       = {Qiang Tang and
                  Vanessa Teague},
  title        = {Public-Key Encryption with Keyword Search in Multi-user, Multi-challenge
                  Setting under Adaptive Corruptions},
  booktitle    = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia,
                  April 15-17, 2024, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14604},
  pages        = {105--126},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-57728-4\_4},
  doi          = {10.1007/978-3-031-57728-4\_4},
  timestamp    = {Wed, 24 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LingZCHQ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LiuW24,
  author       = {Xindong Liu and
                  Li{-}Ping Wang},
  editor       = {Qiang Tang and
                  Vanessa Teague},
  title        = {Short Code-Based One-out-of-Many Proofs and Applications},
  booktitle    = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia,
                  April 15-17, 2024, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14602},
  pages        = {370--399},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-57722-2\_12},
  doi          = {10.1007/978-3-031-57722-2\_12},
  timestamp    = {Wed, 24 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LiuW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/MicciancioV24,
  author       = {Daniele Micciancio and
                  Vinod Vaikuntanathan},
  editor       = {Qiang Tang and
                  Vanessa Teague},
  title        = {SoK: Learning with Errors, Circular Security, and Fully Homomorphic
                  Encryption},
  booktitle    = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia,
                  April 15-17, 2024, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14604},
  pages        = {291--321},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-57728-4\_10},
  doi          = {10.1007/978-3-031-57728-4\_10},
  timestamp    = {Wed, 24 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/MicciancioV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/MicheliKMS24,
  author       = {Gabrielle De Micheli and
                  Duhyeong Kim and
                  Daniele Micciancio and
                  Adam Suhl},
  editor       = {Qiang Tang and
                  Vanessa Teague},
  title        = {Faster Amortized {FHEW} Bootstrapping Using Ring Automorphisms},
  booktitle    = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia,
                  April 15-17, 2024, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14604},
  pages        = {322--353},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-57728-4\_11},
  doi          = {10.1007/978-3-031-57728-4\_11},
  timestamp    = {Wed, 24 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/MicheliKMS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/PengCWHH24,
  author       = {Cong Peng and
                  Rongmao Chen and
                  Yi Wang and
                  Debiao He and
                  Xinyi Huang},
  editor       = {Qiang Tang and
                  Vanessa Teague},
  title        = {Parameter-Hiding Order-Revealing Encryption Without Pairings},
  booktitle    = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia,
                  April 15-17, 2024, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14604},
  pages        = {227--256},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-57728-4\_8},
  doi          = {10.1007/978-3-031-57728-4\_8},
  timestamp    = {Wed, 24 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/PengCWHH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/WangLL24,
  author       = {Zhedong Wang and
                  Qiqi Lai and
                  Feng{-}Hao Liu},
  editor       = {Qiang Tang and
                  Vanessa Teague},
  title        = {Ring/Module Learning with Errors Under Linear Leakage - Hardness and
                  Applications},
  booktitle    = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia,
                  April 15-17, 2024, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14602},
  pages        = {275--304},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-57722-2\_9},
  doi          = {10.1007/978-3-031-57722-2\_9},
  timestamp    = {Wed, 24 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/WangLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/WangYZJ24,
  author       = {Hongxiao Wang and
                  Siu{-}Ming Yiu and
                  Yanmin Zhao and
                  Zoe Lin Jiang},
  editor       = {Qiang Tang and
                  Vanessa Teague},
  title        = {Updatable, Aggregatable, Succinct Mercurial Vector Commitment from
                  Lattice},
  booktitle    = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia,
                  April 15-17, 2024, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14602},
  pages        = {3--35},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-57722-2\_1},
  doi          = {10.1007/978-3-031-57722-2\_1},
  timestamp    = {Wed, 24 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/WangYZJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ZhangSG24,
  author       = {Yuncong Zhang and
                  Shifeng Sun and
                  Dawu Gu},
  editor       = {Qiang Tang and
                  Vanessa Teague},
  title        = {Efficient KZG-Based Univariate Sum-Check and Lookup Argument},
  booktitle    = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia,
                  April 15-17, 2024, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14602},
  pages        = {400--425},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-57722-2\_13},
  doi          = {10.1007/978-3-031-57722-2\_13},
  timestamp    = {Wed, 24 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/ZhangSG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ZhouLH24,
  author       = {Yunxiao Zhou and
                  Shengli Liu and
                  Shuai Han},
  editor       = {Qiang Tang and
                  Vanessa Teague},
  title        = {Multi-hop Fine-Grained Proxy Re-encryption},
  booktitle    = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia,
                  April 15-17, 2024, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14604},
  pages        = {161--192},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-57728-4\_6},
  doi          = {10.1007/978-3-031-57728-4\_6},
  timestamp    = {Wed, 24 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/ZhouLH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2024-2,
  editor       = {Qiang Tang and
                  Vanessa Teague},
  title        = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia,
                  April 15-17, 2024, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14602},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-57722-2},
  doi          = {10.1007/978-3-031-57722-2},
  isbn         = {978-3-031-57721-5},
  timestamp    = {Wed, 24 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/2024-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2024-4,
  editor       = {Qiang Tang and
                  Vanessa Teague},
  title        = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia,
                  April 15-17, 2024, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14604},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-57728-4},
  doi          = {10.1007/978-3-031-57728-4},
  isbn         = {978-3-031-57727-7},
  timestamp    = {Wed, 24 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/2024-4.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AmbronaG23,
  author       = {Miguel Ambrona and
                  Romain Gay},
  editor       = {Alexandra Boldyreva and
                  Vladimir Kolesnikov},
  title        = {Multi-authority {ABE} for Non-monotonic Access Structures},
  booktitle    = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA,
                  May 7-10, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13941},
  pages        = {306--335},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31371-4\_11},
  doi          = {10.1007/978-3-031-31371-4\_11},
  timestamp    = {Fri, 05 May 2023 22:44:30 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AmbronaG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ArunGLMS23,
  author       = {Arasu Arun and
                  Chaya Ganesh and
                  Satya V. Lokam and
                  Tushar Mopuri and
                  Sriram Sridhar},
  editor       = {Alexandra Boldyreva and
                  Vladimir Kolesnikov},
  title        = {Dew: {A} Transparent Constant-Sized Polynomial Commitment Scheme},
  booktitle    = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA,
                  May 7-10, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13941},
  pages        = {542--571},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31371-4\_19},
  doi          = {10.1007/978-3-031-31371-4\_19},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/ArunGLMS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AtenieseCFPT23,
  author       = {Giuseppe Ateniese and
                  Long Chen and
                  Danilo Francati and
                  Dimitrios Papadopoulos and
                  Qiang Tang},
  editor       = {Alexandra Boldyreva and
                  Vladimir Kolesnikov},
  title        = {Verifiable Capacity-Bound Functions: {A} New Primitive from Kolmogorov
                  Complexity - (Revisiting Space-Based Security in the Adaptive Setting)},
  booktitle    = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA,
                  May 7-10, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13941},
  pages        = {63--93},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31371-4\_3},
  doi          = {10.1007/978-3-031-31371-4\_3},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AtenieseCFPT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AttemaCK23,
  author       = {Thomas Attema and
                  Pedro Capit{\~{a}}o and
                  Lisa Kohl},
  editor       = {Alexandra Boldyreva and
                  Vladimir Kolesnikov},
  title        = {On Homomorphic Secret Sharing from Polynomial-Modulus {LWE}},
  booktitle    = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA,
                  May 7-10, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13941},
  pages        = {3--32},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31371-4\_1},
  doi          = {10.1007/978-3-031-31371-4\_1},
  timestamp    = {Fri, 05 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AttemaCK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AvitabileBF23,
  author       = {Gennaro Avitabile and
                  Vincenzo Botta and
                  Dario Fiore},
  editor       = {Alexandra Boldyreva and
                  Vladimir Kolesnikov},
  title        = {Extendable Threshold Ring Signatures with Enhanced Anonymity},
  booktitle    = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA,
                  May 7-10, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13940},
  pages        = {281--311},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31368-4\_11},
  doi          = {10.1007/978-3-031-31368-4\_11},
  timestamp    = {Wed, 07 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AvitabileBF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BadrinarayananMMPRS23,
  author       = {Saikrishna Badrinarayanan and
                  Daniel Masny and
                  Pratyay Mukherjee and
                  Sikhar Patranabis and
                  Srinivasan Raghuraman and
                  Pratik Sarkar},
  editor       = {Alexandra Boldyreva and
                  Vladimir Kolesnikov},
  title        = {Round-Optimal Oblivious Transfer and {MPC} from Computational {CSIDH}},
  booktitle    = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA,
                  May 7-10, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13940},
  pages        = {376--405},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31368-4\_14},
  doi          = {10.1007/978-3-031-31368-4\_14},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/BadrinarayananMMPRS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BaumDDKNO23,
  author       = {Carsten Baum and
                  Bernardo David and
                  Rafael Dowsley and
                  Ravi Kishore and
                  Jesper Buus Nielsen and
                  Sabine Oechsner},
  editor       = {Alexandra Boldyreva and
                  Vladimir Kolesnikov},
  title        = {{CRAFT:} Composable Randomness Beacons and Output-Independent Abort
                  {MPC} From Time},
  booktitle    = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA,
                  May 7-10, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13940},
  pages        = {439--470},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31368-4\_16},
  doi          = {10.1007/978-3-031-31368-4\_16},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BaumDDKNO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BellareDD23,
  author       = {Mihir Bellare and
                  Hannah Davis and
                  Zijing Di},
  editor       = {Alexandra Boldyreva and
                  Vladimir Kolesnikov},
  title        = {Hardening Signature Schemes via Derive-then-Derandomize: Stronger
                  Security Proofs for EdDSA},
  booktitle    = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA,
                  May 7-10, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13940},
  pages        = {223--250},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31368-4\_9},
  doi          = {10.1007/978-3-031-31368-4\_9},
  timestamp    = {Fri, 05 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BellareDD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BenzBEMOS23,
  author       = {Laurin Benz and
                  Wasilij Beskorovajnov and
                  Sarai Eilebrecht and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Astrid Ottenhues and
                  Rebecca Schwerdt},
  editor       = {Alexandra Boldyreva and
                  Vladimir Kolesnikov},
  title        = {Sender-binding Key Encapsulation},
  booktitle    = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA,
                  May 7-10, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13940},
  pages        = {744--773},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31368-4\_26},
  doi          = {10.1007/978-3-031-31368-4\_26},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/BenzBEMOS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BhadauriaHVWZ23,
  author       = {Rishabh Bhadauria and
                  Carmit Hazay and
                  Muthuramakrishnan Venkitasubramaniam and
                  Wenxuan Wu and
                  Yupeng Zhang},
  editor       = {Alexandra Boldyreva and
                  Vladimir Kolesnikov},
  title        = {Private Polynomial Commitments and Applications to {MPC}},
  booktitle    = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA,
                  May 7-10, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13941},
  pages        = {127--158},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31371-4\_5},
  doi          = {10.1007/978-3-031-31371-4\_5},
  timestamp    = {Fri, 05 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BhadauriaHVWZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BouscatieCS23,
  author       = {Elie Bouscati{\'{e}} and
                  Guilhem Castagnos and
                  Olivier Sanders},
  editor       = {Alexandra Boldyreva and
                  Vladimir Kolesnikov},
  title        = {Pattern Matching in Encrypted Stream from Inner Product Encryption},
  booktitle    = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA,
                  May 7-10, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13940},
  pages        = {774--801},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31368-4\_27},
  doi          = {10.1007/978-3-031-31368-4\_27},
  timestamp    = {Fri, 05 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BouscatieCS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BrunettaHS23,
  author       = {Carlo Brunetta and
                  Hans Heum and
                  Martijn Stam},
  editor       = {Alexandra Boldyreva and
                  Vladimir Kolesnikov},
  title        = {Multi-instance Secure Public-Key Encryption},
  booktitle    = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA,
                  May 7-10, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13941},
  pages        = {336--367},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31371-4\_12},
  doi          = {10.1007/978-3-031-31371-4\_12},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BrunettaHS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BuiC23,
  author       = {Dung Bui and
                  Geoffroy Couteau},
  editor       = {Alexandra Boldyreva and
                  Vladimir Kolesnikov},
  title        = {Improved Private Set Intersection for Sets with Small Entries},
  booktitle    = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA,
                  May 7-10, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13941},
  pages        = {190--220},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31371-4\_7},
  doi          = {10.1007/978-3-031-31371-4\_7},
  timestamp    = {Fri, 05 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BuiC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CampanelliFO23,
  author       = {Matteo Campanelli and
                  Danilo Francati and
                  Claudio Orlandi},
  editor       = {Alexandra Boldyreva and
                  Vladimir Kolesnikov},
  title        = {Structure-Preserving Compilers from New Notions of Obfuscations},
  booktitle    = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA,
                  May 7-10, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13941},
  pages        = {663--693},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31371-4\_23},
  doi          = {10.1007/978-3-031-31371-4\_23},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/CampanelliFO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CatalanoFG23,
  author       = {Dario Catalano and
                  Dario Fiore and
                  Emanuele Giunta},
  editor       = {Alexandra Boldyreva and
                  Vladimir Kolesnikov},
  title        = {Efficient and Universally Composable Single Secret Leader Election
                  from Pairings},
  booktitle    = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA,
                  May 7-10, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13940},
  pages        = {471--499},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31368-4\_17},
  doi          = {10.1007/978-3-031-31368-4\_17},
  timestamp    = {Fri, 05 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/CatalanoFG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ChakrabortyPW23,
  author       = {Suvradip Chakraborty and
                  Manoj Prabhakaran and
                  Daniel Wichs},
  editor       = {Alexandra Boldyreva and
                  Vladimir Kolesnikov},
  title        = {A Map of Witness Maps: New Definitions and Connections},
  booktitle    = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA,
                  May 7-10, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13941},
  pages        = {635--662},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31371-4\_22},
  doi          = {10.1007/978-3-031-31371-4\_22},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/ChakrabortyPW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ChvojkaJ23,
  author       = {Peter Chvojka and
                  Tibor Jager},
  editor       = {Alexandra Boldyreva and
                  Vladimir Kolesnikov},
  title        = {Simple, Fast, Efficient, and Tightly-Secure Non-malleable Non-interactive
                  Timed Commitments},
  booktitle    = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA,
                  May 7-10, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13940},
  pages        = {500--529},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31368-4\_18},
  doi          = {10.1007/978-3-031-31368-4\_18},
  timestamp    = {Fri, 05 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/ChvojkaJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CouteauD23,
  author       = {Geoffroy Couteau and
                  Cl{\'{e}}ment Ducros},
  editor       = {Alexandra Boldyreva and
                  Vladimir Kolesnikov},
  title        = {Pseudorandom Correlation Functions from Variable-Density LPN, Revisited},
  booktitle    = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA,
                  May 7-10, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13941},
  pages        = {221--250},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31371-4\_8},
  doi          = {10.1007/978-3-031-31371-4\_8},
  timestamp    = {Fri, 05 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/CouteauD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DattaP23,
  author       = {Pratish Datta and
                  Tapas Pal},
  editor       = {Alexandra Boldyreva and
                  Vladimir Kolesnikov},
  title        = {Decentralized Multi-Authority Attribute-Based Inner-Product {FE:}
                  Large Universe and Unbounded},
  booktitle    = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA,
                  May 7-10, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13940},
  pages        = {587--621},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31368-4\_21},
  doi          = {10.1007/978-3-031-31368-4\_21},
  timestamp    = {Fri, 05 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DattaP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DottlingGM23,
  author       = {Nico D{\"{o}}ttling and
                  Phillip Gajland and
                  Giulio Malavolta},
  editor       = {Alexandra Boldyreva and
                  Vladimir Kolesnikov},
  title        = {Laconic Function Evaluation for Turing Machines},
  booktitle    = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA,
                  May 7-10, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13941},
  pages        = {606--634},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31371-4\_21},
  doi          = {10.1007/978-3-031-31371-4\_21},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/DottlingGM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DucasG23,
  author       = {L{\'{e}}o Ducas and
                  Shane Gibbons},
  editor       = {Alexandra Boldyreva and
                  Vladimir Kolesnikov},
  title        = {Hull Attacks on the Lattice Isomorphism Problem},
  booktitle    = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA,
                  May 7-10, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13940},
  pages        = {177--204},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31368-4\_7},
  doi          = {10.1007/978-3-031-31368-4\_7},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DucasG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DumanHKKLR23,
  author       = {Julien Duman and
                  Dominik Hartmann and
                  Eike Kiltz and
                  Sabrina Kunzweiler and
                  Jonas Lehmann and
                  Doreen Riepel},
  editor       = {Alexandra Boldyreva and
                  Vladimir Kolesnikov},
  title        = {Generic Models for Group Actions},
  booktitle    = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA,
                  May 7-10, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13940},
  pages        = {406--435},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31368-4\_15},
  doi          = {10.1007/978-3-031-31368-4\_15},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DumanHKKLR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DumanHKLSU23,
  author       = {Julien Duman and
                  Kathrin H{\"{o}}velmanns and
                  Eike Kiltz and
                  Vadim Lyubashevsky and
                  Gregor Seiler and
                  Dominique Unruh},
  editor       = {Alexandra Boldyreva and
                  Vladimir Kolesnikov},
  title        = {A Thorough Treatment of Highly-Efficient {NTRU} Instantiations},
  booktitle    = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA,
                  May 7-10, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13940},
  pages        = {65--94},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31368-4\_3},
  doi          = {10.1007/978-3-031-31368-4\_3},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DumanHKLSU23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DuzluKPS23,
  author       = {Samed D{\"{u}}zl{\"{u}} and
                  Juliane Kr{\"{a}}mer and
                  Thomas P{\"{o}}ppelmann and
                  Patrick Struck},
  editor       = {Alexandra Boldyreva and
                  Vladimir Kolesnikov},
  title        = {A Lightweight Identification Protocol Based on Lattices},
  booktitle    = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA,
                  May 7-10, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13940},
  pages        = {95--113},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31368-4\_4},
  doi          = {10.1007/978-3-031-31368-4\_4},
  timestamp    = {Fri, 05 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DuzluKPS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FaonioHR23,
  author       = {Antonio Faonio and
                  Dennis Hofheinz and
                  Luigi Russo},
  editor       = {Alexandra Boldyreva and
                  Vladimir Kolesnikov},
  title        = {Almost Tightly-Secure Re-randomizable and Replayable CCA-Secure Public
                  Key Encryption},
  booktitle    = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA,
                  May 7-10, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13941},
  pages        = {275--305},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31371-4\_10},
  doi          = {10.1007/978-3-031-31371-4\_10},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/FaonioHR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FeoFKLMPW23,
  author       = {Luca De Feo and
                  Tako Boris Fouotsa and
                  P{\'{e}}ter Kutas and
                  Antonin Leroux and
                  Simon{-}Philipp Merz and
                  Lorenz Panny and
                  Benjamin Wesolowski},
  editor       = {Alexandra Boldyreva and
                  Vladimir Kolesnikov},
  title        = {{SCALLOP:} Scaling the CSI-FiSh},
  booktitle    = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA,
                  May 7-10, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13940},
  pages        = {345--375},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31368-4\_13},
  doi          = {10.1007/978-3-031-31368-4\_13},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/FeoFKLMPW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FouqueGQRW23,
  author       = {Pierre{-}Alain Fouque and
                  Adela Georgescu and
                  Chen Qian and
                  Adeline Roux{-}Langlois and
                  Weiqiang Wen},
  editor       = {Alexandra Boldyreva and
                  Vladimir Kolesnikov},
  title        = {A Generic Transform from Multi-round Interactive Proof to {NIZK}},
  booktitle    = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA,
                  May 7-10, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13941},
  pages        = {461--481},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31371-4\_16},
  doi          = {10.1007/978-3-031-31371-4\_16},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/FouqueGQRW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GaltelandP23,
  author       = {Yao Jiang Galteland and
                  Jiaxin Pan},
  editor       = {Alexandra Boldyreva and
                  Vladimir Kolesnikov},
  title        = {Backward-Leak Uni-Directional Updatable Encryption from (Homomorphic)
                  Public Key Encryption},
  booktitle    = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA,
                  May 7-10, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13941},
  pages        = {399--428},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31371-4\_14},
  doi          = {10.1007/978-3-031-31371-4\_14},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/GaltelandP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GargHJJPS23,
  author       = {Sanjam Garg and
                  Mohammad Hajiabadi and
                  Abhishek Jain and
                  Zhengzhong Jin and
                  Omkant Pandey and
                  Sina Shiehian},
  editor       = {Alexandra Boldyreva and
                  Vladimir Kolesnikov},
  title        = {Credibility in Private Set Membership},
  booktitle    = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA,
                  May 7-10, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13941},
  pages        = {159--189},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31371-4\_6},
  doi          = {10.1007/978-3-031-31371-4\_6},
  timestamp    = {Fri, 05 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/GargHJJPS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GhosalSW23,
  author       = {Riddhi Ghosal and
                  Amit Sahai and
                  Brent Waters},
  editor       = {Alexandra Boldyreva and
                  Vladimir Kolesnikov},
  title        = {Non-Interactive Publicly-Verifiable Delegation of Committed Programs},
  booktitle    = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA,
                  May 7-10, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13941},
  pages        = {575--605},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31371-4\_20},
  doi          = {10.1007/978-3-031-31371-4\_20},
  timestamp    = {Fri, 05 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/GhosalSW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GhoshS23,
  author       = {Satrajit Ghosh and
                  Mark Simkin},
  editor       = {Alexandra Boldyreva and
                  Vladimir Kolesnikov},
  title        = {Threshold Private Set Intersection with Better Communication Complexity},
  booktitle    = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA,
                  May 7-10, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13941},
  pages        = {251--272},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31371-4\_9},
  doi          = {10.1007/978-3-031-31371-4\_9},
  timestamp    = {Fri, 05 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/GhoshS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HebantPS23,
  author       = {Chlo{\'{e}} H{\'{e}}bant and
                  David Pointcheval and
                  Robert Sch{\"{a}}dlich},
  editor       = {Alexandra Boldyreva and
                  Vladimir Kolesnikov},
  title        = {Tracing a Linear Subspace: Application to Linearly-Homomorphic Group
                  Signatures},
  booktitle    = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA,
                  May 7-10, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13940},
  pages        = {312--341},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31368-4\_12},
  doi          = {10.1007/978-3-031-31368-4\_12},
  timestamp    = {Fri, 05 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HebantPS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HeningerR23,
  author       = {Nadia Heninger and
                  Keegan Ryan},
  editor       = {Alexandra Boldyreva and
                  Vladimir Kolesnikov},
  title        = {The Hidden Number Problem with Small Unknown Multipliers: Cryptanalyzing
                  {MEGA} in Six Queries and Other Applications},
  booktitle    = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA,
                  May 7-10, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13940},
  pages        = {147--176},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31368-4\_6},
  doi          = {10.1007/978-3-031-31368-4\_6},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HeningerR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HoffmannHKP23,
  author       = {Charlotte Hoffmann and
                  Pavel Hub{\'{a}}cek and
                  Chethan Kamath and
                  Krzysztof Pietrzak},
  editor       = {Alexandra Boldyreva and
                  Vladimir Kolesnikov},
  title        = {Certifying Giant Nonprimes},
  booktitle    = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA,
                  May 7-10, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13940},
  pages        = {530--553},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31368-4\_19},
  doi          = {10.1007/978-3-031-31368-4\_19},
  timestamp    = {Fri, 05 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HoffmannHKP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HoffmannLMPS23,
  author       = {Cl{\'{e}}ment Hoffmann and
                  Beno{\^{\i}}t Libert and
                  Charles Momin and
                  Thomas Peters and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Alexandra Boldyreva and
                  Vladimir Kolesnikov},
  title        = {{POLKA:} Towards Leakage-Resistant Post-quantum CCA-Secure Public
                  Key Encryption},
  booktitle    = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA,
                  May 7-10, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13940},
  pages        = {114--144},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31368-4\_5},
  doi          = {10.1007/978-3-031-31368-4\_5},
  timestamp    = {Fri, 05 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HoffmannLMPS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KolonelosMV23,
  author       = {Dimitris Kolonelos and
                  Mary Maller and
                  Mikhail Volkhov},
  editor       = {Alexandra Boldyreva and
                  Vladimir Kolesnikov},
  title        = {Zero-Knowledge Arguments for Subverted {RSA} Groups},
  booktitle    = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA,
                  May 7-10, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13941},
  pages        = {512--541},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31371-4\_18},
  doi          = {10.1007/978-3-031-31371-4\_18},
  timestamp    = {Fri, 05 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/KolonelosMV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KrauszLRG23,
  author       = {Markus Krausz and
                  Georg Land and
                  Jan Richter{-}Brockmann and
                  Tim G{\"{u}}neysu},
  editor       = {Alexandra Boldyreva and
                  Vladimir Kolesnikov},
  title        = {A Holistic Approach Towards Side-Channel Secure Fixed-Weight Polynomial
                  Sampling},
  booktitle    = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA,
                  May 7-10, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13941},
  pages        = {94--124},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31371-4\_4},
  doi          = {10.1007/978-3-031-31371-4\_4},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/KrauszLRG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LeeY23,
  author       = {KangHoon Lee and
                  Ji Won Yoon},
  editor       = {Alexandra Boldyreva and
                  Vladimir Kolesnikov},
  title        = {Discretization Error Reduction for High Precision Torus Fully Homomorphic
                  Encryption},
  booktitle    = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA,
                  May 7-10, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13941},
  pages        = {33--62},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31371-4\_2},
  doi          = {10.1007/978-3-031-31371-4\_2},
  timestamp    = {Fri, 05 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LeeY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LiuLHG23,
  author       = {Xiangyu Liu and
                  Shengli Liu and
                  Shuai Han and
                  Dawu Gu},
  editor       = {Alexandra Boldyreva and
                  Vladimir Kolesnikov},
  title        = {{EKE} Meets Tight Security in the Universally Composable Framework},
  booktitle    = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA,
                  May 7-10, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13940},
  pages        = {685--713},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31368-4\_24},
  doi          = {10.1007/978-3-031-31368-4\_24},
  timestamp    = {Fri, 05 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LiuLHG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LiuLHG23a,
  author       = {Xiangyu Liu and
                  Shengli Liu and
                  Shuai Han and
                  Dawu Gu},
  editor       = {Alexandra Boldyreva and
                  Vladimir Kolesnikov},
  title        = {Fine-Grained Verifier {NIZK} and Its Applications},
  booktitle    = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA,
                  May 7-10, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13941},
  pages        = {482--511},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31371-4\_17},
  doi          = {10.1007/978-3-031-31371-4\_17},
  timestamp    = {Fri, 05 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LiuLHG23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Lysyanskaya23,
  author       = {Anna Lysyanskaya},
  editor       = {Alexandra Boldyreva and
                  Vladimir Kolesnikov},
  title        = {Security Analysis of {RSA-BSSA}},
  booktitle    = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA,
                  May 7-10, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13940},
  pages        = {251--280},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31368-4\_10},
  doi          = {10.1007/978-3-031-31368-4\_10},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Lysyanskaya23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/MaramX23,
  author       = {Varun Maram and
                  Keita Xagawa},
  editor       = {Alexandra Boldyreva and
                  Vladimir Kolesnikov},
  title        = {Post-quantum Anonymity of Kyber},
  booktitle    = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA,
                  May 7-10, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13940},
  pages        = {3--35},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31368-4\_1},
  doi          = {10.1007/978-3-031-31368-4\_1},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/MaramX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/MiaoPW23,
  author       = {Peihan Miao and
                  Sikhar Patranabis and
                  Gaven J. Watson},
  editor       = {Alexandra Boldyreva and
                  Vladimir Kolesnikov},
  title        = {Unidirectional Updatable Encryption and Proxy Re-encryption from {DDH}},
  booktitle    = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA,
                  May 7-10, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13941},
  pages        = {368--398},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31371-4\_13},
  doi          = {10.1007/978-3-031-31371-4\_13},
  timestamp    = {Wed, 02 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/MiaoPW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Prest23,
  author       = {Thomas Prest},
  editor       = {Alexandra Boldyreva and
                  Vladimir Kolesnikov},
  title        = {A Key-Recovery Attack Against Mitaka in the t-Probing Model},
  booktitle    = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA,
                  May 7-10, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13940},
  pages        = {205--220},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31368-4\_8},
  doi          = {10.1007/978-3-031-31368-4\_8},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Prest23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/RoyX23,
  author       = {Lawrence Roy and
                  Jiayu Xu},
  editor       = {Alexandra Boldyreva and
                  Vladimir Kolesnikov},
  title        = {A Universally Composable {PAKE} with Zero Communication Cost - (And
                  Why It Shouldn't Be Considered UC-Secure)},
  booktitle    = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA,
                  May 7-10, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13940},
  pages        = {714--743},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31368-4\_25},
  doi          = {10.1007/978-3-031-31368-4\_25},
  timestamp    = {Fri, 05 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/RoyX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ShanGX23,
  author       = {Tianshu Shan and
                  Jiangxia Ge and
                  Rui Xue},
  editor       = {Alexandra Boldyreva and
                  Vladimir Kolesnikov},
  title        = {QCCA-Secure Generic Transformations in the Quantum Random Oracle Model},
  booktitle    = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA,
                  May 7-10, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13940},
  pages        = {36--64},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31368-4\_2},
  doi          = {10.1007/978-3-031-31368-4\_2},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/ShanGX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ShiV23,
  author       = {Elaine Shi and
                  Nikhil Vanjani},
  editor       = {Alexandra Boldyreva and
                  Vladimir Kolesnikov},
  title        = {Multi-Client Inner Product Encryption: Function-Hiding Instantiations
                  Without Random Oracles},
  booktitle    = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA,
                  May 7-10, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13940},
  pages        = {622--651},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31368-4\_22},
  doi          = {10.1007/978-3-031-31368-4\_22},
  timestamp    = {Fri, 05 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/ShiV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/SrinivasanLMNPT23,
  author       = {Shravan Srinivasan and
                  Julian Loss and
                  Giulio Malavolta and
                  Kartik Nayak and
                  Charalampos Papamanthou and
                  Sri Aravinda Krishnan Thyagarajan},
  editor       = {Alexandra Boldyreva and
                  Vladimir Kolesnikov},
  title        = {Transparent Batchable Time-lock Puzzles and Applications to Byzantine
                  Consensus},
  booktitle    = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA,
                  May 7-10, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13940},
  pages        = {554--584},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31368-4\_20},
  doi          = {10.1007/978-3-031-31368-4\_20},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/SrinivasanLMNPT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/VenemaA23,
  author       = {Marloes Venema and
                  Greg Alp{\'{a}}r},
  editor       = {Alexandra Boldyreva and
                  Vladimir Kolesnikov},
  title        = {{GLUE:} Generalizing Unbounded Attribute-Based Encryption for Flexible
                  Efficiency Trade-Offs},
  booktitle    = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA,
                  May 7-10, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13940},
  pages        = {652--682},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31368-4\_23},
  doi          = {10.1007/978-3-031-31368-4\_23},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/VenemaA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/WangSWG23,
  author       = {Geng Wang and
                  Shi{-}Feng Sun and
                  Zhedong Wang and
                  Dawu Gu},
  editor       = {Alexandra Boldyreva and
                  Vladimir Kolesnikov},
  title        = {Functional Encryption Against Probabilistic Queries: Definition, Construction
                  and Applications},
  booktitle    = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA,
                  May 7-10, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13941},
  pages        = {429--458},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31371-4\_15},
  doi          = {10.1007/978-3-031-31371-4\_15},
  timestamp    = {Fri, 05 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/WangSWG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2023-1,
  editor       = {Alexandra Boldyreva and
                  Vladimir Kolesnikov},
  title        = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA,
                  May 7-10, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13940},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31368-4},
  doi          = {10.1007/978-3-031-31368-4},
  isbn         = {978-3-031-31367-7},
  timestamp    = {Fri, 05 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/2023-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2023-2,
  editor       = {Alexandra Boldyreva and
                  Vladimir Kolesnikov},
  title        = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA,
                  May 7-10, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13941},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31371-4},
  doi          = {10.1007/978-3-031-31371-4},
  isbn         = {978-3-031-31370-7},
  timestamp    = {Fri, 05 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/2023-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/0001TW22,
  author       = {Ngoc Khanh Nguyen and
                  Eftychios Theodorakis and
                  Bogdan Warinschi},
  editor       = {Goichiro Hanaoka and
                  Junji Shikata and
                  Yohei Watanabe},
  title        = {Lifting Standard Model Reductions to Common Setup Assumptions},
  booktitle    = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Virtual Event,
                  March 8-11, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13178},
  pages        = {130--160},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-97131-1\_5},
  doi          = {10.1007/978-3-030-97131-1\_5},
  timestamp    = {Thu, 10 Mar 2022 11:26:10 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/0001TW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/0005DM22,
  author       = {Pedro Branco and
                  Nico D{\"{o}}ttling and
                  Paulo Mateus},
  editor       = {Goichiro Hanaoka and
                  Junji Shikata and
                  Yohei Watanabe},
  title        = {Two-Round Oblivious Linear Evaluation from Learning with Errors},
  booktitle    = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Virtual Event,
                  March 8-11, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13177},
  pages        = {379--408},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-97121-2\_14},
  doi          = {10.1007/978-3-030-97121-2\_14},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/0005DM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AbramS22,
  author       = {Damiano Abram and
                  Peter Scholl},
  editor       = {Goichiro Hanaoka and
                  Junji Shikata and
                  Yohei Watanabe},
  title        = {Low-Communication Multiparty Triple Generation for {SPDZ} from Ring-LPN},
  booktitle    = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Virtual Event,
                  March 8-11, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13177},
  pages        = {221--251},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-97121-2\_9},
  doi          = {10.1007/978-3-030-97121-2\_9},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AbramS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AranhaBCGO022,
  author       = {Diego F. Aranha and
                  Emil Madsen Bennedsen and
                  Matteo Campanelli and
                  Chaya Ganesh and
                  Claudio Orlandi and
                  Akira Takahashi},
  editor       = {Goichiro Hanaoka and
                  Junji Shikata and
                  Yohei Watanabe},
  title        = {{ECLIPSE:} Enhanced Compiling Method for Pedersen-Committed zkSNARK
                  Engines},
  booktitle    = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Virtual Event,
                  March 8-11, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13177},
  pages        = {584--614},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-97121-2\_21},
  doi          = {10.1007/978-3-030-97121-2\_21},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/AranhaBCGO022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AranhaHNPY22,
  author       = {Diego F. Aranha and
                  Mathias Hall{-}Andersen and
                  Anca Nitulescu and
                  Elena Pagnin and
                  Sophia Yakoubov},
  editor       = {Goichiro Hanaoka and
                  Junji Shikata and
                  Yohei Watanabe},
  title        = {Count Me In! Extendability for Threshold Ring Signatures},
  booktitle    = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Virtual Event,
                  March 8-11, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13178},
  pages        = {379--406},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-97131-1\_13},
  doi          = {10.1007/978-3-030-97131-1\_13},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AranhaHNPY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AronestyCDGHKT22,
  author       = {Erik Aronesty and
                  David Cash and
                  Yevgeniy Dodis and
                  Daniel H. Gallancy and
                  Christopher Higley and
                  Harish Karthikeyan and
                  Oren Tysor},
  editor       = {Goichiro Hanaoka and
                  Junji Shikata and
                  Yohei Watanabe},
  title        = {Encapsulated Search Index: Public-Key, Sub-linear, Distributed, and
                  Delegatable},
  booktitle    = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Virtual Event,
                  March 8-11, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13178},
  pages        = {256--285},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-97131-1\_9},
  doi          = {10.1007/978-3-030-97131-1\_9},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/AronestyCDGHKT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BartusekGSZ22,
  author       = {James Bartusek and
                  Sanjam Garg and
                  Akshayaram Srinivasan and
                  Yinuo Zhang},
  editor       = {Goichiro Hanaoka and
                  Junji Shikata and
                  Yohei Watanabe},
  title        = {Reusable Two-Round {MPC} from {LPN}},
  booktitle    = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Virtual Event,
                  March 8-11, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13177},
  pages        = {165--193},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-97121-2\_7},
  doi          = {10.1007/978-3-030-97121-2\_7},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BartusekGSZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BeskorovajnovGM22,
  author       = {Wasilij Beskorovajnov and
                  Roland Gr{\"{o}}ll and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Astrid Ottenhues and
                  Rebecca Schwerdt},
  editor       = {Goichiro Hanaoka and
                  Junji Shikata and
                  Yohei Watanabe},
  title        = {A New Security Notion for {PKC} in the Standard Model: Weaker, Simpler,
                  and Still Realizing Secure Channels},
  booktitle    = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Virtual Event,
                  March 8-11, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13178},
  pages        = {316--344},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-97131-1\_11},
  doi          = {10.1007/978-3-030-97131-1\_11},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/BeskorovajnovGM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BrendelF0JS22,
  author       = {Jacqueline Brendel and
                  Rune Fiedler and
                  Felix G{\"{u}}nther and
                  Christian Janson and
                  Douglas Stebila},
  editor       = {Goichiro Hanaoka and
                  Junji Shikata and
                  Yohei Watanabe},
  title        = {Post-quantum Asynchronous Deniable Key Exchange and the Signal Handshake},
  booktitle    = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Virtual Event,
                  March 8-11, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13178},
  pages        = {3--34},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-97131-1\_1},
  doi          = {10.1007/978-3-030-97131-1\_1},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/BrendelF0JS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BunnKO22,
  author       = {Paul Bunn and
                  Eyal Kushilevitz and
                  Rafail Ostrovsky},
  editor       = {Goichiro Hanaoka and
                  Junji Shikata and
                  Yohei Watanabe},
  title        = {{CNF-FSS} and Its Applications},
  booktitle    = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Virtual Event,
                  March 8-11, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13177},
  pages        = {283--314},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-97121-2\_11},
  doi          = {10.1007/978-3-030-97121-2\_11},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/BunnKO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ChatterjeeCLM22,
  author       = {Rohit Chatterjee and
                  Kai{-}Min Chung and
                  Xiao Liang and
                  Giulio Malavolta},
  editor       = {Goichiro Hanaoka and
                  Junji Shikata and
                  Yohei Watanabe},
  title        = {A Note on the Post-quantum Security of (Ring) Signatures},
  booktitle    = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Virtual Event,
                  March 8-11, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13178},
  pages        = {407--436},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-97131-1\_14},
  doi          = {10.1007/978-3-030-97131-1\_14},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/ChatterjeeCLM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Connolly0P22,
  author       = {Aisling Connolly and
                  Pascal Lafourcade and
                  Octavio Perez{-}Kempner},
  editor       = {Goichiro Hanaoka and
                  Junji Shikata and
                  Yohei Watanabe},
  title        = {Improved Constructions of Anonymous Credentials from Structure-Preserving
                  Signatures on Equivalence Classes},
  booktitle    = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Virtual Event,
                  March 8-11, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13177},
  pages        = {409--438},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-97121-2\_15},
  doi          = {10.1007/978-3-030-97121-2\_15},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/Connolly0P22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DAnversB22,
  author       = {Jan{-}Pieter D'Anvers and
                  Senne Batsleer},
  editor       = {Goichiro Hanaoka and
                  Junji Shikata and
                  Yohei Watanabe},
  title        = {Multitarget Decryption Failure Attacks and Their Application to Saber
                  and Kyber},
  booktitle    = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Virtual Event,
                  March 8-11, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13177},
  pages        = {3--33},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-97121-2\_1},
  doi          = {10.1007/978-3-030-97121-2\_1},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/DAnversB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DartoisF22,
  author       = {Pierrick Dartois and
                  Luca De Feo},
  editor       = {Goichiro Hanaoka and
                  Junji Shikata and
                  Yohei Watanabe},
  title        = {On the Security of {OSIDH}},
  booktitle    = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Virtual Event,
                  March 8-11, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13177},
  pages        = {52--81},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-97121-2\_3},
  doi          = {10.1007/978-3-030-97121-2\_3},
  timestamp    = {Tue, 15 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/DartoisF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DeveveyLP22,
  author       = {Julien Devevey and
                  Beno{\^{\i}}t Libert and
                  Thomas Peters},
  editor       = {Goichiro Hanaoka and
                  Junji Shikata and
                  Yohei Watanabe},
  title        = {Rational Modular Encoding in the {DCR} Setting: Non-interactive Range
                  Proofs and Paillier-Based Naor-Yung in the Standard Model},
  booktitle    = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Virtual Event,
                  March 8-11, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13177},
  pages        = {615--646},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-97121-2\_22},
  doi          = {10.1007/978-3-030-97121-2\_22},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/DeveveyLP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Ebrahimi22,
  author       = {Ehsan Ebrahimi},
  editor       = {Goichiro Hanaoka and
                  Junji Shikata and
                  Yohei Watanabe},
  title        = {Post-quantum Security of Plain {OAEP} Transform},
  booktitle    = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Virtual Event,
                  March 8-11, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13177},
  pages        = {34--51},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-97121-2\_2},
  doi          = {10.1007/978-3-030-97121-2\_2},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/Ebrahimi22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/EsginSZ22,
  author       = {Muhammed F. Esgin and
                  Ron Steinfeld and
                  Raymond K. Zhao},
  editor       = {Goichiro Hanaoka and
                  Junji Shikata and
                  Yohei Watanabe},
  title        = {Efficient Verifiable Partially-Decryptable Commitments from Lattices
                  and Applications},
  booktitle    = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Virtual Event,
                  March 8-11, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13177},
  pages        = {317--348},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-97121-2\_12},
  doi          = {10.1007/978-3-030-97121-2\_12},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/EsginSZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Esser022,
  author       = {Andre Esser and
                  Emanuele Bellini},
  editor       = {Goichiro Hanaoka and
                  Junji Shikata and
                  Yohei Watanabe},
  title        = {Syndrome Decoding Estimator},
  booktitle    = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Virtual Event,
                  March 8-11, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13177},
  pages        = {112--141},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-97121-2\_5},
  doi          = {10.1007/978-3-030-97121-2\_5},
  timestamp    = {Tue, 17 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Esser022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FaustHKS22,
  author       = {Sebastian Faust and
                  Carmit Hazay and
                  David Kretzler and
                  Benjamin Schlosser},
  editor       = {Goichiro Hanaoka and
                  Junji Shikata and
                  Yohei Watanabe},
  title        = {Financially Backed Covert Security},
  booktitle    = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Virtual Event,
                  March 8-11, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13178},
  pages        = {99--129},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-97131-1\_4},
  doi          = {10.1007/978-3-030-97131-1\_4},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/FaustHKS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FouotsaKMT22,
  author       = {Tako Boris Fouotsa and
                  P{\'{e}}ter Kutas and
                  Simon{-}Philipp Merz and
                  Yan Bo Ti},
  editor       = {Goichiro Hanaoka and
                  Junji Shikata and
                  Yohei Watanabe},
  title        = {On the Isogeny Problem with Torsion Point Information},
  booktitle    = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Virtual Event,
                  March 8-11, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13177},
  pages        = {142--161},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-97121-2\_6},
  doi          = {10.1007/978-3-030-97121-2\_6},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/FouotsaKMT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GoyalKMPS22,
  author       = {Vipul Goyal and
                  Abhiram Kothapalli and
                  Elisaweta Masserova and
                  Bryan Parno and
                  Yifan Song},
  editor       = {Goichiro Hanaoka and
                  Junji Shikata and
                  Yohei Watanabe},
  title        = {Storing and Retrieving Secrets on a Blockchain},
  booktitle    = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Virtual Event,
                  March 8-11, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13177},
  pages        = {252--282},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-97121-2\_10},
  doi          = {10.1007/978-3-030-97121-2\_10},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/GoyalKMPS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HaqueKSS22,
  author       = {Abida Haque and
                  Stephan Krenn and
                  Daniel Slamanig and
                  Christoph Striecks},
  editor       = {Goichiro Hanaoka and
                  Junji Shikata and
                  Yohei Watanabe},
  title        = {Logarithmic-Size (Linkable) Threshold Ring Signatures in the Plain
                  Model},
  booktitle    = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Virtual Event,
                  March 8-11, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13178},
  pages        = {437--467},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-97131-1\_15},
  doi          = {10.1007/978-3-030-97131-1\_15},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HaqueKSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/IshibashiY22,
  author       = {Ren Ishibashi and
                  Kazuki Yoneyama},
  editor       = {Goichiro Hanaoka and
                  Junji Shikata and
                  Yohei Watanabe},
  title        = {Post-quantum Anonymous One-Sided Authenticated Key Exchange Without
                  Random Oracles},
  booktitle    = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Virtual Event,
                  March 8-11, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13178},
  pages        = {35--65},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-97131-1\_2},
  doi          = {10.1007/978-3-030-97131-1\_2},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/IshibashiY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KarpmanL22,
  author       = {Pierre Karpman and
                  Charlotte Lefevre},
  editor       = {Goichiro Hanaoka and
                  Junji Shikata and
                  Yohei Watanabe},
  title        = {Time-Memory Tradeoffs for Large-Weight Syndrome Decoding in Ternary
                  Codes},
  booktitle    = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Virtual Event,
                  March 8-11, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13177},
  pages        = {82--111},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-97121-2\_4},
  doi          = {10.1007/978-3-030-97121-2\_4},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/KarpmanL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KastnerLX22,
  author       = {Julia Kastner and
                  Julian Loss and
                  Jiayu Xu},
  editor       = {Goichiro Hanaoka and
                  Junji Shikata and
                  Yohei Watanabe},
  title        = {On Pairing-Free Blind Signature Schemes in the Algebraic Group Model},
  booktitle    = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Virtual Event,
                  March 8-11, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13178},
  pages        = {468--497},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-97131-1\_16},
  doi          = {10.1007/978-3-030-97131-1\_16},
  timestamp    = {Tue, 15 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/KastnerLX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KitagawaN22,
  author       = {Fuyuki Kitagawa and
                  Ryo Nishimaki},
  editor       = {Goichiro Hanaoka and
                  Junji Shikata and
                  Yohei Watanabe},
  title        = {{KDM} Security for the Fujisaki-Okamoto Transformations in the {QROM}},
  booktitle    = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Virtual Event,
                  March 8-11, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13178},
  pages        = {286--315},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-97131-1\_10},
  doi          = {10.1007/978-3-030-97131-1\_10},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/KitagawaN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Kluczniak22,
  author       = {Kamil Kluczniak},
  editor       = {Goichiro Hanaoka and
                  Junji Shikata and
                  Yohei Watanabe},
  title        = {Lockable Obfuscation from Circularly Insecure Fully Homomorphic Encryption},
  booktitle    = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Virtual Event,
                  March 8-11, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13178},
  pages        = {69--98},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-97131-1\_3},
  doi          = {10.1007/978-3-030-97131-1\_3},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/Kluczniak22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LaiLW22,
  author       = {Qiqi Lai and
                  Feng{-}Hao Liu and
                  Zhedong Wang},
  editor       = {Goichiro Hanaoka and
                  Junji Shikata and
                  Yohei Watanabe},
  title        = {Leakage-Resilient {IBE/} {ABE} with Optimal Leakage Rates from Lattices},
  booktitle    = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Virtual Event,
                  March 8-11, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13178},
  pages        = {225--255},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-97131-1\_8},
  doi          = {10.1007/978-3-030-97131-1\_8},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/LaiLW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Lipmaa22,
  author       = {Helger Lipmaa},
  editor       = {Goichiro Hanaoka and
                  Junji Shikata and
                  Yohei Watanabe},
  title        = {A Unified Framework for Non-universal SNARKs},
  booktitle    = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Virtual Event,
                  March 8-11, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13177},
  pages        = {553--583},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-97121-2\_20},
  doi          = {10.1007/978-3-030-97121-2\_20},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/Lipmaa22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LiuWY22,
  author       = {Yi Liu and
                  Qi Wang and
                  Siu{-}Ming Yiu},
  editor       = {Goichiro Hanaoka and
                  Junji Shikata and
                  Yohei Watanabe},
  title        = {Making Private Function Evaluation Safer, Faster, and Simpler},
  booktitle    = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Virtual Event,
                  March 8-11, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13177},
  pages        = {349--378},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-97121-2\_13},
  doi          = {10.1007/978-3-030-97121-2\_13},
  timestamp    = {Sat, 20 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LiuWY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Lyubashevsky0P22,
  author       = {Vadim Lyubashevsky and
                  Ngoc Khanh Nguyen and
                  Maxime Plan{\c{c}}on},
  editor       = {Goichiro Hanaoka and
                  Junji Shikata and
                  Yohei Watanabe},
  title        = {Efficient Lattice-Based Blind Signatures via Gaussian One-Time Signatures},
  booktitle    = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Virtual Event,
                  March 8-11, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13178},
  pages        = {498--527},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-97131-1\_17},
  doi          = {10.1007/978-3-030-97131-1\_17},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/Lyubashevsky0P22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/MaitraW22,
  author       = {Sarasij Maitra and
                  David J. Wu},
  editor       = {Goichiro Hanaoka and
                  Junji Shikata and
                  Yohei Watanabe},
  title        = {Traceable PRFs: Full Collusion Resistance and Active Security},
  booktitle    = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Virtual Event,
                  March 8-11, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13177},
  pages        = {439--469},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-97121-2\_16},
  doi          = {10.1007/978-3-030-97121-2\_16},
  timestamp    = {Sun, 11 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/MaitraW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/MeraKMS22,
  author       = {Jose Maria Bermudo Mera and
                  Angshuman Karmakar and
                  Tilen Marc and
                  Azam Soleimanian},
  editor       = {Goichiro Hanaoka and
                  Junji Shikata and
                  Yohei Watanabe},
  title        = {Efficient Lattice-Based Inner-Product Functional Encryption},
  booktitle    = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Virtual Event,
                  March 8-11, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13178},
  pages        = {163--193},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-97131-1\_6},
  doi          = {10.1007/978-3-030-97131-1\_6},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/MeraKMS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Nishimaki22,
  author       = {Ryo Nishimaki},
  editor       = {Goichiro Hanaoka and
                  Junji Shikata and
                  Yohei Watanabe},
  title        = {The Direction of Updatable Encryption Does Matter},
  booktitle    = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Virtual Event,
                  March 8-11, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13178},
  pages        = {194--224},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-97131-1\_7},
  doi          = {10.1007/978-3-030-97131-1\_7},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/Nishimaki22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/OnukiM22,
  author       = {Hiroshi Onuki and
                  Tomoki Moriya},
  editor       = {Goichiro Hanaoka and
                  Junji Shikata and
                  Yohei Watanabe},
  title        = {Radical Isogenies on Montgomery Curves},
  booktitle    = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Virtual Event,
                  March 8-11, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13177},
  pages        = {473--497},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-97121-2\_17},
  doi          = {10.1007/978-3-030-97121-2\_17},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/OnukiM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/OrlandiRS22,
  author       = {Claudio Orlandi and
                  Divya Ravi and
                  Peter Scholl},
  editor       = {Goichiro Hanaoka and
                  Junji Shikata and
                  Yohei Watanabe},
  title        = {On the Bottleneck Complexity of {MPC} with Correlated Randomness},
  booktitle    = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Virtual Event,
                  March 8-11, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13177},
  pages        = {194--220},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-97121-2\_8},
  doi          = {10.1007/978-3-030-97121-2\_8},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/OrlandiRS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/PanW22,
  author       = {Jiaxin Pan and
                  Benedikt Wagner},
  editor       = {Goichiro Hanaoka and
                  Junji Shikata and
                  Yohei Watanabe},
  title        = {Lattice-Based Signatures with Tight Adaptive Corruptions and More},
  booktitle    = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Virtual Event,
                  March 8-11, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13178},
  pages        = {347--378},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-97131-1\_12},
  doi          = {10.1007/978-3-030-97131-1\_12},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/PanW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/SzepieniecZ22,
  author       = {Alan Szepieniec and
                  Yuncong Zhang},
  editor       = {Goichiro Hanaoka and
                  Junji Shikata and
                  Yohei Watanabe},
  title        = {Polynomial IOPs for Linear Algebra Relations},
  booktitle    = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Virtual Event,
                  March 8-11, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13177},
  pages        = {523--552},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-97121-2\_19},
  doi          = {10.1007/978-3-030-97121-2\_19},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/SzepieniecZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ZhangY22,
  author       = {Shiduo Zhang and
                  Yang Yu},
  editor       = {Goichiro Hanaoka and
                  Junji Shikata and
                  Yohei Watanabe},
  title        = {Towards a Simpler Lattice Gadget Toolkit},
  booktitle    = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Virtual Event,
                  March 8-11, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13177},
  pages        = {498--520},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-97121-2\_18},
  doi          = {10.1007/978-3-030-97121-2\_18},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/ZhangY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2022-1,
  editor       = {Goichiro Hanaoka and
                  Junji Shikata and
                  Yohei Watanabe},
  title        = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Virtual Event,
                  March 8-11, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13177},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-97121-2},
  doi          = {10.1007/978-3-030-97121-2},
  isbn         = {978-3-030-97120-5},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/2022-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2022-2,
  editor       = {Goichiro Hanaoka and
                  Junji Shikata and
                  Yohei Watanabe},
  title        = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Virtual Event,
                  March 8-11, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13178},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-97131-1},
  doi          = {10.1007/978-3-030-97131-1},
  isbn         = {978-3-030-97130-4},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/2022-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/0005DP21,
  author       = {Pedro Branco and
                  Nico D{\"{o}}ttling and
                  Sihang Pu},
  editor       = {Juan A. Garay},
  title        = {Multiparty Cardinality Testing for Threshold Private Intersection},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12711},
  pages        = {32--60},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75248-4\_2},
  doi          = {10.1007/978-3-030-75248-4\_2},
  timestamp    = {Fri, 07 May 2021 15:40:46 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/0005DP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AgrawalBMMP21,
  author       = {Shashank Agrawal and
                  Saikrishna Badrinarayanan and
                  Payman Mohassel and
                  Pratyay Mukherjee and
                  Sikhar Patranabis},
  editor       = {Juan A. Garay},
  title        = {{BETA:} Biometric-Enabled Threshold Authentication},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12711},
  pages        = {290--318},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75248-4\_11},
  doi          = {10.1007/978-3-030-75248-4\_11},
  timestamp    = {Fri, 07 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AgrawalBMMP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AlbrechtDDS21,
  author       = {Martin R. Albrecht and
                  Alex Davidson and
                  Amit Deo and
                  Nigel P. Smart},
  editor       = {Juan A. Garay},
  title        = {Round-Optimal Verifiable Oblivious Pseudorandom Functions from Ideal
                  Lattices},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12711},
  pages        = {261--289},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75248-4\_10},
  doi          = {10.1007/978-3-030-75248-4\_10},
  timestamp    = {Fri, 07 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AlbrechtDDS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Ambrona21,
  author       = {Miguel Ambrona},
  editor       = {Juan A. Garay},
  title        = {Generic Negation of Pair Encodings},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12711},
  pages        = {120--146},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75248-4\_5},
  doi          = {10.1007/978-3-030-75248-4\_5},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Ambrona21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BadertscherMPR21,
  author       = {Christian Badertscher and
                  Ueli Maurer and
                  Christopher Portmann and
                  Guilherme Rito},
  editor       = {Juan A. Garay},
  title        = {Revisiting {(R)CCA} Security and Replay Protection},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12711},
  pages        = {173--202},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75248-4\_7},
  doi          = {10.1007/978-3-030-75248-4\_7},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/BadertscherMPR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BadrinarayananM21,
  author       = {Saikrishna Badrinarayanan and
                  Peihan Miao and
                  Srinivasan Raghuraman and
                  Peter Rindal},
  editor       = {Juan A. Garay},
  title        = {Multi-party Threshold Private Set Intersection with Sublinear Communication},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12711},
  pages        = {349--379},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75248-4\_13},
  doi          = {10.1007/978-3-030-75248-4\_13},
  timestamp    = {Wed, 02 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BadrinarayananM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BauerFQ21,
  author       = {Balthazar Bauer and
                  Georg Fuchsbauer and
                  Chen Qian},
  editor       = {Juan A. Garay},
  title        = {Transferable E-Cash: {A} Cleaner Model and the First Practical Instantiation},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12711},
  pages        = {559--590},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75248-4\_20},
  doi          = {10.1007/978-3-030-75248-4\_20},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BauerFQ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BaumGKOSZ21,
  author       = {Carsten Baum and
                  Cyprien Delpech de Saint Guilhem and
                  Daniel Kales and
                  Emmanuela Orsini and
                  Peter Scholl and
                  Greg Zaverucha},
  editor       = {Juan A. Garay},
  title        = {Banquet: Short and Fast Signatures from {AES}},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12710},
  pages        = {266--297},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75245-3\_11},
  doi          = {10.1007/978-3-030-75245-3\_11},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BaumGKOSZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BemmannCJ21,
  author       = {Pascal Bemmann and
                  Rongmao Chen and
                  Tibor Jager},
  editor       = {Juan A. Garay},
  title        = {Subversion-Resilient Public Key Encryption with Practical Watchdogs},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12710},
  pages        = {627--658},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75245-3\_23},
  doi          = {10.1007/978-3-030-75245-3\_23},
  timestamp    = {Fri, 07 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BemmannCJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BhatotiaKMT21,
  author       = {Pramod Bhatotia and
                  Markulf Kohlweiss and
                  Lorenzo Martinico and
                  Yiannis Tselekounis},
  editor       = {Juan A. Garay},
  title        = {Steel: Composable Hardware-Based Stateful and Randomised Functional
                  Encryption},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12711},
  pages        = {709--736},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75248-4\_25},
  doi          = {10.1007/978-3-030-75248-4\_25},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BhatotiaKMT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BoisCFK21,
  author       = {Alexandre Bois and
                  Ignacio Cascudo and
                  Dario Fiore and
                  Dongwoo Kim},
  editor       = {Juan A. Garay},
  title        = {Flexible and Efficient Verifiable Computation on Encrypted Data},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12711},
  pages        = {528--558},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75248-4\_19},
  doi          = {10.1007/978-3-030-75248-4\_19},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/BoisCFK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BouvierI21,
  author       = {Cyril Bouvier and
                  Laurent Imbert},
  editor       = {Juan A. Garay},
  title        = {An Alternative Approach for {SIDH} Arithmetic},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12710},
  pages        = {27--44},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75245-3\_2},
  doi          = {10.1007/978-3-030-75245-3\_2},
  timestamp    = {Fri, 07 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BouvierI21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CaforioDV21,
  author       = {Andrea Caforio and
                  F. Bet{\"{u}}l Durak and
                  Serge Vaudenay},
  editor       = {Juan A. Garay},
  title        = {Beyond Security and Efficiency: On-Demand Ratcheting with Security
                  Awareness},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12711},
  pages        = {649--677},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75248-4\_23},
  doi          = {10.1007/978-3-030-75248-4\_23},
  timestamp    = {Fri, 07 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/CaforioDV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CheonCK021,
  author       = {Jung Hee Cheon and
                  Wonhee Cho and
                  Jeong Han Kim and
                  Jiseung Kim},
  editor       = {Juan A. Garay},
  title        = {Adventures in Crypto Dark Matter: Attacks and Fixes for Weak Pseudorandom
                  Functions},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12711},
  pages        = {739--760},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75248-4\_26},
  doi          = {10.1007/978-3-030-75248-4\_26},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/CheonCK021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CiampiSW21,
  author       = {Michele Ciampi and
                  Luisa Siniscalchi and
                  Hendrik Waldner},
  editor       = {Juan A. Garay},
  title        = {Multi-Client Functional Encryption for Separable Functions},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12710},
  pages        = {724--753},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75245-3\_26},
  doi          = {10.1007/978-3-030-75245-3\_26},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/CiampiSW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CiniRSST21,
  author       = {Valerio Cini and
                  Sebastian Ramacher and
                  Daniel Slamanig and
                  Christoph Striecks and
                  Erkan Tairi},
  editor       = {Juan A. Garay},
  title        = {Updatable Signatures and Message Authentication Codes},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12710},
  pages        = {691--723},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75245-3\_25},
  doi          = {10.1007/978-3-030-75245-3\_25},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/CiniRSST21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DamgardO0T21,
  author       = {Ivan Damg{\aa}rd and
                  Claudio Orlandi and
                  Akira Takahashi and
                  Mehdi Tibouchi},
  editor       = {Juan A. Garay},
  title        = {Two-Round n-out-of-n and Multi-signatures and Trapdoor Commitment
                  from Lattices},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12710},
  pages        = {99--130},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75245-3\_5},
  doi          = {10.1007/978-3-030-75245-3\_5},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DamgardO0T21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DeveveyLNPY21,
  author       = {Julien Devevey and
                  Beno{\^{\i}}t Libert and
                  Khoa Nguyen and
                  Thomas Peters and
                  Moti Yung},
  editor       = {Juan A. Garay},
  title        = {Non-interactive CCA2-Secure Threshold Cryptosystems: Achieving Adaptive
                  Security in the Standard Model Without Pairings},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12710},
  pages        = {659--690},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75245-3\_24},
  doi          = {10.1007/978-3-030-75245-3\_24},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/DeveveyLNPY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DeveveySSS21,
  author       = {Julien Devevey and
                  Amin Sakzad and
                  Damien Stehl{\'{e}} and
                  Ron Steinfeld},
  editor       = {Juan A. Garay},
  title        = {On the Integer Polynomial Learning with Errors Problem},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12710},
  pages        = {184--214},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75245-3\_8},
  doi          = {10.1007/978-3-030-75245-3\_8},
  timestamp    = {Fri, 07 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DeveveySSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DiazL21,
  author       = {Jesus Diaz and
                  Anja Lehmann},
  editor       = {Juan A. Garay},
  title        = {Group Signatures with User-Controlled and Sequential Linkability},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12710},
  pages        = {360--388},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75245-3\_14},
  doi          = {10.1007/978-3-030-75245-3\_14},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DiazL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DiemertGJL21,
  author       = {Denis Diemert and
                  Kai Gellert and
                  Tibor Jager and
                  Lin Lyu},
  editor       = {Juan A. Garay},
  title        = {More Efficient Digital Signatures with Tight Multi-user Security},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12711},
  pages        = {1--31},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75248-4\_1},
  doi          = {10.1007/978-3-030-75248-4\_1},
  timestamp    = {Mon, 26 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DiemertGJL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DottlingN21,
  author       = {Nico D{\"{o}}ttling and
                  Ryo Nishimaki},
  editor       = {Juan A. Garay},
  title        = {Universal Proxy Re-Encryption},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12710},
  pages        = {512--542},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75245-3\_19},
  doi          = {10.1007/978-3-030-75245-3\_19},
  timestamp    = {Fri, 07 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DottlingN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ErwigFHM021,
  author       = {Andreas Erwig and
                  Sebastian Faust and
                  Kristina Host{\'{a}}kov{\'{a}} and
                  Monosij Maitra and
                  Siavash Riahi},
  editor       = {Juan A. Garay},
  title        = {Two-Party Adaptor Signatures from Identification Schemes},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12710},
  pages        = {451--480},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75245-3\_17},
  doi          = {10.1007/978-3-030-75245-3\_17},
  timestamp    = {Fri, 07 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/ErwigFHM021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FengGC21,
  author       = {Shengyuan Feng and
                  Junqing Gong and
                  Jie Chen},
  editor       = {Juan A. Garay},
  title        = {Master-Key KDM-Secure {ABE} via Predicate Encoding},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12710},
  pages        = {543--572},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75245-3\_20},
  doi          = {10.1007/978-3-030-75245-3\_20},
  timestamp    = {Thu, 07 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/FengGC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FischlinR21,
  author       = {Marc Fischlin and
                  Felix Rohrbach},
  editor       = {Juan A. Garay},
  title        = {Single-to-Multi-theorem Transformations for Non-interactive Statistical
                  Zero-Knowledge},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12711},
  pages        = {205--234},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75248-4\_8},
  doi          = {10.1007/978-3-030-75248-4\_8},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/FischlinR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Fleischhacker021,
  author       = {Nils Fleischhacker and
                  Mark Simkin},
  editor       = {Juan A. Garay},
  title        = {On Publicly-Accountable Zero-Knowledge and Small Shuffle Arguments},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12711},
  pages        = {618--648},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75248-4\_22},
  doi          = {10.1007/978-3-030-75248-4\_22},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Fleischhacker021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GarimellaMRSS21,
  author       = {Gayathri Garimella and
                  Payman Mohassel and
                  Mike Rosulek and
                  Saeed Sadeghian and
                  Jaspal Singh},
  editor       = {Juan A. Garay},
  title        = {Private Set Operations from Oblivious Switching},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12711},
  pages        = {591--617},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75248-4\_21},
  doi          = {10.1007/978-3-030-75248-4\_21},
  timestamp    = {Fri, 07 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/GarimellaMRSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HamlinV21,
  author       = {Ariel Hamlin and
                  Mayank Varia},
  editor       = {Juan A. Garay},
  title        = {Two-Server Distributed {ORAM} with Sublinear Computation and Constant
                  Rounds},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12711},
  pages        = {499--527},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75248-4\_18},
  doi          = {10.1007/978-3-030-75248-4\_18},
  timestamp    = {Fri, 07 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HamlinV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HashimotoKKP21,
  author       = {Keitaro Hashimoto and
                  Shuichi Katsumata and
                  Kris Kwiatkowski and
                  Thomas Prest},
  editor       = {Juan A. Garay},
  title        = {An Efficient and Generic Construction for Signal's Handshake {(X3DH):}
                  Post-Quantum, State Leakage Secure, and Deniable},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12711},
  pages        = {410--440},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75248-4\_15},
  doi          = {10.1007/978-3-030-75248-4\_15},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HashimotoKKP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HeathKP21,
  author       = {David Heath and
                  Vladimir Kolesnikov and
                  Stanislav Peceny},
  editor       = {Juan A. Garay},
  title        = {Masked Triples - Amortizing Multiplication Triples Across Conditionals},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12711},
  pages        = {319--348},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75248-4\_12},
  doi          = {10.1007/978-3-030-75248-4\_12},
  timestamp    = {Fri, 07 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HeathKP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/IshaiLM21,
  author       = {Yuval Ishai and
                  Russell W. F. Lai and
                  Giulio Malavolta},
  editor       = {Juan A. Garay},
  title        = {A Geometric Approach to Homomorphic Secret Sharing},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12711},
  pages        = {92--119},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75248-4\_4},
  doi          = {10.1007/978-3-030-75248-4\_4},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/IshaiLM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/JagerKN21,
  author       = {Tibor Jager and
                  Rafael Kurek and
                  David Niehues},
  editor       = {Juan A. Garay},
  title        = {Efficient Adaptively-Secure IB-KEMs and VRFs via Near-Collision Resistance},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12710},
  pages        = {596--626},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75245-3\_22},
  doi          = {10.1007/978-3-030-75245-3\_22},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/JagerKN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/JareckiKX21,
  author       = {Stanislaw Jarecki and
                  Hugo Krawczyk and
                  Jiayu Xu},
  editor       = {Juan A. Garay},
  title        = {On the (In)Security of the Diffie-Hellman Oblivious {PRF} with Multiplicative
                  Blinding},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12711},
  pages        = {380--409},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75248-4\_14},
  doi          = {10.1007/978-3-030-75248-4\_14},
  timestamp    = {Fri, 07 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/JareckiKX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KhuranaW21,
  author       = {Dakshita Khurana and
                  Brent Waters},
  editor       = {Juan A. Garay},
  title        = {On the {CCA} Compatibility of Public-Key Infrastructure},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12711},
  pages        = {235--260},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75248-4\_9},
  doi          = {10.1007/978-3-030-75248-4\_9},
  timestamp    = {Fri, 07 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/KhuranaW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LaiLW21,
  author       = {Qiqi Lai and
                  Feng{-}Hao Liu and
                  Zhedong Wang},
  editor       = {Juan A. Garay},
  title        = {Rate-1 Key-Dependent Message Security via Reusable Homomorphic Extractor
                  Against Correlated-Source Attacks},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12710},
  pages        = {421--450},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75245-3\_16},
  doi          = {10.1007/978-3-030-75245-3\_16},
  timestamp    = {Fri, 07 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LaiLW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LiuW21,
  author       = {Xu Liu and
                  Mingqiang Wang},
  editor       = {Juan A. Garay},
  title        = {QCCA-Secure Generic Key Encapsulation Mechanism with Tighter Security
                  in the Quantum Random Oracle Model},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12710},
  pages        = {3--26},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75245-3\_1},
  doi          = {10.1007/978-3-030-75245-3\_1},
  timestamp    = {Fri, 07 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LiuW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Lyubashevsky0S21,
  author       = {Vadim Lyubashevsky and
                  Ngoc Khanh Nguyen and
                  Gregor Seiler},
  editor       = {Juan A. Garay},
  title        = {Shorter Lattice-Based Zero-Knowledge Proofs via One-Time Commitments},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12710},
  pages        = {215--241},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75245-3\_9},
  doi          = {10.1007/978-3-030-75245-3\_9},
  timestamp    = {Fri, 07 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Lyubashevsky0S21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/NguyenSSWXZ21,
  author       = {Khoa Nguyen and
                  Reihaneh Safavi{-}Naini and
                  Willy Susilo and
                  Huaxiong Wang and
                  Yanhong Xu and
                  Neng Zeng},
  editor       = {Juan A. Garay},
  title        = {Group Encryption: Full Dynamicity, Message Filtering and Code-Based
                  Instantiation},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12711},
  pages        = {678--708},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75248-4\_24},
  doi          = {10.1007/978-3-030-75248-4\_24},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/NguyenSSWXZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Niehues21,
  author       = {David Niehues},
  editor       = {Juan A. Garay},
  title        = {Verifiable Random Functions with Optimal Tightness},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12711},
  pages        = {61--91},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75248-4\_3},
  doi          = {10.1007/978-3-030-75248-4\_3},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Niehues21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Nuida21,
  author       = {Koji Nuida},
  editor       = {Juan A. Garay},
  title        = {Cryptographic Pseudorandom Generators Can Make Cryptosystems Problematic},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12711},
  pages        = {441--468},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75248-4\_16},
  doi          = {10.1007/978-3-030-75248-4\_16},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Nuida21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ONeillZ21,
  author       = {Adam O'Neill and
                  Mohammad Zaheri},
  editor       = {Juan A. Garay},
  title        = {On Selective-Opening Security of Deterministic Primitives},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12711},
  pages        = {147--172},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75248-4\_6},
  doi          = {10.1007/978-3-030-75248-4\_6},
  timestamp    = {Fri, 07 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/ONeillZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/OygardenFR21,
  author       = {Morten {\O}ygarden and
                  Patrick Felke and
                  H{\aa}vard Raddum},
  editor       = {Juan A. Garay},
  title        = {Analysis of Multivariate Encryption Schemes: Application to Dob},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12710},
  pages        = {155--183},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75245-3\_7},
  doi          = {10.1007/978-3-030-75245-3\_7},
  timestamp    = {Fri, 07 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/OygardenFR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Pereira21,
  author       = {Hilder Vitor Lima Pereira},
  editor       = {Juan A. Garay},
  title        = {Bootstrapping Fully Homomorphic Encryption over the Integers in Less
                  than One Second},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12710},
  pages        = {331--359},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75245-3\_13},
  doi          = {10.1007/978-3-030-75245-3\_13},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Pereira21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/PereiraB21,
  author       = {Geovandro C. C. F. Pereira and
                  Paulo S. L. M. Barreto},
  editor       = {Juan A. Garay},
  title        = {Isogeny-Based Key Compression Without Pairings},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12710},
  pages        = {131--154},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75245-3\_6},
  doi          = {10.1007/978-3-030-75245-3\_6},
  timestamp    = {Fri, 07 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/PereiraB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/PlanconP21,
  author       = {Maxime Plan{\c{c}}on and
                  Thomas Prest},
  editor       = {Juan A. Garay},
  title        = {Exact Lattice Sampling from Non-Gaussian Distributions},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12710},
  pages        = {573--595},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75245-3\_21},
  doi          = {10.1007/978-3-030-75245-3\_21},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/PlanconP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/PostlethwaiteV21,
  author       = {Eamonn W. Postlethwaite and
                  Fernando Virdia},
  editor       = {Juan A. Garay},
  title        = {On the Success Probability of Solving Unique {SVP} via {BKZ}},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12710},
  pages        = {68--98},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75245-3\_4},
  doi          = {10.1007/978-3-030-75245-3\_4},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/PostlethwaiteV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/RavivLT21,
  author       = {Netanel Raviv and
                  Ben Langton and
                  Itzhak Tamo},
  editor       = {Juan A. Garay},
  title        = {Multivariate Public Key Cryptosystem from Sidon Spaces},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12710},
  pages        = {242--265},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75245-3\_10},
  doi          = {10.1007/978-3-030-75245-3\_10},
  timestamp    = {Fri, 07 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/RavivLT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Sanders21,
  author       = {Olivier Sanders},
  editor       = {Juan A. Garay},
  title        = {Improving Revocation for Group Signature with Redactable Signature},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12710},
  pages        = {301--330},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75245-3\_12},
  doi          = {10.1007/978-3-030-75245-3\_12},
  timestamp    = {Fri, 07 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Sanders21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ScafuroSV21,
  author       = {Alessandra Scafuro and
                  Luisa Siniscalchi and
                  Ivan Visconti},
  editor       = {Juan A. Garay},
  title        = {Publicly Verifiable Zero Knowledge from (Collapsing) Blockchains},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12711},
  pages        = {469--498},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75248-4\_17},
  doi          = {10.1007/978-3-030-75248-4\_17},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/ScafuroSV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Walter21,
  author       = {Michael Walter},
  editor       = {Juan A. Garay},
  title        = {The Convergence of Slide-Type Reductions},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12710},
  pages        = {45--67},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75245-3\_3},
  doi          = {10.1007/978-3-030-75245-3\_3},
  timestamp    = {Tue, 07 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/Walter21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Wang0HT21,
  author       = {Yuyu Wang and
                  Takahiro Matsuda and
                  Goichiro Hanaoka and
                  Keisuke Tanaka},
  editor       = {Juan A. Garay},
  title        = {Impossibility on Tamper-Resilient Cryptography with Uniqueness Properties},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12710},
  pages        = {389--420},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75245-3\_15},
  doi          = {10.1007/978-3-030-75245-3\_15},
  timestamp    = {Mon, 21 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Wang0HT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/YuenCX21,
  author       = {Tsz Hon Yuen and
                  Handong Cui and
                  Xiang Xie},
  editor       = {Juan A. Garay},
  title        = {Compact Zero-Knowledge Proofs for Threshold {ECDSA} with Trustless
                  Setup},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12710},
  pages        = {481--511},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75245-3\_18},
  doi          = {10.1007/978-3-030-75245-3\_18},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/YuenCX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2021-1,
  editor       = {Juan A. Garay},
  title        = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12710},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75245-3},
  doi          = {10.1007/978-3-030-75245-3},
  isbn         = {978-3-030-75244-6},
  timestamp    = {Fri, 07 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/2021-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2021-2,
  editor       = {Juan A. Garay},
  title        = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12711},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75248-4},
  doi          = {10.1007/978-3-030-75248-4},
  isbn         = {978-3-030-75247-7},
  timestamp    = {Fri, 07 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/2021-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AbdolmalekiLS020,
  author       = {Behzad Abdolmaleki and
                  Helger Lipmaa and
                  Janno Siim and
                  Michal Zajac},
  editor       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Petros Wallden and
                  Vassilis Zikas},
  title        = {On {QA-NIZK} in the {BPK} Model},
  booktitle    = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
                  May 4-7, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12110},
  pages        = {590--620},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45374-9\_20},
  doi          = {10.1007/978-3-030-45374-9\_20},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AbdolmalekiLS020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AbeAO20,
  author       = {Masayuki Abe and
                  Miguel Ambrona and
                  Miyako Ohkubo},
  editor       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Petros Wallden and
                  Vassilis Zikas},
  title        = {On Black-Box Extensions of Non-interactive Zero-Knowledge Arguments,
                  and Signatures Directly from Simulation Soundness},
  booktitle    = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
                  May 4-7, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12110},
  pages        = {558--589},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45374-9\_19},
  doi          = {10.1007/978-3-030-45374-9\_19},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AbeAO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AgrawalLMT20,
  author       = {Shweta Agrawal and
                  Beno{\^{\i}}t Libert and
                  Monosij Maitra and
                  Radu Titiu},
  editor       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Petros Wallden and
                  Vassilis Zikas},
  title        = {Adaptive Simulation Security for Inner Product Functional Encryption},
  booktitle    = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
                  May 4-7, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12110},
  pages        = {34--64},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45374-9\_2},
  doi          = {10.1007/978-3-030-45374-9\_2},
  timestamp    = {Fri, 01 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AgrawalLMT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AgrikolaCH20,
  author       = {Thomas Agrikola and
                  Geoffroy Couteau and
                  Dennis Hofheinz},
  editor       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Petros Wallden and
                  Vassilis Zikas},
  title        = {The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential
                  iO},
  booktitle    = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
                  May 4-7, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12110},
  pages        = {187--219},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45374-9\_7},
  doi          = {10.1007/978-3-030-45374-9\_7},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AgrikolaCH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Bai0HRSSSZ20,
  author       = {Shi Bai and
                  Dipayan Das and
                  Ryo Hiromasa and
                  Miruna Rosca and
                  Amin Sakzad and
                  Damien Stehl{\'{e}} and
                  Ron Steinfeld and
                  Zhenfei Zhang},
  editor       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Petros Wallden and
                  Vassilis Zikas},
  title        = {MPSign: {A} Signature from Small-Secret Middle-Product Learning with
                  Errors},
  booktitle    = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
                  May 4-7, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12111},
  pages        = {66--93},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45388-6\_3},
  doi          = {10.1007/978-3-030-45388-6\_3},
  timestamp    = {Tue, 30 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Bai0HRSSSZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BaumN20,
  author       = {Carsten Baum and
                  Ariel Nof},
  editor       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Petros Wallden and
                  Vassilis Zikas},
  title        = {Concretely-Efficient Zero-Knowledge Arguments for Arithmetic Circuits
                  and Their Application to Lattice-Based Cryptography},
  booktitle    = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
                  May 4-7, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12110},
  pages        = {495--526},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45374-9\_17},
  doi          = {10.1007/978-3-030-45374-9\_17},
  timestamp    = {Fri, 01 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BaumN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Bhattacharyya20,
  author       = {Rishiraj Bhattacharyya},
  editor       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Petros Wallden and
                  Vassilis Zikas},
  title        = {Memory-Tight Reductions for Practical Key Encapsulation Mechanisms},
  booktitle    = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
                  May 4-7, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12110},
  pages        = {249--278},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45374-9\_9},
  doi          = {10.1007/978-3-030-45374-9\_9},
  timestamp    = {Fri, 01 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Bhattacharyya20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BouvierI20,
  author       = {Cyril Bouvier and
                  Laurent Imbert},
  editor       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Petros Wallden and
                  Vassilis Zikas},
  title        = {Faster Cofactorization with {ECM} Using Mixed Representations},
  booktitle    = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
                  May 4-7, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12111},
  pages        = {483--504},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45388-6\_17},
  doi          = {10.1007/978-3-030-45388-6\_17},
  timestamp    = {Fri, 01 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BouvierI20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BrakerskiK20,
  author       = {Zvika Brakerski and
                  Yael Kalai},
  editor       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Petros Wallden and
                  Vassilis Zikas},
  title        = {Witness Indistinguishability for Any Single-Round Argument with Applications
                  to Access Control},
  booktitle    = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
                  May 4-7, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12111},
  pages        = {97--123},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45388-6\_4},
  doi          = {10.1007/978-3-030-45388-6\_4},
  timestamp    = {Fri, 01 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BrakerskiK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CanettiSW20,
  author       = {Ran Canetti and
                  Pratik Sarkar and
                  Xiao Wang},
  editor       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Petros Wallden and
                  Vassilis Zikas},
  title        = {Blazing Fast {OT} for Three-Round {UC} {OT} Extension},
  booktitle    = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
                  May 4-7, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12111},
  pages        = {299--327},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45388-6\_11},
  doi          = {10.1007/978-3-030-45388-6\_11},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/CanettiSW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CaoOZ20,
  author       = {Nairen Cao and
                  Adam O'Neill and
                  Mohammad Zaheri},
  editor       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Petros Wallden and
                  Vassilis Zikas},
  title        = {Toward {RSA-OAEP} Without Random Oracles},
  booktitle    = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
                  May 4-7, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12110},
  pages        = {279--308},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45374-9\_10},
  doi          = {10.1007/978-3-030-45374-9\_10},
  timestamp    = {Fri, 01 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/CaoOZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CastagnosCLST20,
  author       = {Guilhem Castagnos and
                  Dario Catalano and
                  Fabien Laguillaumie and
                  Federico Savasta and
                  Ida Tucker},
  editor       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Petros Wallden and
                  Vassilis Zikas},
  title        = {Bandwidth-Efficient Threshold {EC-DSA}},
  booktitle    = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
                  May 4-7, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12111},
  pages        = {266--296},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45388-6\_10},
  doi          = {10.1007/978-3-030-45388-6\_10},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/CastagnosCLST20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CatalanoRFG20,
  author       = {Dario Catalano and
                  Mario Di Raimondo and
                  Dario Fiore and
                  Irene Giacomelli},
  editor       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Petros Wallden and
                  Vassilis Zikas},
  title        = {Mon{\textdollar}{\textbackslash}mathbb \{Z\}{\_}\{2\{k\}\}{\textdollar}a:
                  Fast Maliciously Secure Two Party Computation on {\textdollar}{\textbackslash}mathbb
                  \{Z\}{\_}\{2\{k\}\}{\textdollar}},
  booktitle    = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
                  May 4-7, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12111},
  pages        = {357--386},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45388-6\_13},
  doi          = {10.1007/978-3-030-45388-6\_13},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/CatalanoRFG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ChaillouxD20,
  author       = {Andr{\'{e}} Chailloux and
                  Thomas Debris{-}Alazard},
  editor       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Petros Wallden and
                  Vassilis Zikas},
  title        = {Tight and Optimal Reductions for Signatures Based on Average Trapdoor
                  Preimage Sampleable Functions and Applications to Code-Based Signatures},
  booktitle    = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
                  May 4-7, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12111},
  pages        = {453--479},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45388-6\_16},
  doi          = {10.1007/978-3-030-45388-6\_16},
  timestamp    = {Fri, 01 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/ChaillouxD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ChakrabortyPW20,
  author       = {Suvradip Chakraborty and
                  Manoj Prabhakaran and
                  Daniel Wichs},
  editor       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Petros Wallden and
                  Vassilis Zikas},
  title        = {Witness Maps and Applications},
  booktitle    = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
                  May 4-7, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12110},
  pages        = {220--246},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45374-9\_8},
  doi          = {10.1007/978-3-030-45374-9\_8},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/ChakrabortyPW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ChanPS20,
  author       = {T.{-}H. Hubert Chan and
                  Rafael Pass and
                  Elaine Shi},
  editor       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Petros Wallden and
                  Vassilis Zikas},
  title        = {Sublinear-Round Byzantine Agreement Under Corrupt Majority},
  booktitle    = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
                  May 4-7, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12111},
  pages        = {246--265},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45388-6\_9},
  doi          = {10.1007/978-3-030-45388-6\_9},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/ChanPS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CostelloLNRV20,
  author       = {Craig Costello and
                  Patrick Longa and
                  Michael Naehrig and
                  Joost Renes and
                  Fernando Virdia},
  editor       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Petros Wallden and
                  Vassilis Zikas},
  title        = {Improved Classical Cryptanalysis of {SIKE} in Practice},
  booktitle    = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
                  May 4-7, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12111},
  pages        = {505--534},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45388-6\_18},
  doi          = {10.1007/978-3-030-45388-6\_18},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/CostelloLNRV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DazaRZ20,
  author       = {Vanesa Daza and
                  Carla R{\`{a}}fols and
                  Alexandros Zacharakis},
  editor       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Petros Wallden and
                  Vassilis Zikas},
  title        = {Updateable Inner Product Argument with Logarithmic Verifier and Applications},
  booktitle    = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
                  May 4-7, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12110},
  pages        = {527--557},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45374-9\_18},
  doi          = {10.1007/978-3-030-45374-9\_18},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DazaRZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DerlerSS20,
  author       = {David Derler and
                  Kai Samelin and
                  Daniel Slamanig},
  editor       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Petros Wallden and
                  Vassilis Zikas},
  title        = {Bringing Order to Chaos: The Case of Collision-Resistant Chameleon-Hashes},
  booktitle    = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
                  May 4-7, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12110},
  pages        = {462--492},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45374-9\_16},
  doi          = {10.1007/978-3-030-45374-9\_16},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DerlerSS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DowlingRS20,
  author       = {Benjamin Dowling and
                  Paul R{\"{o}}sler and
                  J{\"{o}}rg Schwenk},
  editor       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Petros Wallden and
                  Vassilis Zikas},
  title        = {Flexible Authenticated and Confidential Channel Establishment (fACCE):
                  Analyzing the Noise Protocol Framework},
  booktitle    = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
                  May 4-7, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12110},
  pages        = {341--373},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45374-9\_12},
  doi          = {10.1007/978-3-030-45374-9\_12},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DowlingRS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DucasLW20,
  author       = {L{\'{e}}o Ducas and
                  Thijs Laarhoven and
                  Wessel P. J. van Woerden},
  editor       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Petros Wallden and
                  Vassilis Zikas},
  title        = {The Randomized Slicer for {CVPP:} Sharper, Faster, Smaller, Batchier},
  booktitle    = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
                  May 4-7, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12111},
  pages        = {3--36},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45388-6\_1},
  doi          = {10.1007/978-3-030-45388-6\_1},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DucasLW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FeoM20,
  author       = {Luca De Feo and
                  Michael Meyer},
  editor       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Petros Wallden and
                  Vassilis Zikas},
  title        = {Threshold Schemes from Isogeny Assumptions},
  booktitle    = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
                  May 4-7, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12111},
  pages        = {187--212},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45388-6\_7},
  doi          = {10.1007/978-3-030-45388-6\_7},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/FeoM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FioreNP20,
  author       = {Dario Fiore and
                  Anca Nitulescu and
                  David Pointcheval},
  editor       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Petros Wallden and
                  Vassilis Zikas},
  title        = {Boosting Verifiable Computation on Encrypted Data},
  booktitle    = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
                  May 4-7, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12111},
  pages        = {124--154},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45388-6\_5},
  doi          = {10.1007/978-3-030-45388-6\_5},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/FioreNP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GargGH20,
  author       = {Sanjam Garg and
                  Romain Gay and
                  Mohammad Hajiabadi},
  editor       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Petros Wallden and
                  Vassilis Zikas},
  title        = {Master-Key KDM-Secure {IBE} from Pairings},
  booktitle    = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
                  May 4-7, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12110},
  pages        = {123--152},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45374-9\_5},
  doi          = {10.1007/978-3-030-45374-9\_5},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/GargGH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Gay20,
  author       = {Romain Gay},
  editor       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Petros Wallden and
                  Vassilis Zikas},
  title        = {A New Paradigm for Public-Key Functional Encryption for Degree-2 Polynomials},
  booktitle    = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
                  May 4-7, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12110},
  pages        = {95--120},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45374-9\_4},
  doi          = {10.1007/978-3-030-45374-9\_4},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Gay20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GeniseMP020,
  author       = {Nicholas Genise and
                  Daniele Micciancio and
                  Chris Peikert and
                  Michael Walter},
  editor       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Petros Wallden and
                  Vassilis Zikas},
  title        = {Improved Discrete Gaussian and Subgaussian Analysis for Lattice Cryptography},
  booktitle    = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
                  May 4-7, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12110},
  pages        = {623--651},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45374-9\_21},
  doi          = {10.1007/978-3-030-45374-9\_21},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/GeniseMP020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Guillevic20,
  author       = {Aurore Guillevic},
  editor       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Petros Wallden and
                  Vassilis Zikas},
  title        = {A Short-List of Pairing-Friendly Curves Resistant to Special {TNFS}
                  at the 128-Bit Security Level},
  booktitle    = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
                  May 4-7, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12111},
  pages        = {535--564},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45388-6\_19},
  doi          = {10.1007/978-3-030-45388-6\_19},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Guillevic20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GuoKRS20,
  author       = {Siyao Guo and
                  Pritish Kamath and
                  Alon Rosen and
                  Katerina Sotiraki},
  editor       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Petros Wallden and
                  Vassilis Zikas},
  title        = {Limits on the Efficiency of (Ring) {LWE} Based Non-interactive Key
                  Exchange},
  booktitle    = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
                  May 4-7, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12110},
  pages        = {374--395},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45374-9\_13},
  doi          = {10.1007/978-3-030-45374-9\_13},
  timestamp    = {Fri, 01 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/GuoKRS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HaqueS20,
  author       = {Abida Haque and
                  Alessandra Scafuro},
  editor       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Petros Wallden and
                  Vassilis Zikas},
  title        = {Threshold Ring Signatures: New Definitions and Post-quantum Security},
  booktitle    = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
                  May 4-7, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12111},
  pages        = {423--452},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45388-6\_15},
  doi          = {10.1007/978-3-030-45388-6\_15},
  timestamp    = {Fri, 01 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HaqueS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HazaySV20,
  author       = {Carmit Hazay and
                  Abhi Shelat and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Petros Wallden and
                  Vassilis Zikas},
  title        = {Going Beyond Dual Execution: {MPC} for Functions with Efficient Verification},
  booktitle    = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
                  May 4-7, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12111},
  pages        = {328--356},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45388-6\_12},
  doi          = {10.1007/978-3-030-45388-6\_12},
  timestamp    = {Fri, 01 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HazaySV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HebantPP20,
  author       = {Chlo{\'{e}} H{\'{e}}bant and
                  Duong Hieu Phan and
                  David Pointcheval},
  editor       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Petros Wallden and
                  Vassilis Zikas},
  title        = {Linearly-Homomorphic Signatures and Scalable Mix-Nets},
  booktitle    = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
                  May 4-7, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12111},
  pages        = {597--627},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45388-6\_21},
  doi          = {10.1007/978-3-030-45388-6\_21},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HebantPP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HovelmannsKSU20,
  author       = {Kathrin H{\"{o}}velmanns and
                  Eike Kiltz and
                  Sven Sch{\"{a}}ge and
                  Dominique Unruh},
  editor       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Petros Wallden and
                  Vassilis Zikas},
  title        = {Generic Authenticated Key Exchange in the Quantum Random Oracle Model},
  booktitle    = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
                  May 4-7, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12111},
  pages        = {389--422},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45388-6\_14},
  doi          = {10.1007/978-3-030-45388-6\_14},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HovelmannsKSU20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/JiangGHNW20,
  author       = {Shaoquan Jiang and
                  Guang Gong and
                  Jingnan He and
                  Khoa Nguyen and
                  Huaxiong Wang},
  editor       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Petros Wallden and
                  Vassilis Zikas},
  title        = {PAKEs: New Framework, New Techniques and More Efficient Lattice-Based
                  Constructions in the Standard Model},
  booktitle    = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
                  May 4-7, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12110},
  pages        = {396--427},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45374-9\_14},
  doi          = {10.1007/978-3-030-45374-9\_14},
  timestamp    = {Wed, 21 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/JiangGHNW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KaafaraniKP20,
  author       = {Ali {El Kaafarani} and
                  Shuichi Katsumata and
                  Federico Pintore},
  editor       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Petros Wallden and
                  Vassilis Zikas},
  title        = {Lossy CSI-FiSh: Efficient Signature Scheme with Tight Reduction to
                  Decisional {CSIDH-512}},
  booktitle    = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
                  May 4-7, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12111},
  pages        = {157--186},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45388-6\_6},
  doi          = {10.1007/978-3-030-45388-6\_6},
  timestamp    = {Fri, 01 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/KaafaraniKP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LaVigneZMMMT20,
  author       = {Rio LaVigne and
                  Chen{-}Da Liu Zhang and
                  Ueli Maurer and
                  Tal Moran and
                  Marta Mularczyk and
                  Daniel Tschudi},
  editor       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Petros Wallden and
                  Vassilis Zikas},
  title        = {Topology-Hiding Computation for Networks with Unknown Delays},
  booktitle    = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
                  May 4-7, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12111},
  pages        = {215--245},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45388-6\_8},
  doi          = {10.1007/978-3-030-45388-6\_8},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LaVigneZMMMT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LaiLW20,
  author       = {Qiqi Lai and
                  Feng{-}Hao Liu and
                  Zhedong Wang},
  editor       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Petros Wallden and
                  Vassilis Zikas},
  title        = {Almost Tight Security in Lattices with Polynomial Moduli - PRF, IBE,
                  All-but-many LTF, and More},
  booktitle    = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
                  May 4-7, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12110},
  pages        = {652--681},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45374-9\_22},
  doi          = {10.1007/978-3-030-45374-9\_22},
  timestamp    = {Fri, 01 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LaiLW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LangrehrP20,
  author       = {Roman Langrehr and
                  Jiaxin Pan},
  editor       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Petros Wallden and
                  Vassilis Zikas},
  title        = {Hierarchical Identity-Based Encryption with Tight Multi-challenge
                  Security},
  booktitle    = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
                  May 4-7, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12110},
  pages        = {153--183},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45374-9\_6},
  doi          = {10.1007/978-3-030-45374-9\_6},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LangrehrP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/PeikertS20,
  author       = {Chris Peikert and
                  Sina Shiehian},
  editor       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Petros Wallden and
                  Vassilis Zikas},
  title        = {Constraining and Watermarking PRFs from Milder Assumptions},
  booktitle    = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
                  May 4-7, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12110},
  pages        = {431--461},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45374-9\_15},
  doi          = {10.1007/978-3-030-45374-9\_15},
  timestamp    = {Fri, 01 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/PeikertS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Sanders20,
  author       = {Olivier Sanders},
  editor       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Petros Wallden and
                  Vassilis Zikas},
  title        = {Efficient Redactable Signature and Application to Anonymous Credentials},
  booktitle    = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
                  May 4-7, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12111},
  pages        = {628--656},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45388-6\_22},
  doi          = {10.1007/978-3-030-45388-6\_22},
  timestamp    = {Fri, 01 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Sanders20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/SchageSL20,
  author       = {Sven Sch{\"{a}}ge and
                  J{\"{o}}rg Schwenk and
                  Sebastian Lauer},
  editor       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Petros Wallden and
                  Vassilis Zikas},
  title        = {Privacy-Preserving Authenticated Key Exchange and the Case of IKEv2},
  booktitle    = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
                  May 4-7, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12111},
  pages        = {567--596},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45388-6\_20},
  doi          = {10.1007/978-3-030-45388-6\_20},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/SchageSL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/SoroushIRRR20,
  author       = {Najmeh Soroush and
                  Vincenzo Iovino and
                  Alfredo Rial and
                  Peter B. R{\o}nne and
                  Peter Y. A. Ryan},
  editor       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Petros Wallden and
                  Vassilis Zikas},
  title        = {Verifiable Inner Product Encryption Scheme},
  booktitle    = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
                  May 4-7, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12110},
  pages        = {65--94},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45374-9\_3},
  doi          = {10.1007/978-3-030-45374-9\_3},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/SoroushIRRR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/SunSSLG20,
  author       = {Shifeng Sun and
                  Amin Sakzad and
                  Ron Steinfeld and
                  Joseph K. Liu and
                  Dawu Gu},
  editor       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Petros Wallden and
                  Vassilis Zikas},
  title        = {Public-Key Puncturable Encryption: Modular and Compact Constructions},
  booktitle    = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
                  May 4-7, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12110},
  pages        = {309--338},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45374-9\_11},
  doi          = {10.1007/978-3-030-45374-9\_11},
  timestamp    = {Wed, 25 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/SunSSLG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/TomidaKN20,
  author       = {Junichi Tomida and
                  Yuto Kawahara and
                  Ryo Nishimaki},
  editor       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Petros Wallden and
                  Vassilis Zikas},
  title        = {Fast, Compact, and Expressive Attribute-Based Encryption},
  booktitle    = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
                  May 4-7, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12110},
  pages        = {3--33},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45374-9\_1},
  doi          = {10.1007/978-3-030-45374-9\_1},
  timestamp    = {Fri, 01 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/TomidaKN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Zhang0FZY20,
  author       = {Jiang Zhang and
                  Yu Yu and
                  Shuqin Fan and
                  Zhenfeng Zhang and
                  Kang Yang},
  editor       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Petros Wallden and
                  Vassilis Zikas},
  title        = {Tweaking the Asymmetry of Asymmetric-Key Cryptography on Lattices:
                  KEMs and Signatures of Smaller Sizes},
  booktitle    = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
                  May 4-7, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12111},
  pages        = {37--65},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45388-6\_2},
  doi          = {10.1007/978-3-030-45388-6\_2},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/Zhang0FZY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2020-1,
  editor       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Petros Wallden and
                  Vassilis Zikas},
  title        = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
                  May 4-7, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12110},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45374-9},
  doi          = {10.1007/978-3-030-45374-9},
  isbn         = {978-3-030-45373-2},
  timestamp    = {Fri, 01 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/2020-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2020-2,
  editor       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Petros Wallden and
                  Vassilis Zikas},
  title        = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
                  May 4-7, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12111},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45388-6},
  doi          = {10.1007/978-3-030-45388-6},
  isbn         = {978-3-030-45387-9},
  timestamp    = {Fri, 01 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/2020-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AbdallaBKW19,
  author       = {Michel Abdalla and
                  Fabrice Benhamouda and
                  Markulf Kohlweiss and
                  Hendrik Waldner},
  editor       = {Dongdai Lin and
                  Kazue Sako},
  title        = {Decentralizing Inner-Product Functional Encryption},
  booktitle    = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Beijing, China,
                  April 14-17, 2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11443},
  pages        = {128--157},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17259-6\_5},
  doi          = {10.1007/978-3-030-17259-6\_5},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AbdallaBKW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AttrapadungMNYY19,
  author       = {Nuttapong Attrapadung and
                  Takahiro Matsuda and
                  Ryo Nishimaki and
                  Shota Yamada and
                  Takashi Yamakawa},
  editor       = {Dongdai Lin and
                  Kazue Sako},
  title        = {Adaptively Single-Key Secure Constrained PRFs for {\textbackslash}mathrm
                  {NC1}},
  booktitle    = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Beijing, China,
                  April 14-17, 2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11443},
  pages        = {223--253},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17259-6\_8},
  doi          = {10.1007/978-3-030-17259-6\_8},
  timestamp    = {Tue, 09 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AttrapadungMNYY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BackesHHKP19,
  author       = {Michael Backes and
                  Lucjan Hanzlik and
                  Amir Herzberg and
                  Aniket Kate and
                  Ivan Pryvalov},
  editor       = {Dongdai Lin and
                  Kazue Sako},
  title        = {Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains Without
                  Trusted Setup},
  booktitle    = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Beijing, China,
                  April 14-17, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11442},
  pages        = {286--313},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17253-4\_10},
  doi          = {10.1007/978-3-030-17253-4\_10},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BackesHHKP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BeullensW19,
  author       = {Ward Beullens and
                  Hoeteck Wee},
  editor       = {Dongdai Lin and
                  Kazue Sako},
  title        = {Obfuscating Simple Functionalities from Knowledge Assumptions},
  booktitle    = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Beijing, China,
                  April 14-17, 2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11443},
  pages        = {254--283},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17259-6\_9},
  doi          = {10.1007/978-3-030-17259-6\_9},
  timestamp    = {Tue, 09 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BeullensW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BultelLLMST19,
  author       = {Xavier Bultel and
                  Pascal Lafourcade and
                  Russell W. F. Lai and
                  Giulio Malavolta and
                  Dominique Schr{\"{o}}der and
                  Sri Aravinda Krishnan Thyagarajan},
  editor       = {Dongdai Lin and
                  Kazue Sako},
  title        = {Efficient Invisible and Unlinkable Sanitizable Signatures},
  booktitle    = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Beijing, China,
                  April 14-17, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11442},
  pages        = {159--189},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17253-4\_6},
  doi          = {10.1007/978-3-030-17253-4\_6},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/BultelLLMST19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ChowRTYZZ19,
  author       = {Sherman S. M. Chow and
                  Alexander Russell and
                  Qiang Tang and
                  Moti Yung and
                  Yongjun Zhao and
                  Hong{-}Sheng Zhou},
  editor       = {Dongdai Lin and
                  Kazue Sako},
  title        = {Let a Non-barking Watchdog Bite: Cliptographic Signatures with an
                  Offline Watchdog},
  booktitle    = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Beijing, China,
                  April 14-17, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11442},
  pages        = {221--251},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17253-4\_8},
  doi          = {10.1007/978-3-030-17253-4\_8},
  timestamp    = {Fri, 12 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/ChowRTYZZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ClearM19,
  author       = {Michael Clear and
                  Ciaran McGoldrick},
  editor       = {Dongdai Lin and
                  Kazue Sako},
  title        = {Additively Homomorphic {IBE} from Higher Residuosity},
  booktitle    = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Beijing, China,
                  April 14-17, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11442},
  pages        = {496--515},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17253-4\_17},
  doi          = {10.1007/978-3-030-17253-4\_17},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/ClearM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Cohen19,
  author       = {Aloni Cohen},
  editor       = {Dongdai Lin and
                  Kazue Sako},
  title        = {What About Bob? The Inadequacy of {CPA} Security for Proxy Reencryption},
  booktitle    = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Beijing, China,
                  April 14-17, 2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11443},
  pages        = {287--316},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17259-6\_10},
  doi          = {10.1007/978-3-030-17259-6\_10},
  timestamp    = {Tue, 09 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Cohen19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CouteauR19,
  author       = {Geoffroy Couteau and
                  Michael Reichle},
  editor       = {Dongdai Lin and
                  Kazue Sako},
  title        = {Non-interactive Keyed-Verification Anonymous Credentials},
  booktitle    = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Beijing, China,
                  April 14-17, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11442},
  pages        = {66--96},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17253-4\_3},
  doi          = {10.1007/978-3-030-17253-4\_3},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/CouteauR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DAnversGJNVV19,
  author       = {Jan{-}Pieter D'Anvers and
                  Qian Guo and
                  Thomas Johansson and
                  Alexander Nilsson and
                  Frederik Vercauteren and
                  Ingrid Verbauwhede},
  editor       = {Dongdai Lin and
                  Kazue Sako},
  title        = {Decryption Failure Attacks on {IND-CCA} Secure Lattice-Based Schemes},
  booktitle    = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Beijing, China,
                  April 14-17, 2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11443},
  pages        = {565--598},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17259-6\_19},
  doi          = {10.1007/978-3-030-17259-6\_19},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/DAnversGJNVV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Dachman-SoledK19,
  author       = {Dana Dachman{-}Soled and
                  Mukul Kulkarni},
  editor       = {Dongdai Lin and
                  Kazue Sako},
  title        = {Upper and Lower Bounds for Continuous Non-Malleable Codes},
  booktitle    = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Beijing, China,
                  April 14-17, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11442},
  pages        = {519--548},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17253-4\_18},
  doi          = {10.1007/978-3-030-17253-4\_18},
  timestamp    = {Tue, 09 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Dachman-SoledK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DattaOT19,
  author       = {Pratish Datta and
                  Tatsuaki Okamoto and
                  Katsuyuki Takashima},
  editor       = {Dongdai Lin and
                  Kazue Sako},
  title        = {Efficient Attribute-Based Signatures for Unbounded Arithmetic Branching
                  Programs},
  booktitle    = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Beijing, China,
                  April 14-17, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11442},
  pages        = {127--158},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17253-4\_5},
  doi          = {10.1007/978-3-030-17253-4\_5},
  timestamp    = {Tue, 09 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DattaOT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DazaGPRS19,
  author       = {Vanesa Daza and
                  Alonso Gonz{\'{a}}lez and
                  Zaira Pindado and
                  Carla R{\`{a}}fols and
                  Javier Silva},
  editor       = {Dongdai Lin and
                  Kazue Sako},
  title        = {Shorter Quadratic {QA-NIZK} Proofs},
  booktitle    = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Beijing, China,
                  April 14-17, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11442},
  pages        = {314--343},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17253-4\_11},
  doi          = {10.1007/978-3-030-17253-4\_11},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DazaGPRS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FuchsbauerKKP19,
  author       = {Georg Fuchsbauer and
                  Chethan Kamath and
                  Karen Klein and
                  Krzysztof Pietrzak},
  editor       = {Dongdai Lin and
                  Kazue Sako},
  title        = {Adaptively Secure Proxy Re-encryption},
  booktitle    = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Beijing, China,
                  April 14-17, 2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11443},
  pages        = {317--346},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17259-6\_11},
  doi          = {10.1007/978-3-030-17259-6\_11},
  timestamp    = {Tue, 09 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/FuchsbauerKKP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GalbraithMP19,
  author       = {Steven D. Galbraith and
                  Jake Massimo and
                  Kenneth G. Paterson},
  editor       = {Dongdai Lin and
                  Kazue Sako},
  title        = {Safety in Numbers: On the Need for Robust Diffie-Hellman Parameter
                  Validation},
  booktitle    = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Beijing, China,
                  April 14-17, 2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11443},
  pages        = {379--407},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17259-6\_13},
  doi          = {10.1007/978-3-030-17259-6\_13},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/GalbraithMP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GargHMRS19,
  author       = {Sanjam Garg and
                  Mohammad Hajiabadi and
                  Mohammad Mahmoody and
                  Ahmadreza Rahimi and
                  Sruthi Sekar},
  editor       = {Dongdai Lin and
                  Kazue Sako},
  title        = {Registration-Based Encryption from Standard Assumptions},
  booktitle    = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Beijing, China,
                  April 14-17, 2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11443},
  pages        = {63--93},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17259-6\_3},
  doi          = {10.1007/978-3-030-17259-6\_3},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/GargHMRS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GarmsL19,
  author       = {Lydia Garms and
                  Anja Lehmann},
  editor       = {Dongdai Lin and
                  Kazue Sako},
  title        = {Group Signatures with Selective Linkability},
  booktitle    = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Beijing, China,
                  April 14-17, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11442},
  pages        = {190--220},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17253-4\_7},
  doi          = {10.1007/978-3-030-17253-4\_7},
  timestamp    = {Tue, 09 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/GarmsL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GeW19,
  author       = {Aijun Ge and
                  Puwen Wei},
  editor       = {Dongdai Lin and
                  Kazue Sako},
  title        = {Identity-Based Broadcast Encryption with Efficient Revocation},
  booktitle    = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Beijing, China,
                  April 14-17, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11442},
  pages        = {405--435},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17253-4\_14},
  doi          = {10.1007/978-3-030-17253-4\_14},
  timestamp    = {Tue, 15 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/GeW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Gonzalez19,
  author       = {Alonso Gonz{\'{a}}lez},
  editor       = {Dongdai Lin and
                  Kazue Sako},
  title        = {Shorter Ring Signatures from Standard Assumptions},
  booktitle    = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Beijing, China,
                  April 14-17, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11442},
  pages        = {99--126},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17253-4\_4},
  doi          = {10.1007/978-3-030-17253-4\_4},
  timestamp    = {Tue, 09 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Gonzalez19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GoyalVW19,
  author       = {Rishab Goyal and
                  Satyanarayana Vusirikala and
                  Brent Waters},
  editor       = {Dongdai Lin and
                  Kazue Sako},
  title        = {Collusion Resistant Broadcast and Trace from Positional Witness Encryption},
  booktitle    = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Beijing, China,
                  April 14-17, 2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11443},
  pages        = {3--33},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17259-6\_1},
  doi          = {10.1007/978-3-030-17259-6\_1},
  timestamp    = {Tue, 09 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/GoyalVW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HofheinzN19,
  author       = {Dennis Hofheinz and
                  Ngoc Khanh Nguyen},
  editor       = {Dongdai Lin and
                  Kazue Sako},
  title        = {On Tightly Secure Primitives in the Multi-instance Setting},
  booktitle    = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Beijing, China,
                  April 14-17, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11442},
  pages        = {581--611},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17253-4\_20},
  doi          = {10.1007/978-3-030-17253-4\_20},
  timestamp    = {Tue, 09 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HofheinzN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/JiangZM19,
  author       = {Haodong Jiang and
                  Zhenfeng Zhang and
                  Zhi Ma},
  editor       = {Dongdai Lin and
                  Kazue Sako},
  title        = {Key Encapsulation Mechanism with Explicit Rejection in the Quantum
                  Random Oracle Model},
  booktitle    = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Beijing, China,
                  April 14-17, 2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11443},
  pages        = {618--645},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17259-6\_21},
  doi          = {10.1007/978-3-030-17259-6\_21},
  timestamp    = {Tue, 13 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/JiangZM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KatsumataMT19,
  author       = {Shuichi Katsumata and
                  Takahiro Matsuda and
                  Atsushi Takayasu},
  editor       = {Dongdai Lin and
                  Kazue Sako},
  title        = {Lattice-Based Revocable (Hierarchical) {IBE} with Decryption Key Exposure
                  Resistance},
  booktitle    = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Beijing, China,
                  April 14-17, 2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11443},
  pages        = {441--471},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17259-6\_15},
  doi          = {10.1007/978-3-030-17259-6\_15},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/KatsumataMT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KatsumataY19,
  author       = {Shuichi Katsumata and
                  Shota Yamada},
  editor       = {Dongdai Lin and
                  Kazue Sako},
  title        = {Non-zero Inner Product Encryption Schemes from Various Assumptions:
                  LWE, {DDH} and {DCR}},
  booktitle    = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Beijing, China,
                  April 14-17, 2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11443},
  pages        = {158--188},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17259-6\_6},
  doi          = {10.1007/978-3-030-17259-6\_6},
  timestamp    = {Tue, 09 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/KatsumataY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Kohl19,
  author       = {Lisa Kohl},
  editor       = {Dongdai Lin and
                  Kazue Sako},
  title        = {Hunting and Gathering - Verifiable Random Functions from Standard
                  Assumptions with Short Proofs},
  booktitle    = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Beijing, China,
                  April 14-17, 2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11443},
  pages        = {408--437},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17259-6\_14},
  doi          = {10.1007/978-3-030-17259-6\_14},
  timestamp    = {Tue, 09 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Kohl19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KushilevitzM19,
  author       = {Eyal Kushilevitz and
                  Tamer Mour},
  editor       = {Dongdai Lin and
                  Kazue Sako},
  title        = {Sub-logarithmic Distributed Oblivious {RAM} with Small Block Size},
  booktitle    = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Beijing, China,
                  April 14-17, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11442},
  pages        = {3--33},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17253-4\_1},
  doi          = {10.1007/978-3-030-17253-4\_1},
  timestamp    = {Tue, 09 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/KushilevitzM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LangrehrP19,
  author       = {Roman Langrehr and
                  Jiaxin Pan},
  editor       = {Dongdai Lin and
                  Kazue Sako},
  title        = {Tightly Secure Hierarchical Identity-Based Encryption},
  booktitle    = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Beijing, China,
                  April 14-17, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11442},
  pages        = {436--465},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17253-4\_15},
  doi          = {10.1007/978-3-030-17253-4\_15},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LangrehrP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LiXY19,
  author       = {Zhe Li and
                  Chaoping Xing and
                  Sze Ling Yeo},
  editor       = {Dongdai Lin and
                  Kazue Sako},
  title        = {Reducing the Key Size of McEliece Cryptosystem from Automorphism-induced
                  Goppa Codes via Permutations},
  booktitle    = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Beijing, China,
                  April 14-17, 2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11443},
  pages        = {599--617},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17259-6\_20},
  doi          = {10.1007/978-3-030-17259-6\_20},
  timestamp    = {Tue, 09 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LiXY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LibertNTW19,
  author       = {Beno{\^{\i}}t Libert and
                  Khoa Nguyen and
                  Benjamin Hong Meng Tan and
                  Huaxiong Wang},
  editor       = {Dongdai Lin and
                  Kazue Sako},
  title        = {Zero-Knowledge Elementary Databases with More Expressive Queries},
  booktitle    = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Beijing, China,
                  April 14-17, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11442},
  pages        = {255--285},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17253-4\_9},
  doi          = {10.1007/978-3-030-17253-4\_9},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/LibertNTW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LibertQ19,
  author       = {Beno{\^{\i}}t Libert and
                  Chen Qian},
  editor       = {Dongdai Lin and
                  Kazue Sako},
  title        = {Lossy Algebraic Filters with Short Tags},
  booktitle    = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Beijing, China,
                  April 14-17, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11442},
  pages        = {34--65},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17253-4\_2},
  doi          = {10.1007/978-3-030-17253-4\_2},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LibertQ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/MatsudaTMH19,
  author       = {Takahiro Matsuda and
                  Kenta Takahashi and
                  Takao Murakami and
                  Goichiro Hanaoka},
  editor       = {Dongdai Lin and
                  Kazue Sako},
  title        = {Improved Security Evaluation Techniques for Imperfect Randomness from
                  Arbitrary Distributions},
  booktitle    = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Beijing, China,
                  April 14-17, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11442},
  pages        = {549--580},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17253-4\_19},
  doi          = {10.1007/978-3-030-17253-4\_19},
  timestamp    = {Tue, 09 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/MatsudaTMH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/MerzP19,
  author       = {Simon{-}Philipp Merz and
                  Christophe Petit},
  editor       = {Dongdai Lin and
                  Kazue Sako},
  title        = {Factoring Products of Braids via Garside Normal Form},
  booktitle    = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Beijing, China,
                  April 14-17, 2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11443},
  pages        = {646--678},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17259-6\_22},
  doi          = {10.1007/978-3-030-17259-6\_22},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/MerzP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/NishimakiY19,
  author       = {Ryo Nishimaki and
                  Takashi Yamakawa},
  editor       = {Dongdai Lin and
                  Kazue Sako},
  title        = {Leakage-Resilient Identity-Based Encryption in Bounded Retrieval Model
                  with Nearly Optimal Leakage-Ratio},
  booktitle    = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Beijing, China,
                  April 14-17, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11442},
  pages        = {466--495},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17253-4\_16},
  doi          = {10.1007/978-3-030-17253-4\_16},
  timestamp    = {Tue, 09 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/NishimakiY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/PatranabisMR19,
  author       = {Sikhar Patranabis and
                  Debdeep Mukhopadhyay and
                  Somindu C. Ramanna},
  editor       = {Dongdai Lin and
                  Kazue Sako},
  title        = {Function Private Predicate Encryption for Low Min-Entropy Predicates},
  booktitle    = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Beijing, China,
                  April 14-17, 2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11443},
  pages        = {189--219},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17259-6\_7},
  doi          = {10.1007/978-3-030-17259-6\_7},
  timestamp    = {Tue, 09 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/PatranabisMR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/PinoLS19,
  author       = {Rafa{\"{e}}l del Pino and
                  Vadim Lyubashevsky and
                  Gregor Seiler},
  editor       = {Dongdai Lin and
                  Kazue Sako},
  title        = {Short Discrete Log Proofs for {FHE} and Ring-LWE Ciphertexts},
  booktitle    = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Beijing, China,
                  April 14-17, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11442},
  pages        = {344--373},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17253-4\_12},
  doi          = {10.1007/978-3-030-17253-4\_12},
  timestamp    = {Tue, 09 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/PinoLS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/PorninP19,
  author       = {Thomas Pornin and
                  Thomas Prest},
  editor       = {Dongdai Lin and
                  Kazue Sako},
  title        = {More Efficient Algorithms for the {NTRU} Key Generation Using the
                  Field Norm},
  booktitle    = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Beijing, China,
                  April 14-17, 2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11443},
  pages        = {504--533},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17259-6\_17},
  doi          = {10.1007/978-3-030-17259-6\_17},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/PorninP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/RothblumSS19,
  author       = {Ron D. Rothblum and
                  Adam Sealfon and
                  Katerina Sotiraki},
  editor       = {Dongdai Lin and
                  Kazue Sako},
  title        = {Towards Non-Interactive Zero-Knowledge for {NP} from {LWE}},
  booktitle    = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Beijing, China,
                  April 14-17, 2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11443},
  pages        = {472--503},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17259-6\_16},
  doi          = {10.1007/978-3-030-17259-6\_16},
  timestamp    = {Tue, 09 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/RothblumSS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Scafuro19,
  author       = {Alessandra Scafuro},
  editor       = {Dongdai Lin and
                  Kazue Sako},
  title        = {Break-glass Encryption},
  booktitle    = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Beijing, China,
                  April 14-17, 2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11443},
  pages        = {34--62},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17259-6\_2},
  doi          = {10.1007/978-3-030-17259-6\_2},
  timestamp    = {Tue, 09 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Scafuro19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ScafuroSV19,
  author       = {Alessandra Scafuro and
                  Luisa Siniscalchi and
                  Ivan Visconti},
  editor       = {Dongdai Lin and
                  Kazue Sako},
  title        = {Publicly Verifiable Proofs from Blockchains},
  booktitle    = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Beijing, China,
                  April 14-17, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11442},
  pages        = {374--401},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17253-4\_13},
  doi          = {10.1007/978-3-030-17253-4\_13},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/ScafuroSV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/SchneiderPOG19,
  author       = {Tobias Schneider and
                  Clara Paglialonga and
                  Tobias Oder and
                  Tim G{\"{u}}neysu},
  editor       = {Dongdai Lin and
                  Kazue Sako},
  title        = {Efficiently Masking Binomial Sampling at Arbitrary Orders for Lattice-Based
                  Crypto},
  booktitle    = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Beijing, China,
                  April 14-17, 2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11443},
  pages        = {534--564},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17259-6\_18},
  doi          = {10.1007/978-3-030-17259-6\_18},
  timestamp    = {Tue, 09 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/SchneiderPOG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/WangFL19,
  author       = {Zhedong Wang and
                  Xiong Fan and
                  Feng{-}Hao Liu},
  editor       = {Dongdai Lin and
                  Kazue Sako},
  title        = {{FE} for Inner Products and Its Application to Decentralized {ABE}},
  booktitle    = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Beijing, China,
                  April 14-17, 2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11443},
  pages        = {97--127},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17259-6\_4},
  doi          = {10.1007/978-3-030-17259-6\_4},
  timestamp    = {Tue, 09 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/WangFL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/WenLG19,
  author       = {Yunhua Wen and
                  Shengli Liu and
                  Dawu Gu},
  editor       = {Dongdai Lin and
                  Kazue Sako},
  title        = {Generic Constructions of Robustly Reusable Fuzzy Extractor},
  booktitle    = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Beijing, China,
                  April 14-17, 2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11443},
  pages        = {349--378},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17259-6\_12},
  doi          = {10.1007/978-3-030-17259-6\_12},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/WenLG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2019-1,
  editor       = {Dongdai Lin and
                  Kazue Sako},
  title        = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Beijing, China,
                  April 14-17, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11442},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17253-4},
  doi          = {10.1007/978-3-030-17253-4},
  isbn         = {978-3-030-17252-7},
  timestamp    = {Fri, 01 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/2019-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2019-2,
  editor       = {Dongdai Lin and
                  Kazue Sako},
  title        = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Beijing, China,
                  April 14-17, 2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11443},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17259-6},
  doi          = {10.1007/978-3-030-17259-6},
  isbn         = {978-3-030-17258-9},
  timestamp    = {Fri, 01 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/2019-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/0002S18,
  author       = {Takahiro Matsuda and
                  Jacob C. N. Schuldt},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {Related Randomness Security for Public Key Encryption, Revisited},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10769},
  pages        = {280--311},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76578-5\_10},
  doi          = {10.1007/978-3-319-76578-5\_10},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/0002S18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AgrikolaH18,
  author       = {Thomas Agrikola and
                  Dennis Hofheinz},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {Interactively Secure Groups from Obfuscation},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10770},
  pages        = {341--370},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76581-5\_12},
  doi          = {10.1007/978-3-319-76581-5\_12},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AgrikolaH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AlamatiPS18,
  author       = {Navid Alamati and
                  Chris Peikert and
                  Noah Stephens{-}Davidowitz},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {New (and Old) Proof Systems for Lattice Problems},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10770},
  pages        = {619--643},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76581-5\_21},
  doi          = {10.1007/978-3-319-76581-5\_21},
  timestamp    = {Fri, 13 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AlamatiPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AuerbachBK18,
  author       = {Benedikt Auerbach and
                  Mihir Bellare and
                  Eike Kiltz},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {Public-Key Encryption Resistant to Parameter Subversion and Its Realization
                  from Efficiently-Embeddable Groups},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10769},
  pages        = {348--377},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76578-5\_12},
  doi          = {10.1007/978-3-319-76578-5\_12},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AuerbachBK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AuerbachP18,
  author       = {Benedikt Auerbach and
                  Bertram Poettering},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {Hashing Solutions Instead of Generating Problems: On the Interactive
                  Certification of {RSA} Moduli},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10770},
  pages        = {403--430},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76581-5\_14},
  doi          = {10.1007/978-3-319-76581-5\_14},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AuerbachP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BadertscherMT18,
  author       = {Christian Badertscher and
                  Ueli Maurer and
                  Bj{\"{o}}rn Tackmann},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {On Composable Security for Digital Signatures},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10769},
  pages        = {494--523},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76578-5\_17},
  doi          = {10.1007/978-3-319-76578-5\_17},
  timestamp    = {Fri, 13 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BadertscherMT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BenhamoudaBDQ18,
  author       = {Fabrice Benhamouda and
                  Olivier Blazy and
                  L{\'{e}}o Ducas and
                  Willy Quach},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {Hash Proof Systems over Lattices Revisited},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10770},
  pages        = {644--674},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76581-5\_22},
  doi          = {10.1007/978-3-319-76581-5\_22},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/BenhamoudaBDQ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BootleG18,
  author       = {Jonathan Bootle and
                  Jens Groth},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {Efficient Batch Zero-Knowledge Arguments for Low Degree Polynomials},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10770},
  pages        = {561--588},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76581-5\_19},
  doi          = {10.1007/978-3-319-76581-5\_19},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/BootleG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BrakerskiKSW18,
  author       = {Zvika Brakerski and
                  Elena Kirshanova and
                  Damien Stehl{\'{e}} and
                  Weiqiang Wen},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {Learning with Errors and Extrapolated Dihedral Cosets},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10770},
  pages        = {702--727},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76581-5\_24},
  doi          = {10.1007/978-3-319-76581-5\_24},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BrakerskiKSW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BroadnaxFMR18,
  author       = {Brandon Broadnax and
                  Valerie Fetzer and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Andy Rupp},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {Non-malleability vs. CCA-Security: The Case of Commitments},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10770},
  pages        = {312--337},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76581-5\_11},
  doi          = {10.1007/978-3-319-76581-5\_11},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BroadnaxFMR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ChenHRSS18,
  author       = {Ming{-}Shing Chen and
                  Andreas H{\"{u}}lsing and
                  Joost Rijneveld and
                  Simona Samardjiska and
                  Peter Schwabe},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {{SOFIA:} \emph{MQ} {MQ} -Based Signatures in the {QROM}},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10770},
  pages        = {3--33},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76581-5\_1},
  doi          = {10.1007/978-3-319-76581-5\_1},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/ChenHRSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Dachman-SoledKS18,
  author       = {Dana Dachman{-}Soled and
                  Mukul Kulkarni and
                  Aria Shahverdi},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {Local Non-malleable Codes in the Bounded Retrieval Model},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10770},
  pages        = {281--311},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76581-5\_10},
  doi          = {10.1007/978-3-319-76581-5\_10},
  timestamp    = {Fri, 13 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Dachman-SoledKS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DamgardLOSS18,
  author       = {Ivan Damg{\aa}rd and
                  Ji Luo and
                  Sabine Oechsner and
                  Peter Scholl and
                  Mark Simkin},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {Compact Zero-Knowledge Proofs of Small Hamming Weight},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10770},
  pages        = {530--560},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76581-5\_18},
  doi          = {10.1007/978-3-319-76581-5\_18},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DamgardLOSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DataP18,
  author       = {Deepesh Data and
                  Manoj Prabhakaran},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {Towards Characterizing Securely Computable Two-Party Randomized Functions},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10769},
  pages        = {675--697},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76578-5\_23},
  doi          = {10.1007/978-3-319-76578-5\_23},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DataP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DattaOT18,
  author       = {Pratish Datta and
                  Tatsuaki Okamoto and
                  Junichi Tomida},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {Full-Hiding (Unbounded) Multi-input Inner Product Functional Encryption
                  from the k-Linear Assumption},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10770},
  pages        = {245--277},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76581-5\_9},
  doi          = {10.1007/978-3-319-76581-5\_9},
  timestamp    = {Fri, 13 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DattaOT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DengSY018,
  author       = {Yi Deng and
                  Xuyang Song and
                  Jingyue Yu and
                  Yu Chen},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {On the Security of Classic Protocols for Unique Witness Relations},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10770},
  pages        = {589--615},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76581-5\_20},
  doi          = {10.1007/978-3-319-76581-5\_20},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/DengSY018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DerlerKLRSS18,
  author       = {David Derler and
                  Stephan Krenn and
                  Thomas Lor{\"{u}}nser and
                  Sebastian Ramacher and
                  Daniel Slamanig and
                  Christoph Striecks},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {Revisiting Proxy Re-encryption: Forward Secrecy, Improved Security,
                  and Applications},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10769},
  pages        = {219--250},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76578-5\_8},
  doi          = {10.1007/978-3-319-76578-5\_8},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/DerlerKLRSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DorozHPSSWZ18,
  author       = {Yarkin Dor{\"{o}}z and
                  Jeffrey Hoffstein and
                  Jill Pipher and
                  Joseph H. Silverman and
                  Berk Sunar and
                  William Whyte and
                  Zhenfei Zhang},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {Fully Homomorphic Encryption from the Finite Field Isomorphism Problem},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10769},
  pages        = {125--155},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76578-5\_5},
  doi          = {10.1007/978-3-319-76578-5\_5},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DorozHPSSWZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DottlingGHM18,
  author       = {Nico D{\"{o}}ttling and
                  Sanjam Garg and
                  Mohammad Hajiabadi and
                  Daniel Masny},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {New Constructions of Identity-Based and Key-Dependent Message Secure
                  Encryption Schemes},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10769},
  pages        = {3--31},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76578-5\_1},
  doi          = {10.1007/978-3-319-76578-5\_1},
  timestamp    = {Fri, 13 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DottlingGHM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FanT18,
  author       = {Xiong Fan and
                  Qiang Tang},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {Making Public Key Functional Encryption Function Private, Distributively},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10770},
  pages        = {218--244},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76581-5\_8},
  doi          = {10.1007/978-3-319-76581-5\_8},
  timestamp    = {Fri, 13 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/FanT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FarshimHHL18,
  author       = {Pooya Farshim and
                  Julia Hesse and
                  Dennis Hofheinz and
                  Enrique Larraia},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {Graded Encoding Schemes from Obfuscation},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10770},
  pages        = {371--400},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76581-5\_13},
  doi          = {10.1007/978-3-319-76581-5\_13},
  timestamp    = {Fri, 13 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/FarshimHHL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FrederiksenPY18,
  author       = {Tore Kasper Frederiksen and
                  Benny Pinkas and
                  Avishay Yanai},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {Committed {MPC} - Maliciously Secure Multiparty Computation from Homomorphic
                  Commitments},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10769},
  pages        = {587--619},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76578-5\_20},
  doi          = {10.1007/978-3-319-76578-5\_20},
  timestamp    = {Mon, 16 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/FrederiksenPY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Fuchsbauer18,
  author       = {Georg Fuchsbauer},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {Subversion-Zero-Knowledge SNARKs},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10769},
  pages        = {315--347},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76578-5\_11},
  doi          = {10.1007/978-3-319-76578-5\_11},
  timestamp    = {Fri, 13 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Fuchsbauer18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FuchsbauerG18,
  author       = {Georg Fuchsbauer and
                  Romain Gay},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {Weakly Secure Equivalence-Class Signatures from Standard Assumptions},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10770},
  pages        = {153--183},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76581-5\_6},
  doi          = {10.1007/978-3-319-76581-5\_6},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/FuchsbauerG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GaneshKPS18,
  author       = {Chaya Ganesh and
                  Yashvanth Kondi and
                  Arpita Patra and
                  Pratik Sarkar},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {Efficient Adaptively Secure Zero-Knowledge from Garbled Circuits},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10770},
  pages        = {499--529},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76581-5\_17},
  doi          = {10.1007/978-3-319-76581-5\_17},
  timestamp    = {Fri, 13 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/GaneshKPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GarayKLP18,
  author       = {Juan A. Garay and
                  Aggelos Kiayias and
                  Nikos Leonardos and
                  Giorgos Panagiotakos},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {Bootstrapping the Blockchain, with Applications to Consensus and Fast
                  {PKI} Setup},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10770},
  pages        = {465--495},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76581-5\_16},
  doi          = {10.1007/978-3-319-76581-5\_16},
  timestamp    = {Fri, 13 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/GarayKLP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GentryOR18,
  author       = {Craig Gentry and
                  Adam O'Neill and
                  Leonid Reyzin},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {A Unified Framework for Trapdoor-Permutation-Based Sequential Aggregate
                  Signatures},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10770},
  pages        = {34--57},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76581-5\_2},
  doi          = {10.1007/978-3-319-76581-5\_2},
  timestamp    = {Fri, 13 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/GentryOR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GiaconHP18,
  author       = {Federico Giacon and
                  Felix Heuer and
                  Bertram Poettering},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {{KEM} Combiners},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10769},
  pages        = {190--218},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76578-5\_7},
  doi          = {10.1007/978-3-319-76578-5\_7},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/GiaconHP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GiaconKP18,
  author       = {Federico Giacon and
                  Eike Kiltz and
                  Bertram Poettering},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {Hybrid Encryption in a Multi-user Setting, Revisited},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10769},
  pages        = {159--189},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76578-5\_6},
  doi          = {10.1007/978-3-319-76578-5\_6},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/GiaconKP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HamlinSWW18,
  author       = {Ariel Hamlin and
                  Abhi Shelat and
                  Mor Weiss and
                  Daniel Wichs},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {Multi-Key Searchable Encryption, Revisited},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10769},
  pages        = {95--124},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76578-5\_4},
  doi          = {10.1007/978-3-319-76578-5\_4},
  timestamp    = {Fri, 13 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HamlinSWW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HartKMPPQ18,
  author       = {Daniel Hart and
                  DoHoon Kim and
                  Giacomo Micheli and
                  Guillermo Pascual{-}Perez and
                  Christophe Petit and
                  Yuxuan Quek},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {A Practical Cryptanalysis of WalnutDSA {TM}},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10769},
  pages        = {381--406},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76578-5\_13},
  doi          = {10.1007/978-3-319-76578-5\_13},
  timestamp    = {Fri, 17 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/HartKMPPQ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HeroldKL18,
  author       = {Gottfried Herold and
                  Elena Kirshanova and
                  Thijs Laarhoven},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {Speed-Ups and Time-Memory Trade-Offs for Tuple Lattice Sieving},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10769},
  pages        = {407--436},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76578-5\_14},
  doi          = {10.1007/978-3-319-76578-5\_14},
  timestamp    = {Fri, 13 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HeroldKL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HuangLCAPL18,
  author       = {Zhengan Huang and
                  Junzuo Lai and
                  Wenbin Chen and
                  Man Ho Au and
                  Zhen Peng and
                  Jin Li},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {Hedged Nonce-Based Public-Key Encryption: Adaptive Security Under
                  Randomness Failures},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10769},
  pages        = {253--279},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76578-5\_9},
  doi          = {10.1007/978-3-319-76578-5\_9},
  timestamp    = {Mon, 20 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HuangLCAPL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Hulsing0S18,
  author       = {Andreas H{\"{u}}lsing and
                  Tanja Lange and
                  Kit Smeets},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {Rounded Gaussians - Fast and Secure Constant-Time Sampling for Lattice-Based
                  Crypto},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10770},
  pages        = {728--757},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76581-5\_25},
  doi          = {10.1007/978-3-319-76581-5\_25},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/Hulsing0S18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/IshaiMO18,
  author       = {Yuval Ishai and
                  Manika Mittal and
                  Rafail Ostrovsky},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {On the Message Complexity of Secure Multiparty Computation},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10769},
  pages        = {698--711},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76578-5\_24},
  doi          = {10.1007/978-3-319-76578-5\_24},
  timestamp    = {Fri, 13 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/IshaiMO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Jarecki18,
  author       = {Stanislaw Jarecki},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {Efficient Covert Two-Party Computation},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10769},
  pages        = {644--674},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76578-5\_22},
  doi          = {10.1007/978-3-319-76578-5\_22},
  timestamp    = {Fri, 13 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Jarecki18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/JareckiKSS18,
  author       = {Stanislaw Jarecki and
                  Hugo Krawczyk and
                  Maliheh Shirvanian and
                  Nitesh Saxena},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {Two-Factor Authentication with End-to-End Password Security},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10770},
  pages        = {431--461},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76581-5\_15},
  doi          = {10.1007/978-3-319-76581-5\_15},
  timestamp    = {Fri, 13 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/JareckiKSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/JutlaO018,
  author       = {Charanjit S. Jutla and
                  Miyako Ohkubo and
                  Arnab Roy},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {Improved (Almost) Tightly-Secure Structure-Preserving Signatures},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10770},
  pages        = {123--152},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76581-5\_5},
  doi          = {10.1007/978-3-319-76581-5\_5},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/JutlaO018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KaafaraniK18,
  author       = {Ali {El Kaafarani} and
                  Shuichi Katsumata},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {Attribute-Based Signatures for Unbounded Circuits in the {ROM} and
                  Efficient Instantiations from Lattices},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10770},
  pages        = {89--119},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76581-5\_4},
  doi          = {10.1007/978-3-319-76581-5\_4},
  timestamp    = {Fri, 13 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/KaafaraniK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KitagawaNT18,
  author       = {Fuyuki Kitagawa and
                  Ryo Nishimaki and
                  Keisuke Tanaka},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {Simple and Generic Constructions of Succinct Functional Encryption},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10770},
  pages        = {187--217},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76581-5\_7},
  doi          = {10.1007/978-3-319-76581-5\_7},
  timestamp    = {Fri, 13 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/KitagawaNT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KitagawaT18,
  author       = {Fuyuki Kitagawa and
                  Keisuke Tanaka},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {Key Dependent Message Security and Receiver Selective Opening Security
                  for Identity-Based Encryption},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10769},
  pages        = {32--61},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76578-5\_2},
  doi          = {10.1007/978-3-319-76578-5\_2},
  timestamp    = {Fri, 13 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/KitagawaT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LiM18,
  author       = {Baiyu Li and
                  Daniele Micciancio},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {Equational Security Proofs of Oblivious Transfer Protocols},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10769},
  pages        = {527--553},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76578-5\_18},
  doi          = {10.1007/978-3-319-76578-5\_18},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/LiM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LindellY18,
  author       = {Yehuda Lindell and
                  Avishay Yanai},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {Fast Garbling of Circuits over 3-Valued Logic},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10769},
  pages        = {620--643},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76578-5\_21},
  doi          = {10.1007/978-3-319-76578-5\_21},
  timestamp    = {Fri, 13 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LindellY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LingNWX18,
  author       = {San Ling and
                  Khoa Nguyen and
                  Huaxiong Wang and
                  Yanhong Xu},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {Constant-Size Group Signatures from Lattices},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10770},
  pages        = {58--88},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76581-5\_3},
  doi          = {10.1007/978-3-319-76581-5\_3},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LingNWX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LyuLHG18,
  author       = {Lin Lyu and
                  Shengli Liu and
                  Shuai Han and
                  Dawu Gu},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {Tightly {SIM-SO-CCA} Secure Public Key Encryption from Standard Assumptions},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10769},
  pages        = {62--92},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76578-5\_3},
  doi          = {10.1007/978-3-319-76578-5\_3},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LyuLHG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/MechlerMN18,
  author       = {Jeremias Mechler and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Tobias Nilges},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {Reusing Tamper-Proof Hardware in UC-Secure Protocols},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10769},
  pages        = {463--493},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76578-5\_16},
  doi          = {10.1007/978-3-319-76578-5\_16},
  timestamp    = {Fri, 13 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/MechlerMN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/PeikertS18,
  author       = {Chris Peikert and
                  Sina Shiehian},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {Privately Constraining and Programming PRFs, the {LWE} Way},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10770},
  pages        = {675--701},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76581-5\_23},
  doi          = {10.1007/978-3-319-76581-5\_23},
  timestamp    = {Fri, 13 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/PeikertS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Scholl18,
  author       = {Peter Scholl},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {Extending Oblivious Transfer with Low Communication via Key-Homomorphic
                  PRFs},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10769},
  pages        = {554--583},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76578-5\_19},
  doi          = {10.1007/978-3-319-76578-5\_19},
  timestamp    = {Fri, 13 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Scholl18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/TeruyaKH18,
  author       = {Tadanori Teruya and
                  Kenji Kashiwabara and
                  Goichiro Hanaoka},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {Fast Lattice Basis Reduction Suitable for Massive Parallelization
                  and Its Application to the Shortest Vector Problem},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10769},
  pages        = {437--460},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76578-5\_15},
  doi          = {10.1007/978-3-319-76578-5\_15},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/TeruyaKH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2018-1,
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10769},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76578-5},
  doi          = {10.1007/978-3-319-76578-5},
  isbn         = {978-3-319-76577-8},
  timestamp    = {Fri, 01 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/2018-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2018-2,
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10770},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76581-5},
  doi          = {10.1007/978-3-319-76581-5},
  isbn         = {978-3-319-76580-8},
  timestamp    = {Fri, 01 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/2018-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/0001J17,
  author       = {Taechan Kim and
                  Jinhyuck Jeong},
  editor       = {Serge Fehr},
  title        = {Extended Tower Number Field Sieve with Application to Finite Fields
                  of Arbitrary Composite Extension Degree},
  booktitle    = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Amsterdam, The
                  Netherlands, March 28-31, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10174},
  pages        = {388--408},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54365-8\_16},
  doi          = {10.1007/978-3-662-54365-8\_16},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/0001J17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/0021GW17,
  author       = {Jie Chen and
                  Junqing Gong and
                  Jian Weng},
  editor       = {Serge Fehr},
  title        = {Tightly Secure {IBE} Under Constant-Size Master Public Key},
  booktitle    = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Amsterdam, The
                  Netherlands, March 28-31, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10174},
  pages        = {207--231},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54365-8\_9},
  doi          = {10.1007/978-3-662-54365-8\_9},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/0021GW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AbdallaBP17,
  author       = {Michel Abdalla and
                  Fabrice Benhamouda and
                  David Pointcheval},
  editor       = {Serge Fehr},
  title        = {Removing Erasures with Explainable Hash Proof Systems},
  booktitle    = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Amsterdam, The
                  Netherlands, March 28-31, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10174},
  pages        = {151--174},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54365-8\_7},
  doi          = {10.1007/978-3-662-54365-8\_7},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/AbdallaBP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AbrahamFNP017,
  author       = {Ittai Abraham and
                  Christopher W. Fletcher and
                  Kartik Nayak and
                  Benny Pinkas and
                  Ling Ren},
  editor       = {Serge Fehr},
  title        = {Asymptotically Tight Bounds for Composing {ORAM} with {PIR}},
  booktitle    = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Amsterdam, The
                  Netherlands, March 28-31, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10174},
  pages        = {91--120},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54365-8\_5},
  doi          = {10.1007/978-3-662-54365-8\_5},
  timestamp    = {Thu, 23 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/AbrahamFNP017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Attrapadung17,
  author       = {Nuttapong Attrapadung},
  editor       = {Serge Fehr},
  title        = {Dual System Framework in Multilinear Settings and Applications to
                  Fully Secure (Compact) {ABE} for Unbounded-Size Circuits},
  booktitle    = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Amsterdam, The
                  Netherlands, March 28-31, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10175},
  pages        = {3--35},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54388-7\_1},
  doi          = {10.1007/978-3-662-54388-7\_1},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Attrapadung17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BellarePS17,
  author       = {Mihir Bellare and
                  Bertram Poettering and
                  Douglas Stebila},
  editor       = {Serge Fehr},
  title        = {Deterring Certificate Subversion: Efficient Double-Authentication-Preventing
                  Signatures},
  booktitle    = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Amsterdam, The
                  Netherlands, March 28-31, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10175},
  pages        = {121--151},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54388-7\_5},
  doi          = {10.1007/978-3-662-54388-7\_5},
  timestamp    = {Thu, 23 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/BellarePS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BenarrochBL17,
  author       = {Daniel Benarroch and
                  Zvika Brakerski and
                  Tancr{\`{e}}de Lepoint},
  editor       = {Serge Fehr},
  title        = {{FHE} over the Integers: Decomposed and Batched in the Post-Quantum
                  Regime},
  booktitle    = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Amsterdam, The
                  Netherlands, March 28-31, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10175},
  pages        = {271--301},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54388-7\_10},
  doi          = {10.1007/978-3-662-54388-7\_10},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/BenarrochBL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BenhamoudaBL17,
  author       = {Fabrice Benhamouda and
                  Florian Bourse and
                  Helger Lipmaa},
  editor       = {Serge Fehr},
  title        = {CCA-Secure Inner-Product Functional Encryption from Projective Hash
                  Functions},
  booktitle    = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Amsterdam, The
                  Netherlands, March 28-31, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10175},
  pages        = {36--66},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54388-7\_2},
  doi          = {10.1007/978-3-662-54388-7\_2},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/BenhamoudaBL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BonehLW17,
  author       = {Dan Boneh and
                  Kevin Lewi and
                  David J. Wu},
  editor       = {Serge Fehr},
  title        = {Constraining Pseudorandom Functions Privately},
  booktitle    = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Amsterdam, The
                  Netherlands, March 28-31, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10175},
  pages        = {494--524},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54388-7\_17},
  doi          = {10.1007/978-3-662-54388-7\_17},
  timestamp    = {Sun, 11 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BonehLW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BrzuskaJ17,
  author       = {Chris Brzuska and
                  H{\aa}kon Jacobsen},
  editor       = {Serge Fehr},
  title        = {A Modular Security Analysis of {EAP} and {IEEE} 802.11},
  booktitle    = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Amsterdam, The
                  Netherlands, March 28-31, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10175},
  pages        = {335--365},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54388-7\_12},
  doi          = {10.1007/978-3-662-54388-7\_12},
  timestamp    = {Thu, 23 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/BrzuskaJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CamenischDKPSS17,
  author       = {Jan Camenisch and
                  David Derler and
                  Stephan Krenn and
                  Henrich C. P{\"{o}}hls and
                  Kai Samelin and
                  Daniel Slamanig},
  editor       = {Serge Fehr},
  title        = {Chameleon-Hashes with Ephemeral Trapdoors - And Applications to Invisible
                  Sanitizable Signatures},
  booktitle    = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Amsterdam, The
                  Netherlands, March 28-31, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10175},
  pages        = {152--182},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54388-7\_6},
  doi          = {10.1007/978-3-662-54388-7\_6},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/CamenischDKPSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CanettiPV17,
  author       = {Ran Canetti and
                  Oxana Poburinnaya and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Serge Fehr},
  title        = {Better Two-Round Adaptive Multi-party Computation},
  booktitle    = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Amsterdam, The
                  Netherlands, March 28-31, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10175},
  pages        = {396--427},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54388-7\_14},
  doi          = {10.1007/978-3-662-54388-7\_14},
  timestamp    = {Thu, 23 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/CanettiPV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CanettiRRV17,
  author       = {Ran Canetti and
                  Srinivasan Raghuraman and
                  Silas Richelson and
                  Vinod Vaikuntanathan},
  editor       = {Serge Fehr},
  title        = {Chosen-Ciphertext Secure Fully Homomorphic Encryption},
  booktitle    = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Amsterdam, The
                  Netherlands, March 28-31, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10175},
  pages        = {213--240},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54388-7\_8},
  doi          = {10.1007/978-3-662-54388-7\_8},
  timestamp    = {Thu, 23 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/CanettiRRV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ChongchitmateO17,
  author       = {Wutichai Chongchitmate and
                  Rafail Ostrovsky},
  editor       = {Serge Fehr},
  title        = {Circuit-Private Multi-key {FHE}},
  booktitle    = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Amsterdam, The
                  Netherlands, March 28-31, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10175},
  pages        = {241--270},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54388-7\_9},
  doi          = {10.1007/978-3-662-54388-7\_9},
  timestamp    = {Thu, 23 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/ChongchitmateO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CoronLLT17,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Moon Sung Lee and
                  Tancr{\`{e}}de Lepoint and
                  Mehdi Tibouchi},
  editor       = {Serge Fehr},
  title        = {Zeroizing Attacks on Indistinguishability Obfuscation over {CLT13}},
  booktitle    = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Amsterdam, The
                  Netherlands, March 28-31, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10174},
  pages        = {41--58},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54365-8\_3},
  doi          = {10.1007/978-3-662-54365-8\_3},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/CoronLLT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Dachman-SoledKS17,
  author       = {Dana Dachman{-}Soled and
                  Mukul Kulkarni and
                  Aria Shahverdi},
  editor       = {Serge Fehr},
  title        = {Tight Upper and Lower Bounds for Leakage-Resilient, Locally Decodable
                  and Updatable Non-malleable Codes},
  booktitle    = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Amsterdam, The
                  Netherlands, March 28-31, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10174},
  pages        = {310--332},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54365-8\_13},
  doi          = {10.1007/978-3-662-54365-8\_13},
  timestamp    = {Thu, 23 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/Dachman-SoledKS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DattaDM17,
  author       = {Pratish Datta and
                  Ratna Dutta and
                  Sourav Mukhopadhyay},
  editor       = {Serge Fehr},
  title        = {Constrained Pseudorandom Functions for Unconstrained Inputs Revisited:
                  Achieving Verifiability and Key Delegation},
  booktitle    = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Amsterdam, The
                  Netherlands, March 28-31, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10175},
  pages        = {463--493},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54388-7\_16},
  doi          = {10.1007/978-3-662-54388-7\_16},
  timestamp    = {Thu, 23 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/DattaDM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FaonioN017,
  author       = {Antonio Faonio and
                  Jesper Buus Nielsen and
                  Daniele Venturi},
  editor       = {Serge Fehr},
  title        = {Predictable Arguments of Knowledge},
  booktitle    = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Amsterdam, The
                  Netherlands, March 28-31, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10174},
  pages        = {121--150},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54365-8\_6},
  doi          = {10.1007/978-3-662-54365-8\_6},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/FaonioN017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FaonioN17,
  author       = {Antonio Faonio and
                  Jesper Buus Nielsen},
  editor       = {Serge Fehr},
  title        = {Non-malleable Codes with Split-State Refresh},
  booktitle    = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Amsterdam, The
                  Netherlands, March 28-31, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10174},
  pages        = {279--309},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54365-8\_12},
  doi          = {10.1007/978-3-662-54365-8\_12},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/FaonioN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FaonioN17a,
  author       = {Antonio Faonio and
                  Jesper Buus Nielsen},
  editor       = {Serge Fehr},
  title        = {Fully Leakage-Resilient Codes},
  booktitle    = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Amsterdam, The
                  Netherlands, March 28-31, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10174},
  pages        = {333--358},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54365-8\_14},
  doi          = {10.1007/978-3-662-54365-8\_14},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/FaonioN17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FuchsbauerGKO17,
  author       = {Georg Fuchsbauer and
                  Romain Gay and
                  Lucas Kowalczyk and
                  Claudio Orlandi},
  editor       = {Serge Fehr},
  title        = {Access Control Encryption for Equality, Comparison, and More},
  booktitle    = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Amsterdam, The
                  Netherlands, March 28-31, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10175},
  pages        = {88--118},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54388-7\_4},
  doi          = {10.1007/978-3-662-54388-7\_4},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/FuchsbauerGKO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GoyalKW17,
  author       = {Rishab Goyal and
                  Venkata Koppula and
                  Brent Waters},
  editor       = {Serge Fehr},
  title        = {Separating {IND-CPA} and Circular Security for Unbounded Length Key
                  Cycles},
  booktitle    = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Amsterdam, The
                  Netherlands, March 28-31, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10174},
  pages        = {232--246},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54365-8\_10},
  doi          = {10.1007/978-3-662-54365-8\_10},
  timestamp    = {Thu, 23 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/GoyalKW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HazayPV17,
  author       = {Carmit Hazay and
                  Antigoni Polychroniadou and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Serge Fehr},
  title        = {Constant Round Adaptively Secure Protocols in the Tamper-Proof Hardware
                  Model},
  booktitle    = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Amsterdam, The
                  Netherlands, March 28-31, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10175},
  pages        = {428--460},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54388-7\_15},
  doi          = {10.1007/978-3-662-54388-7\_15},
  timestamp    = {Thu, 23 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/HazayPV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HazayV17,
  author       = {Carmit Hazay and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Serge Fehr},
  title        = {Scalable Multi-party Private Set-Intersection},
  booktitle    = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Amsterdam, The
                  Netherlands, March 28-31, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10174},
  pages        = {175--203},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54365-8\_8},
  doi          = {10.1007/978-3-662-54365-8\_8},
  timestamp    = {Thu, 23 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/HazayV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Herold017,
  author       = {Gottfried Herold and
                  Alexander May},
  editor       = {Serge Fehr},
  title        = {{LP} Solutions of Vectorial Integer Subset Sums - Cryptanalysis of
                  Galbraith's Binary Matrix {LWE}},
  booktitle    = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Amsterdam, The
                  Netherlands, March 28-31, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10174},
  pages        = {3--15},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54365-8\_1},
  doi          = {10.1007/978-3-662-54365-8\_1},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Herold017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HeroldK17,
  author       = {Gottfried Herold and
                  Elena Kirshanova},
  editor       = {Serge Fehr},
  title        = {Improved Algorithms for the Approximate k-List Problem in Euclidean
                  Norm},
  booktitle    = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Amsterdam, The
                  Netherlands, March 28-31, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10174},
  pages        = {16--40},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54365-8\_2},
  doi          = {10.1007/978-3-662-54365-8\_2},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HeroldK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ItkisSVWY17,
  author       = {Gene Itkis and
                  Emily Shen and
                  Mayank Varia and
                  David Wilson and
                  Arkady Yerukhimovich},
  editor       = {Serge Fehr},
  title        = {Bounded-Collusion Attribute-Based Encryption from Minimal Assumptions},
  booktitle    = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Amsterdam, The
                  Netherlands, March 28-31, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10175},
  pages        = {67--87},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54388-7\_3},
  doi          = {10.1007/978-3-662-54388-7\_3},
  timestamp    = {Thu, 23 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/ItkisSVWY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Jutla017,
  author       = {Charanjit S. Jutla and
                  Arnab Roy},
  editor       = {Serge Fehr},
  title        = {Improved Structure Preserving Signatures Under Standard Bilinear Assumptions},
  booktitle    = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Amsterdam, The
                  Netherlands, March 28-31, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10175},
  pages        = {183--209},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54388-7\_7},
  doi          = {10.1007/978-3-662-54388-7\_7},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Jutla017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Kiayias0Z17,
  author       = {Aggelos Kiayias and
                  Thomas Zacharias and
                  Bingsheng Zhang},
  editor       = {Serge Fehr},
  title        = {Ceremonies for End-to-End Verifiable Elections},
  booktitle    = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Amsterdam, The
                  Netherlands, March 28-31, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10175},
  pages        = {305--334},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54388-7\_11},
  doi          = {10.1007/978-3-662-54388-7\_11},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/Kiayias0Z17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KoppulaPW17,
  author       = {Venkata Koppula and
                  Andrew Poelstra and
                  Brent Waters},
  editor       = {Serge Fehr},
  title        = {Universal Samplers with Fast Verification},
  booktitle    = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Amsterdam, The
                  Netherlands, March 28-31, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10175},
  pages        = {525--554},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54388-7\_18},
  doi          = {10.1007/978-3-662-54388-7\_18},
  timestamp    = {Thu, 23 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/KoppulaPW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LibertPQ17,
  author       = {Beno{\^{\i}}t Libert and
                  Thomas Peters and
                  Chen Qian},
  editor       = {Serge Fehr},
  title        = {Structure-Preserving Chosen-Ciphertext Security with Shorter Verifiable
                  Ciphertexts},
  booktitle    = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Amsterdam, The
                  Netherlands, March 28-31, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10174},
  pages        = {247--276},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54365-8\_11},
  doi          = {10.1007/978-3-662-54365-8\_11},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LibertPQ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/NielsenR17,
  author       = {Jesper Buus Nielsen and
                  Samuel Ranellucci},
  editor       = {Serge Fehr},
  title        = {On the Computational Overhead of {MPC} with Dishonest Majority},
  booktitle    = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Amsterdam, The
                  Netherlands, March 28-31, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10175},
  pages        = {369--395},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54388-7\_13},
  doi          = {10.1007/978-3-662-54388-7\_13},
  timestamp    = {Thu, 23 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/NielsenR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/PointchevalST17,
  author       = {David Pointcheval and
                  Olivier Sanders and
                  Jacques Traor{\'{e}}},
  editor       = {Serge Fehr},
  title        = {Cut Down the Tree to Achieve Constant Complexity in Divisible E-cash},
  booktitle    = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Amsterdam, The
                  Netherlands, March 28-31, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10174},
  pages        = {61--90},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54365-8\_4},
  doi          = {10.1007/978-3-662-54365-8\_4},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/PointchevalST17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Shani17,
  author       = {Barak Shani},
  editor       = {Serge Fehr},
  title        = {On the Bit Security of Elliptic Curve Diffie-Hellman},
  booktitle    = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Amsterdam, The
                  Netherlands, March 28-31, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10174},
  pages        = {361--387},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54365-8\_15},
  doi          = {10.1007/978-3-662-54365-8\_15},
  timestamp    = {Thu, 23 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/Shani17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Villar17,
  author       = {Jorge L. Villar},
  editor       = {Serge Fehr},
  title        = {Equivalences and Black-Box Separations of Matrix Diffie-Hellman Problems},
  booktitle    = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Amsterdam, The
                  Netherlands, March 28-31, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10174},
  pages        = {435--464},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54365-8\_18},
  doi          = {10.1007/978-3-662-54365-8\_18},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Villar17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/YuXW17,
  author       = {Yang Yu and
                  Guangwu Xu and
                  Xiaoyun Wang},
  editor       = {Serge Fehr},
  title        = {Provably Secure {NTRU} Instances over Prime Cyclotomic Rings},
  booktitle    = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Amsterdam, The
                  Netherlands, March 28-31, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10174},
  pages        = {409--434},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54365-8\_17},
  doi          = {10.1007/978-3-662-54365-8\_17},
  timestamp    = {Wed, 05 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/YuXW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2017-1,
  editor       = {Serge Fehr},
  title        = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Amsterdam, The
                  Netherlands, March 28-31, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10174},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54365-8},
  doi          = {10.1007/978-3-662-54365-8},
  isbn         = {978-3-662-54364-1},
  timestamp    = {Fri, 01 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/2017-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2017-2,
  editor       = {Serge Fehr},
  title        = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Amsterdam, The
                  Netherlands, March 28-31, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10175},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54388-7},
  doi          = {10.1007/978-3-662-54388-7},
  isbn         = {978-3-662-54387-0},
  timestamp    = {Fri, 01 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/2017-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/0002H16,
  author       = {Takahiro Matsuda and
                  Goichiro Hanaoka},
  editor       = {Chen{-}Mou Cheng and
                  Kai{-}Min Chung and
                  Giuseppe Persiano and
                  Bo{-}Yin Yang},
  title        = {Trading Plaintext-Awareness for Simulatability to Achieve Chosen Ciphertext
                  Security},
  booktitle    = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan,
                  March 6-9, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9614},
  pages        = {3--34},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49384-7\_1},
  doi          = {10.1007/978-3-662-49384-7\_1},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/0002H16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BackesMS16,
  author       = {Michael Backes and
                  Sebastian Meiser and
                  Dominique Schr{\"{o}}der},
  editor       = {Chen{-}Mou Cheng and
                  Kai{-}Min Chung and
                  Giuseppe Persiano and
                  Bo{-}Yin Yang},
  title        = {Delegatable Functional Signatures},
  booktitle    = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan,
                  March 6-9, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9614},
  pages        = {357--386},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49384-7\_14},
  doi          = {10.1007/978-3-662-49384-7\_14},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/BackesMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Ben-SassonBDIR16,
  author       = {Eli Ben{-}Sasson and
                  Iddo Bentov and
                  Ivan Damg{\aa}rd and
                  Yuval Ishai and
                  Noga Ron{-}Zewi},
  editor       = {Chen{-}Mou Cheng and
                  Kai{-}Min Chung and
                  Giuseppe Persiano and
                  Bo{-}Yin Yang},
  title        = {On Public Key Encryption from Noisy Codewords},
  booktitle    = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan,
                  March 6-9, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9615},
  pages        = {417--446},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49387-8\_16},
  doi          = {10.1007/978-3-662-49387-8\_16},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Ben-SassonBDIR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BenhamoudaCTV16,
  author       = {Fabrice Benhamouda and
                  C{\'{e}}line Chevalier and
                  Adrian Thillard and
                  Damien Vergnaud},
  editor       = {Chen{-}Mou Cheng and
                  Kai{-}Min Chung and
                  Giuseppe Persiano and
                  Bo{-}Yin Yang},
  title        = {Easing Coppersmith Methods Using Analytic Combinatorics: Applications
                  to Public-Key Cryptography with Weak Pseudorandomness},
  booktitle    = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan,
                  March 6-9, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9615},
  pages        = {36--66},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49387-8\_3},
  doi          = {10.1007/978-3-662-49387-8\_3},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/BenhamoudaCTV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BernhardFW16,
  author       = {David Bernhard and
                  Marc Fischlin and
                  Bogdan Warinschi},
  editor       = {Chen{-}Mou Cheng and
                  Kai{-}Min Chung and
                  Giuseppe Persiano and
                  Bo{-}Yin Yang},
  title        = {On the Hardness of Proving CCA-Security of Signed ElGamal},
  booktitle    = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan,
                  March 6-9, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9614},
  pages        = {47--69},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49384-7\_3},
  doi          = {10.1007/978-3-662-49384-7\_3},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BernhardFW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BishopP16,
  author       = {Allison Bishop and
                  Valerio Pastro},
  editor       = {Chen{-}Mou Cheng and
                  Kai{-}Min Chung and
                  Giuseppe Persiano and
                  Bo{-}Yin Yang},
  title        = {Robust Secret Sharing Schemes Against Local Adversaries},
  booktitle    = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan,
                  March 6-9, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9615},
  pages        = {327--356},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49387-8\_13},
  doi          = {10.1007/978-3-662-49387-8\_13},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BishopP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Brandao16,
  author       = {Lu{\'{\i}}s T. A. N. Brand{\~{a}}o},
  editor       = {Chen{-}Mou Cheng and
                  Kai{-}Min Chung and
                  Giuseppe Persiano and
                  Bo{-}Yin Yang},
  title        = {Very-Efficient Simulatable Flipping of Many Coins into a Well - (and
                  a New Universally-Composable Commitment Scheme)},
  booktitle    = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan,
                  March 6-9, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9615},
  pages        = {297--326},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49387-8\_12},
  doi          = {10.1007/978-3-662-49387-8\_12},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Brandao16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CamenischDL16,
  author       = {Jan Camenisch and
                  Manu Drijvers and
                  Anja Lehmann},
  editor       = {Chen{-}Mou Cheng and
                  Kai{-}Min Chung and
                  Giuseppe Persiano and
                  Bo{-}Yin Yang},
  title        = {Universally Composable Direct Anonymous Attestation},
  booktitle    = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan,
                  March 6-9, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9615},
  pages        = {234--264},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49387-8\_10},
  doi          = {10.1007/978-3-662-49387-8\_10},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/CamenischDL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CanettiSV16,
  author       = {Ran Canetti and
                  Daniel Shahaf and
                  Margarita Vald},
  editor       = {Chen{-}Mou Cheng and
                  Kai{-}Min Chung and
                  Giuseppe Persiano and
                  Bo{-}Yin Yang},
  title        = {Universally Composable Authentication and Key-Exchange with Global
                  {PKI}},
  booktitle    = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan,
                  March 6-9, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9615},
  pages        = {265--296},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49387-8\_11},
  doi          = {10.1007/978-3-662-49387-8\_11},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/CanettiSV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CaroIO16,
  author       = {Angelo De Caro and
                  Vincenzo Iovino and
                  Adam O'Neill},
  editor       = {Chen{-}Mou Cheng and
                  Kai{-}Min Chung and
                  Giuseppe Persiano and
                  Bo{-}Yin Yang},
  title        = {Deniable Functional Encryption},
  booktitle    = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan,
                  March 6-9, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9614},
  pages        = {196--222},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49384-7\_8},
  doi          = {10.1007/978-3-662-49384-7\_8},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/CaroIO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ChandranRV16,
  author       = {Nishanth Chandran and
                  Srinivasan Raghuraman and
                  Dhinakaran Vinayagamurthy},
  editor       = {Chen{-}Mou Cheng and
                  Kai{-}Min Chung and
                  Giuseppe Persiano and
                  Bo{-}Yin Yang},
  title        = {Reducing Depth in Constrained PRFs: From Bit-Fixing to {\textbackslash}mathbf
                  {NC1}},
  booktitle    = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan,
                  March 6-9, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9615},
  pages        = {359--385},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49387-8\_14},
  doi          = {10.1007/978-3-662-49387-8\_14},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/ChandranRV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ChenQZDC16,
  author       = {Yu Chen and
                  Baodong Qin and
                  Jiang Zhang and
                  Yi Deng and
                  Sherman S. M. Chow},
  editor       = {Chen{-}Mou Cheng and
                  Kai{-}Min Chung and
                  Giuseppe Persiano and
                  Bo{-}Yin Yang},
  title        = {Non-Malleable Functions and Their Applications},
  booktitle    = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan,
                  March 6-9, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9615},
  pages        = {386--416},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49387-8\_15},
  doi          = {10.1007/978-3-662-49387-8\_15},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/ChenQZDC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Cohen16,
  author       = {Ran Cohen},
  editor       = {Chen{-}Mou Cheng and
                  Kai{-}Min Chung and
                  Giuseppe Persiano and
                  Bo{-}Yin Yang},
  title        = {Asynchronous Secure Multiparty Computation in Constant Time},
  booktitle    = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan,
                  March 6-9, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9615},
  pages        = {183--207},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49387-8\_8},
  doi          = {10.1007/978-3-662-49387-8\_8},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Cohen16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Dachman-SoledGL16,
  author       = {Dana Dachman{-}Soled and
                  S. Dov Gordon and
                  Feng{-}Hao Liu and
                  Adam O'Neill and
                  Hong{-}Sheng Zhou},
  editor       = {Chen{-}Mou Cheng and
                  Kai{-}Min Chung and
                  Giuseppe Persiano and
                  Bo{-}Yin Yang},
  title        = {Leakage-Resilient Public-Key Encryption from Obfuscation},
  booktitle    = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan,
                  March 6-9, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9615},
  pages        = {101--128},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49387-8\_5},
  doi          = {10.1007/978-3-662-49387-8\_5},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Dachman-SoledGL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DamgardPR16,
  author       = {Ivan Damg{\aa}rd and
                  Antigoni Polychroniadou and
                  Vanishree Rao},
  editor       = {Chen{-}Mou Cheng and
                  Kai{-}Min Chung and
                  Giuseppe Persiano and
                  Bo{-}Yin Yang},
  title        = {Adaptively Secure Multi-Party Computation from {LWE} (via Equivocal
                  {FHE)}},
  booktitle    = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan,
                  March 6-9, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9615},
  pages        = {208--233},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49387-8\_9},
  doi          = {10.1007/978-3-662-49387-8\_9},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DamgardPR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DattaDM16,
  author       = {Pratish Datta and
                  Ratna Dutta and
                  Sourav Mukhopadhyay},
  editor       = {Chen{-}Mou Cheng and
                  Kai{-}Min Chung and
                  Giuseppe Persiano and
                  Bo{-}Yin Yang},
  title        = {Functional Encryption for Inner Product with Full Function Privacy},
  booktitle    = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan,
                  March 6-9, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9614},
  pages        = {164--195},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49384-7\_7},
  doi          = {10.1007/978-3-662-49384-7\_7},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DattaDM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FaustMV16,
  author       = {Sebastian Faust and
                  Daniel Masny and
                  Daniele Venturi},
  editor       = {Chen{-}Mou Cheng and
                  Kai{-}Min Chung and
                  Giuseppe Persiano and
                  Bo{-}Yin Yang},
  title        = {Chosen-Ciphertext Security from Subset Sum},
  booktitle    = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan,
                  March 6-9, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9614},
  pages        = {35--46},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49384-7\_2},
  doi          = {10.1007/978-3-662-49384-7\_2},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/FaustMV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FleischhackerKM16,
  author       = {Nils Fleischhacker and
                  Johannes Krupp and
                  Giulio Malavolta and
                  Jonas Schneider and
                  Dominique Schr{\"{o}}der and
                  Mark Simkin},
  editor       = {Chen{-}Mou Cheng and
                  Kai{-}Min Chung and
                  Giuseppe Persiano and
                  Bo{-}Yin Yang},
  title        = {Efficient Unlinkable Sanitizable Signatures from Signatures with Re-randomizable
                  Keys},
  booktitle    = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan,
                  March 6-9, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9614},
  pages        = {301--330},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49384-7\_12},
  doi          = {10.1007/978-3-662-49384-7\_12},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/FleischhackerKM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Gong0DCT16,
  author       = {Junqing Gong and
                  Jie Chen and
                  Xiaolei Dong and
                  Zhenfu Cao and
                  Shaohua Tang},
  editor       = {Chen{-}Mou Cheng and
                  Kai{-}Min Chung and
                  Giuseppe Persiano and
                  Bo{-}Yin Yang},
  title        = {Extended Nested Dual System Groups, Revisited},
  booktitle    = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan,
                  March 6-9, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9614},
  pages        = {133--163},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49384-7\_6},
  doi          = {10.1007/978-3-662-49384-7\_6},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Gong0DCT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HajiabadiKS16,
  author       = {Mohammad Hajiabadi and
                  Bruce M. Kapron and
                  Venkatesh Srinivasan},
  editor       = {Chen{-}Mou Cheng and
                  Kai{-}Min Chung and
                  Giuseppe Persiano and
                  Bo{-}Yin Yang},
  title        = {On Generic Constructions of Circularly-Secure, Leakage-Resilient Public-Key
                  Encryption Schemes},
  booktitle    = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan,
                  March 6-9, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9615},
  pages        = {129--158},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49387-8\_6},
  doi          = {10.1007/978-3-662-49387-8\_6},
  timestamp    = {Thu, 22 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/HajiabadiKS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HartungKKKR16,
  author       = {Gunnar Hartung and
                  Bj{\"{o}}rn Kaidel and
                  Alexander Koch and
                  Jessica Koch and
                  Andy Rupp},
  editor       = {Chen{-}Mou Cheng and
                  Kai{-}Min Chung and
                  Giuseppe Persiano and
                  Bo{-}Yin Yang},
  title        = {Fault-Tolerant Aggregate Signatures},
  booktitle    = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan,
                  March 6-9, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9614},
  pages        = {331--356},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49384-7\_13},
  doi          = {10.1007/978-3-662-49384-7\_13},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HartungKKKR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HulsingR016,
  author       = {Andreas H{\"{u}}lsing and
                  Joost Rijneveld and
                  Fang Song},
  editor       = {Chen{-}Mou Cheng and
                  Kai{-}Min Chung and
                  Giuseppe Persiano and
                  Bo{-}Yin Yang},
  title        = {Mitigating Multi-target Attacks in Hash-Based Signatures},
  booktitle    = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan,
                  March 6-9, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9614},
  pages        = {387--416},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49384-7\_15},
  doi          = {10.1007/978-3-662-49384-7\_15},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/HulsingR016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HulsingRS16,
  author       = {Andreas H{\"{u}}lsing and
                  Joost Rijneveld and
                  Peter Schwabe},
  editor       = {Chen{-}Mou Cheng and
                  Kai{-}Min Chung and
                  Giuseppe Persiano and
                  Bo{-}Yin Yang},
  title        = {ARMed {SPHINCS} - Computing a 41 {KB} Signature in 16 {KB} of {RAM}},
  booktitle    = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan,
                  March 6-9, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9614},
  pages        = {446--470},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49384-7\_17},
  doi          = {10.1007/978-3-662-49384-7\_17},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/HulsingRS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Joye16,
  author       = {Marc Joye},
  editor       = {Chen{-}Mou Cheng and
                  Kai{-}Min Chung and
                  Giuseppe Persiano and
                  Bo{-}Yin Yang},
  title        = {Identity-Based Cryptosystems and Quadratic Residuosity},
  booktitle    = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan,
                  March 6-9, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9614},
  pages        = {225--254},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49384-7\_9},
  doi          = {10.1007/978-3-662-49384-7\_9},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Joye16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Kitagawa0HT16,
  author       = {Fuyuki Kitagawa and
                  Takahiro Matsuda and
                  Goichiro Hanaoka and
                  Keisuke Tanaka},
  editor       = {Chen{-}Mou Cheng and
                  Kai{-}Min Chung and
                  Giuseppe Persiano and
                  Bo{-}Yin Yang},
  title        = {On the Key Dependent Message Security of the Fujisaki-Okamoto Constructions},
  booktitle    = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan,
                  March 6-9, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9614},
  pages        = {99--129},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49384-7\_5},
  doi          = {10.1007/978-3-662-49384-7\_5},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Kitagawa0HT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KruppSSFAN16,
  author       = {Johannes Krupp and
                  Dominique Schr{\"{o}}der and
                  Mark Simkin and
                  Dario Fiore and
                  Giuseppe Ateniese and
                  Stefan N{\"{u}}rnberger},
  editor       = {Chen{-}Mou Cheng and
                  Kai{-}Min Chung and
                  Giuseppe Persiano and
                  Bo{-}Yin Yang},
  title        = {Nearly Optimal Verifiable Data Streaming},
  booktitle    = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan,
                  March 6-9, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9614},
  pages        = {417--445},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49384-7\_16},
  doi          = {10.1007/978-3-662-49384-7\_16},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/KruppSSFAN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LaiDMSW16,
  author       = {Junzuo Lai and
                  Robert H. Deng and
                  Changshe Ma and
                  Kouichi Sakurai and
                  Jian Weng},
  editor       = {Chen{-}Mou Cheng and
                  Kai{-}Min Chung and
                  Giuseppe Persiano and
                  Bo{-}Yin Yang},
  title        = {CCA-Secure Keyed-Fully Homomorphic Encryption},
  booktitle    = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan,
                  March 6-9, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9614},
  pages        = {70--98},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49384-7\_4},
  doi          = {10.1007/978-3-662-49384-7\_4},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/LaiDMSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LinPST16,
  author       = {Huijia Lin and
                  Rafael Pass and
                  Karn Seth and
                  Sidharth Telang},
  editor       = {Chen{-}Mou Cheng and
                  Kai{-}Min Chung and
                  Giuseppe Persiano and
                  Bo{-}Yin Yang},
  title        = {Indistinguishability Obfuscation with Non-trivial Efficiency},
  booktitle    = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan,
                  March 6-9, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9615},
  pages        = {447--462},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49387-8\_17},
  doi          = {10.1007/978-3-662-49387-8\_17},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LinPST16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/NevesT16,
  author       = {Samuel Neves and
                  Mehdi Tibouchi},
  editor       = {Chen{-}Mou Cheng and
                  Kai{-}Min Chung and
                  Giuseppe Persiano and
                  Bo{-}Yin Yang},
  title        = {Degenerate Curve Attacks - Extending Invalid Curve Attacks to Edwards
                  Curves and Other Models},
  booktitle    = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan,
                  March 6-9, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9615},
  pages        = {19--35},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49387-8\_2},
  doi          = {10.1007/978-3-662-49387-8\_2},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/NevesT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/PetitKM16,
  author       = {Christophe Petit and
                  Michiel Kosters and
                  Ange Messeng},
  editor       = {Chen{-}Mou Cheng and
                  Kai{-}Min Chung and
                  Giuseppe Persiano and
                  Bo{-}Yin Yang},
  title        = {Algebraic Approaches for the Elliptic Curve Discrete Logarithm Problem
                  over Prime Fields},
  booktitle    = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan,
                  March 6-9, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9615},
  pages        = {3--18},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49387-8\_1},
  doi          = {10.1007/978-3-662-49387-8\_1},
  timestamp    = {Fri, 17 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/PetitKM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/SakaiAH16,
  author       = {Yusuke Sakai and
                  Nuttapong Attrapadung and
                  Goichiro Hanaoka},
  editor       = {Chen{-}Mou Cheng and
                  Kai{-}Min Chung and
                  Giuseppe Persiano and
                  Bo{-}Yin Yang},
  title        = {Attribute-Based Signatures for Circuits from Bilinear Map},
  booktitle    = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan,
                  March 6-9, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9614},
  pages        = {283--300},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49384-7\_11},
  doi          = {10.1007/978-3-662-49384-7\_11},
  timestamp    = {Mon, 21 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/SakaiAH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/TakayasuK16,
  author       = {Atsushi Takayasu and
                  Noboru Kunihiro},
  editor       = {Chen{-}Mou Cheng and
                  Kai{-}Min Chung and
                  Giuseppe Persiano and
                  Bo{-}Yin Yang},
  title        = {How to Generalize {RSA} Cryptanalyses},
  booktitle    = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan,
                  March 6-9, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9615},
  pages        = {67--97},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49387-8\_4},
  doi          = {10.1007/978-3-662-49387-8\_4},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/TakayasuK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/WatanabeS16,
  author       = {Yohei Watanabe and
                  Junji Shikata},
  editor       = {Chen{-}Mou Cheng and
                  Kai{-}Min Chung and
                  Giuseppe Persiano and
                  Bo{-}Yin Yang},
  title        = {Identity-Based Hierarchical Key-Insulated Encryption Without Random
                  Oracles},
  booktitle    = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan,
                  March 6-9, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9614},
  pages        = {255--279},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49384-7\_10},
  doi          = {10.1007/978-3-662-49384-7\_10},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/WatanabeS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Wee16,
  author       = {Hoeteck Wee},
  editor       = {Chen{-}Mou Cheng and
                  Kai{-}Min Chung and
                  Giuseppe Persiano and
                  Bo{-}Yin Yang},
  title        = {KDM-Security via Homomorphic Smooth Projective Hashing},
  booktitle    = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan,
                  March 6-9, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9615},
  pages        = {159--179},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49387-8\_7},
  doi          = {10.1007/978-3-662-49387-8\_7},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Wee16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2016-1,
  editor       = {Chen{-}Mou Cheng and
                  Kai{-}Min Chung and
                  Giuseppe Persiano and
                  Bo{-}Yin Yang},
  title        = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan,
                  March 6-9, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9614},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49384-7},
  doi          = {10.1007/978-3-662-49384-7},
  isbn         = {978-3-662-49383-0},
  timestamp    = {Fri, 01 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/2016-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2016-2,
  editor       = {Chen{-}Mou Cheng and
                  Kai{-}Min Chung and
                  Giuseppe Persiano and
                  Bo{-}Yin Yang},
  title        = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan,
                  March 6-9, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9615},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49387-8},
  doi          = {10.1007/978-3-662-49387-8},
  isbn         = {978-3-662-49386-1},
  timestamp    = {Fri, 01 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/2016-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AbdallaBCP15,
  author       = {Michel Abdalla and
                  Florian Bourse and
                  Angelo De Caro and
                  David Pointcheval},
  editor       = {Jonathan Katz},
  title        = {Simple Functional Encryption Schemes for Inner Products},
  booktitle    = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
                  USA, March 30 - April 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9020},
  pages        = {733--751},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46447-2\_33},
  doi          = {10.1007/978-3-662-46447-2\_33},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AbdallaBCP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AbdallaBP15,
  author       = {Michel Abdalla and
                  Fabrice Benhamouda and
                  David Pointcheval},
  editor       = {Jonathan Katz},
  title        = {Public-Key Encryption Indistinguishable Under Plaintext-Checkable
                  Attacks},
  booktitle    = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
                  USA, March 30 - April 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9020},
  pages        = {332--352},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46447-2\_15},
  doi          = {10.1007/978-3-662-46447-2\_15},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/AbdallaBP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AgrawalABKPS15,
  author       = {Shashank Agrawal and
                  Shweta Agrawal and
                  Saikrishna Badrinarayanan and
                  Abishek Kumarasubramanian and
                  Manoj Prabhakaran and
                  Amit Sahai},
  editor       = {Jonathan Katz},
  title        = {On the Practical Security of Inner Product Functional Encryption},
  booktitle    = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
                  USA, March 30 - April 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9020},
  pages        = {777--798},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46447-2\_35},
  doi          = {10.1007/978-3-662-46447-2\_35},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AgrawalABKPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Alperin-Sheriff15,
  author       = {Jacob Alperin{-}Sheriff},
  editor       = {Jonathan Katz},
  title        = {Short Signatures with Short Public Keys from Homomorphic Trapdoor
                  Functions},
  booktitle    = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
                  USA, March 30 - April 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9020},
  pages        = {236--255},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46447-2\_11},
  doi          = {10.1007/978-3-662-46447-2\_11},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Alperin-Sheriff15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BaldimtsiCFK15,
  author       = {Foteini Baldimtsi and
                  Melissa Chase and
                  Georg Fuchsbauer and
                  Markulf Kohlweiss},
  editor       = {Jonathan Katz},
  title        = {Anonymous Transferable E-Cash},
  booktitle    = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
                  USA, March 30 - April 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9020},
  pages        = {101--124},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46447-2\_5},
  doi          = {10.1007/978-3-662-46447-2\_5},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BaldimtsiCFK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BartheFFSST15,
  author       = {Gilles Barthe and
                  Edvard Fagerholm and
                  Dario Fiore and
                  Andre Scedrov and
                  Benedikt Schmidt and
                  Mehdi Tibouchi},
  editor       = {Jonathan Katz},
  title        = {Strongly-Optimal Structure Preserving Signatures from Type {II} Pairings:
                  Synthesis and Lower Bounds},
  booktitle    = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
                  USA, March 30 - April 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9020},
  pages        = {355--376},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46447-2\_16},
  doi          = {10.1007/978-3-662-46447-2\_16},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BartheFFSST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BellareDK15,
  author       = {Mihir Bellare and
                  Rafael Dowsley and
                  Sriram Keelveedhi},
  editor       = {Jonathan Katz},
  title        = {How Secure is Deterministic Encryption?},
  booktitle    = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
                  USA, March 30 - April 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9020},
  pages        = {52--73},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46447-2\_3},
  doi          = {10.1007/978-3-662-46447-2\_3},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BellareDK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BellareH15,
  author       = {Mihir Bellare and
                  Viet Tung Hoang},
  editor       = {Jonathan Katz},
  title        = {Adaptive Witness Encryption and Asymmetric Password-Based Cryptography},
  booktitle    = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
                  USA, March 30 - April 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9020},
  pages        = {308--331},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46447-2\_14},
  doi          = {10.1007/978-3-662-46447-2\_14},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BellareH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BellareK15,
  author       = {Mihir Bellare and
                  Sriram Keelveedhi},
  editor       = {Jonathan Katz},
  title        = {Interactive Message-Locked Encryption and Secure Deduplication},
  booktitle    = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
                  USA, March 30 - April 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9020},
  pages        = {516--538},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46447-2\_23},
  doi          = {10.1007/978-3-662-46447-2\_23},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BellareK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BergsmaJS15,
  author       = {Florian Bergsma and
                  Tibor Jager and
                  J{\"{o}}rg Schwenk},
  editor       = {Jonathan Katz},
  title        = {One-Round Key Exchange with Strong Security: An Efficient and Generic
                  Construction in the Standard Model},
  booktitle    = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
                  USA, March 30 - April 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9020},
  pages        = {477--494},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46447-2\_21},
  doi          = {10.1007/978-3-662-46447-2\_21},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BergsmaJS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BernhardFW15,
  author       = {David Bernhard and
                  Marc Fischlin and
                  Bogdan Warinschi},
  editor       = {Jonathan Katz},
  title        = {Adaptive Proofs of Knowledge in the Random Oracle Model},
  booktitle    = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
                  USA, March 30 - April 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9020},
  pages        = {629--649},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46447-2\_28},
  doi          = {10.1007/978-3-662-46447-2\_28},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BernhardFW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BlazyKKP15,
  author       = {Olivier Blazy and
                  Saqib A. Kakvi and
                  Eike Kiltz and
                  Jiaxin Pan},
  editor       = {Jonathan Katz},
  title        = {Tightly-Secure Signatures from Chameleon Hash Functions},
  booktitle    = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
                  USA, March 30 - April 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9020},
  pages        = {256--279},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46447-2\_12},
  doi          = {10.1007/978-3-662-46447-2\_12},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/BlazyKKP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CamenischEN15,
  author       = {Jan Camenisch and
                  Robert R. Enderlein and
                  Gregory Neven},
  editor       = {Jonathan Katz},
  title        = {Two-Server Password-Authenticated Secret Sharing UC-Secure Against
                  Transient Corruptions},
  booktitle    = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
                  USA, March 30 - April 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9020},
  pages        = {283--307},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46447-2\_13},
  doi          = {10.1007/978-3-662-46447-2\_13},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/CamenischEN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CanardPST15,
  author       = {S{\'{e}}bastien Canard and
                  David Pointcheval and
                  Olivier Sanders and
                  Jacques Traor{\'{e}}},
  editor       = {Jonathan Katz},
  title        = {Divisible E-Cash Made Practical},
  booktitle    = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
                  USA, March 30 - April 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9020},
  pages        = {77--100},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46447-2\_4},
  doi          = {10.1007/978-3-662-46447-2\_4},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/CanardPST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CascudoDDGNT15,
  author       = {Ignacio Cascudo and
                  Ivan Damg{\aa}rd and
                  Bernardo Machado David and
                  Irene Giacomelli and
                  Jesper Buus Nielsen and
                  Roberto Trifiletti},
  editor       = {Jonathan Katz},
  title        = {Additively Homomorphic {UC} Commitments with Optimal Amortized Overhead},
  booktitle    = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
                  USA, March 30 - April 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9020},
  pages        = {495--515},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46447-2\_22},
  doi          = {10.1007/978-3-662-46447-2\_22},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/CascudoDDGNT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CashDK15,
  author       = {David Cash and
                  Rafael Dowsley and
                  Eike Kiltz},
  editor       = {Jonathan Katz},
  title        = {Digital Signatures from Strong {RSA} without Prime Generation},
  booktitle    = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
                  USA, March 30 - April 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9020},
  pages        = {217--235},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46447-2\_10},
  doi          = {10.1007/978-3-662-46447-2\_10},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/CashDK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ChaidosG15,
  author       = {Pyrros Chaidos and
                  Jens Groth},
  editor       = {Jonathan Katz},
  title        = {Making Sigma-Protocols Non-interactive Without Random Oracles},
  booktitle    = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
                  USA, March 30 - April 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9020},
  pages        = {650--670},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46447-2\_29},
  doi          = {10.1007/978-3-662-46447-2\_29},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/ChaidosG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CouvreurOTG15,
  author       = {Alain Couvreur and
                  Ayoub Otmani and
                  Jean{-}Pierre Tillich and
                  Val{\'{e}}rie Gauthier{-}Uma{\~{n}}a},
  editor       = {Jonathan Katz},
  title        = {A Polynomial-Time Attack on the {BBCRS} Scheme},
  booktitle    = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
                  USA, March 30 - April 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9020},
  pages        = {175--193},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46447-2\_8},
  doi          = {10.1007/978-3-662-46447-2\_8},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/CouvreurOTG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Dottling15,
  author       = {Nico D{\"{o}}ttling},
  editor       = {Jonathan Katz},
  title        = {Low Noise {LPN:} {KDM} Secure Public Key Encryption and Sample Amplification},
  booktitle    = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
                  USA, March 30 - April 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9020},
  pages        = {604--626},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46447-2\_27},
  doi          = {10.1007/978-3-662-46447-2\_27},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Dottling15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FaugereGPST15,
  author       = {Jean{-}Charles Faug{\`{e}}re and
                  Danilo Gligoroski and
                  Ludovic Perret and
                  Simona Samardjiska and
                  Enrico Thomae},
  editor       = {Jonathan Katz},
  title        = {A Polynomial-Time Key-Recovery Attack on {MQQ} Cryptosystems},
  booktitle    = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
                  USA, March 30 - April 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9020},
  pages        = {150--174},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46447-2\_7},
  doi          = {10.1007/978-3-662-46447-2\_7},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/FaugereGPST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FaustMNV15,
  author       = {Sebastian Faust and
                  Pratyay Mukherjee and
                  Jesper Buus Nielsen and
                  Daniele Venturi},
  editor       = {Jonathan Katz},
  title        = {A Tamper and Leakage Resilient von Neumann Architecture},
  booktitle    = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
                  USA, March 30 - April 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9020},
  pages        = {579--603},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46447-2\_26},
  doi          = {10.1007/978-3-662-46447-2\_26},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/FaustMNV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GayMW15,
  author       = {Romain Gay and
                  Pierrick M{\'{e}}aux and
                  Hoeteck Wee},
  editor       = {Jonathan Katz},
  title        = {Predicate Encryption for Multi-dimensional Range Queries from Lattices},
  booktitle    = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
                  USA, March 30 - April 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9020},
  pages        = {752--776},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46447-2\_34},
  doi          = {10.1007/978-3-662-46447-2\_34},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/GayMW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GrangerS15,
  author       = {Robert Granger and
                  Michael Scott},
  editor       = {Jonathan Katz},
  title        = {Faster {ECC} over {\textbackslash}mathbb F{\_}2521-1},
  booktitle    = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
                  USA, March 30 - April 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9020},
  pages        = {539--553},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46447-2\_24},
  doi          = {10.1007/978-3-662-46447-2\_24},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/GrangerS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HeuerJKS15,
  author       = {Felix Heuer and
                  Tibor Jager and
                  Eike Kiltz and
                  Sven Sch{\"{a}}ge},
  editor       = {Jonathan Katz},
  title        = {On the Selective Opening Security of Practical Public-Key Encryption
                  Schemes},
  booktitle    = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
                  USA, March 30 - April 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9020},
  pages        = {27--51},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46447-2\_2},
  doi          = {10.1007/978-3-662-46447-2\_2},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HeuerJKS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HiromasaAO15,
  author       = {Ryo Hiromasa and
                  Masayuki Abe and
                  Tatsuaki Okamoto},
  editor       = {Jonathan Katz},
  title        = {Packing Messages and Optimizing Bootstrapping in {GSW-FHE}},
  booktitle    = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
                  USA, March 30 - April 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9020},
  pages        = {699--715},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46447-2\_31},
  doi          = {10.1007/978-3-662-46447-2\_31},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HiromasaAO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HofheinzKS15,
  author       = {Dennis Hofheinz and
                  Jessica Koch and
                  Christoph Striecks},
  editor       = {Jonathan Katz},
  title        = {Identity-Based Encryption with (Almost) Tight Security in the Multi-instance,
                  Multi-ciphertext Setting},
  booktitle    = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
                  USA, March 30 - April 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9020},
  pages        = {799--822},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46447-2\_36},
  doi          = {10.1007/978-3-662-46447-2\_36},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HofheinzKS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KijimaM15,
  author       = {Shuji Kijima and
                  Ravi Montenegro},
  editor       = {Jonathan Katz},
  title        = {Collision of Random Walks and a Refined Analysis of Attacks on the
                  Discrete Logarithm Problem},
  booktitle    = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
                  USA, March 30 - April 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9020},
  pages        = {127--149},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46447-2\_6},
  doi          = {10.1007/978-3-662-46447-2\_6},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/KijimaM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LewkoM15,
  author       = {Allison B. Lewko and
                  Sarah Meiklejohn},
  editor       = {Jonathan Katz},
  title        = {A Profitable Sub-prime Loan: Obtaining the Advantages of Composite
                  Order in Prime-Order Bilinear Groups},
  booktitle    = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
                  USA, March 30 - April 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9020},
  pages        = {377--398},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46447-2\_17},
  doi          = {10.1007/978-3-662-46447-2\_17},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LewkoM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LibertJYP15,
  author       = {Beno{\^{\i}}t Libert and
                  Marc Joye and
                  Moti Yung and
                  Thomas Peters},
  editor       = {Jonathan Katz},
  title        = {Secure Efficient History-Hiding Append-Only Signatures in the Standard
                  Model},
  booktitle    = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
                  USA, March 30 - April 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9020},
  pages        = {450--473},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46447-2\_20},
  doi          = {10.1007/978-3-662-46447-2\_20},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LibertJYP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LingNW15,
  author       = {San Ling and
                  Khoa Nguyen and
                  Huaxiong Wang},
  editor       = {Jonathan Katz},
  title        = {Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-Based},
  booktitle    = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
                  USA, March 30 - April 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9020},
  pages        = {427--449},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46447-2\_19},
  doi          = {10.1007/978-3-662-46447-2\_19},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/LingNW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LiuP15,
  author       = {Shengli Liu and
                  Kenneth G. Paterson},
  editor       = {Jonathan Katz},
  title        = {Simulation-Based Selective Opening {CCA} Security for {PKE} from Key
                  Encapsulation Mechanisms},
  booktitle    = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
                  USA, March 30 - April 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9020},
  pages        = {3--26},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46447-2\_1},
  doi          = {10.1007/978-3-662-46447-2\_1},
  timestamp    = {Sun, 26 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/LiuP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LyubashevskyW15,
  author       = {Vadim Lyubashevsky and
                  Daniel Wichs},
  editor       = {Jonathan Katz},
  title        = {Simple Lattice Trapdoor Sampling from a Broad Class of Distributions},
  booktitle    = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
                  USA, March 30 - April 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9020},
  pages        = {716--730},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46447-2\_32},
  doi          = {10.1007/978-3-662-46447-2\_32},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LyubashevskyW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/NguyenZZ15,
  author       = {Phong Q. Nguyen and
                  Jiang Zhang and
                  Zhenfeng Zhang},
  editor       = {Jonathan Katz},
  title        = {Simpler Efficient Group Signatures from Lattices},
  booktitle    = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
                  USA, March 30 - April 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9020},
  pages        = {401--426},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46447-2\_18},
  doi          = {10.1007/978-3-662-46447-2\_18},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/NguyenZZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/OrsiniPS15,
  author       = {Emmanuela Orsini and
                  Joop van de Pol and
                  Nigel P. Smart},
  editor       = {Jonathan Katz},
  title        = {Bootstrapping {BGV} Ciphertexts with a Wider Choice of p and q},
  booktitle    = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
                  USA, March 30 - April 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9020},
  pages        = {673--698},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46447-2\_30},
  doi          = {10.1007/978-3-662-46447-2\_30},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/OrsiniPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/PenaFP15,
  author       = {Marta Conde Pena and
                  Jean{-}Charles Faug{\`{e}}re and
                  Ludovic Perret},
  editor       = {Jonathan Katz},
  title        = {Algebraic Cryptanalysis of a Quantum Money Scheme The Noise-Free Case},
  booktitle    = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
                  USA, March 30 - April 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9020},
  pages        = {194--213},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46447-2\_9},
  doi          = {10.1007/978-3-662-46447-2\_9},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/PenaFP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/QinLYDC15,
  author       = {Baodong Qin and
                  Shengli Liu and
                  Tsz Hon Yuen and
                  Robert H. Deng and
                  Kefei Chen},
  editor       = {Jonathan Katz},
  title        = {Continuous Non-malleable Key Derivation and Its Application to Related-Key
                  Security},
  booktitle    = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
                  USA, March 30 - April 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9020},
  pages        = {557--578},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46447-2\_25},
  doi          = {10.1007/978-3-662-46447-2\_25},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/QinLYDC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2015,
  editor       = {Jonathan Katz},
  title        = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
                  USA, March 30 - April 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9020},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46447-2},
  doi          = {10.1007/978-3-662-46447-2},
  isbn         = {978-3-662-46446-5},
  timestamp    = {Fri, 01 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/0002H14,
  author       = {Takahiro Matsuda and
                  Goichiro Hanaoka},
  editor       = {Hugo Krawczyk},
  title        = {Chosen Ciphertext Security via {UCE}},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {56--76},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_4},
  doi          = {10.1007/978-3-642-54631-0\_4},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/0002H14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AlbrechtFFP14,
  author       = {Martin R. Albrecht and
                  Jean{-}Charles Faug{\`{e}}re and
                  Robert Fitzpatrick and
                  Ludovic Perret},
  editor       = {Hugo Krawczyk},
  title        = {Lazy Modulus Switching for the {BKW} Algorithm on {LWE}},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {429--445},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_25},
  doi          = {10.1007/978-3-642-54631-0\_25},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AlbrechtFFP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AlbrechtFFPTX14,
  author       = {Martin R. Albrecht and
                  Jean{-}Charles Faug{\`{e}}re and
                  Robert Fitzpatrick and
                  Ludovic Perret and
                  Yosuke Todo and
                  Keita Xagawa},
  editor       = {Hugo Krawczyk},
  title        = {Practical Cryptanalysis of a Public-Key Encryption Scheme Based on
                  New Multivariate Quadratic Assumptions},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {446--464},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_26},
  doi          = {10.1007/978-3-642-54631-0\_26},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AlbrechtFFPTX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AnanthCGKO14,
  author       = {Prabhanjan Ananth and
                  Nishanth Chandran and
                  Vipul Goyal and
                  Bhavana Kanukurthi and
                  Rafail Ostrovsky},
  editor       = {Hugo Krawczyk},
  title        = {Achieving Privacy in Verifiable Computation with Multiple Servers
                  - Without {FHE} and without Pre-processing},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {149--166},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_9},
  doi          = {10.1007/978-3-642-54631-0\_9},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AnanthCGKO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AponKST14,
  author       = {Daniel Apon and
                  Jonathan Katz and
                  Elaine Shi and
                  Aishwarya Thiruvengadam},
  editor       = {Hugo Krawczyk},
  title        = {Verifiable Oblivious Storage},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {131--148},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_8},
  doi          = {10.1007/978-3-642-54631-0\_8},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AponKST14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ArmknechtGKP14,
  author       = {Frederik Armknecht and
                  Tommaso Gagliardoni and
                  Stefan Katzenbeisser and
                  Andreas Peter},
  editor       = {Hugo Krawczyk},
  title        = {General Impossibility of Group Homomorphic Encryption in the Quantum
                  World},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {556--573},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_32},
  doi          = {10.1007/978-3-642-54631-0\_32},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/ArmknechtGKP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BarbulescuBDGJTVZ14,
  author       = {Razvan Barbulescu and
                  Cyril Bouvier and
                  J{\'{e}}r{\'{e}}mie Detrey and
                  Pierrick Gaudry and
                  Hamza Jeljeli and
                  Emmanuel Thom{\'{e}} and
                  Marion Videau and
                  Paul Zimmermann},
  editor       = {Hugo Krawczyk},
  title        = {Discrete Logarithm in {GF(2809)} with {FFS}},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {221--238},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_13},
  doi          = {10.1007/978-3-642-54631-0\_13},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BarbulescuBDGJTVZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BellareF14,
  author       = {Mihir Bellare and
                  Georg Fuchsbauer},
  editor       = {Hugo Krawczyk},
  title        = {Policy-Based Signatures},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {520--537},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_30},
  doi          = {10.1007/978-3-642-54631-0\_30},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BellareF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BiCFNRZ14,
  author       = {Jingguo Bi and
                  Jean{-}S{\'{e}}bastien Coron and
                  Jean{-}Charles Faug{\`{e}}re and
                  Phong Q. Nguyen and
                  Gu{\'{e}}na{\"{e}}l Renault and
                  Rina Zeitoun},
  editor       = {Hugo Krawczyk},
  title        = {Rounding and Chaining {LLL:} Finding Faster Small Roots of Univariate
                  Polynomial Congruences},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {185--202},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_11},
  doi          = {10.1007/978-3-642-54631-0\_11},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BiCFNRZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BohlDH14,
  author       = {Florian B{\"{o}}hl and
                  Gareth T. Davies and
                  Dennis Hofheinz},
  editor       = {Hugo Krawczyk},
  title        = {Encryption Schemes Secure under Related-Key and Key-Dependent Message
                  Attacks},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {483--500},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_28},
  doi          = {10.1007/978-3-642-54631-0\_28},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BohlDH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BosCM14,
  author       = {Joppe W. Bos and
                  Craig Costello and
                  Andrea Miele},
  editor       = {Hugo Krawczyk},
  title        = {Elliptic and Hyperelliptic Curves: {A} Practical Security Analysis},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {203--220},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_12},
  doi          = {10.1007/978-3-642-54631-0\_12},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/BosCM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BoyleGI14,
  author       = {Elette Boyle and
                  Shafi Goldwasser and
                  Ioana Ivan},
  editor       = {Hugo Krawczyk},
  title        = {Functional Signatures and Pseudorandom Functions},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {501--519},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_29},
  doi          = {10.1007/978-3-642-54631-0\_29},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BoyleGI14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CanardPS14,
  author       = {S{\'{e}}bastien Canard and
                  David Pointcheval and
                  Olivier Sanders},
  editor       = {Hugo Krawczyk},
  title        = {Efficient Delegation of Zero-Knowledge Proofs of Knowledge in a Pairing-Friendly
                  Setting},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {167--184},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_10},
  doi          = {10.1007/978-3-642-54631-0\_10},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/CanardPS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CanettiPPT14,
  author       = {Ran Canetti and
                  Omer Paneth and
                  Dimitrios Papadopoulos and
                  Nikos Triandopoulos},
  editor       = {Hugo Krawczyk},
  title        = {Verifiable Set Operations over Outsourced Databases},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {113--130},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_7},
  doi          = {10.1007/978-3-642-54631-0\_7},
  timestamp    = {Mon, 07 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/CanettiPPT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CatalanoFGN14,
  author       = {Dario Catalano and
                  Dario Fiore and
                  Rosario Gennaro and
                  Luca Nizzardo},
  editor       = {Hugo Krawczyk},
  title        = {Generalizing Homomorphic MACs for Arithmetic Circuits},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {538--555},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_31},
  doi          = {10.1007/978-3-642-54631-0\_31},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/CatalanoFGN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ChandranCLNX14,
  author       = {Nishanth Chandran and
                  Melissa Chase and
                  Feng{-}Hao Liu and
                  Ryo Nishimaki and
                  Keita Xagawa},
  editor       = {Hugo Krawczyk},
  title        = {Re-encryption, Functional Re-encryption, and Multi-hop Re-encryption:
                  {A} Framework for Achieving Obfuscation-Based Security and Instantiations
                  from Lattices},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {95--112},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_6},
  doi          = {10.1007/978-3-642-54631-0\_6},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/ChandranCLNX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ChoGO14,
  author       = {Chongwon Cho and
                  Sanjam Garg and
                  Rafail Ostrovsky},
  editor       = {Hugo Krawczyk},
  title        = {Cross-Domain Secure Computation},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {650--668},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_37},
  doi          = {10.1007/978-3-642-54631-0\_37},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/ChoGO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CoronLT14,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Tancr{\`{e}}de Lepoint and
                  Mehdi Tibouchi},
  editor       = {Hugo Krawczyk},
  title        = {Scale-Invariant Fully Homomorphic Encryption over the Integers},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {311--328},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_18},
  doi          = {10.1007/978-3-642-54631-0\_18},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/CoronLT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Dachman-Soled14,
  author       = {Dana Dachman{-}Soled},
  editor       = {Hugo Krawczyk},
  title        = {A Black-Box Construction of a {CCA2} Encryption Scheme from a Plaintext
                  Aware (sPA1) Encryption Scheme},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {37--55},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_3},
  doi          = {10.1007/978-3-642-54631-0\_3},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Dachman-Soled14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Dachman-Soled14a,
  author       = {Dana Dachman{-}Soled},
  editor       = {Hugo Krawczyk},
  title        = {On Minimal Assumptions for Sender-Deniable Public Key Encryption},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {574--591},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_33},
  doi          = {10.1007/978-3-642-54631-0\_33},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Dachman-Soled14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Dachman-SoledFMO14,
  author       = {Dana Dachman{-}Soled and
                  Georg Fuchsbauer and
                  Payman Mohassel and
                  Adam O'Neill},
  editor       = {Hugo Krawczyk},
  title        = {Enhanced Chosen-Ciphertext Security and Applications},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {329--344},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_19},
  doi          = {10.1007/978-3-642-54631-0\_19},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Dachman-SoledFMO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/EscalaG14,
  author       = {Alex Escala and
                  Jens Groth},
  editor       = {Hugo Krawczyk},
  title        = {Fine-Tuning Groth-Sahai Proofs},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {630--649},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_36},
  doi          = {10.1007/978-3-642-54631-0\_36},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/EscalaG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/EscalaHLR14,
  author       = {Alex Escala and
                  Javier Herranz and
                  Beno{\^{\i}}t Libert and
                  Carla R{\`{a}}fols},
  editor       = {Hugo Krawczyk},
  title        = {Identity-Based Lossy Trapdoor Functions: New Definitions, Hierarchical
                  Extensions, and Implications},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {239--256},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_14},
  doi          = {10.1007/978-3-642-54631-0\_14},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/EscalaHLR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HohenbergerW14,
  author       = {Susan Hohenberger and
                  Brent Waters},
  editor       = {Hugo Krawczyk},
  title        = {Online/Offline Attribute-Based Encryption},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {293--310},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_17},
  doi          = {10.1007/978-3-642-54631-0\_17},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HohenbergerW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HuPZ14,
  author       = {Gengran Hu and
                  Yanbin Pan and
                  Feng Zhang},
  editor       = {Hugo Krawczyk},
  title        = {Solving Random Subset Sum Problem by l p -norm {SVP} Oracle},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {399--410},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_23},
  doi          = {10.1007/978-3-642-54631-0\_23},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HuPZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/IshiguroKMT14,
  author       = {Tsukasa Ishiguro and
                  Shinsaku Kiyomoto and
                  Yutaka Miyake and
                  Tsuyoshi Takagi},
  editor       = {Hugo Krawczyk},
  title        = {Parallel Gauss Sieve Algorithm: Solving the {SVP} Challenge over a
                  128-Dimensional Ideal Lattice},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {411--428},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_24},
  doi          = {10.1007/978-3-642-54631-0\_24},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/IshiguroKMT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Jarecki14,
  author       = {Stanislaw Jarecki},
  editor       = {Hugo Krawczyk},
  title        = {Practical Covert Authentication},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {611--629},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_35},
  doi          = {10.1007/978-3-642-54631-0\_35},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Jarecki14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KiltzMP14,
  author       = {Eike Kiltz and
                  Daniel Masny and
                  Krzysztof Pietrzak},
  editor       = {Hugo Krawczyk},
  title        = {Simple Chosen-Ciphertext Security from Low-Noise {LPN}},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_1},
  doi          = {10.1007/978-3-642-54631-0\_1},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/KiltzMP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Kirshanova14,
  author       = {Elena Kirshanova},
  editor       = {Hugo Krawczyk},
  title        = {Proxy Re-encryption from Lattices},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {77--94},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_5},
  doi          = {10.1007/978-3-642-54631-0\_5},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Kirshanova14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LangloisLNW14,
  author       = {Adeline Langlois and
                  San Ling and
                  Khoa Nguyen and
                  Huaxiong Wang},
  editor       = {Hugo Krawczyk},
  title        = {Lattice-Based Group Signature Scheme with Verifier-Local Revocation},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {345--361},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_20},
  doi          = {10.1007/978-3-642-54631-0\_20},
  timestamp    = {Mon, 19 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/LangloisLNW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LiSYKS14,
  author       = {Yong Li and
                  Sven Sch{\"{a}}ge and
                  Zheng Yang and
                  Florian Kohlar and
                  J{\"{o}}rg Schwenk},
  editor       = {Hugo Krawczyk},
  title        = {On the Security of the Pre-shared Key Ciphersuites of {TLS}},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {669--684},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_38},
  doi          = {10.1007/978-3-642-54631-0\_38},
  timestamp    = {Thu, 16 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LiSYKS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LibertYJP14,
  author       = {Beno{\^{\i}}t Libert and
                  Moti Yung and
                  Marc Joye and
                  Thomas Peters},
  editor       = {Hugo Krawczyk},
  title        = {Traceable Group Encryption},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {592--610},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_34},
  doi          = {10.1007/978-3-642-54631-0\_34},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LibertYJP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/NielsenVZ14,
  author       = {Jesper Buus Nielsen and
                  Daniele Venturi and
                  Angela Zottarel},
  editor       = {Hugo Krawczyk},
  title        = {Leakage-Resilient Signatures with Graceful Degradation},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {362--379},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_21},
  doi          = {10.1007/978-3-642-54631-0\_21},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/NielsenVZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/PatersonSS14,
  author       = {Kenneth G. Paterson and
                  Jacob C. N. Schuldt and
                  Dale L. Sibborn},
  editor       = {Hugo Krawczyk},
  title        = {Related Randomness Attacks for Public Key Encryption},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {465--482},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_27},
  doi          = {10.1007/978-3-642-54631-0\_27},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/PatersonSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/QinL14,
  author       = {Baodong Qin and
                  Shengli Liu},
  editor       = {Hugo Krawczyk},
  title        = {Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction
                  and Free of Pairing},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {19--36},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_2},
  doi          = {10.1007/978-3-642-54631-0\_2},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/QinL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Seurin14,
  author       = {Yannick Seurin},
  editor       = {Hugo Krawczyk},
  title        = {On the Lossiness of the Rabin Trapdoor Function},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {380--398},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_22},
  doi          = {10.1007/978-3-642-54631-0\_22},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Seurin14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/TessaroW14,
  author       = {Stefano Tessaro and
                  David A. Wilson},
  editor       = {Hugo Krawczyk},
  title        = {Bounded-Collusion Identity-Based Encryption from Semantically-Secure
                  Public-Key Encryption: Generic Constructions with Short Ciphertexts},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {257--274},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_15},
  doi          = {10.1007/978-3-642-54631-0\_15},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/TessaroW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/YamadaAHK14,
  author       = {Shota Yamada and
                  Nuttapong Attrapadung and
                  Goichiro Hanaoka and
                  Noboru Kunihiro},
  editor       = {Hugo Krawczyk},
  title        = {A Framework and Compact Constructions for Non-monotonic Attribute-Based
                  Encryption},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {275--292},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_16},
  doi          = {10.1007/978-3-642-54631-0\_16},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/YamadaAHK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2014,
  editor       = {Hugo Krawczyk},
  title        = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0},
  doi          = {10.1007/978-3-642-54631-0},
  isbn         = {978-3-642-54630-3},
  timestamp    = {Fri, 01 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AbdallaHP13,
  author       = {Michel Abdalla and
                  Fabrice Ben Hamouda and
                  David Pointcheval},
  editor       = {Kaoru Kurosawa and
                  Goichiro Hanaoka},
  title        = {Tighter Reductions for Forward-Secure Signature Schemes},
  booktitle    = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference
                  on Practice and Theory in Public-Key Cryptography, Nara, Japan, February
                  26 - March 1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7778},
  pages        = {292--311},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36362-7\_19},
  doi          = {10.1007/978-3-642-36362-7\_19},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AbdallaHP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AbeDKNO13,
  author       = {Masayuki Abe and
                  Bernardo David and
                  Markulf Kohlweiss and
                  Ryo Nishimaki and
                  Miyako Ohkubo},
  editor       = {Kaoru Kurosawa and
                  Goichiro Hanaoka},
  title        = {Tagged One-Time Signatures: Tight Security and Optimal Tag Size},
  booktitle    = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference
                  on Practice and Theory in Public-Key Cryptography, Nara, Japan, February
                  26 - March 1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7778},
  pages        = {312--331},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36362-7\_20},
  doi          = {10.1007/978-3-642-36362-7\_20},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AbeDKNO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AttrapadungLP13,
  author       = {Nuttapong Attrapadung and
                  Beno{\^{\i}}t Libert and
                  Thomas Peters},
  editor       = {Kaoru Kurosawa and
                  Goichiro Hanaoka},
  title        = {Efficient Completely Context-Hiding Quotable and Linearly Homomorphic
                  Signatures},
  booktitle    = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference
                  on Practice and Theory in Public-Key Cryptography, Nara, Japan, February
                  26 - March 1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7778},
  pages        = {386--404},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36362-7\_24},
  doi          = {10.1007/978-3-642-36362-7\_24},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AttrapadungLP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BarbosaF13,
  author       = {Manuel Barbosa and
                  Pooya Farshim},
  editor       = {Kaoru Kurosawa and
                  Goichiro Hanaoka},
  title        = {On the Semantic Security of Functional Encryption Schemes},
  booktitle    = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference
                  on Practice and Theory in Public-Key Cryptography, Nara, Japan, February
                  26 - March 1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7778},
  pages        = {143--161},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36362-7\_10},
  doi          = {10.1007/978-3-642-36362-7\_10},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BarbosaF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BarbuBDGRRZ13,
  author       = {Guillaume Barbu and
                  Alberto Battistello and
                  Guillaume Dabosville and
                  Christophe Giraud and
                  Gu{\'{e}}na{\"{e}}l Renault and
                  Soline Renner and
                  Rina Zeitoun},
  editor       = {Kaoru Kurosawa and
                  Goichiro Hanaoka},
  title        = {Combined Attack on {CRT-RSA} - Why Public Verification Must Not Be
                  Public?},
  booktitle    = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference
                  on Practice and Theory in Public-Key Cryptography, Nara, Japan, February
                  26 - March 1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7778},
  pages        = {198--215},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36362-7\_13},
  doi          = {10.1007/978-3-642-36362-7\_13},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BarbuBDGRRZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BrakerskiGH13,
  author       = {Zvika Brakerski and
                  Craig Gentry and
                  Shai Halevi},
  editor       = {Kaoru Kurosawa and
                  Goichiro Hanaoka},
  title        = {Packed Ciphertexts in LWE-Based Homomorphic Encryption},
  booktitle    = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference
                  on Practice and Theory in Public-Key Cryptography, Nara, Japan, February
                  26 - March 1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7778},
  pages        = {1--13},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36362-7\_1},
  doi          = {10.1007/978-3-642-36362-7\_1},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BrakerskiGH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CatalanoF13,
  author       = {Dario Catalano and
                  Dario Fiore},
  editor       = {Kaoru Kurosawa and
                  Goichiro Hanaoka},
  title        = {Vector Commitments and Their Applications},
  booktitle    = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference
                  on Practice and Theory in Public-Key Cryptography, Nara, Japan, February
                  26 - March 1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7778},
  pages        = {55--72},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36362-7\_5},
  doi          = {10.1007/978-3-642-36362-7\_5},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/CatalanoF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ChaseKLM13,
  author       = {Melissa Chase and
                  Markulf Kohlweiss and
                  Anna Lysyanskaya and
                  Sarah Meiklejohn},
  editor       = {Kaoru Kurosawa and
                  Goichiro Hanaoka},
  title        = {Verifiable Elections That Scale for Free},
  booktitle    = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference
                  on Practice and Theory in Public-Key Cryptography, Nara, Japan, February
                  26 - March 1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7778},
  pages        = {479--496},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36362-7\_29},
  doi          = {10.1007/978-3-642-36362-7\_29},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/ChaseKLM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ChoiKWZ13,
  author       = {Seung Geol Choi and
                  Jonathan Katz and
                  Hoeteck Wee and
                  Hong{-}Sheng Zhou},
  editor       = {Kaoru Kurosawa and
                  Goichiro Hanaoka},
  title        = {Efficient, Adaptively Secure, and Composable Oblivious Transfer with
                  a Single, Global {CRS}},
  booktitle    = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference
                  on Practice and Theory in Public-Key Cryptography, Nara, Japan, February
                  26 - March 1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7778},
  pages        = {73--88},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36362-7\_6},
  doi          = {10.1007/978-3-642-36362-7\_6},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/ChoiKWZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DagdelenMV13,
  author       = {{\"{O}}zg{\"{u}}r Dagdelen and
                  Payman Mohassel and
                  Daniele Venturi},
  editor       = {Kaoru Kurosawa and
                  Goichiro Hanaoka},
  title        = {Rate-Limited Secure Function Evaluation: Definitions and Constructions},
  booktitle    = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference
                  on Practice and Theory in Public-Key Cryptography, Nara, Japan, February
                  26 - March 1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7778},
  pages        = {461--478},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36362-7\_28},
  doi          = {10.1007/978-3-642-36362-7\_28},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DagdelenMV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/EmuraHO0Y13,
  author       = {Keita Emura and
                  Goichiro Hanaoka and
                  Go Ohtake and
                  Takahiro Matsuda and
                  Shota Yamada},
  editor       = {Kaoru Kurosawa and
                  Goichiro Hanaoka},
  title        = {Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption},
  booktitle    = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference
                  on Practice and Theory in Public-Key Cryptography, Nara, Japan, February
                  26 - March 1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7778},
  pages        = {32--50},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36362-7\_3},
  doi          = {10.1007/978-3-642-36362-7\_3},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/EmuraHO0Y13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FarshimLPQ13,
  author       = {Pooya Farshim and
                  Beno{\^{\i}}t Libert and
                  Kenneth G. Paterson and
                  Elizabeth A. Quaglia},
  editor       = {Kaoru Kurosawa and
                  Goichiro Hanaoka},
  title        = {Robust Encryption, Revisited},
  booktitle    = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference
                  on Practice and Theory in Public-Key Cryptography, Nara, Japan, February
                  26 - March 1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7778},
  pages        = {352--368},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36362-7\_22},
  doi          = {10.1007/978-3-642-36362-7\_22},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/FarshimLPQ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FreireHKP13,
  author       = {Eduarda S. V. Freire and
                  Dennis Hofheinz and
                  Eike Kiltz and
                  Kenneth G. Paterson},
  editor       = {Kaoru Kurosawa and
                  Goichiro Hanaoka},
  title        = {Non-Interactive Key Exchange},
  booktitle    = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference
                  on Practice and Theory in Public-Key Cryptography, Nara, Japan, February
                  26 - March 1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7778},
  pages        = {254--271},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36362-7\_17},
  doi          = {10.1007/978-3-642-36362-7\_17},
  timestamp    = {Wed, 22 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/FreireHKP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HamoudaBCPV13,
  author       = {Fabrice Ben Hamouda and
                  Olivier Blazy and
                  C{\'{e}}line Chevalier and
                  David Pointcheval and
                  Damien Vergnaud},
  editor       = {Kaoru Kurosawa and
                  Goichiro Hanaoka},
  title        = {Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages},
  booktitle    = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference
                  on Practice and Theory in Public-Key Cryptography, Nara, Japan, February
                  26 - March 1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7778},
  pages        = {272--291},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36362-7\_18},
  doi          = {10.1007/978-3-642-36362-7\_18},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/HamoudaBCPV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HohenbergerW13,
  author       = {Susan Hohenberger and
                  Brent Waters},
  editor       = {Kaoru Kurosawa and
                  Goichiro Hanaoka},
  title        = {Attribute-Based Encryption with Fast Decryption},
  booktitle    = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference
                  on Practice and Theory in Public-Key Cryptography, Nara, Japan, February
                  26 - March 1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7778},
  pages        = {162--179},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36362-7\_11},
  doi          = {10.1007/978-3-642-36362-7\_11},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HohenbergerW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HuangLQ13,
  author       = {Zhengan Huang and
                  Shengli Liu and
                  Baodong Qin},
  editor       = {Kaoru Kurosawa and
                  Goichiro Hanaoka},
  title        = {Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext
                  Attacks Revisited},
  booktitle    = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference
                  on Practice and Theory in Public-Key Cryptography, Nara, Japan, February
                  26 - March 1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7778},
  pages        = {369--385},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36362-7\_23},
  doi          = {10.1007/978-3-642-36362-7\_23},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HuangLQ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KatzTZ13,
  author       = {Jonathan Katz and
                  Aishwarya Thiruvengadam and
                  Hong{-}Sheng Zhou},
  editor       = {Kaoru Kurosawa and
                  Goichiro Hanaoka},
  title        = {Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic
                  Encryption},
  booktitle    = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference
                  on Practice and Theory in Public-Key Cryptography, Nara, Japan, February
                  26 - March 1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7778},
  pages        = {14--31},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36362-7\_2},
  doi          = {10.1007/978-3-642-36362-7\_2},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/KatzTZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KumarasubramanianOPW13,
  author       = {Abishek Kumarasubramanian and
                  Rafail Ostrovsky and
                  Omkant Pandey and
                  Akshay Wadia},
  editor       = {Kaoru Kurosawa and
                  Goichiro Hanaoka},
  title        = {Cryptography Using Captcha Puzzles},
  booktitle    = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference
                  on Practice and Theory in Public-Key Cryptography, Nara, Japan, February
                  26 - March 1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7778},
  pages        = {89--106},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36362-7\_7},
  doi          = {10.1007/978-3-642-36362-7\_7},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/KumarasubramanianOPW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KunihiroSI13,
  author       = {Noboru Kunihiro and
                  Naoyuki Shinohara and
                  Tetsuya Izu},
  editor       = {Kaoru Kurosawa and
                  Goichiro Hanaoka},
  title        = {Recovering {RSA} Secret Keys from Noisy Key Bits with Erasures and
                  Errors},
  booktitle    = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference
                  on Practice and Theory in Public-Key Cryptography, Nara, Japan, February
                  26 - March 1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7778},
  pages        = {180--197},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36362-7\_12},
  doi          = {10.1007/978-3-642-36362-7\_12},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/KunihiroSI13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LeeLY13,
  author       = {Kwangsu Lee and
                  Dong Hoon Lee and
                  Moti Yung},
  editor       = {Kaoru Kurosawa and
                  Goichiro Hanaoka},
  title        = {Sequential Aggregate Signatures with Short Public Keys: Design, Analysis
                  and Implementation Studies},
  booktitle    = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference
                  on Practice and Theory in Public-Key Cryptography, Nara, Japan, February
                  26 - March 1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7778},
  pages        = {423--442},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36362-7\_26},
  doi          = {10.1007/978-3-642-36362-7\_26},
  timestamp    = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/LeeLY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Lindell13,
  author       = {Yehuda Lindell},
  editor       = {Kaoru Kurosawa and
                  Goichiro Hanaoka},
  title        = {Techniques for Efficient Secure Computation Based on Yao's Protocol},
  booktitle    = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference
                  on Practice and Theory in Public-Key Cryptography, Nara, Japan, February
                  26 - March 1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7778},
  pages        = {253},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36362-7\_16},
  doi          = {10.1007/978-3-642-36362-7\_16},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Lindell13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LingNSW13,
  author       = {San Ling and
                  Khoa Nguyen and
                  Damien Stehl{\'{e}} and
                  Huaxiong Wang},
  editor       = {Kaoru Kurosawa and
                  Goichiro Hanaoka},
  title        = {Improved Zero-Knowledge Proofs of Knowledge for the {ISIS} Problem,
                  and Applications},
  booktitle    = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference
                  on Practice and Theory in Public-Key Cryptography, Nara, Japan, February
                  26 - March 1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7778},
  pages        = {107--124},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36362-7\_8},
  doi          = {10.1007/978-3-642-36362-7\_8},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/LingNSW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/MatsudaH13,
  author       = {Takahiro Matsuda and
                  Goichiro Hanaoka},
  editor       = {Kaoru Kurosawa and
                  Goichiro Hanaoka},
  title        = {Key Encapsulation Mechanisms from Extractable Hash Proof Systems,
                  Revisited},
  booktitle    = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference
                  on Practice and Theory in Public-Key Cryptography, Nara, Japan, February
                  26 - March 1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7778},
  pages        = {332--351},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36362-7\_21},
  doi          = {10.1007/978-3-642-36362-7\_21},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/MatsudaH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/NielsenVZ13,
  author       = {Jesper Buus Nielsen and
                  Daniele Venturi and
                  Angela Zottarel},
  editor       = {Kaoru Kurosawa and
                  Goichiro Hanaoka},
  title        = {On the Connection between Leakage Tolerance and Adaptive Security},
  booktitle    = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference
                  on Practice and Theory in Public-Key Cryptography, Nara, Japan, February
                  26 - March 1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7778},
  pages        = {497--515},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36362-7\_30},
  doi          = {10.1007/978-3-642-36362-7\_30},
  timestamp    = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/NielsenVZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/NishimakiX13,
  author       = {Ryo Nishimaki and
                  Keita Xagawa},
  editor       = {Kaoru Kurosawa and
                  Goichiro Hanaoka},
  title        = {Verifiably Encrypted Signatures with Short Keys Based on the Decisional
                  Linear Problem and Obfuscation for Encrypted {VES}},
  booktitle    = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference
                  on Practice and Theory in Public-Key Cryptography, Nara, Japan, February
                  26 - March 1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7778},
  pages        = {405--422},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36362-7\_25},
  doi          = {10.1007/978-3-642-36362-7\_25},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/NishimakiX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/OkamotoT13,
  author       = {Tatsuaki Okamoto and
                  Katsuyuki Takashima},
  editor       = {Kaoru Kurosawa and
                  Goichiro Hanaoka},
  title        = {Decentralized Attribute-Based Signatures},
  booktitle    = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference
                  on Practice and Theory in Public-Key Cryptography, Nara, Japan, February
                  26 - March 1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7778},
  pages        = {125--142},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36362-7\_9},
  doi          = {10.1007/978-3-642-36362-7\_9},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/OkamotoT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/SeoE13,
  author       = {Jae Hong Seo and
                  Keita Emura},
  editor       = {Kaoru Kurosawa and
                  Goichiro Hanaoka},
  title        = {Revocable Identity-Based Encryption Revisited: Security Model and
                  Construction},
  booktitle    = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference
                  on Practice and Theory in Public-Key Cryptography, Nara, Japan, February
                  26 - March 1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7778},
  pages        = {216--234},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36362-7\_14},
  doi          = {10.1007/978-3-642-36362-7\_14},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/SeoE13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Seurin13,
  author       = {Yannick Seurin},
  editor       = {Kaoru Kurosawa and
                  Goichiro Hanaoka},
  title        = {New Constructions and Applications of Trapdoor {DDH} Groups},
  booktitle    = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference
                  on Practice and Theory in Public-Key Cryptography, Nara, Japan, February
                  26 - March 1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7778},
  pages        = {443--460},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36362-7\_27},
  doi          = {10.1007/978-3-642-36362-7\_27},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Seurin13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Waters13,
  author       = {Brent Waters},
  editor       = {Kaoru Kurosawa and
                  Goichiro Hanaoka},
  title        = {Functional Encryption: Origins and Recent Developments},
  booktitle    = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference
                  on Practice and Theory in Public-Key Cryptography, Nara, Japan, February
                  26 - March 1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7778},
  pages        = {51--54},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36362-7\_4},
  doi          = {10.1007/978-3-642-36362-7\_4},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Waters13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Xagawa13,
  author       = {Keita Xagawa},
  editor       = {Kaoru Kurosawa and
                  Goichiro Hanaoka},
  title        = {Improved (Hierarchical) Inner-Product Encryption from Lattices},
  booktitle    = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference
                  on Practice and Theory in Public-Key Cryptography, Nara, Japan, February
                  26 - March 1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7778},
  pages        = {235--252},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36362-7\_15},
  doi          = {10.1007/978-3-642-36362-7\_15},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Xagawa13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2013,
  editor       = {Kaoru Kurosawa and
                  Goichiro Hanaoka},
  title        = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference
                  on Practice and Theory in Public-Key Cryptography, Nara, Japan, February
                  26 - March 1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7778},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36362-7},
  doi          = {10.1007/978-3-642-36362-7},
  isbn         = {978-3-642-36361-0},
  timestamp    = {Fri, 01 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AbdallaFL12,
  author       = {Michel Abdalla and
                  Dario Fiore and
                  Vadim Lyubashevsky},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {From Selective to Full Security: Semi-generic Transformations in the
                  Standard Model},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {316--333},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_19},
  doi          = {10.1007/978-3-642-30057-8\_19},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AbdallaFL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AgrawalBVVW12,
  author       = {Shweta Agrawal and
                  Xavier Boyen and
                  Vinod Vaikuntanathan and
                  Panagiotis Voulgaris and
                  Hoeteck Wee},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {Functional Encryption for Threshold Functions (or Fuzzy {IBE)} from
                  Lattices},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {280--297},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_17},
  doi          = {10.1007/978-3-642-30057-8\_17},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AgrawalBVVW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Alperin-SheriffP12,
  author       = {Jacob Alperin{-}Sheriff and
                  Chris Peikert},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {Circular and {KDM} Security for Identity-Based Encryption},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {334--352},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_20},
  doi          = {10.1007/978-3-642-30057-8\_20},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Alperin-SheriffP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BauerVZ12,
  author       = {Aur{\'{e}}lie Bauer and
                  Damien Vergnaud and
                  Jean{-}Christophe Zapalowicz},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {Inferring Sequences Produced by Nonlinear Pseudorandom Number Generators
                  Using Coppersmith's Methods},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {609--626},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_36},
  doi          = {10.1007/978-3-642-30057-8\_36},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/BauerVZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BohlHK12,
  author       = {Florian B{\"{o}}hl and
                  Dennis Hofheinz and
                  Daniel Kraschewski},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {On Definitions of Selective Opening Security},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {522--539},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_31},
  doi          = {10.1007/978-3-642-30057-8\_31},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BohlHK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CanettiDVW12,
  author       = {Ran Canetti and
                  Dana Dachman{-}Soled and
                  Vinod Vaikuntanathan and
                  Hoeteck Wee},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {Efficient Password Authenticated Key Exchange via Oblivious Transfer},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {449--466},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_27},
  doi          = {10.1007/978-3-642-30057-8\_27},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/CanettiDVW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CashGH12,
  author       = {David Cash and
                  Matthew Green and
                  Susan Hohenberger},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {New Definitions and Separations for Circular Security},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {540--557},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_32},
  doi          = {10.1007/978-3-642-30057-8\_32},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/CashGH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CatalanoFW12,
  author       = {Dario Catalano and
                  Dario Fiore and
                  Bogdan Warinschi},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {Efficient Network Coding Signatures in the Standard Model},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {680--696},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_40},
  doi          = {10.1007/978-3-642-30057-8\_40},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/CatalanoFW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CayrelHP12,
  author       = {Pierre{-}Louis Cayrel and
                  Gerhard Hoffmann and
                  Edoardo Persichetti},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {Efficient Implementation of a CCA2-Secure Variant of McEliece Using
                  Generalized Srivastava Codes},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {138--155},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_9},
  doi          = {10.1007/978-3-642-30057-8\_9},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/CayrelHP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ClavierFTP12,
  author       = {Christophe Clavier and
                  Benoit Feix and
                  Lo{\"{\i}}c Thierry and
                  Pascal Paillier},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {Generating Provable Primes Efficiently on Embedded Devices},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {372--389},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_22},
  doi          = {10.1007/978-3-642-30057-8\_22},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/ClavierFTP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CramerDKZZ12,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Eike Kiltz and
                  Sarah Zakarias and
                  Angela Zottarel},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {DDH-Like Assumptions Based on Extension Rings},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {644--661},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_38},
  doi          = {10.1007/978-3-642-30057-8\_38},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/CramerDKZZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DucasD12,
  author       = {L{\'{e}}o Ducas and
                  Alain Durmus},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {Ring-LWE in Polynomial Rings},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {34--51},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_3},
  doi          = {10.1007/978-3-642-30057-8\_3},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DucasD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FazioP12,
  author       = {Nelly Fazio and
                  Irippuge Milinda Perera},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {225--242},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_14},
  doi          = {10.1007/978-3-642-30057-8\_14},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/FazioP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Freeman12,
  author       = {David Mandell Freeman},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {Improved Security for Linearly Homomorphic Signatures: {A} Generic
                  Framework},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {697--714},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_41},
  doi          = {10.1007/978-3-642-30057-8\_41},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Freeman12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FujiokaSXY12,
  author       = {Atsushi Fujioka and
                  Koutarou Suzuki and
                  Keita Xagawa and
                  Kazuki Yoneyama},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {Strongly Secure Authenticated Key Exchange from Factoring, Codes,
                  and Lattices},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {467--484},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_28},
  doi          = {10.1007/978-3-642-30057-8\_28},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/FujiokaSXY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GentryHS12,
  author       = {Craig Gentry and
                  Shai Halevi and
                  Nigel P. Smart},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {Better Bootstrapping in Fully Homomorphic Encryption},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_1},
  doi          = {10.1007/978-3-642-30057-8\_1},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/GentryHS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HemenwayLO12,
  author       = {Brett Hemenway and
                  Steve Lu and
                  Rafail Ostrovsky},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {Correlated Product Security from Any One-Way Function},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {558--575},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_33},
  doi          = {10.1007/978-3-642-30057-8\_33},
  timestamp    = {Tue, 15 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/HemenwayLO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HemenwayO12,
  author       = {Brett Hemenway and
                  Rafail Ostrovsky},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {On Homomorphic Encryption and Chosen-Ciphertext Security},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {52--65},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_4},
  doi          = {10.1007/978-3-642-30057-8\_4},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HemenwayO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HemenwayO12a,
  author       = {Brett Hemenway and
                  Rafail Ostrovsky},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {Extended-DDH and Lossy Trapdoor Functions},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {627--643},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_37},
  doi          = {10.1007/978-3-642-30057-8\_37},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HemenwayO12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Herold12,
  author       = {Gottfried Herold},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {Polly Cracker, Revisited, Revisited},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {17--33},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_2},
  doi          = {10.1007/978-3-642-30057-8\_2},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Herold12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HofheinzJK12,
  author       = {Dennis Hofheinz and
                  Tibor Jager and
                  Edward Knapp},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {Waters Signatures with Optimal Security Reduction},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {66--83},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_5},
  doi          = {10.1007/978-3-642-30057-8\_5},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HofheinzJK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HuangLY12,
  author       = {Yun{-}Ju Huang and
                  Feng{-}Hao Liu and
                  Bo{-}Yin Yang},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {Public-Key Cryptography from New Multivariate Quadratic Assumptions},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {190--205},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_12},
  doi          = {10.1007/978-3-642-30057-8\_12},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HuangLY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HuangWS12,
  author       = {Qiong Huang and
                  Duncan S. Wong and
                  Willy Susilo},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {The Construction of Ambiguous Optimistic Fair Exchange from Designated
                  Confirmer Signature without Random Oracles},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {120--137},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_8},
  doi          = {10.1007/978-3-642-30057-8\_8},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HuangWS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/JumaVY12,
  author       = {Ali Juma and
                  Yevgeniy Vahlis and
                  Moti Yung},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {Multi-location Leakage Resilient Cryptography},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {504--521},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_30},
  doi          = {10.1007/978-3-642-30057-8\_30},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/JumaVY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/JutlaR12,
  author       = {Charanjit S. Jutla and
                  Arnab Roy},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {Relatively-Sound NIZKs and Password-Based Key-Exchange},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {485--503},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_29},
  doi          = {10.1007/978-3-642-30057-8\_29},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/JutlaR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LibertPQ12,
  author       = {Beno{\^{\i}}t Libert and
                  Kenneth G. Paterson and
                  Elizabeth A. Quaglia},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions
                  in the Standard Model},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {206--224},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_13},
  doi          = {10.1007/978-3-642-30057-8\_13},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LibertPQ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/MatsudaHM12,
  author       = {Takahiro Matsuda and
                  Goichiro Hanaoka and
                  Kanta Matsuura},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {Relations between Constrained and Bounded Chosen Ciphertext Security
                  for Key Encapsulation Mechanisms},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {576--594},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_34},
  doi          = {10.1007/978-3-642-30057-8\_34},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/MatsudaHM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ParampalliRT12,
  author       = {Udaya Parampalli and
                  Kim Ramchen and
                  Vanessa Teague},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {Efficiently Shuffling in Public},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {431--448},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_26},
  doi          = {10.1007/978-3-642-30057-8\_26},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/ParampalliRT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Pointcheval12,
  author       = {David Pointcheval},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {Password-Based Authenticated Key Exchange},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {390--397},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_23},
  doi          = {10.1007/978-3-642-30057-8\_23},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/Pointcheval12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/RamannaCS12,
  author       = {Somindu C. Ramanna and
                  Sanjit Chatterjee and
                  Palash Sarkar},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {Variants of Waters' Dual System Primitives Using Asymmetric Pairings
                  - (Extended Abstract)},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {298--315},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_18},
  doi          = {10.1007/978-3-642-30057-8\_18},
  timestamp    = {Tue, 04 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/RamannaCS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/SakaiSEHO12,
  author       = {Yusuke Sakai and
                  Jacob C. N. Schuldt and
                  Keita Emura and
                  Goichiro Hanaoka and
                  Kazuo Ohta},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {On the Security of Dynamic Group Signatures: Preventing Signature
                  Hijacking},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {715--732},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_42},
  doi          = {10.1007/978-3-642-30057-8\_42},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/SakaiSEHO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/SakemiHITY12,
  author       = {Yumi Sakemi and
                  Goichiro Hanaoka and
                  Tetsuya Izu and
                  Masahiko Takenaka and
                  Masaya Yasuda},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {Solving a Discrete Logarithm Problem with Auxiliary Input on a 160-Bit
                  Elliptic Curve},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {595--608},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_35},
  doi          = {10.1007/978-3-642-30057-8\_35},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/SakemiHITY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Sakumoto12,
  author       = {Koichi Sakumoto},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {Public-Key Identification Schemes Based on Multivariate Cubic Polynomials},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {172--189},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_11},
  doi          = {10.1007/978-3-642-30057-8\_11},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Sakumoto12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Schage12,
  author       = {Sven Sch{\"{a}}ge},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {Strong Security from Probabilistic Signature Schemes},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {84--101},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_6},
  doi          = {10.1007/978-3-642-30057-8\_6},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/Schage12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/SchroderU12,
  author       = {Dominique Schr{\"{o}}der and
                  Dominique Unruh},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {Security of Blind Signatures Revisited},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {662--679},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_39},
  doi          = {10.1007/978-3-642-30057-8\_39},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/SchroderU12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/SeoCK12,
  author       = {Jae Hong Seo and
                  Jung Hee Cheon and
                  Jonathan Katz},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {Constant-Round Multi-party Private Set Union Using Reversed Laurent
                  Series},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {398--412},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_24},
  doi          = {10.1007/978-3-642-30057-8\_24},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/SeoCK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/StefanovSS12,
  author       = {Emil Stefanov and
                  Elaine Shi and
                  Dawn Song},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {Policy-Enhanced Private Set Intersection: Sharing Information While
                  Enforcing Privacy Policies},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {413--430},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_25},
  doi          = {10.1007/978-3-642-30057-8\_25},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/StefanovSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/SteinfeldLPTW12,
  author       = {Ron Steinfeld and
                  San Ling and
                  Josef Pieprzyk and
                  Christophe Tartary and
                  Huaxiong Wang},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {{NTRUCCA:} How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security
                  in the Standard Model},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {353--371},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_21},
  doi          = {10.1007/978-3-642-30057-8\_21},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/SteinfeldLPTW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ThomaeW12,
  author       = {Enrico Thomae and
                  Christopher Wolf},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {Solving Underdetermined Systems of Multivariate Quadratic Equations
                  Revisited},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {156--171},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_10},
  doi          = {10.1007/978-3-642-30057-8\_10},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/ThomaeW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Wee12,
  author       = {Hoeteck Wee},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {Public Key Encryption against Related Key Attacks},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {262--279},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_16},
  doi          = {10.1007/978-3-642-30057-8\_16},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Wee12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/YamadaASSHK12,
  author       = {Shota Yamada and
                  Nuttapong Attrapadung and
                  Bagus Santoso and
                  Jacob C. N. Schuldt and
                  Goichiro Hanaoka and
                  Noboru Kunihiro},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {Verifiable Predicate Encryption and Applications to {CCA} Security
                  and Anonymous Predicate Authentication},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {243--261},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_15},
  doi          = {10.1007/978-3-642-30057-8\_15},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/YamadaASSHK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/YamadaHK12,
  author       = {Shota Yamada and
                  Goichiro Hanaoka and
                  Noboru Kunihiro},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {Space Efficient Signature Schemes from the {RSA} Assumption},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {102--119},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_7},
  doi          = {10.1007/978-3-642-30057-8\_7},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/YamadaHK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2012,
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8},
  doi          = {10.1007/978-3-642-30057-8},
  isbn         = {978-3-642-30056-1},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AcarN11,
  author       = {Tolga Acar and
                  Lan Nguyen},
  editor       = {Dario Catalano and
                  Nelly Fazio and
                  Rosario Gennaro and
                  Antonio Nicolosi},
  title        = {Revocation for Delegatable Anonymous Credentials},
  booktitle    = {Public Key Cryptography - {PKC} 2011 - 14th International Conference
                  on Practice and Theory in Public Key Cryptography, Taormina, Italy,
                  March 6-9, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6571},
  pages        = {423--440},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19379-8\_26},
  doi          = {10.1007/978-3-642-19379-8\_26},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AcarN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AtenieseCT11,
  author       = {Giuseppe Ateniese and
                  Emiliano De Cristofaro and
                  Gene Tsudik},
  editor       = {Dario Catalano and
                  Nelly Fazio and
                  Rosario Gennaro and
                  Antonio Nicolosi},
  title        = {(If) Size Matters: Size-Hiding Private Set Intersection},
  booktitle    = {Public Key Cryptography - {PKC} 2011 - 14th International Conference
                  on Practice and Theory in Public Key Cryptography, Taormina, Italy,
                  March 6-9, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6571},
  pages        = {156--173},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19379-8\_10},
  doi          = {10.1007/978-3-642-19379-8\_10},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AtenieseCT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AttrapadungL11,
  author       = {Nuttapong Attrapadung and
                  Beno{\^{\i}}t Libert},
  editor       = {Dario Catalano and
                  Nelly Fazio and
                  Rosario Gennaro and
                  Antonio Nicolosi},
  title        = {Homomorphic Network Coding Signatures in the Standard Model},
  booktitle    = {Public Key Cryptography - {PKC} 2011 - 14th International Conference
                  on Practice and Theory in Public Key Cryptography, Taormina, Italy,
                  March 6-9, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6571},
  pages        = {17--34},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19379-8\_2},
  doi          = {10.1007/978-3-642-19379-8\_2},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AttrapadungL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AttrapadungLP11,
  author       = {Nuttapong Attrapadung and
                  Beno{\^{\i}}t Libert and
                  Elie de Panafieu},
  editor       = {Dario Catalano and
                  Nelly Fazio and
                  Rosario Gennaro and
                  Antonio Nicolosi},
  title        = {Expressive Key-Policy Attribute-Based Encryption with Constant-Size
                  Ciphertexts},
  booktitle    = {Public Key Cryptography - {PKC} 2011 - 14th International Conference
                  on Practice and Theory in Public Key Cryptography, Taormina, Italy,
                  March 6-9, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6571},
  pages        = {90--108},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19379-8\_6},
  doi          = {10.1007/978-3-642-19379-8\_6},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AttrapadungLP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AvanziH11,
  author       = {Roberto Maria Avanzi and
                  Clemens Heuberger},
  editor       = {Dario Catalano and
                  Nelly Fazio and
                  Rosario Gennaro and
                  Antonio Nicolosi},
  title        = {Faster and Lower Memory Scalar Multiplication on Supersingular Curves
                  in Characteristic Three},
  booktitle    = {Public Key Cryptography - {PKC} 2011 - 14th International Conference
                  on Practice and Theory in Public Key Cryptography, Taormina, Italy,
                  March 6-9, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6571},
  pages        = {109--127},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19379-8\_7},
  doi          = {10.1007/978-3-642-19379-8\_7},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AvanziH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BernsteinLS11,
  author       = {Daniel J. Bernstein and
                  Tanja Lange and
                  Peter Schwabe},
  editor       = {Dario Catalano and
                  Nelly Fazio and
                  Rosario Gennaro and
                  Antonio Nicolosi},
  title        = {On the Correct Use of the Negation Map in the Pollard rho Method},
  booktitle    = {Public Key Cryptography - {PKC} 2011 - 14th International Conference
                  on Practice and Theory in Public Key Cryptography, Taormina, Italy,
                  March 6-9, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6571},
  pages        = {128--146},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19379-8\_8},
  doi          = {10.1007/978-3-642-19379-8\_8},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BernsteinLS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BettaleFP11,
  author       = {Luk Bettale and
                  Jean{-}Charles Faug{\`{e}}re and
                  Ludovic Perret},
  editor       = {Dario Catalano and
                  Nelly Fazio and
                  Rosario Gennaro and
                  Antonio Nicolosi},
  title        = {Cryptanalysis of Multivariate and Odd-Characteristic {HFE} Variants},
  booktitle    = {Public Key Cryptography - {PKC} 2011 - 14th International Conference
                  on Practice and Theory in Public Key Cryptography, Taormina, Italy,
                  March 6-9, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6571},
  pages        = {441--458},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19379-8\_27},
  doi          = {10.1007/978-3-642-19379-8\_27},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BettaleFP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BhattacharyyaM11,
  author       = {Rishiraj Bhattacharyya and
                  Avradip Mandal},
  editor       = {Dario Catalano and
                  Nelly Fazio and
                  Rosario Gennaro and
                  Antonio Nicolosi},
  title        = {On the Impossibility of Instantiating {PSS} in the Standard Model},
  booktitle    = {Public Key Cryptography - {PKC} 2011 - 14th International Conference
                  on Practice and Theory in Public Key Cryptography, Taormina, Italy,
                  March 6-9, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6571},
  pages        = {351--368},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19379-8\_22},
  doi          = {10.1007/978-3-642-19379-8\_22},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BhattacharyyaM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BlazyFPV11,
  author       = {Olivier Blazy and
                  Georg Fuchsbauer and
                  David Pointcheval and
                  Damien Vergnaud},
  editor       = {Dario Catalano and
                  Nelly Fazio and
                  Rosario Gennaro and
                  Antonio Nicolosi},
  title        = {Signatures on Randomizable Ciphertexts},
  booktitle    = {Public Key Cryptography - {PKC} 2011 - 14th International Conference
                  on Practice and Theory in Public Key Cryptography, Taormina, Italy,
                  March 6-9, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6571},
  pages        = {403--422},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19379-8\_25},
  doi          = {10.1007/978-3-642-19379-8\_25},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/BlazyFPV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BonehF11,
  author       = {Dan Boneh and
                  David Mandell Freeman},
  editor       = {Dario Catalano and
                  Nelly Fazio and
                  Rosario Gennaro and
                  Antonio Nicolosi},
  title        = {Linearly Homomorphic Signatures over Binary Fields and New Tools for
                  Lattice-Based Signatures},
  booktitle    = {Public Key Cryptography - {PKC} 2011 - 14th International Conference
                  on Practice and Theory in Public Key Cryptography, Taormina, Italy,
                  March 6-9, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6571},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19379-8\_1},
  doi          = {10.1007/978-3-642-19379-8\_1},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BonehF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BouillaguetFFP11,
  author       = {Charles Bouillaguet and
                  Jean{-}Charles Faug{\`{e}}re and
                  Pierre{-}Alain Fouque and
                  Ludovic Perret},
  editor       = {Dario Catalano and
                  Nelly Fazio and
                  Rosario Gennaro and
                  Antonio Nicolosi},
  title        = {Practical Cryptanalysis of the Identification Scheme Based on the
                  Isomorphism of Polynomial with One Secret Problem},
  booktitle    = {Public Key Cryptography - {PKC} 2011 - 14th International Conference
                  on Practice and Theory in Public Key Cryptography, Taormina, Italy,
                  March 6-9, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6571},
  pages        = {473--493},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19379-8\_29},
  doi          = {10.1007/978-3-642-19379-8\_29},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/BouillaguetFFP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CamenischDNZ11,
  author       = {Jan Camenisch and
                  Maria Dubovitskaya and
                  Gregory Neven and
                  Gregory M. Zaverucha},
  editor       = {Dario Catalano and
                  Nelly Fazio and
                  Rosario Gennaro and
                  Antonio Nicolosi},
  title        = {Oblivious Transfer with Hidden Access Control Policies},
  booktitle    = {Public Key Cryptography - {PKC} 2011 - 14th International Conference
                  on Practice and Theory in Public Key Cryptography, Taormina, Italy,
                  March 6-9, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6571},
  pages        = {192--209},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19379-8\_12},
  doi          = {10.1007/978-3-642-19379-8\_12},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/CamenischDNZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CoronJMNT11,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Antoine Joux and
                  Avradip Mandal and
                  David Naccache and
                  Mehdi Tibouchi},
  editor       = {Dario Catalano and
                  Nelly Fazio and
                  Rosario Gennaro and
                  Antonio Nicolosi},
  title        = {Cryptanalysis of the {RSA} Subgroup Assumption from {TCC} 2005},
  booktitle    = {Public Key Cryptography - {PKC} 2011 - 14th International Conference
                  on Practice and Theory in Public Key Cryptography, Taormina, Italy,
                  March 6-9, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6571},
  pages        = {147--155},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19379-8\_9},
  doi          = {10.1007/978-3-642-19379-8\_9},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/CoronJMNT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DuboisK11,
  author       = {Vivien Dubois and
                  Jean{-}Gabriel Kammerer},
  editor       = {Dario Catalano and
                  Nelly Fazio and
                  Rosario Gennaro and
                  Antonio Nicolosi},
  title        = {Cryptanalysis of Cryptosystems Based on Non-commutative Skew Polynomials},
  booktitle    = {Public Key Cryptography - {PKC} 2011 - 14th International Conference
                  on Practice and Theory in Public Key Cryptography, Taormina, Italy,
                  March 6-9, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6571},
  pages        = {459--472},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19379-8\_28},
  doi          = {10.1007/978-3-642-19379-8\_28},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DuboisK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Green11,
  author       = {Matthew Green},
  editor       = {Dario Catalano and
                  Nelly Fazio and
                  Rosario Gennaro and
                  Antonio Nicolosi},
  title        = {Secure Blind Decryption},
  booktitle    = {Public Key Cryptography - {PKC} 2011 - 14th International Conference
                  on Practice and Theory in Public Key Cryptography, Taormina, Italy,
                  March 6-9, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6571},
  pages        = {265--282},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19379-8\_16},
  doi          = {10.1007/978-3-642-19379-8\_16},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Green11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HaleviK11,
  author       = {Shai Halevi and
                  Hugo Krawczyk},
  editor       = {Dario Catalano and
                  Nelly Fazio and
                  Rosario Gennaro and
                  Antonio Nicolosi},
  title        = {One-Pass {HMQV} and Asymmetric Key-Wrapping},
  booktitle    = {Public Key Cryptography - {PKC} 2011 - 14th International Conference
                  on Practice and Theory in Public Key Cryptography, Taormina, Italy,
                  March 6-9, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6571},
  pages        = {317--334},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19379-8\_20},
  doi          = {10.1007/978-3-642-19379-8\_20},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HaleviK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LaiDL11,
  author       = {Junzuo Lai and
                  Robert H. Deng and
                  Shengli Liu},
  editor       = {Dario Catalano and
                  Nelly Fazio and
                  Rosario Gennaro and
                  Antonio Nicolosi},
  title        = {Chameleon All-But-One TDFs and Their Application to Chosen-Ciphertext
                  Security},
  booktitle    = {Public Key Cryptography - {PKC} 2011 - 14th International Conference
                  on Practice and Theory in Public Key Cryptography, Taormina, Italy,
                  March 6-9, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6571},
  pages        = {228--245},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19379-8\_14},
  doi          = {10.1007/978-3-642-19379-8\_14},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LaiDL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/MatsudaM11,
  author       = {Takahiro Matsuda and
                  Kanta Matsuura},
  editor       = {Dario Catalano and
                  Nelly Fazio and
                  Rosario Gennaro and
                  Antonio Nicolosi},
  title        = {Parallel Decryption Queries in Bounded Chosen Ciphertext Attacks},
  booktitle    = {Public Key Cryptography - {PKC} 2011 - 14th International Conference
                  on Practice and Theory in Public Key Cryptography, Taormina, Italy,
                  March 6-9, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6571},
  pages        = {246--264},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19379-8\_15},
  doi          = {10.1007/978-3-642-19379-8\_15},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/MatsudaM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/MeiLLJ11,
  author       = {Qixiang Mei and
                  Bao Li and
                  Xianhui Lu and
                  Dingding Jia},
  editor       = {Dario Catalano and
                  Nelly Fazio and
                  Rosario Gennaro and
                  Antonio Nicolosi},
  title        = {Chosen Ciphertext Secure Encryption under Factoring Assumption Revisited},
  booktitle    = {Public Key Cryptography - {PKC} 2011 - 14th International Conference
                  on Practice and Theory in Public Key Cryptography, Taormina, Italy,
                  March 6-9, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6571},
  pages        = {210--227},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19379-8\_13},
  doi          = {10.1007/978-3-642-19379-8\_13},
  timestamp    = {Wed, 07 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/MeiLLJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/OkamotoT11,
  author       = {Tatsuaki Okamoto and
                  Katsuyuki Takashima},
  editor       = {Dario Catalano and
                  Nelly Fazio and
                  Rosario Gennaro and
                  Antonio Nicolosi},
  title        = {Efficient Attribute-Based Signatures for Non-monotone Predicates in
                  the Standard Model},
  booktitle    = {Public Key Cryptography - {PKC} 2011 - 14th International Conference
                  on Practice and Theory in Public Key Cryptography, Taormina, Italy,
                  March 6-9, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6571},
  pages        = {35--52},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19379-8\_3},
  doi          = {10.1007/978-3-642-19379-8\_3},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/OkamotoT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/PetzoldtBB11,
  author       = {Albrecht Petzoldt and
                  Stanislav Bulygin and
                  Johannes Buchmann},
  editor       = {Dario Catalano and
                  Nelly Fazio and
                  Rosario Gennaro and
                  Antonio Nicolosi},
  title        = {Linear Recurring Sequences for the {UOV} Key Generation},
  booktitle    = {Public Key Cryptography - {PKC} 2011 - 14th International Conference
                  on Practice and Theory in Public Key Cryptography, Taormina, Italy,
                  March 6-9, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6571},
  pages        = {335--350},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19379-8\_21},
  doi          = {10.1007/978-3-642-19379-8\_21},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/PetzoldtBB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/SahaiS11,
  author       = {Amit Sahai and
                  Hakan Seyalioglu},
  editor       = {Dario Catalano and
                  Nelly Fazio and
                  Rosario Gennaro and
                  Antonio Nicolosi},
  title        = {Fully Secure Accountable-Authority Identity-Based Encryption},
  booktitle    = {Public Key Cryptography - {PKC} 2011 - 14th International Conference
                  on Practice and Theory in Public Key Cryptography, Taormina, Italy,
                  March 6-9, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6571},
  pages        = {296--316},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19379-8\_19},
  doi          = {10.1007/978-3-642-19379-8\_19},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/SahaiS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/SchuldtM11,
  author       = {Jacob C. N. Schuldt and
                  Kanta Matsuura},
  editor       = {Dario Catalano and
                  Nelly Fazio and
                  Rosario Gennaro and
                  Antonio Nicolosi},
  title        = {On-line Non-transferable Signatures Revisited},
  booktitle    = {Public Key Cryptography - {PKC} 2011 - 14th International Conference
                  on Practice and Theory in Public Key Cryptography, Taormina, Italy,
                  March 6-9, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6571},
  pages        = {369--386},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19379-8\_23},
  doi          = {10.1007/978-3-642-19379-8\_23},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/SchuldtM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Seo11,
  author       = {Jae Hong Seo},
  editor       = {Dario Catalano and
                  Nelly Fazio and
                  Rosario Gennaro and
                  Antonio Nicolosi},
  title        = {Round-Efficient Sub-linear Zero-Knowledge Arguments for Linear Algebra},
  booktitle    = {Public Key Cryptography - {PKC} 2011 - 14th International Conference
                  on Practice and Theory in Public Key Cryptography, Taormina, Italy,
                  March 6-9, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6571},
  pages        = {387--402},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19379-8\_24},
  doi          = {10.1007/978-3-642-19379-8\_24},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Seo11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Toft11,
  author       = {Tomas Toft},
  editor       = {Dario Catalano and
                  Nelly Fazio and
                  Rosario Gennaro and
                  Antonio Nicolosi},
  title        = {Sub-linear, Secure Comparison with Two Non-colluding Parties},
  booktitle    = {Public Key Cryptography - {PKC} 2011 - 14th International Conference
                  on Practice and Theory in Public Key Cryptography, Taormina, Italy,
                  March 6-9, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6571},
  pages        = {174--191},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19379-8\_11},
  doi          = {10.1007/978-3-642-19379-8\_11},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Toft11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Vaikuntanathan11,
  author       = {Vinod Vaikuntanathan},
  editor       = {Dario Catalano and
                  Nelly Fazio and
                  Rosario Gennaro and
                  Antonio Nicolosi},
  title        = {New Developments in Leakage-Resilient Cryptography},
  booktitle    = {Public Key Cryptography - {PKC} 2011 - 14th International Conference
                  on Practice and Theory in Public Key Cryptography, Taormina, Italy,
                  March 6-9, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6571},
  pages        = {283},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19379-8\_17},
  doi          = {10.1007/978-3-642-19379-8\_17},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Vaikuntanathan11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Waters11,
  author       = {Brent Waters},
  editor       = {Dario Catalano and
                  Nelly Fazio and
                  Rosario Gennaro and
                  Antonio Nicolosi},
  title        = {Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient,
                  and Provably Secure Realization},
  booktitle    = {Public Key Cryptography - {PKC} 2011 - 14th International Conference
                  on Practice and Theory in Public Key Cryptography, Taormina, Italy,
                  March 6-9, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6571},
  pages        = {53--70},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19379-8\_4},
  doi          = {10.1007/978-3-642-19379-8\_4},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Waters11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/WengZH11,
  author       = {Jian Weng and
                  Yunlei Zhao and
                  Goichiro Hanaoka},
  editor       = {Dario Catalano and
                  Nelly Fazio and
                  Rosario Gennaro and
                  Antonio Nicolosi},
  title        = {On the Security of a Bidirectional Proxy Re-encryption Scheme from
                  {PKC} 2010},
  booktitle    = {Public Key Cryptography - {PKC} 2011 - 14th International Conference
                  on Practice and Theory in Public Key Cryptography, Taormina, Italy,
                  March 6-9, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6571},
  pages        = {284--295},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19379-8\_18},
  doi          = {10.1007/978-3-642-19379-8\_18},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/WengZH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/YamadaAHK11,
  author       = {Shota Yamada and
                  Nuttapong Attrapadung and
                  Goichiro Hanaoka and
                  Noboru Kunihiro},
  editor       = {Dario Catalano and
                  Nelly Fazio and
                  Rosario Gennaro and
                  Antonio Nicolosi},
  title        = {Generic Constructions for Chosen-Ciphertext Secure Attribute Based
                  Encryption},
  booktitle    = {Public Key Cryptography - {PKC} 2011 - 14th International Conference
                  on Practice and Theory in Public Key Cryptography, Taormina, Italy,
                  March 6-9, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6571},
  pages        = {71--89},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19379-8\_5},
  doi          = {10.1007/978-3-642-19379-8\_5},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/YamadaAHK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2011,
  editor       = {Dario Catalano and
                  Nelly Fazio and
                  Rosario Gennaro and
                  Antonio Nicolosi},
  title        = {Public Key Cryptography - {PKC} 2011 - 14th International Conference
                  on Practice and Theory in Public Key Cryptography, Taormina, Italy,
                  March 6-9, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6571},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19379-8},
  doi          = {10.1007/978-3-642-19379-8},
  isbn         = {978-3-642-19378-1},
  timestamp    = {Fri, 01 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AgrawalBBF10,
  author       = {Shweta Agrawal and
                  Dan Boneh and
                  Xavier Boyen and
                  David Mandell Freeman},
  editor       = {Phong Q. Nguyen and
                  David Pointcheval},
  title        = {Preventing Pollution Attacks in Multi-source Network Coding},
  booktitle    = {Public Key Cryptography - {PKC} 2010, 13th International Conference
                  on Practice and Theory in Public Key Cryptography, Paris, France,
                  May 26-28, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6056},
  pages        = {161--176},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13013-7\_10},
  doi          = {10.1007/978-3-642-13013-7\_10},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AgrawalBBF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AttrapadungL10,
  author       = {Nuttapong Attrapadung and
                  Beno{\^{\i}}t Libert},
  editor       = {Phong Q. Nguyen and
                  David Pointcheval},
  title        = {Functional Encryption for Inner Product: Achieving Constant-Size Ciphertexts
                  with Adaptive Security or Support for Negation},
  booktitle    = {Public Key Cryptography - {PKC} 2010, 13th International Conference
                  on Practice and Theory in Public Key Cryptography, Paris, France,
                  May 26-28, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6056},
  pages        = {384--402},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13013-7\_23},
  doi          = {10.1007/978-3-642-13013-7\_23},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AttrapadungL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BagherzandiJ10,
  author       = {Ali Bagherzandi and
                  Stanislaw Jarecki},
  editor       = {Phong Q. Nguyen and
                  David Pointcheval},
  title        = {Identity-Based Aggregate and Multi-Signature Schemes Based on {RSA}},
  booktitle    = {Public Key Cryptography - {PKC} 2010, 13th International Conference
                  on Practice and Theory in Public Key Cryptography, Paris, France,
                  May 26-28, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6056},
  pages        = {480--498},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13013-7\_28},
  doi          = {10.1007/978-3-642-13013-7\_28},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BagherzandiJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Boyen10,
  author       = {Xavier Boyen},
  editor       = {Phong Q. Nguyen and
                  David Pointcheval},
  title        = {Lattice Mixing and Vanishing Trapdoors: {A} Framework for Fully Secure
                  Short Signatures and More},
  booktitle    = {Public Key Cryptography - {PKC} 2010, 13th International Conference
                  on Practice and Theory in Public Key Cryptography, Paris, France,
                  May 26-28, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6056},
  pages        = {499--517},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13013-7\_29},
  doi          = {10.1007/978-3-642-13013-7\_29},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Boyen10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BrzuskaFLS10,
  author       = {Christina Brzuska and
                  Marc Fischlin and
                  Anja Lehmann and
                  Dominique Schr{\"{o}}der},
  editor       = {Phong Q. Nguyen and
                  David Pointcheval},
  title        = {Unlinkability of Sanitizable Signatures},
  booktitle    = {Public Key Cryptography - {PKC} 2010, 13th International Conference
                  on Practice and Theory in Public Key Cryptography, Paris, France,
                  May 26-28, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6056},
  pages        = {444--461},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13013-7\_26},
  doi          = {10.1007/978-3-642-13013-7\_26},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/BrzuskaFLS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CaoVZ10,
  author       = {Zhenfu Cao and
                  Ivan Visconti and
                  Zongyang Zhang},
  editor       = {Phong Q. Nguyen and
                  David Pointcheval},
  title        = {Constant-Round Concurrent Non-Malleable Statistically Binding Commitments
                  and Decommitments},
  booktitle    = {Public Key Cryptography - {PKC} 2010, 13th International Conference
                  on Practice and Theory in Public Key Cryptography, Paris, France,
                  May 26-28, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6056},
  pages        = {193--208},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13013-7\_12},
  doi          = {10.1007/978-3-642-13013-7\_12},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/CaoVZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CostelloLN10,
  author       = {Craig Costello and
                  Tanja Lange and
                  Michael Naehrig},
  editor       = {Phong Q. Nguyen and
                  David Pointcheval},
  title        = {Faster Pairing Computations on Curves with High-Degree Twists},
  booktitle    = {Public Key Cryptography - {PKC} 2010, 13th International Conference
                  on Practice and Theory in Public Key Cryptography, Paris, France,
                  May 26-28, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6056},
  pages        = {224--242},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13013-7\_14},
  doi          = {10.1007/978-3-642-13013-7\_14},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/CostelloLN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DentFMSS10,
  author       = {Alexander W. Dent and
                  Marc Fischlin and
                  Mark Manulis and
                  Martijn Stam and
                  Dominique Schr{\"{o}}der},
  editor       = {Phong Q. Nguyen and
                  David Pointcheval},
  title        = {Confidential Signatures and Deterministic Signcryption},
  booktitle    = {Public Key Cryptography - {PKC} 2010, 13th International Conference
                  on Practice and Theory in Public Key Cryptography, Paris, France,
                  May 26-28, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6056},
  pages        = {462--479},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13013-7\_27},
  doi          = {10.1007/978-3-642-13013-7\_27},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/DentFMSS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FarashahiJ10,
  author       = {Reza Rezaeian Farashahi and
                  Marc Joye},
  editor       = {Phong Q. Nguyen and
                  David Pointcheval},
  title        = {Efficient Arithmetic on Hessian Curves},
  booktitle    = {Public Key Cryptography - {PKC} 2010, 13th International Conference
                  on Practice and Theory in Public Key Cryptography, Paris, France,
                  May 26-28, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6056},
  pages        = {243--260},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13013-7\_15},
  doi          = {10.1007/978-3-642-13013-7\_15},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/FarashahiJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FaugereMR10,
  author       = {Jean{-}Charles Faug{\`{e}}re and
                  Rapha{\"{e}}l Marinier and
                  Gu{\'{e}}na{\"{e}}l Renault},
  editor       = {Phong Q. Nguyen and
                  David Pointcheval},
  title        = {Implicit Factoring with Shared Most Significant and Middle Bits},
  booktitle    = {Public Key Cryptography - {PKC} 2010, 13th International Conference
                  on Practice and Theory in Public Key Cryptography, Paris, France,
                  May 26-28, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6056},
  pages        = {70--87},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13013-7\_5},
  doi          = {10.1007/978-3-642-13013-7\_5},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/FaugereMR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FaugereS10,
  author       = {Jean{-}Charles Faug{\`{e}}re and
                  Pierre{-}Jean Spaenlehauer},
  editor       = {Phong Q. Nguyen and
                  David Pointcheval},
  title        = {Algebraic Cryptanalysis of the PKC'2009 Algebraic Surface Cryptosystem},
  booktitle    = {Public Key Cryptography - {PKC} 2010, 13th International Conference
                  on Practice and Theory in Public Key Cryptography, Paris, France,
                  May 26-28, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6056},
  pages        = {35--52},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13013-7\_3},
  doi          = {10.1007/978-3-642-13013-7\_3},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/FaugereS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FreemanGKRS10,
  author       = {David Mandell Freeman and
                  Oded Goldreich and
                  Eike Kiltz and
                  Alon Rosen and
                  Gil Segev},
  editor       = {Phong Q. Nguyen and
                  David Pointcheval},
  title        = {More Constructions of Lossy and Correlation-Secure Trapdoor Functions},
  booktitle    = {Public Key Cryptography - {PKC} 2010, 13th International Conference
                  on Practice and Theory in Public Key Cryptography, Paris, France,
                  May 26-28, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6056},
  pages        = {279--295},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13013-7\_17},
  doi          = {10.1007/978-3-642-13013-7\_17},
  timestamp    = {Sun, 16 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/FreemanGKRS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GalbraithR10,
  author       = {Steven D. Galbraith and
                  Raminder S. Ruprai},
  editor       = {Phong Q. Nguyen and
                  David Pointcheval},
  title        = {Using Equivalence Classes to Accelerate Solving the Discrete Logarithm
                  Problem in a Short Interval},
  booktitle    = {Public Key Cryptography - {PKC} 2010, 13th International Conference
                  on Practice and Theory in Public Key Cryptography, Paris, France,
                  May 26-28, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6056},
  pages        = {368--383},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13013-7\_22},
  doi          = {10.1007/978-3-642-13013-7\_22},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/GalbraithR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GennaroHS10,
  author       = {Rosario Gennaro and
                  Carmit Hazay and
                  Jeffrey S. Sorensen},
  editor       = {Phong Q. Nguyen and
                  David Pointcheval},
  title        = {Text Search Protocols with Simulation Based Security},
  booktitle    = {Public Key Cryptography - {PKC} 2010, 13th International Conference
                  on Practice and Theory in Public Key Cryptography, Paris, France,
                  May 26-28, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6056},
  pages        = {332--350},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13013-7\_20},
  doi          = {10.1007/978-3-642-13013-7\_20},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/GennaroHS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GennaroKKR10,
  author       = {Rosario Gennaro and
                  Jonathan Katz and
                  Hugo Krawczyk and
                  Tal Rabin},
  editor       = {Phong Q. Nguyen and
                  David Pointcheval},
  title        = {Secure Network Coding over the Integers},
  booktitle    = {Public Key Cryptography - {PKC} 2010, 13th International Conference
                  on Practice and Theory in Public Key Cryptography, Paris, France,
                  May 26-28, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6056},
  pages        = {142--160},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13013-7\_9},
  doi          = {10.1007/978-3-642-13013-7\_9},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/GennaroKKR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GhadafiSW10,
  author       = {Essam Ghadafi and
                  Nigel P. Smart and
                  Bogdan Warinschi},
  editor       = {Phong Q. Nguyen and
                  David Pointcheval},
  title        = {Groth-Sahai Proofs Revisited},
  booktitle    = {Public Key Cryptography - {PKC} 2010, 13th International Conference
                  on Practice and Theory in Public Key Cryptography, Paris, France,
                  May 26-28, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6056},
  pages        = {177--192},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13013-7\_11},
  doi          = {10.1007/978-3-642-13013-7\_11},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/GhadafiSW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GrangerS10,
  author       = {Robert Granger and
                  Michael Scott},
  editor       = {Phong Q. Nguyen and
                  David Pointcheval},
  title        = {Faster Squaring in the Cyclotomic Subgroup of Sixth Degree Extensions},
  booktitle    = {Public Key Cryptography - {PKC} 2010, 13th International Conference
                  on Practice and Theory in Public Key Cryptography, Paris, France,
                  May 26-28, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6056},
  pages        = {209--223},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13013-7\_13},
  doi          = {10.1007/978-3-642-13013-7\_13},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/GrangerS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GrothKL10,
  author       = {Jens Groth and
                  Aggelos Kiayias and
                  Helger Lipmaa},
  editor       = {Phong Q. Nguyen and
                  David Pointcheval},
  title        = {Multi-query Computationally-Private Information Retrieval with Constant
                  Communication Rate},
  booktitle    = {Public Key Cryptography - {PKC} 2010, 13th International Conference
                  on Practice and Theory in Public Key Cryptography, Paris, France,
                  May 26-28, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6056},
  pages        = {107--123},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13013-7\_7},
  doi          = {10.1007/978-3-642-13013-7\_7},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/GrothKL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HaralambievJKS10,
  author       = {Kristiyan Haralambiev and
                  Tibor Jager and
                  Eike Kiltz and
                  Victor Shoup},
  editor       = {Phong Q. Nguyen and
                  David Pointcheval},
  title        = {Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman
                  in the Standard Model},
  booktitle    = {Public Key Cryptography - {PKC} 2010, 13th International Conference
                  on Practice and Theory in Public Key Cryptography, Paris, France,
                  May 26-28, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6056},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13013-7\_1},
  doi          = {10.1007/978-3-642-13013-7\_1},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HaralambievJKS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HayashiSWMST10,
  author       = {Takuya Hayashi and
                  Naoyuki Shinohara and
                  Lihua Wang and
                  Shin'ichiro Matsuo and
                  Masaaki Shirase and
                  Tsuyoshi Takagi},
  editor       = {Phong Q. Nguyen and
                  David Pointcheval},
  title        = {Solving a 676-Bit Discrete Logarithm Problem in GF(3\({}^{\mbox{6\emph{n}}}\))},
  booktitle    = {Public Key Cryptography - {PKC} 2010, 13th International Conference
                  on Practice and Theory in Public Key Cryptography, Paris, France,
                  May 26-28, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6056},
  pages        = {351--367},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13013-7\_21},
  doi          = {10.1007/978-3-642-13013-7\_21},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HayashiSWMST10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HazayN10,
  author       = {Carmit Hazay and
                  Kobbi Nissim},
  editor       = {Phong Q. Nguyen and
                  David Pointcheval},
  title        = {Efficient Set Operations in the Presence of Malicious Adversaries},
  booktitle    = {Public Key Cryptography - {PKC} 2010, 13th International Conference
                  on Practice and Theory in Public Key Cryptography, Paris, France,
                  May 26-28, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6056},
  pages        = {312--331},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13013-7\_19},
  doi          = {10.1007/978-3-642-13013-7\_19},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HazayN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HerranzLR10,
  author       = {Javier Herranz and
                  Fabien Laguillaumie and
                  Carla R{\`{a}}fols},
  editor       = {Phong Q. Nguyen and
                  David Pointcheval},
  title        = {Constant Size Ciphertexts in Threshold Attribute-Based Encryption},
  booktitle    = {Public Key Cryptography - {PKC} 2010, 13th International Conference
                  on Practice and Theory in Public Key Cryptography, Paris, France,
                  May 26-28, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6056},
  pages        = {19--34},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13013-7\_2},
  doi          = {10.1007/978-3-642-13013-7\_2},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HerranzLR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HerrmannM10,
  author       = {Mathias Herrmann and
                  Alexander May},
  editor       = {Phong Q. Nguyen and
                  David Pointcheval},
  title        = {Maximizing Small Root Bounds by Linearization and Applications to
                  Small Secret Exponent {RSA}},
  booktitle    = {Public Key Cryptography - {PKC} 2010, 13th International Conference
                  on Practice and Theory in Public Key Cryptography, Paris, France,
                  May 26-28, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6056},
  pages        = {53--69},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13013-7\_4},
  doi          = {10.1007/978-3-642-13013-7\_4},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/HerrmannM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HuangMSWX10,
  author       = {Xinyi Huang and
                  Yi Mu and
                  Willy Susilo and
                  Wei Wu and
                  Yang Xiang},
  editor       = {Phong Q. Nguyen and
                  David Pointcheval},
  title        = {Further Observations on Optimistic Fair Exchange Protocols in the
                  Multi-user Setting},
  booktitle    = {Public Key Cryptography - {PKC} 2010, 13th International Conference
                  on Practice and Theory in Public Key Cryptography, Paris, France,
                  May 26-28, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6056},
  pages        = {124--141},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13013-7\_8},
  doi          = {10.1007/978-3-642-13013-7\_8},
  timestamp    = {Thu, 24 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/HuangMSWX10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KawachiNTX10,
  author       = {Akinori Kawachi and
                  Akira Numayama and
                  Keisuke Tanaka and
                  Keita Xagawa},
  editor       = {Phong Q. Nguyen and
                  David Pointcheval},
  title        = {Security of Encryption Schemes in Weakened Random Oracle Models},
  booktitle    = {Public Key Cryptography - {PKC} 2010, 13th International Conference
                  on Practice and Theory in Public Key Cryptography, Paris, France,
                  May 26-28, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6056},
  pages        = {403--419},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13013-7\_24},
  doi          = {10.1007/978-3-642-13013-7\_24},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/KawachiNTX10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LaurL10,
  author       = {Sven Laur and
                  Helger Lipmaa},
  editor       = {Phong Q. Nguyen and
                  David Pointcheval},
  title        = {On the Feasibility of Consistent Computations},
  booktitle    = {Public Key Cryptography - {PKC} 2010, 13th International Conference
                  on Practice and Theory in Public Key Cryptography, Paris, France,
                  May 26-28, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6056},
  pages        = {88--106},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13013-7\_6},
  doi          = {10.1007/978-3-642-13013-7\_6},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LaurL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/MatsudaNT10,
  author       = {Toshihide Matsuda and
                  Ryo Nishimaki and
                  Keisuke Tanaka},
  editor       = {Phong Q. Nguyen and
                  David Pointcheval},
  title        = {{CCA} Proxy Re-Encryption without Bilinear Maps in the Standard Model},
  booktitle    = {Public Key Cryptography - {PKC} 2010, 13th International Conference
                  on Practice and Theory in Public Key Cryptography, Paris, France,
                  May 26-28, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6056},
  pages        = {261--278},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13013-7\_16},
  doi          = {10.1007/978-3-642-13013-7\_16},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/MatsudaNT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/MolY10,
  author       = {Petros Mol and
                  Scott Yilek},
  editor       = {Phong Q. Nguyen and
                  David Pointcheval},
  title        = {Chosen-Ciphertext Security from Slightly Lossy Trapdoor Functions},
  booktitle    = {Public Key Cryptography - {PKC} 2010, 13th International Conference
                  on Practice and Theory in Public Key Cryptography, Paris, France,
                  May 26-28, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6056},
  pages        = {296--311},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13013-7\_18},
  doi          = {10.1007/978-3-642-13013-7\_18},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/MolY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/SmartV10,
  author       = {Nigel P. Smart and
                  Frederik Vercauteren},
  editor       = {Phong Q. Nguyen and
                  David Pointcheval},
  title        = {Fully Homomorphic Encryption with Relatively Small Key and Ciphertext
                  Sizes},
  booktitle    = {Public Key Cryptography - {PKC} 2010, 13th International Conference
                  on Practice and Theory in Public Key Cryptography, Paris, France,
                  May 26-28, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6056},
  pages        = {420--443},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13013-7\_25},
  doi          = {10.1007/978-3-642-13013-7\_25},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/SmartV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2010,
  editor       = {Phong Q. Nguyen and
                  David Pointcheval},
  title        = {Public Key Cryptography - {PKC} 2010, 13th International Conference
                  on Practice and Theory in Public Key Cryptography, Paris, France,
                  May 26-28, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6056},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13013-7},
  doi          = {10.1007/978-3-642-13013-7},
  isbn         = {978-3-642-13012-0},
  timestamp    = {Fri, 01 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AbdallaBCP09,
  author       = {Michel Abdalla and
                  Xavier Boyen and
                  C{\'{e}}line Chevalier and
                  David Pointcheval},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {Distributed Public-Key Cryptography from Weak Secrets},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {139--159},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_9},
  doi          = {10.1007/978-3-642-00468-1\_9},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AbdallaBCP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AbeKO09,
  author       = {Masayuki Abe and
                  Eike Kiltz and
                  Tatsuaki Okamoto},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {Compact CCA-Secure Encryption for Messages of Arbitrary Length},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {377--392},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_21},
  doi          = {10.1007/978-3-642-00468-1\_21},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AbeKO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AkiyamaGM09,
  author       = {Koichiro Akiyama and
                  Yasuhiro Goto and
                  Hideyuki Miyake},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {An Algebraic Surface Cryptosystem},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {425--442},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_24},
  doi          = {10.1007/978-3-642-00468-1\_24},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AkiyamaGM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Aono09,
  author       = {Yoshinori Aono},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {A New Lattice Construction for Partial Key Exposure Attack for {RSA}},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {34--53},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_3},
  doi          = {10.1007/978-3-642-00468-1\_3},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Aono09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BonehFKW09,
  author       = {Dan Boneh and
                  David Mandell Freeman and
                  Jonathan Katz and
                  Brent Waters},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {Signing a Linear Subspace: Signature Schemes for Network Coding},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {68--87},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_5},
  doi          = {10.1007/978-3-642-00468-1\_5},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BonehFKW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BrzuskaFFLPSSV09,
  author       = {Christina Brzuska and
                  Marc Fischlin and
                  Tobias Freudenreich and
                  Anja Lehmann and
                  Marcus Page and
                  Jakob Schelbert and
                  Dominique Schr{\"{o}}der and
                  Florian Volk},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {Security of Sanitizable Signatures Revisited},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {317--336},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_18},
  doi          = {10.1007/978-3-642-00468-1\_18},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/BrzuskaFFLPSSV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CamenischKRS09,
  author       = {Jan Camenisch and
                  Markulf Kohlweiss and
                  Alfredo Rial and
                  Caroline Sheedy},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {Blind and Anonymous Identity-Based Encryption and Authorised Private
                  Searches on Public Key Encrypted Data},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {196--214},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_12},
  doi          = {10.1007/978-3-642-00468-1\_12},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/CamenischKRS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CamenischKS09,
  author       = {Jan Camenisch and
                  Markulf Kohlweiss and
                  Claudio Soriente},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {An Accumulator Based on Bilinear Maps and Efficient Revocation for
                  Anonymous Credentials},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {481--500},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_27},
  doi          = {10.1007/978-3-642-00468-1\_27},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/CamenischKS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Chow09,
  author       = {Sherman S. M. Chow},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {Removing Escrow from Identity-Based Encryption},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {256--276},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_15},
  doi          = {10.1007/978-3-642-00468-1\_15},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/Chow09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CoullGH09,
  author       = {Scott E. Coull and
                  Matthew Green and
                  Susan Hohenberger},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {Controlling Access to an Oblivious Database Using Stateful Anonymous
                  Credentials},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {501--520},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_28},
  doi          = {10.1007/978-3-642-00468-1\_28},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/CoullGH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DamgardGKN09,
  author       = {Ivan Damg{\aa}rd and
                  Martin Geisler and
                  Mikkel Kr{\o}igaard and
                  Jesper Buus Nielsen},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {Asynchronous Multiparty Computation: Theory and Implementation},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {160--179},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_10},
  doi          = {10.1007/978-3-642-00468-1\_10},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DamgardGKN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DamgardM09,
  author       = {Ivan Damg{\aa}rd and
                  Gert L{\ae}ss{\o}e Mikkelsen},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {On the Theory and Practice of Personal Digital Signatures},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {277--296},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_16},
  doi          = {10.1007/978-3-642-00468-1\_16},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DamgardM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FischlinS09,
  author       = {Marc Fischlin and
                  Dominique Schr{\"{o}}der},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {Security of Blind Signatures under Aborts},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {297--316},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_17},
  doi          = {10.1007/978-3-642-00468-1\_17},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/FischlinS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GhodosiP09,
  author       = {Hossein Ghodosi and
                  Josef Pieprzyk},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {Multi-Party Computation with Omnipresent Adversary},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {180--195},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_11},
  doi          = {10.1007/978-3-642-00468-1\_11},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/GhodosiP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GorantlaBN09,
  author       = {M. Choudary Gorantla and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {Modeling Key Compromise Impersonation Attacks on Group Key Exchange
                  Protocols},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {105--123},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_7},
  doi          = {10.1007/978-3-642-00468-1\_7},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/GorantlaBN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HerrmannL09,
  author       = {Mathias Herrmann and
                  Gregor Leander},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {A Practical Key Recovery Attack on Basic TCHo},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {411--424},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_23},
  doi          = {10.1007/978-3-642-00468-1\_23},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HerrmannL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HooghSSV09,
  author       = {Sebastiaan de Hoogh and
                  Berry Schoenmakers and
                  Boris Skoric and
                  Jos{\'{e}} Villegas},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {Verifiable Rotation of Homomorphic Encryptions},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {393--410},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_22},
  doi          = {10.1007/978-3-642-00468-1\_22},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HooghSSV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/JunodKL09,
  author       = {Pascal Junod and
                  Alexandre Karlov and
                  Arjen K. Lenstra},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {Improving the Boneh-Franklin Traitor Tracing Scheme},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {88--104},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_6},
  doi          = {10.1007/978-3-642-00468-1\_6},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/JunodKL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KiayiasZ09,
  author       = {Aggelos Kiayias and
                  Hong{-}Sheng Zhou},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {Zero-Knowledge Proofs with Witness Elimination},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {124--138},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_8},
  doi          = {10.1007/978-3-642-00468-1\_8},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/KiayiasZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KimCH09,
  author       = {Minkyu Kim and
                  Jung Hee Cheon and
                  Jin Hong},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {Subset-Restricted Random Walks for Pollard rho Method on F\({}_{\mbox{p\({}^{\mbox{m}}\)}}\)},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {54--67},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_4},
  doi          = {10.1007/978-3-642-00468-1\_4},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/KimCH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LibertV09,
  author       = {Beno{\^{\i}}t Libert and
                  Damien Vergnaud},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {Towards Black-Box Accountable Authority {IBE} with Short Ciphertexts
                  and Private Keys},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {235--255},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_14},
  doi          = {10.1007/978-3-642-00468-1\_14},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/LibertV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LongaG09,
  author       = {Patrick Longa and
                  Catherine H. Gebotys},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {Fast Multibase Methods and Other Several Optimizations for Elliptic
                  Curve Scalar Multiplication},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {443--462},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_25},
  doi          = {10.1007/978-3-642-00468-1\_25},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LongaG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Matt09,
  author       = {Brian J. Matt},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {Identification of Multiple Invalid Signatures in Pairing-Based Batched
                  Signatures},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {337--356},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_19},
  doi          = {10.1007/978-3-642-00468-1\_19},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Matt09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/MayR09,
  author       = {Alexander May and
                  Maike Ritzenhofen},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {Implicit Factoring: On Polynomial Time Factoring Given Only an Implicit
                  Hint},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {1--14},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_1},
  doi          = {10.1007/978-3-642-00468-1\_1},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/MayR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/MorilloR09,
  author       = {Paz Morillo and
                  Carla R{\`{a}}fols},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {The Security of All Bits Using List Decoding},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {15--33},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_2},
  doi          = {10.1007/978-3-642-00468-1\_2},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/MorilloR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/NakanishiFHF09,
  author       = {Toru Nakanishi and
                  Hiroki Fujii and
                  Yuta Hira and
                  Nobuo Funabiki},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {Revocable Group Signature Schemes with Constant Costs for Signing
                  and Verifying},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {463--480},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_26},
  doi          = {10.1007/978-3-642-00468-1\_26},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/NakanishiFHF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/SeoKOS09,
  author       = {Jae Hong Seo and
                  Tetsutaro Kobayashi and
                  Miyako Ohkubo and
                  Koutarou Suzuki},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {Anonymous Hierarchical Identity-Based Encryption with Constant Size
                  Ciphertexts},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {215--234},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_13},
  doi          = {10.1007/978-3-642-00468-1\_13},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/SeoKOS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ShaoC09,
  author       = {Jun Shao and
                  Zhenfu Cao},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {CCA-Secure Proxy Re-encryption without Pairings},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {357--376},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_20},
  doi          = {10.1007/978-3-642-00468-1\_20},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/ShaoC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2009,
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1},
  doi          = {10.1007/978-3-642-00468-1},
  isbn         = {978-3-642-00467-4},
  timestamp    = {Fri, 01 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BirkettD08,
  author       = {James Birkett and
                  Alexander W. Dent},
  editor       = {Ronald Cramer},
  title        = {Relations Among Notions of Plaintext Awareness},
  booktitle    = {Public Key Cryptography - {PKC} 2008, 11th International Workshop
                  on Practice and Theory in Public-Key Cryptography, Barcelona, Spain,
                  March 9-12, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4939},
  pages        = {47--64},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78440-1\_4},
  doi          = {10.1007/978-3-540-78440-1\_4},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BirkettD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CatalanoRFG08,
  author       = {Dario Catalano and
                  Mario Di Raimondo and
                  Dario Fiore and
                  Rosario Gennaro},
  editor       = {Ronald Cramer},
  title        = {Off-Line/On-Line Signatures: Theoretical Aspects and Experimental
                  Results},
  booktitle    = {Public Key Cryptography - {PKC} 2008, 11th International Workshop
                  on Practice and Theory in Public-Key Cryptography, Barcelona, Spain,
                  March 9-12, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4939},
  pages        = {101--120},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78440-1\_7},
  doi          = {10.1007/978-3-540-78440-1\_7},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/CatalanoRFG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DentLP08,
  author       = {Alexander W. Dent and
                  Beno{\^{\i}}t Libert and
                  Kenneth G. Paterson},
  editor       = {Ronald Cramer},
  title        = {Certificateless Encryption Schemes Strongly Secure in the Standard
                  Model},
  booktitle    = {Public Key Cryptography - {PKC} 2008, 11th International Workshop
                  on Practice and Theory in Public-Key Cryptography, Barcelona, Spain,
                  March 9-12, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4939},
  pages        = {344--359},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78440-1\_20},
  doi          = {10.1007/978-3-540-78440-1\_20},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DentLP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FaustKL08,
  author       = {Sebastian Faust and
                  Emilia K{\"{a}}sper and
                  Stefan Lucks},
  editor       = {Ronald Cramer},
  title        = {Efficient Simultaneous Broadcast},
  booktitle    = {Public Key Cryptography - {PKC} 2008, 11th International Workshop
                  on Practice and Theory in Public-Key Cryptography, Barcelona, Spain,
                  March 9-12, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4939},
  pages        = {180--196},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78440-1\_11},
  doi          = {10.1007/978-3-540-78440-1\_11},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/FaustKL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FouqueMPS08,
  author       = {Pierre{-}Alain Fouque and
                  Gilles Macario{-}Rat and
                  Ludovic Perret and
                  Jacques Stern},
  editor       = {Ronald Cramer},
  title        = {Total Break of the \emph{l}-IC Signature Scheme},
  booktitle    = {Public Key Cryptography - {PKC} 2008, 11th International Workshop
                  on Practice and Theory in Public-Key Cryptography, Barcelona, Spain,
                  March 9-12, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4939},
  pages        = {1--17},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78440-1\_1},
  doi          = {10.1007/978-3-540-78440-1\_1},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/FouqueMPS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GalbraithV08,
  author       = {Steven D. Galbraith and
                  Eric R. Verheul},
  editor       = {Ronald Cramer},
  title        = {An Analysis of the Vector Decomposition Problem},
  booktitle    = {Public Key Cryptography - {PKC} 2008, 11th International Workshop
                  on Practice and Theory in Public-Key Cryptography, Barcelona, Spain,
                  March 9-12, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4939},
  pages        = {308--327},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78440-1\_18},
  doi          = {10.1007/978-3-540-78440-1\_18},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/GalbraithV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HuangGKE08,
  author       = {Miaoqing Huang and
                  Kris Gaj and
                  Soonhak Kwon and
                  Tarek A. El{-}Ghazawi},
  editor       = {Ronald Cramer},
  title        = {An Optimized Hardware Architecture for the Montgomery Multiplication
                  Algorithm},
  booktitle    = {Public Key Cryptography - {PKC} 2008, 11th International Workshop
                  on Practice and Theory in Public-Key Cryptography, Barcelona, Spain,
                  March 9-12, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4939},
  pages        = {214--228},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78440-1\_13},
  doi          = {10.1007/978-3-540-78440-1\_13},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HuangGKE08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KimC08,
  author       = {Sungwook Kim and
                  Jung Hee Cheon},
  editor       = {Ronald Cramer},
  title        = {A Parameterized Splitting System and Its Application to the Discrete
                  Logarithm Problem with Low Hamming Weight Product Exponents},
  booktitle    = {Public Key Cryptography - {PKC} 2008, 11th International Workshop
                  on Practice and Theory in Public-Key Cryptography, Barcelona, Spain,
                  March 9-12, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4939},
  pages        = {328--343},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78440-1\_19},
  doi          = {10.1007/978-3-540-78440-1\_19},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/KimC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LaurP08,
  author       = {Sven Laur and
                  Sylvain Pasini},
  editor       = {Ronald Cramer},
  title        = {SAS-Based Group Authentication and Key Agreement Protocols},
  booktitle    = {Public Key Cryptography - {PKC} 2008, 11th International Workshop
                  on Practice and Theory in Public-Key Cryptography, Barcelona, Spain,
                  March 9-12, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4939},
  pages        = {197--213},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78440-1\_12},
  doi          = {10.1007/978-3-540-78440-1\_12},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LaurP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LevieilN08,
  author       = {{\'{E}}ric Levieil and
                  David Naccache},
  editor       = {Ronald Cramer},
  title        = {Cryptographic Test Correction},
  booktitle    = {Public Key Cryptography - {PKC} 2008, 11th International Workshop
                  on Practice and Theory in Public-Key Cryptography, Barcelona, Spain,
                  March 9-12, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4939},
  pages        = {85--100},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78440-1\_6},
  doi          = {10.1007/978-3-540-78440-1\_6},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/LevieilN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LibertV08,
  author       = {Beno{\^{\i}}t Libert and
                  Damien Vergnaud},
  editor       = {Ronald Cramer},
  title        = {Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption},
  booktitle    = {Public Key Cryptography - {PKC} 2008, 11th International Workshop
                  on Practice and Theory in Public-Key Cryptography, Barcelona, Spain,
                  March 9-12, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4939},
  pages        = {360--379},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78440-1\_21},
  doi          = {10.1007/978-3-540-78440-1\_21},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/LibertV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LiskovM08,
  author       = {Moses D. Liskov and
                  Silvio Micali},
  editor       = {Ronald Cramer},
  title        = {Online-Untransferable Signatures},
  booktitle    = {Public Key Cryptography - {PKC} 2008, 11th International Workshop
                  on Practice and Theory in Public-Key Cryptography, Barcelona, Spain,
                  March 9-12, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4939},
  pages        = {248--267},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78440-1\_15},
  doi          = {10.1007/978-3-540-78440-1\_15},
  timestamp    = {Fri, 25 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LiskovM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LiuT08,
  author       = {Yi{-}Ru Liu and
                  Wen{-}Guey Tzeng},
  editor       = {Ronald Cramer},
  title        = {Public Key Broadcast Encryption with Low Number of Keys and Constant
                  Decryption Time},
  booktitle    = {Public Key Cryptography - {PKC} 2008, 11th International Workshop
                  on Practice and Theory in Public-Key Cryptography, Barcelona, Spain,
                  March 9-12, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4939},
  pages        = {380--396},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78440-1\_22},
  doi          = {10.1007/978-3-540-78440-1\_22},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LiuT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LongaM08,
  author       = {Patrick Longa and
                  Ali Miri},
  editor       = {Ronald Cramer},
  title        = {New Composite Operations and Precomputation Scheme for Elliptic Curve
                  Cryptosystems over Prime Fields},
  booktitle    = {Public Key Cryptography - {PKC} 2008, 11th International Workshop
                  on Practice and Theory in Public-Key Cryptography, Barcelona, Spain,
                  March 9-12, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4939},
  pages        = {229--247},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78440-1\_14},
  doi          = {10.1007/978-3-540-78440-1\_14},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LongaM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Lyubashevsky08,
  author       = {Vadim Lyubashevsky},
  editor       = {Ronald Cramer},
  title        = {Lattice-Based Identification Schemes Secure Under Active Attacks},
  booktitle    = {Public Key Cryptography - {PKC} 2008, 11th International Workshop
                  on Practice and Theory in Public-Key Cryptography, Barcelona, Spain,
                  March 9-12, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4939},
  pages        = {162--179},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78440-1\_10},
  doi          = {10.1007/978-3-540-78440-1\_10},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Lyubashevsky08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/MayR08,
  author       = {Alexander May and
                  Maike Ritzenhofen},
  editor       = {Ronald Cramer},
  title        = {Solving Systems of Modular Equations in One Variable: How Many RSA-Encrypted
                  Messages Does Eve Need to Know?},
  booktitle    = {Public Key Cryptography - {PKC} 2008, 11th International Workshop
                  on Practice and Theory in Public-Key Cryptography, Barcelona, Spain,
                  March 9-12, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4939},
  pages        = {37--46},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78440-1\_3},
  doi          = {10.1007/978-3-540-78440-1\_3},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/MayR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/MolY08,
  author       = {Petros Mol and
                  Moti Yung},
  editor       = {Ronald Cramer},
  title        = {Recovering {NTRU} Secret Key from Inversion Oracles},
  booktitle    = {Public Key Cryptography - {PKC} 2008, 11th International Workshop
                  on Practice and Theory in Public-Key Cryptography, Barcelona, Spain,
                  March 9-12, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4939},
  pages        = {18--36},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78440-1\_2},
  doi          = {10.1007/978-3-540-78440-1\_2},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/MolY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/NumayamaIT08,
  author       = {Akira Numayama and
                  Toshiyuki Isshiki and
                  Keisuke Tanaka},
  editor       = {Ronald Cramer},
  title        = {Security of Digital Signature Schemes in Weakened Random Oracle Models},
  booktitle    = {Public Key Cryptography - {PKC} 2008, 11th International Workshop
                  on Practice and Theory in Public-Key Cryptography, Barcelona, Spain,
                  March 9-12, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4939},
  pages        = {268--287},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78440-1\_16},
  doi          = {10.1007/978-3-540-78440-1\_16},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/NumayamaIT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/PlantardSW08,
  author       = {Thomas Plantard and
                  Willy Susilo and
                  Khin Than Win},
  editor       = {Ronald Cramer},
  title        = {A Digital Signature Scheme Based on CVP\({}_{\mbox{infinity}}\)},
  booktitle    = {Public Key Cryptography - {PKC} 2008, 11th International Workshop
                  on Practice and Theory in Public-Key Cryptography, Barcelona, Spain,
                  March 9-12, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4939},
  pages        = {288--307},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78440-1\_17},
  doi          = {10.1007/978-3-540-78440-1\_17},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/PlantardSW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/SchuldtMP08,
  author       = {Jacob C. N. Schuldt and
                  Kanta Matsuura and
                  Kenneth G. Paterson},
  editor       = {Ronald Cramer},
  title        = {Proxy Signatures Secure Against Proxy Key Exposure},
  booktitle    = {Public Key Cryptography - {PKC} 2008, 11th International Workshop
                  on Practice and Theory in Public-Key Cryptography, Barcelona, Spain,
                  March 9-12, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4939},
  pages        = {141--161},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78440-1\_9},
  doi          = {10.1007/978-3-540-78440-1\_9},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/SchuldtMP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ShahandashtiS08,
  author       = {Siamak Fayyaz Shahandashti and
                  Reihaneh Safavi{-}Naini},
  editor       = {Ronald Cramer},
  title        = {Construction of Universal Designated-Verifier Signatures and Identity-Based
                  Signatures from Standard Signatures},
  booktitle    = {Public Key Cryptography - {PKC} 2008, 11th International Workshop
                  on Practice and Theory in Public-Key Cryptography, Barcelona, Spain,
                  March 9-12, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4939},
  pages        = {121--140},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78440-1\_8},
  doi          = {10.1007/978-3-540-78440-1\_8},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/ShahandashtiS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/VentreV08,
  author       = {Carmine Ventre and
                  Ivan Visconti},
  editor       = {Ronald Cramer},
  title        = {Completely Non-malleable Encryption Revisited},
  booktitle    = {Public Key Cryptography - {PKC} 2008, 11th International Workshop
                  on Practice and Theory in Public-Key Cryptography, Barcelona, Spain,
                  March 9-12, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4939},
  pages        = {65--84},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78440-1\_5},
  doi          = {10.1007/978-3-540-78440-1\_5},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/VentreV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2008,
  editor       = {Ronald Cramer},
  title        = {Public Key Cryptography - {PKC} 2008, 11th International Workshop
                  on Practice and Theory in Public-Key Cryptography, Barcelona, Spain,
                  March 9-12, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4939},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78440-1},
  doi          = {10.1007/978-3-540-78440-1},
  isbn         = {978-3-540-78439-5},
  timestamp    = {Fri, 01 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AbdallaDMNPS07,
  author       = {Michel Abdalla and
                  Alexander W. Dent and
                  John Malone{-}Lee and
                  Gregory Neven and
                  Duong Hieu Phan and
                  Nigel P. Smart},
  editor       = {Tatsuaki Okamoto and
                  Xiaoyun Wang},
  title        = {Identity-Based Traitor Tracing},
  booktitle    = {Public Key Cryptography - {PKC} 2007, 10th International Conference
                  on Practice and Theory in Public-Key Cryptography, Beijing, China,
                  April 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4450},
  pages        = {361--376},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71677-8\_24},
  doi          = {10.1007/978-3-540-71677-8\_24},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AbdallaDMNPS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BellareS07,
  author       = {Mihir Bellare and
                  Sarah Shoup},
  editor       = {Tatsuaki Okamoto and
                  Xiaoyun Wang},
  title        = {Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir
                  Without Random Oracles},
  booktitle    = {Public Key Cryptography - {PKC} 2007, 10th International Conference
                  on Practice and Theory in Public-Key Cryptography, Beijing, China,
                  April 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4450},
  pages        = {201--216},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71677-8\_14},
  doi          = {10.1007/978-3-540-71677-8\_14},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BellareS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BoldyrevaFPW07,
  author       = {Alexandra Boldyreva and
                  Marc Fischlin and
                  Adriana Palacio and
                  Bogdan Warinschi},
  editor       = {Tatsuaki Okamoto and
                  Xiaoyun Wang},
  title        = {A Closer Look at {PKI:} Security and Efficiency},
  booktitle    = {Public Key Cryptography - {PKC} 2007, 10th International Conference
                  on Practice and Theory in Public-Key Cryptography, Beijing, China,
                  April 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4450},
  pages        = {458--475},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71677-8\_30},
  doi          = {10.1007/978-3-540-71677-8\_30},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BoldyrevaFPW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BoyenW07,
  author       = {Xavier Boyen and
                  Brent Waters},
  editor       = {Tatsuaki Okamoto and
                  Xiaoyun Wang},
  title        = {Full-Domain Subgroup Hiding and Constant-Size Group Signatures},
  booktitle    = {Public Key Cryptography - {PKC} 2007, 10th International Conference
                  on Practice and Theory in Public-Key Cryptography, Beijing, China,
                  April 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4450},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71677-8\_1},
  doi          = {10.1007/978-3-540-71677-8\_1},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BoyenW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BressonCG07,
  author       = {Emmanuel Bresson and
                  Dario Catalano and
                  Rosario Gennaro},
  editor       = {Tatsuaki Okamoto and
                  Xiaoyun Wang},
  title        = {Improved On-Line/Off-Line Threshold Signatures},
  booktitle    = {Public Key Cryptography - {PKC} 2007, 10th International Conference
                  on Practice and Theory in Public-Key Cryptography, Beijing, China,
                  April 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4450},
  pages        = {217--232},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71677-8\_15},
  doi          = {10.1007/978-3-540-71677-8\_15},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BressonCG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BuldasL07,
  author       = {Ahto Buldas and
                  Sven Laur},
  editor       = {Tatsuaki Okamoto and
                  Xiaoyun Wang},
  title        = {Knowledge-Binding Commitments with Applications in Time-Stamping},
  booktitle    = {Public Key Cryptography - {PKC} 2007, 10th International Conference
                  on Practice and Theory in Public-Key Cryptography, Beijing, China,
                  April 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4450},
  pages        = {150--165},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71677-8\_11},
  doi          = {10.1007/978-3-540-71677-8\_11},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/BuldasL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CheonY07,
  author       = {Jung Hee Cheon and
                  Jeong Hyun Yi},
  editor       = {Tatsuaki Okamoto and
                  Xiaoyun Wang},
  title        = {Fast Batch Verification of Multiple Signatures},
  booktitle    = {Public Key Cryptography - {PKC} 2007, 10th International Conference
                  on Practice and Theory in Public-Key Cryptography, Beijing, China,
                  April 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4450},
  pages        = {442--457},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71677-8\_29},
  doi          = {10.1007/978-3-540-71677-8\_29},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/CheonY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DingHNLW07,
  author       = {Jintai Ding and
                  Lei Hu and
                  Xuyun Nie and
                  Jianyu Li and
                  John Wagner},
  editor       = {Tatsuaki Okamoto and
                  Xiaoyun Wang},
  title        = {High Order Linearization Equation {(HOLE)} Attack on Multivariate
                  Public Key Cryptosystems},
  booktitle    = {Public Key Cryptography - {PKC} 2007, 10th International Conference
                  on Practice and Theory in Public-Key Cryptography, Beijing, China,
                  April 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4450},
  pages        = {233--248},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71677-8\_16},
  doi          = {10.1007/978-3-540-71677-8\_16},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DingHNLW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DingWY07,
  author       = {Jintai Ding and
                  Christopher Wolf and
                  Bo{-}Yin Yang},
  editor       = {Tatsuaki Okamoto and
                  Xiaoyun Wang},
  title        = {\emph{l}-Invertible Cycles for \emph{M}ultivariate \emph{Q}uadratic
                  (\emph{MQ}) Public Key Cryptography},
  booktitle    = {Public Key Cryptography - {PKC} 2007, 10th International Conference
                  on Practice and Theory in Public-Key Cryptography, Beijing, China,
                  April 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4450},
  pages        = {266--281},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71677-8\_18},
  doi          = {10.1007/978-3-540-71677-8\_18},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DingWY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DodisLY07,
  author       = {Yevgeniy Dodis and
                  Pil Joong Lee and
                  Dae Hyun Yum},
  editor       = {Tatsuaki Okamoto and
                  Xiaoyun Wang},
  title        = {Optimistic Fair Exchange in a Multi-user Setting},
  booktitle    = {Public Key Cryptography - {PKC} 2007, 10th International Conference
                  on Practice and Theory in Public-Key Cryptography, Beijing, China,
                  April 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4450},
  pages        = {118--133},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71677-8\_9},
  doi          = {10.1007/978-3-540-71677-8\_9},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DodisLY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DuboisGS07,
  author       = {Vivien Dubois and
                  Louis Granboulan and
                  Jacques Stern},
  editor       = {Tatsuaki Okamoto and
                  Xiaoyun Wang},
  title        = {Cryptanalysis of {HFE} with Internal Perturbation},
  booktitle    = {Public Key Cryptography - {PKC} 2007, 10th International Conference
                  on Practice and Theory in Public-Key Cryptography, Beijing, China,
                  April 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4450},
  pages        = {249--265},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71677-8\_17},
  doi          = {10.1007/978-3-540-71677-8\_17},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DuboisGS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FarashahiSS07,
  author       = {Reza Rezaeian Farashahi and
                  Berry Schoenmakers and
                  Andrey Sidorenko},
  editor       = {Tatsuaki Okamoto and
                  Xiaoyun Wang},
  title        = {Efficient Pseudorandom Generators Based on the {DDH} Assumption},
  booktitle    = {Public Key Cryptography - {PKC} 2007, 10th International Conference
                  on Practice and Theory in Public-Key Cryptography, Beijing, China,
                  April 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4450},
  pages        = {426--441},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71677-8\_28},
  doi          = {10.1007/978-3-540-71677-8\_28},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/FarashahiSS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Fischlin07,
  author       = {Marc Fischlin},
  editor       = {Tatsuaki Okamoto and
                  Xiaoyun Wang},
  title        = {Anonymous Signatures Made Easy},
  booktitle    = {Public Key Cryptography - {PKC} 2007, 10th International Conference
                  on Practice and Theory in Public-Key Cryptography, Beijing, China,
                  April 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4450},
  pages        = {31--42},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71677-8\_3},
  doi          = {10.1007/978-3-540-71677-8\_3},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Fischlin07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FujisakiS07,
  author       = {Eiichiro Fujisaki and
                  Koutarou Suzuki},
  editor       = {Tatsuaki Okamoto and
                  Xiaoyun Wang},
  title        = {Traceable Ring Signature},
  booktitle    = {Public Key Cryptography - {PKC} 2007, 10th International Conference
                  on Practice and Theory in Public-Key Cryptography, Beijing, China,
                  April 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4450},
  pages        = {181--200},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71677-8\_13},
  doi          = {10.1007/978-3-540-71677-8\_13},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/FujisakiS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GamaN07,
  author       = {Nicolas Gama and
                  Phong Q. Nguyen},
  editor       = {Tatsuaki Okamoto and
                  Xiaoyun Wang},
  title        = {New Chosen-Ciphertext Attacks on {NTRU}},
  booktitle    = {Public Key Cryptography - {PKC} 2007, 10th International Conference
                  on Practice and Theory in Public-Key Cryptography, Beijing, China,
                  April 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4450},
  pages        = {89--106},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71677-8\_7},
  doi          = {10.1007/978-3-540-71677-8\_7},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/GamaN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GaraySV07,
  author       = {Juan A. Garay and
                  Berry Schoenmakers and
                  Jos{\'{e}} Villegas},
  editor       = {Tatsuaki Okamoto and
                  Xiaoyun Wang},
  title        = {Practical and Secure Solutions for Integer Comparison},
  booktitle    = {Public Key Cryptography - {PKC} 2007, 10th International Conference
                  on Practice and Theory in Public-Key Cryptography, Beijing, China,
                  April 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4450},
  pages        = {330--342},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71677-8\_22},
  doi          = {10.1007/978-3-540-71677-8\_22},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/GaraySV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GeT07,
  author       = {He Ge and
                  Stephen R. Tate},
  editor       = {Tatsuaki Okamoto and
                  Xiaoyun Wang},
  title        = {A Direct Anonymous Attestation Scheme for Embedded Devices},
  booktitle    = {Public Key Cryptography - {PKC} 2007, 10th International Conference
                  on Practice and Theory in Public-Key Cryptography, Beijing, China,
                  April 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4450},
  pages        = {16--30},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71677-8\_2},
  doi          = {10.1007/978-3-540-71677-8\_2},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/GeT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GrothL07,
  author       = {Jens Groth and
                  Steve Lu},
  editor       = {Tatsuaki Okamoto and
                  Xiaoyun Wang},
  title        = {Verifiable Shuffle of Large Size Ciphertexts},
  booktitle    = {Public Key Cryptography - {PKC} 2007, 10th International Conference
                  on Practice and Theory in Public-Key Cryptography, Beijing, China,
                  April 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4450},
  pages        = {377--392},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71677-8\_25},
  doi          = {10.1007/978-3-540-71677-8\_25},
  timestamp    = {Tue, 15 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/GrothL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HanKY07,
  author       = {Daewan Han and
                  Myung{-}Hwan Kim and
                  Yongjin Yeom},
  editor       = {Tatsuaki Okamoto and
                  Xiaoyun Wang},
  title        = {Cryptanalysis of the Paeng-Jung-Ha Cryptosystem from {PKC} 2003},
  booktitle    = {Public Key Cryptography - {PKC} 2007, 10th International Conference
                  on Practice and Theory in Public-Key Cryptography, Beijing, China,
                  April 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4450},
  pages        = {107--117},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71677-8\_8},
  doi          = {10.1007/978-3-540-71677-8\_8},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HanKY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KawachiTX07,
  author       = {Akinori Kawachi and
                  Keisuke Tanaka and
                  Keita Xagawa},
  editor       = {Tatsuaki Okamoto and
                  Xiaoyun Wang},
  title        = {Multi-bit Cryptosystems Based on Lattice Problems},
  booktitle    = {Public Key Cryptography - {PKC} 2007, 10th International Conference
                  on Practice and Theory in Public-Key Cryptography, Beijing, China,
                  April 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4450},
  pages        = {315--329},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71677-8\_21},
  doi          = {10.1007/978-3-540-71677-8\_21},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/KawachiTX07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Kiltz07,
  author       = {Eike Kiltz},
  editor       = {Tatsuaki Okamoto and
                  Xiaoyun Wang},
  title        = {Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman},
  booktitle    = {Public Key Cryptography - {PKC} 2007, 10th International Conference
                  on Practice and Theory in Public-Key Cryptography, Beijing, China,
                  April 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4450},
  pages        = {282--297},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71677-8\_19},
  doi          = {10.1007/978-3-540-71677-8\_19},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Kiltz07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KunihiroK07,
  author       = {Noboru Kunihiro and
                  Kaoru Kurosawa},
  editor       = {Tatsuaki Okamoto and
                  Xiaoyun Wang},
  title        = {Deterministic Polynomial Time Equivalence Between Factoring and Key-Recovery
                  Attack on Takagi's {RSA}},
  booktitle    = {Public Key Cryptography - {PKC} 2007, 10th International Conference
                  on Practice and Theory in Public-Key Cryptography, Beijing, China,
                  April 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4450},
  pages        = {412--425},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71677-8\_27},
  doi          = {10.1007/978-3-540-71677-8\_27},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/KunihiroK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LaiK07,
  author       = {Junzuo Lai and
                  Weidong Kou},
  editor       = {Tatsuaki Okamoto and
                  Xiaoyun Wang},
  title        = {Self-Generated-Certificate Public Key Encryption Without Pairing},
  booktitle    = {Public Key Cryptography - {PKC} 2007, 10th International Conference
                  on Practice and Theory in Public-Key Cryptography, Beijing, China,
                  April 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4450},
  pages        = {476--489},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71677-8\_31},
  doi          = {10.1007/978-3-540-71677-8\_31},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LaiK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LibertQY07,
  author       = {Beno{\^{\i}}t Libert and
                  Jean{-}Jacques Quisquater and
                  Moti Yung},
  editor       = {Tatsuaki Okamoto and
                  Xiaoyun Wang},
  title        = {Parallel Key-Insulated Public Key Encryption Without Random Oracles},
  booktitle    = {Public Key Cryptography - {PKC} 2007, 10th International Conference
                  on Practice and Theory in Public-Key Cryptography, Beijing, China,
                  April 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4450},
  pages        = {298--314},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71677-8\_20},
  doi          = {10.1007/978-3-540-71677-8\_20},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LibertQY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/MyasnikovU07,
  author       = {Alex D. Myasnikov and
                  Alexander Ushakov},
  editor       = {Tatsuaki Okamoto and
                  Xiaoyun Wang},
  title        = {Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld
                  Key Exchange Protocol},
  booktitle    = {Public Key Cryptography - {PKC} 2007, 10th International Conference
                  on Practice and Theory in Public-Key Cryptography, Beijing, China,
                  April 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4450},
  pages        = {76--88},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71677-8\_6},
  doi          = {10.1007/978-3-540-71677-8\_6},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/MyasnikovU07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/NishideO07,
  author       = {Takashi Nishide and
                  Kazuo Ohta},
  editor       = {Tatsuaki Okamoto and
                  Xiaoyun Wang},
  title        = {Multiparty Computation for Interval, Equality, and Comparison Without
                  Bit-Decomposition Protocol},
  booktitle    = {Public Key Cryptography - {PKC} 2007, 10th International Conference
                  on Practice and Theory in Public-Key Cryptography, Beijing, China,
                  April 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4450},
  pages        = {343--360},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71677-8\_23},
  doi          = {10.1007/978-3-540-71677-8\_23},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/NishideO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/OstrovskyS07,
  author       = {Rafail Ostrovsky and
                  William E. Skeith III},
  editor       = {Tatsuaki Okamoto and
                  Xiaoyun Wang},
  title        = {A Survey of Single-Database Private Information Retrieval: Techniques
                  and Applications},
  booktitle    = {Public Key Cryptography - {PKC} 2007, 10th International Conference
                  on Practice and Theory in Public-Key Cryptography, Beijing, China,
                  April 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4450},
  pages        = {393--411},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71677-8\_26},
  doi          = {10.1007/978-3-540-71677-8\_26},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/OstrovskyS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/RuinskiyST07,
  author       = {Dima Ruinskiy and
                  Adi Shamir and
                  Boaz Tsaban},
  editor       = {Tatsuaki Okamoto and
                  Xiaoyun Wang},
  title        = {Cryptanalysis of Group-Based Key Agreement Protocols Using Subgroup
                  Distance Functions},
  booktitle    = {Public Key Cryptography - {PKC} 2007, 10th International Conference
                  on Practice and Theory in Public-Key Cryptography, Beijing, China,
                  April 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4450},
  pages        = {61--75},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71677-8\_5},
  doi          = {10.1007/978-3-540-71677-8\_5},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/RuinskiyST07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ShachamW07,
  author       = {Hovav Shacham and
                  Brent Waters},
  editor       = {Tatsuaki Okamoto and
                  Xiaoyun Wang},
  title        = {Efficient Ring Signatures Without Random Oracles},
  booktitle    = {Public Key Cryptography - {PKC} 2007, 10th International Conference
                  on Practice and Theory in Public-Key Cryptography, Beijing, China,
                  April 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4450},
  pages        = {166--180},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71677-8\_12},
  doi          = {10.1007/978-3-540-71677-8\_12},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/ShachamW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/WangBWB07,
  author       = {Guilin Wang and
                  Joonsang Baek and
                  Duncan S. Wong and
                  Feng Bao},
  editor       = {Tatsuaki Okamoto and
                  Xiaoyun Wang},
  title        = {On the Generic and Efficient Constructions of Secure Designated Confirmer
                  Signatures},
  booktitle    = {Public Key Cryptography - {PKC} 2007, 10th International Conference
                  on Practice and Theory in Public-Key Cryptography, Beijing, China,
                  April 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4450},
  pages        = {43--60},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71677-8\_4},
  doi          = {10.1007/978-3-540-71677-8\_4},
  timestamp    = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/WangBWB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ZhuSM07,
  author       = {Huafei Zhu and
                  Willy Susilo and
                  Yi Mu},
  editor       = {Tatsuaki Okamoto and
                  Xiaoyun Wang},
  title        = {Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures},
  booktitle    = {Public Key Cryptography - {PKC} 2007, 10th International Conference
                  on Practice and Theory in Public-Key Cryptography, Beijing, China,
                  April 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4450},
  pages        = {134--149},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71677-8\_10},
  doi          = {10.1007/978-3-540-71677-8\_10},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/ZhuSM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2007,
  editor       = {Tatsuaki Okamoto and
                  Xiaoyun Wang},
  title        = {Public Key Cryptography - {PKC} 2007, 10th International Conference
                  on Practice and Theory in Public-Key Cryptography, Beijing, China,
                  April 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4450},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71677-8},
  doi          = {10.1007/978-3-540-71677-8},
  isbn         = {978-3-540-71676-1},
  timestamp    = {Fri, 01 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AbdallaBCP06,
  author       = {Michel Abdalla and
                  Emmanuel Bresson and
                  Olivier Chevassut and
                  David Pointcheval},
  editor       = {Moti Yung and
                  Yevgeniy Dodis and
                  Aggelos Kiayias and
                  Tal Malkin},
  title        = {Password-Based Group Key Exchange in a Constant Number of Rounds},
  booktitle    = {Public Key Cryptography - {PKC} 2006, 9th International Conference
                  on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
                  April 24-26, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3958},
  pages        = {427--442},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11745853\_28},
  doi          = {10.1007/11745853\_28},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AbdallaBCP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Bernstein06,
  author       = {Daniel J. Bernstein},
  editor       = {Moti Yung and
                  Yevgeniy Dodis and
                  Aggelos Kiayias and
                  Tal Malkin},
  title        = {Curve25519: New Diffie-Hellman Speed Records},
  booktitle    = {Public Key Cryptography - {PKC} 2006, 9th International Conference
                  on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
                  April 24-26, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3958},
  pages        = {207--228},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11745853\_14},
  doi          = {10.1007/11745853\_14},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/Bernstein06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BjorstadD06,
  author       = {Tor E. Bj{\o}rstad and
                  Alexander W. Dent},
  editor       = {Moti Yung and
                  Yevgeniy Dodis and
                  Aggelos Kiayias and
                  Tal Malkin},
  title        = {Building Better Signcryption Schemes with Tag-KEMs},
  booktitle    = {Public Key Cryptography - {PKC} 2006, 9th International Conference
                  on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
                  April 24-26, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3958},
  pages        = {491--507},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11745853\_32},
  doi          = {10.1007/11745853\_32},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BjorstadD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BleichenbacherM06,
  author       = {Daniel Bleichenbacher and
                  Alexander May},
  editor       = {Moti Yung and
                  Yevgeniy Dodis and
                  Aggelos Kiayias and
                  Tal Malkin},
  title        = {New Attacks on {RSA} with Small Secret CRT-Exponents},
  booktitle    = {Public Key Cryptography - {PKC} 2006, 9th International Conference
                  on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
                  April 24-26, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3958},
  pages        = {1--13},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11745853\_1},
  doi          = {10.1007/11745853\_1},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/BleichenbacherM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BonehSW06,
  author       = {Dan Boneh and
                  Emily Shen and
                  Brent Waters},
  editor       = {Moti Yung and
                  Yevgeniy Dodis and
                  Aggelos Kiayias and
                  Tal Malkin},
  title        = {Strongly Unforgeable Signatures Based on Computational Diffie-Hellman},
  booktitle    = {Public Key Cryptography - {PKC} 2006, 9th International Conference
                  on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
                  April 24-26, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3958},
  pages        = {229--240},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11745853\_15},
  doi          = {10.1007/11745853\_15},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BonehSW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ChatterjeeS06,
  author       = {Sanjit Chatterjee and
                  Palash Sarkar},
  editor       = {Moti Yung and
                  Yevgeniy Dodis and
                  Aggelos Kiayias and
                  Tal Malkin},
  title        = {Generalization of the Selective-ID Security Model for {HIBE} Protocols},
  booktitle    = {Public Key Cryptography - {PKC} 2006, 9th International Conference
                  on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
                  April 24-26, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3958},
  pages        = {241--256},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11745853\_16},
  doi          = {10.1007/11745853\_16},
  timestamp    = {Tue, 04 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/ChatterjeeS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Chevallier-MamesPP06,
  author       = {Beno{\^{\i}}t Chevallier{-}Mames and
                  Pascal Paillier and
                  David Pointcheval},
  editor       = {Moti Yung and
                  Yevgeniy Dodis and
                  Aggelos Kiayias and
                  Tal Malkin},
  title        = {Encoding-Free ElGamal Encryption Without Random Oracles},
  booktitle    = {Public Key Cryptography - {PKC} 2006, 9th International Conference
                  on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
                  April 24-26, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3958},
  pages        = {91--104},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11745853\_7},
  doi          = {10.1007/11745853\_7},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/Chevallier-MamesPP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ChevassutFGP06,
  author       = {Olivier Chevassut and
                  Pierre{-}Alain Fouque and
                  Pierrick Gaudry and
                  David Pointcheval},
  editor       = {Moti Yung and
                  Yevgeniy Dodis and
                  Aggelos Kiayias and
                  Tal Malkin},
  title        = {The Twist-AUgmented Technique for Key Exchange},
  booktitle    = {Public Key Cryptography - {PKC} 2006, 9th International Conference
                  on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
                  April 24-26, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3958},
  pages        = {410--426},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11745853\_27},
  doi          = {10.1007/11745853\_27},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/ChevassutFGP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ChowBN06,
  author       = {Sherman S. M. Chow and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  editor       = {Moti Yung and
                  Yevgeniy Dodis and
                  Aggelos Kiayias and
                  Tal Malkin},
  title        = {Security-Mediated Certificateless Cryptography},
  booktitle    = {Public Key Cryptography - {PKC} 2006, 9th International Conference
                  on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
                  April 24-26, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3958},
  pages        = {508--524},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11745853\_33},
  doi          = {10.1007/11745853\_33},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/ChowBN06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ChuT06,
  author       = {Cheng{-}Kang Chu and
                  Wen{-}Guey Tzeng},
  editor       = {Moti Yung and
                  Yevgeniy Dodis and
                  Aggelos Kiayias and
                  Tal Malkin},
  title        = {Conditional Oblivious Cast},
  booktitle    = {Public Key Cryptography - {PKC} 2006, 9th International Conference
                  on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
                  April 24-26, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3958},
  pages        = {443--457},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11745853\_29},
  doi          = {10.1007/11745853\_29},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/ChuT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CommeineS06,
  author       = {An Commeine and
                  Igor A. Semaev},
  editor       = {Moti Yung and
                  Yevgeniy Dodis and
                  Aggelos Kiayias and
                  Tal Malkin},
  title        = {An Algorithm to Solve the Discrete Logarithm Problem with the Number
                  Field Sieve},
  booktitle    = {Public Key Cryptography - {PKC} 2006, 9th International Conference
                  on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
                  April 24-26, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3958},
  pages        = {174--190},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11745853\_12},
  doi          = {10.1007/11745853\_12},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/CommeineS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CrutchfieldMTW06,
  author       = {Chris Crutchfield and
                  David Molnar and
                  David Turner and
                  David A. Wagner},
  editor       = {Moti Yung and
                  Yevgeniy Dodis and
                  Aggelos Kiayias and
                  Tal Malkin},
  title        = {Generic On-Line/Off-Line Threshold Signatures},
  booktitle    = {Public Key Cryptography - {PKC} 2006, 9th International Conference
                  on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
                  April 24-26, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3958},
  pages        = {58--74},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11745853\_5},
  doi          = {10.1007/11745853\_5},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/CrutchfieldMTW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DamgardT06,
  author       = {Ivan Damg{\aa}rd and
                  Rune Thorbek},
  editor       = {Moti Yung and
                  Yevgeniy Dodis and
                  Aggelos Kiayias and
                  Tal Malkin},
  title        = {Linear Integer Secret Sharing and Distributed Exponentiation},
  booktitle    = {Public Key Cryptography - {PKC} 2006, 9th International Conference
                  on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
                  April 24-26, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3958},
  pages        = {75--90},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11745853\_6},
  doi          = {10.1007/11745853\_6},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DamgardT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DingG06,
  author       = {Jintai Ding and
                  Jason E. Gower},
  editor       = {Moti Yung and
                  Yevgeniy Dodis and
                  Aggelos Kiayias and
                  Tal Malkin},
  title        = {Inoculating Multivariate Schemes Against Differential Attacks},
  booktitle    = {Public Key Cryptography - {PKC} 2006, 9th International Conference
                  on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
                  April 24-26, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3958},
  pages        = {290--301},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11745853\_19},
  doi          = {10.1007/11745853\_19},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DingG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DocheIK06,
  author       = {Christophe Doche and
                  Thomas Icart and
                  David R. Kohel},
  editor       = {Moti Yung and
                  Yevgeniy Dodis and
                  Aggelos Kiayias and
                  Tal Malkin},
  title        = {Efficient Scalar Multiplication by Isogeny Decompositions},
  booktitle    = {Public Key Cryptography - {PKC} 2006, 9th International Conference
                  on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
                  April 24-26, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3958},
  pages        = {191--206},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11745853\_13},
  doi          = {10.1007/11745853\_13},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DocheIK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GentryR06,
  author       = {Craig Gentry and
                  Zulfikar Ramzan},
  editor       = {Moti Yung and
                  Yevgeniy Dodis and
                  Aggelos Kiayias and
                  Tal Malkin},
  title        = {Identity-Based Aggregate Signatures},
  booktitle    = {Public Key Cryptography - {PKC} 2006, 9th International Conference
                  on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
                  April 24-26, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3958},
  pages        = {257--273},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11745853\_17},
  doi          = {10.1007/11745853\_17},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/GentryR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HanaokaHI06,
  author       = {Goichiro Hanaoka and
                  Yumiko Hanaoka and
                  Hideki Imai},
  editor       = {Moti Yung and
                  Yevgeniy Dodis and
                  Aggelos Kiayias and
                  Tal Malkin},
  title        = {Parallel Key-Insulated Public Key Encryption},
  booktitle    = {Public Key Cryptography - {PKC} 2006, 9th International Conference
                  on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
                  April 24-26, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3958},
  pages        = {105--122},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11745853\_8},
  doi          = {10.1007/11745853\_8},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HanaokaHI06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Kiltz06,
  author       = {Eike Kiltz},
  editor       = {Moti Yung and
                  Yevgeniy Dodis and
                  Aggelos Kiayias and
                  Tal Malkin},
  title        = {On the Limitations of the Spread of an IBE-to-PKE Transformation},
  booktitle    = {Public Key Cryptography - {PKC} 2006, 9th International Conference
                  on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
                  April 24-26, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3958},
  pages        = {274--289},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11745853\_18},
  doi          = {10.1007/11745853\_18},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Kiltz06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Kunz-JacquesMPS06,
  author       = {S{\'{e}}bastien Kunz{-}Jacques and
                  Gwena{\"{e}}lle Martinet and
                  Guillaume Poupard and
                  Jacques Stern},
  editor       = {Moti Yung and
                  Yevgeniy Dodis and
                  Aggelos Kiayias and
                  Tal Malkin},
  title        = {Cryptanalysis of an Efficient Proof of Knowledge of Discrete Logarithm},
  booktitle    = {Public Key Cryptography - {PKC} 2006, 9th International Conference
                  on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
                  April 24-26, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3958},
  pages        = {27--43},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11745853\_3},
  doi          = {10.1007/11745853\_3},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Kunz-JacquesMPS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KurosawaH06,
  author       = {Kaoru Kurosawa and
                  Swee{-}Huay Heng},
  editor       = {Moti Yung and
                  Yevgeniy Dodis and
                  Aggelos Kiayias and
                  Tal Malkin},
  title        = {The Power of Identification Schemes},
  booktitle    = {Public Key Cryptography - {PKC} 2006, 9th International Conference
                  on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
                  April 24-26, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3958},
  pages        = {364--377},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11745853\_24},
  doi          = {10.1007/11745853\_24},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/KurosawaH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KurosawaS06,
  author       = {Kaoru Kurosawa and
                  Katja Schmidt{-}Samoa},
  editor       = {Moti Yung and
                  Yevgeniy Dodis and
                  Aggelos Kiayias and
                  Tal Malkin},
  title        = {New Online/Offline Signature Schemes Without Random Oracles},
  booktitle    = {Public Key Cryptography - {PKC} 2006, 9th International Conference
                  on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
                  April 24-26, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3958},
  pages        = {330--346},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11745853\_22},
  doi          = {10.1007/11745853\_22},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/KurosawaS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LauterM06,
  author       = {Kristin E. Lauter and
                  Anton Mityagin},
  editor       = {Moti Yung and
                  Yevgeniy Dodis and
                  Aggelos Kiayias and
                  Tal Malkin},
  title        = {Security Analysis of {KEA} Authenticated Key Exchange Protocol},
  booktitle    = {Public Key Cryptography - {PKC} 2006, 9th International Conference
                  on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
                  April 24-26, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3958},
  pages        = {378--394},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11745853\_25},
  doi          = {10.1007/11745853\_25},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LauterM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LibertQ06,
  author       = {Beno{\^{\i}}t Libert and
                  Jean{-}Jacques Quisquater},
  editor       = {Moti Yung and
                  Yevgeniy Dodis and
                  Aggelos Kiayias and
                  Tal Malkin},
  title        = {On Constructing Certificateless Cryptosystems from Identity Based
                  Encryption},
  booktitle    = {Public Key Cryptography - {PKC} 2006, 9th International Conference
                  on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
                  April 24-26, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3958},
  pages        = {474--490},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11745853\_31},
  doi          = {10.1007/11745853\_31},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LibertQ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LysyanskayaM06,
  author       = {Anna Lysyanskaya and
                  Mira Meyerovich},
  editor       = {Moti Yung and
                  Yevgeniy Dodis and
                  Aggelos Kiayias and
                  Tal Malkin},
  title        = {Provably Secure Steganography with Imperfect Sampling},
  booktitle    = {Public Key Cryptography - {PKC} 2006, 9th International Conference
                  on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
                  April 24-26, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3958},
  pages        = {123--139},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11745853\_9},
  doi          = {10.1007/11745853\_9},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LysyanskayaM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Mironov06,
  author       = {Ilya Mironov},
  editor       = {Moti Yung and
                  Yevgeniy Dodis and
                  Aggelos Kiayias and
                  Tal Malkin},
  title        = {Collision-Resistant No More: Hash-and-Sign Paradigm Revisited},
  booktitle    = {Public Key Cryptography - {PKC} 2006, 9th International Conference
                  on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
                  April 24-26, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3958},
  pages        = {140--156},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11745853\_10},
  doi          = {10.1007/11745853\_10},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/Mironov06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/MohasselF06,
  author       = {Payman Mohassel and
                  Matthew K. Franklin},
  editor       = {Moti Yung and
                  Yevgeniy Dodis and
                  Aggelos Kiayias and
                  Tal Malkin},
  title        = {Efficient Polynomial Operations in the Shared-Coefficients Setting},
  booktitle    = {Public Key Cryptography - {PKC} 2006, 9th International Conference
                  on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
                  April 24-26, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3958},
  pages        = {44--57},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11745853\_4},
  doi          = {10.1007/11745853\_4},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/MohasselF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/MohasselF06a,
  author       = {Payman Mohassel and
                  Matthew K. Franklin},
  editor       = {Moti Yung and
                  Yevgeniy Dodis and
                  Aggelos Kiayias and
                  Tal Malkin},
  title        = {Efficiency Tradeoffs for Malicious Two-Party Computation},
  booktitle    = {Public Key Cryptography - {PKC} 2006, 9th International Conference
                  on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
                  April 24-26, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3958},
  pages        = {458--473},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11745853\_30},
  doi          = {10.1007/11745853\_30},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/MohasselF06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/MullerV06,
  author       = {Fr{\'{e}}d{\'{e}}ric Muller and
                  Fr{\'{e}}d{\'{e}}ric Valette},
  editor       = {Moti Yung and
                  Yevgeniy Dodis and
                  Aggelos Kiayias and
                  Tal Malkin},
  title        = {High-Order Attacks Against the Exponent Splitting Protection},
  booktitle    = {Public Key Cryptography - {PKC} 2006, 9th International Conference
                  on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
                  April 24-26, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3958},
  pages        = {315--329},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11745853\_21},
  doi          = {10.1007/11745853\_21},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/MullerV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/MyasnikovSU06,
  author       = {Alexei G. Myasnikov and
                  Vladimir Shpilrain and
                  Alexander Ushakov},
  editor       = {Moti Yung and
                  Yevgeniy Dodis and
                  Aggelos Kiayias and
                  Tal Malkin},
  title        = {Random Subgroups of Braid Groups: An Approach to Cryptanalysis of
                  a Braid Group Based Cryptographic Protocol},
  booktitle    = {Public Key Cryptography - {PKC} 2006, 9th International Conference
                  on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
                  April 24-26, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3958},
  pages        = {302--314},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11745853\_20},
  doi          = {10.1007/11745853\_20},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/MyasnikovSU06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/PasiniV06,
  author       = {Sylvain Pasini and
                  Serge Vaudenay},
  editor       = {Moti Yung and
                  Yevgeniy Dodis and
                  Aggelos Kiayias and
                  Tal Malkin},
  title        = {SAS-Based Authenticated Key Agreement},
  booktitle    = {Public Key Cryptography - {PKC} 2006, 9th International Conference
                  on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
                  April 24-26, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3958},
  pages        = {395--409},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11745853\_26},
  doi          = {10.1007/11745853\_26},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/PasiniV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/SteinfeldPW06,
  author       = {Ron Steinfeld and
                  Josef Pieprzyk and
                  Huaxiong Wang},
  editor       = {Moti Yung and
                  Yevgeniy Dodis and
                  Aggelos Kiayias and
                  Tal Malkin},
  title        = {Higher Order Universal One-Way Hash Functions from the Subset Sum
                  Assumption},
  booktitle    = {Public Key Cryptography - {PKC} 2006, 9th International Conference
                  on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
                  April 24-26, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3958},
  pages        = {157--173},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11745853\_11},
  doi          = {10.1007/11745853\_11},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/SteinfeldPW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/TeranishiS06,
  author       = {Isamu Teranishi and
                  Kazue Sako},
  editor       = {Moti Yung and
                  Yevgeniy Dodis and
                  Aggelos Kiayias and
                  Tal Malkin},
  title        = {\emph{k}-Times Anonymous Authentication with a Constant Proving Cost},
  booktitle    = {Public Key Cryptography - {PKC} 2006, 9th International Conference
                  on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
                  April 24-26, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3958},
  pages        = {525--542},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11745853\_34},
  doi          = {10.1007/11745853\_34},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/TeranishiS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Wieschebrink06,
  author       = {Christian Wieschebrink},
  editor       = {Moti Yung and
                  Yevgeniy Dodis and
                  Aggelos Kiayias and
                  Tal Malkin},
  title        = {An Attack on a Modified Niederreiter Encryption Scheme},
  booktitle    = {Public Key Cryptography - {PKC} 2006, 9th International Conference
                  on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
                  April 24-26, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3958},
  pages        = {14--26},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11745853\_2},
  doi          = {10.1007/11745853\_2},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Wieschebrink06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/YangWDW06,
  author       = {Guomin Yang and
                  Duncan S. Wong and
                  Xiaotie Deng and
                  Huaxiong Wang},
  editor       = {Moti Yung and
                  Yevgeniy Dodis and
                  Aggelos Kiayias and
                  Tal Malkin},
  title        = {Anonymous Signature Schemes},
  booktitle    = {Public Key Cryptography - {PKC} 2006, 9th International Conference
                  on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
                  April 24-26, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3958},
  pages        = {347--363},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11745853\_23},
  doi          = {10.1007/11745853\_23},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/YangWDW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2006,
  editor       = {Moti Yung and
                  Yevgeniy Dodis and
                  Aggelos Kiayias and
                  Tal Malkin},
  title        = {Public Key Cryptography - {PKC} 2006, 9th International Conference
                  on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
                  April 24-26, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3958},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11745853},
  doi          = {10.1007/11745853},
  isbn         = {3-540-33851-9},
  timestamp    = {Fri, 01 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AbdallaCP05,
  author       = {Michel Abdalla and
                  Olivier Chevassut and
                  David Pointcheval},
  editor       = {Serge Vaudenay},
  title        = {One-Time Verifier-Based Encrypted Key Exchange},
  booktitle    = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on
                  Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland,
                  January 23-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3386},
  pages        = {47--64},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30580-4\_5},
  doi          = {10.1007/978-3-540-30580-4\_5},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AbdallaCP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AbdallaFP05,
  author       = {Michel Abdalla and
                  Pierre{-}Alain Fouque and
                  David Pointcheval},
  editor       = {Serge Vaudenay},
  title        = {Password-Based Authenticated Key Exchange in the Three-Party Setting},
  booktitle    = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on
                  Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland,
                  January 23-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3386},
  pages        = {65--84},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30580-4\_6},
  doi          = {10.1007/978-3-540-30580-4\_6},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/AbdallaFP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Al-RiyamiP05,
  author       = {Sattam S. Al{-}Riyami and
                  Kenneth G. Paterson},
  editor       = {Serge Vaudenay},
  title        = {{CBE} from {CL-PKE:} {A} Generic Construction and Efficient Schemes},
  booktitle    = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on
                  Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland,
                  January 23-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3386},
  pages        = {398--415},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30580-4\_27},
  doi          = {10.1007/978-3-540-30580-4\_27},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Al-RiyamiP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BaekSS05,
  author       = {Joonsang Baek and
                  Reihaneh Safavi{-}Naini and
                  Willy Susilo},
  editor       = {Serge Vaudenay},
  title        = {Efficient Multi-receiver Identity-Based Encryption and Its Application
                  to Broadcast Encryption},
  booktitle    = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on
                  Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland,
                  January 23-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3386},
  pages        = {380--397},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30580-4\_26},
  doi          = {10.1007/978-3-540-30580-4\_26},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BaekSS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BangerterCM05,
  author       = {Endre Bangerter and
                  Jan Camenisch and
                  Ueli M. Maurer},
  editor       = {Serge Vaudenay},
  title        = {Efficient Proofs of Knowledge of Discrete Logarithms and Representations
                  in Groups with Hidden Order},
  booktitle    = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on
                  Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland,
                  January 23-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3386},
  pages        = {154--171},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30580-4\_11},
  doi          = {10.1007/978-3-540-30580-4\_11},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BangerterCM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Bleichenbacher05,
  author       = {Daniel Bleichenbacher},
  editor       = {Serge Vaudenay},
  title        = {Breaking a Cryptographic Protocol with Pseudoprimes},
  booktitle    = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on
                  Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland,
                  January 23-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3386},
  pages        = {9--15},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30580-4\_2},
  doi          = {10.1007/978-3-540-30580-4\_2},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Bleichenbacher05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CatalanoG05,
  author       = {Dario Catalano and
                  Rosario Gennaro},
  editor       = {Serge Vaudenay},
  title        = {Cramer-Damg{\aa}rd Signatures Revisited: Efficient Flat-Tree Signatures
                  Based on Factoring},
  booktitle    = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on
                  Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland,
                  January 23-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3386},
  pages        = {313--327},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30580-4\_22},
  doi          = {10.1007/978-3-540-30580-4\_22},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/CatalanoG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CathaloCN05,
  author       = {Julien Cathalo and
                  Jean{-}S{\'{e}}bastien Coron and
                  David Naccache},
  editor       = {Serge Vaudenay},
  title        = {From Fixed-Length to Arbitrary-Length {RSA} Encoding Schemes Revisited},
  booktitle    = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on
                  Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland,
                  January 23-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3386},
  pages        = {234--243},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30580-4\_16},
  doi          = {10.1007/978-3-540-30580-4\_16},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/CathaloCN05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ChenM05,
  author       = {Liqun Chen and
                  John Malone{-}Lee},
  editor       = {Serge Vaudenay},
  title        = {Improved Identity-Based Signcryption},
  booktitle    = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on
                  Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland,
                  January 23-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3386},
  pages        = {362--379},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30580-4\_25},
  doi          = {10.1007/978-3-540-30580-4\_25},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/ChenM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ChuT05,
  author       = {Cheng{-}Kang Chu and
                  Wen{-}Guey Tzeng},
  editor       = {Serge Vaudenay},
  title        = {Efficient \emph{k}-Out-of-\emph{n} Oblivious Transfer Schemes with
                  Adaptive and Non-adaptive Queries},
  booktitle    = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on
                  Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland,
                  January 23-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3386},
  pages        = {172--183},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30580-4\_12},
  doi          = {10.1007/978-3-540-30580-4\_12},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/ChuT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DamgardD05,
  author       = {Ivan Damg{\aa}rd and
                  Kasper Dupont},
  editor       = {Serge Vaudenay},
  title        = {Efficient Threshold {RSA} Signatures with General Moduli and No Extra
                  Assumptions},
  booktitle    = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on
                  Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland,
                  January 23-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3386},
  pages        = {346--361},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30580-4\_24},
  doi          = {10.1007/978-3-540-30580-4\_24},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DamgardD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DingS05,
  author       = {Jintai Ding and
                  Dieter Schmidt},
  editor       = {Serge Vaudenay},
  title        = {Cryptanalysis of HFEv and Internal Perturbation of {HFE}},
  booktitle    = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on
                  Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland,
                  January 23-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3386},
  pages        = {288--301},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30580-4\_20},
  doi          = {10.1007/978-3-540-30580-4\_20},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DingS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DodisY05,
  author       = {Yevgeniy Dodis and
                  Aleksandr Yampolskiy},
  editor       = {Serge Vaudenay},
  title        = {A Verifiable Random Function with Short Proofs and Keys},
  booktitle    = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on
                  Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland,
                  January 23-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3386},
  pages        = {416--431},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30580-4\_28},
  doi          = {10.1007/978-3-540-30580-4\_28},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DodisY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Gjosteen05,
  author       = {Kristian Gj{\o}steen},
  editor       = {Serge Vaudenay},
  title        = {Symmetric Subgroup Membership Problems},
  booktitle    = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on
                  Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland,
                  January 23-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3386},
  pages        = {104--119},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30580-4\_8},
  doi          = {10.1007/978-3-540-30580-4\_8},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Gjosteen05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Granboulan05,
  author       = {Louis Granboulan},
  editor       = {Serge Vaudenay},
  title        = {A Generic Scheme Based on Trapdoor One-Way Permutations with Signatures
                  as Short as Possible},
  booktitle    = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on
                  Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland,
                  January 23-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3386},
  pages        = {302--312},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30580-4\_21},
  doi          = {10.1007/978-3-540-30580-4\_21},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Granboulan05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HayashiT05,
  author       = {Ryotaro Hayashi and
                  Keisuke Tanaka},
  editor       = {Serge Vaudenay},
  title        = {The Sampling Twice Technique for the RSA-Based Cryptosystems with
                  Anonymity},
  booktitle    = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on
                  Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland,
                  January 23-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3386},
  pages        = {216--233},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30580-4\_15},
  doi          = {10.1007/978-3-540-30580-4\_15},
  timestamp    = {Thu, 29 Mar 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HayashiT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/JonssonR05,
  author       = {Jakob Jonsson and
                  Matthew J. B. Robshaw},
  editor       = {Serge Vaudenay},
  title        = {Securing {RSA-KEM} via the {AES}},
  booktitle    = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on
                  Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland,
                  January 23-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3386},
  pages        = {29--46},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30580-4\_4},
  doi          = {10.1007/978-3-540-30580-4\_4},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/JonssonR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/JouxKMR05,
  author       = {Antoine Joux and
                  S{\'{e}}bastien Kunz{-}Jacques and
                  Fr{\'{e}}d{\'{e}}ric Muller and
                  Pierre{-}Michel Ricordel},
  editor       = {Serge Vaudenay},
  title        = {Cryptanalysis of the Tractable Rational Map Cryptosystem},
  booktitle    = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on
                  Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland,
                  January 23-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3386},
  pages        = {258--274},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30580-4\_18},
  doi          = {10.1007/978-3-540-30580-4\_18},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/JouxKMR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/NaccacheNTW05,
  author       = {David Naccache and
                  Phong Q. Nguyen and
                  Michael Tunstall and
                  Claire Whelan},
  editor       = {Serge Vaudenay},
  title        = {Experimenting with Faults, Lattices and the {DSA}},
  booktitle    = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on
                  Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland,
                  January 23-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3386},
  pages        = {16--28},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30580-4\_3},
  doi          = {10.1007/978-3-540-30580-4\_3},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/NaccacheNTW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/OgataKH05,
  author       = {Wakaha Ogata and
                  Kaoru Kurosawa and
                  Swee{-}Huay Heng},
  editor       = {Serge Vaudenay},
  title        = {The Security of the {FDH} Variant of Chaum's Undeniable Signature
                  Scheme},
  booktitle    = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on
                  Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland,
                  January 23-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3386},
  pages        = {328--345},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30580-4\_23},
  doi          = {10.1007/978-3-540-30580-4\_23},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/OgataKH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/OngK05,
  author       = {Emil Ong and
                  John Kubiatowicz},
  editor       = {Serge Vaudenay},
  title        = {Optimizing Robustness While Generating Shared Secret Safe Primes},
  booktitle    = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on
                  Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland,
                  January 23-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3386},
  pages        = {120--137},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30580-4\_9},
  doi          = {10.1007/978-3-540-30580-4\_9},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/OngK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Schindler05,
  author       = {Werner Schindler},
  editor       = {Serge Vaudenay},
  title        = {On the Optimization of Side-Channel Attacks by Advanced Stochastic
                  Methods},
  booktitle    = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on
                  Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland,
                  January 23-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3386},
  pages        = {85--103},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30580-4\_7},
  doi          = {10.1007/978-3-540-30580-4\_7},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Schindler05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/SteinfeldCWP05,
  author       = {Ron Steinfeld and
                  Scott Contini and
                  Huaxiong Wang and
                  Josef Pieprzyk},
  editor       = {Serge Vaudenay},
  title        = {Converse Results to the Wiener Attack on {RSA}},
  booktitle    = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on
                  Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland,
                  January 23-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3386},
  pages        = {184--198},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30580-4\_13},
  doi          = {10.1007/978-3-540-30580-4\_13},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/SteinfeldCWP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/SunY05,
  author       = {Hung{-}Min Sun and
                  Cheng{-}Ta Yang},
  editor       = {Serge Vaudenay},
  title        = {{RSA} with Balanced Short Exponents and Its Application to Entity
                  Authentication},
  booktitle    = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on
                  Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland,
                  January 23-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3386},
  pages        = {199--215},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30580-4\_14},
  doi          = {10.1007/978-3-540-30580-4\_14},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/SunY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/WangHLCY05,
  author       = {Lih{-}Chung Wang and
                  Yuh{-}Hua Hu and
                  Feipei Lai and
                  Chun{-}yen Chou and
                  Bo{-}Yin Yang},
  editor       = {Serge Vaudenay},
  title        = {Tractable Rational Map Signature},
  booktitle    = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on
                  Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland,
                  January 23-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3386},
  pages        = {244--257},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30580-4\_17},
  doi          = {10.1007/978-3-540-30580-4\_17},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/WangHLCY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/WolfP05,
  author       = {Christopher Wolf and
                  Bart Preneel},
  editor       = {Serge Vaudenay},
  title        = {Large Superfluous Keys in Multivariate Quadratic Asymmetric Systems},
  booktitle    = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on
                  Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland,
                  January 23-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3386},
  pages        = {275--287},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30580-4\_19},
  doi          = {10.1007/978-3-540-30580-4\_19},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/WolfP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/YacobiY05,
  author       = {Oded Yacobi and
                  Yacov Yacobi},
  editor       = {Serge Vaudenay},
  title        = {A New Related Message Attack on {RSA}},
  booktitle    = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on
                  Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland,
                  January 23-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3386},
  pages        = {1--8},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30580-4\_1},
  doi          = {10.1007/978-3-540-30580-4\_1},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/YacobiY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/YangGL05,
  author       = {Wu{-}Chuan Yang and
                  Dah{-}Jyh Guan and
                  Chi{-}Sung Laih},
  editor       = {Serge Vaudenay},
  title        = {Fast Multi-computations with Integer Similarity Strategy},
  booktitle    = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on
                  Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland,
                  January 23-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3386},
  pages        = {138--153},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30580-4\_10},
  doi          = {10.1007/978-3-540-30580-4\_10},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/YangGL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2005,
  editor       = {Serge Vaudenay},
  title        = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on
                  Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland,
                  January 23-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3386},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/b105124},
  doi          = {10.1007/B105124},
  isbn         = {3-540-24454-9},
  timestamp    = {Fri, 01 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AkishitaT04,
  author       = {Toru Akishita and
                  Tsuyoshi Takagi},
  editor       = {Feng Bao and
                  Robert H. Deng and
                  Jianying Zhou},
  title        = {On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using
                  Isogeny},
  booktitle    = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on
                  Theory and Practice in Public Key Cryptography, Singapore, March 1-4,
                  2004},
  series       = {Lecture Notes in Computer Science},
  volume       = {2947},
  pages        = {346--359},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24632-9\_25},
  doi          = {10.1007/978-3-540-24632-9\_25},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AkishitaT04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AmbainisJL04,
  author       = {Andris Ambainis and
                  Markus Jakobsson and
                  Helger Lipmaa},
  editor       = {Feng Bao and
                  Robert H. Deng and
                  Jianying Zhou},
  title        = {Cryptographic Randomized Response Techniques},
  booktitle    = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on
                  Theory and Practice in Public Key Cryptography, Singapore, March 1-4,
                  2004},
  series       = {Lecture Notes in Computer Science},
  volume       = {2947},
  pages        = {425--438},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24632-9\_31},
  doi          = {10.1007/978-3-540-24632-9\_31},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AmbainisJL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AvanziCS04,
  author       = {Roberto Maria Avanzi and
                  Mathieu Ciet and
                  Francesco Sica},
  editor       = {Feng Bao and
                  Robert H. Deng and
                  Jianying Zhou},
  title        = {Faster Scalar Multiplication on Koblitz Curves Combining Point Halving
                  with the Frobenius Endomorphism},
  booktitle    = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on
                  Theory and Practice in Public Key Cryptography, Singapore, March 1-4,
                  2004},
  series       = {Lecture Notes in Computer Science},
  volume       = {2947},
  pages        = {28--40},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24632-9\_3},
  doi          = {10.1007/978-3-540-24632-9\_3},
  timestamp    = {Thu, 07 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AvanziCS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BaekZ04,
  author       = {Joonsang Baek and
                  Yuliang Zheng},
  editor       = {Feng Bao and
                  Robert H. Deng and
                  Jianying Zhou},
  title        = {Identity-Based Threshold Decryption},
  booktitle    = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on
                  Theory and Practice in Public Key Cryptography, Singapore, March 1-4,
                  2004},
  series       = {Lecture Notes in Computer Science},
  volume       = {2947},
  pages        = {262--276},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24632-9\_19},
  doi          = {10.1007/978-3-540-24632-9\_19},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/BaekZ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BenjumeaLMT04,
  author       = {Vicente Benjumea and
                  Javier L{\'{o}}pez and
                  Jos{\'{e}} A. Montenegro and
                  Jos{\'{e}} M. Troya},
  editor       = {Feng Bao and
                  Robert H. Deng and
                  Jianying Zhou},
  title        = {A First Approach to Provide Anonymity in Attribute Certificates},
  booktitle    = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on
                  Theory and Practice in Public Key Cryptography, Singapore, March 1-4,
                  2004},
  series       = {Lecture Notes in Computer Science},
  volume       = {2947},
  pages        = {402--415},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24632-9\_29},
  doi          = {10.1007/978-3-540-24632-9\_29},
  timestamp    = {Thu, 29 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BenjumeaLMT04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BlomerM04,
  author       = {Johannes Bl{\"{o}}mer and
                  Alexander May},
  editor       = {Feng Bao and
                  Robert H. Deng and
                  Jianying Zhou},
  title        = {A Generalized Wiener Attack on {RSA}},
  booktitle    = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on
                  Theory and Practice in Public Key Cryptography, Singapore, March 1-4,
                  2004},
  series       = {Lecture Notes in Computer Science},
  volume       = {2947},
  pages        = {1--13},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24632-9\_1},
  doi          = {10.1007/978-3-540-24632-9\_1},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/BlomerM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BressonC04,
  author       = {Emmanuel Bresson and
                  Dario Catalano},
  editor       = {Feng Bao and
                  Robert H. Deng and
                  Jianying Zhou},
  title        = {Constant Round Authenticated Group Key Agreement via Distributed Computation},
  booktitle    = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on
                  Theory and Practice in Public Key Cryptography, Singapore, March 1-4,
                  2004},
  series       = {Lecture Notes in Computer Science},
  volume       = {2947},
  pages        = {115--129},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24632-9\_9},
  doi          = {10.1007/978-3-540-24632-9\_9},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BressonC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BressonCP04,
  author       = {Emmanuel Bresson and
                  Olivier Chevassut and
                  David Pointcheval},
  editor       = {Feng Bao and
                  Robert H. Deng and
                  Jianying Zhou},
  title        = {New Security Results on Encrypted Key Exchange},
  booktitle    = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on
                  Theory and Practice in Public Key Cryptography, Singapore, March 1-4,
                  2004},
  series       = {Lecture Notes in Computer Science},
  volume       = {2947},
  pages        = {145--158},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24632-9\_11},
  doi          = {10.1007/978-3-540-24632-9\_11},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/BressonCP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ChoiHL04,
  author       = {Kyu Young Choi and
                  Jung Yeon Hwang and
                  Dong Hoon Lee},
  editor       = {Feng Bao and
                  Robert H. Deng and
                  Jianying Zhou},
  title        = {Efficient ID-based Group Key Agreement with Bilinear Maps},
  booktitle    = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on
                  Theory and Practice in Public Key Cryptography, Singapore, March 1-4,
                  2004},
  series       = {Lecture Notes in Computer Science},
  volume       = {2947},
  pages        = {130--144},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24632-9\_10},
  doi          = {10.1007/978-3-540-24632-9\_10},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/ChoiHL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Coron04,
  author       = {Jean{-}S{\'{e}}bastien Coron},
  editor       = {Feng Bao and
                  Robert H. Deng and
                  Jianying Zhou},
  title        = {Cryptanalysis of a Public-Key Encryption Scheme Based on the Polynomial
                  Reconstruction Problem},
  booktitle    = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on
                  Theory and Practice in Public Key Cryptography, Singapore, March 1-4,
                  2004},
  series       = {Lecture Notes in Computer Science},
  volume       = {2947},
  pages        = {14--27},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24632-9\_2},
  doi          = {10.1007/978-3-540-24632-9\_2},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Coron04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Courtois04,
  author       = {Nicolas T. Courtois},
  editor       = {Feng Bao and
                  Robert H. Deng and
                  Jianying Zhou},
  title        = {Algebraic Attacks over GF(2\({}^{\mbox{k}}\)), Application to {HFE}
                  Challenge 2 and Sflash-v2},
  booktitle    = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on
                  Theory and Practice in Public Key Cryptography, Singapore, March 1-4,
                  2004},
  series       = {Lecture Notes in Computer Science},
  volume       = {2947},
  pages        = {201--217},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24632-9\_15},
  doi          = {10.1007/978-3-540-24632-9\_15},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Courtois04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Ding04,
  author       = {Jintai Ding},
  editor       = {Feng Bao and
                  Robert H. Deng and
                  Jianying Zhou},
  title        = {A New Variant of the Matsumoto-Imai Cryptosystem through Perturbation},
  booktitle    = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on
                  Theory and Practice in Public Key Cryptography, Singapore, March 1-4,
                  2004},
  series       = {Lecture Notes in Computer Science},
  volume       = {2947},
  pages        = {305--318},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24632-9\_22},
  doi          = {10.1007/978-3-540-24632-9\_22},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Ding04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ElwaillyGR04,
  author       = {Farid F. Elwailly and
                  Craig Gentry and
                  Zulfikar Ramzan},
  editor       = {Feng Bao and
                  Robert H. Deng and
                  Jianying Zhou},
  title        = {QuasiModo: Efficient Certificate Validation and Revocation},
  booktitle    = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on
                  Theory and Practice in Public Key Cryptography, Singapore, March 1-4,
                  2004},
  series       = {Lecture Notes in Computer Science},
  volume       = {2947},
  pages        = {375--388},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24632-9\_27},
  doi          = {10.1007/978-3-540-24632-9\_27},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/ElwaillyGR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FlonO04,
  author       = {St{\'{e}}phane Flon and
                  Roger Oyono},
  editor       = {Feng Bao and
                  Robert H. Deng and
                  Jianying Zhou},
  title        = {Fast Arithmetic on Jacobians of Picard Curves},
  booktitle    = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on
                  Theory and Practice in Public Key Cryptography, Singapore, March 1-4,
                  2004},
  series       = {Lecture Notes in Computer Science},
  volume       = {2947},
  pages        = {55--68},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24632-9\_5},
  doi          = {10.1007/978-3-540-24632-9\_5},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/FlonO04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Furukawa04,
  author       = {Jun Furukawa},
  editor       = {Feng Bao and
                  Robert H. Deng and
                  Jianying Zhou},
  title        = {Efficient, Verifiable Shuffle Decryption and Its Requirement of Unlinkability},
  booktitle    = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on
                  Theory and Practice in Public Key Cryptography, Singapore, March 1-4,
                  2004},
  series       = {Lecture Notes in Computer Science},
  volume       = {2947},
  pages        = {319--332},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24632-9\_23},
  doi          = {10.1007/978-3-540-24632-9\_23},
  timestamp    = {Sat, 30 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/Furukawa04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HayashiOT04,
  author       = {Ryotaro Hayashi and
                  Tatsuaki Okamoto and
                  Keisuke Tanaka},
  editor       = {Feng Bao and
                  Robert H. Deng and
                  Jianying Zhou},
  title        = {An {RSA} Family of Trap-Door Permutations with a Common Domain and
                  Its Applications},
  booktitle    = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on
                  Theory and Practice in Public Key Cryptography, Singapore, March 1-4,
                  2004},
  series       = {Lecture Notes in Computer Science},
  volume       = {2947},
  pages        = {291--304},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24632-9\_21},
  doi          = {10.1007/978-3-540-24632-9\_21},
  timestamp    = {Thu, 29 Mar 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HayashiOT04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/King04,
  author       = {Brian King},
  editor       = {Feng Bao and
                  Robert H. Deng and
                  Jianying Zhou},
  title        = {A Point Compression Method for Elliptic Curves Defined over {GF(2}
                  n)},
  booktitle    = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on
                  Theory and Practice in Public Key Cryptography, Singapore, March 1-4,
                  2004},
  series       = {Lecture Notes in Computer Science},
  volume       = {2947},
  pages        = {333--345},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24632-9\_24},
  doi          = {10.1007/978-3-540-24632-9\_24},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/King04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KogaS04,
  author       = {Satoshi Koga and
                  Kouichi Sakurai},
  editor       = {Feng Bao and
                  Robert H. Deng and
                  Jianying Zhou},
  title        = {A Distributed Online Certificate Status Protocol with a Single Public
                  Key},
  booktitle    = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on
                  Theory and Practice in Public Key Cryptography, Singapore, March 1-4,
                  2004},
  series       = {Lecture Notes in Computer Science},
  volume       = {2947},
  pages        = {389--401},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24632-9\_28},
  doi          = {10.1007/978-3-540-24632-9\_28},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/KogaS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KoshibaK04,
  author       = {Takeshi Koshiba and
                  Kaoru Kurosawa},
  editor       = {Feng Bao and
                  Robert H. Deng and
                  Jianying Zhou},
  title        = {Short Exponent Diffie-Hellman Problems},
  booktitle    = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on
                  Theory and Practice in Public Key Cryptography, Singapore, March 1-4,
                  2004},
  series       = {Lecture Notes in Computer Science},
  volume       = {2947},
  pages        = {173--186},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24632-9\_13},
  doi          = {10.1007/978-3-540-24632-9\_13},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/KoshibaK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KurosawaH04,
  author       = {Kaoru Kurosawa and
                  Swee{-}Huay Heng},
  editor       = {Feng Bao and
                  Robert H. Deng and
                  Jianying Zhou},
  title        = {From Digital Signature to ID-based Identification/Signature},
  booktitle    = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on
                  Theory and Practice in Public Key Cryptography, Singapore, March 1-4,
                  2004},
  series       = {Lecture Notes in Computer Science},
  volume       = {2947},
  pages        = {248--261},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24632-9\_18},
  doi          = {10.1007/978-3-540-24632-9\_18},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/KurosawaH04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LibertQ04,
  author       = {Beno{\^{\i}}t Libert and
                  Jean{-}Jacques Quisquater},
  editor       = {Feng Bao and
                  Robert H. Deng and
                  Jianying Zhou},
  title        = {Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups},
  booktitle    = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on
                  Theory and Practice in Public Key Cryptography, Singapore, March 1-4,
                  2004},
  series       = {Lecture Notes in Computer Science},
  volume       = {2947},
  pages        = {187--200},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24632-9\_14},
  doi          = {10.1007/978-3-540-24632-9\_14},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LibertQ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/May04,
  author       = {Alexander May},
  editor       = {Feng Bao and
                  Robert H. Deng and
                  Jianying Zhou},
  title        = {Secret Exponent Attacks on RSA-type Schemes with Moduli N= p\({}^{\mbox{r}}\)q},
  booktitle    = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on
                  Theory and Practice in Public Key Cryptography, Singapore, March 1-4,
                  2004},
  series       = {Lecture Notes in Computer Science},
  volume       = {2947},
  pages        = {218--230},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24632-9\_16},
  doi          = {10.1007/978-3-540-24632-9\_16},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/May04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/MishraS04,
  author       = {Pradeep Kumar Mishra and
                  Palash Sarkar},
  editor       = {Feng Bao and
                  Robert H. Deng and
                  Jianying Zhou},
  title        = {Application of Montgomery's Trick to Scalar Multiplication for Elliptic
                  and Hyperelliptic Curves Using a Fixed Base Point},
  booktitle    = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on
                  Theory and Practice in Public Key Cryptography, Singapore, March 1-4,
                  2004},
  series       = {Lecture Notes in Computer Science},
  volume       = {2947},
  pages        = {41--54},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24632-9\_4},
  doi          = {10.1007/978-3-540-24632-9\_4},
  timestamp    = {Tue, 04 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/MishraS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/MonneratV04,
  author       = {Jean Monnerat and
                  Serge Vaudenay},
  editor       = {Feng Bao and
                  Robert H. Deng and
                  Jianying Zhou},
  title        = {Undeniable Signatures Based on Characters: How to Sign with One Bit},
  booktitle    = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on
                  Theory and Practice in Public Key Cryptography, Singapore, March 1-4,
                  2004},
  series       = {Lecture Notes in Computer Science},
  volume       = {2947},
  pages        = {69--85},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24632-9\_6},
  doi          = {10.1007/978-3-540-24632-9\_6},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/MonneratV04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/PengBDV04,
  author       = {Kun Peng and
                  Colin Boyd and
                  Ed Dawson and
                  Kapalee Viswanathan},
  editor       = {Feng Bao and
                  Robert H. Deng and
                  Jianying Zhou},
  title        = {A Correct, Private, and Efficient Mix Network},
  booktitle    = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on
                  Theory and Practice in Public Key Cryptography, Singapore, March 1-4,
                  2004},
  series       = {Lecture Notes in Computer Science},
  volume       = {2947},
  pages        = {439--454},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24632-9\_32},
  doi          = {10.1007/978-3-540-24632-9\_32},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/PengBDV04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Safavi-NainiMY04,
  author       = {Reihaneh Safavi{-}Naini and
                  Luke McAven and
                  Moti Yung},
  editor       = {Feng Bao and
                  Robert H. Deng and
                  Jianying Zhou},
  title        = {General Group Authentication Codes and Their Relation to "Unconditionally-Secure
                  Signatures"},
  booktitle    = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on
                  Theory and Practice in Public Key Cryptography, Singapore, March 1-4,
                  2004},
  series       = {Lecture Notes in Computer Science},
  volume       = {2947},
  pages        = {231--247},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24632-9\_17},
  doi          = {10.1007/978-3-540-24632-9\_17},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Safavi-NainiMY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ShparlinskiW04,
  author       = {Igor E. Shparlinski and
                  Arne Winterhof},
  editor       = {Feng Bao and
                  Robert H. Deng and
                  Jianying Zhou},
  title        = {A Nonuniform Algorithm for the Hidden Number Problem in Subgroups},
  booktitle    = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on
                  Theory and Practice in Public Key Cryptography, Singapore, March 1-4,
                  2004},
  series       = {Lecture Notes in Computer Science},
  volume       = {2947},
  pages        = {416--424},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24632-9\_30},
  doi          = {10.1007/978-3-540-24632-9\_30},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/ShparlinskiW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/SteinfeldWP04,
  author       = {Ron Steinfeld and
                  Huaxiong Wang and
                  Josef Pieprzyk},
  editor       = {Feng Bao and
                  Robert H. Deng and
                  Jianying Zhou},
  title        = {Efficient Extension of Standard Schnorr/RSA Signatures into Universal
                  Designated-Verifier Signatures},
  booktitle    = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on
                  Theory and Practice in Public Key Cryptography, Singapore, March 1-4,
                  2004},
  series       = {Lecture Notes in Computer Science},
  volume       = {2947},
  pages        = {86--100},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24632-9\_7},
  doi          = {10.1007/978-3-540-24632-9\_7},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/SteinfeldWP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/VascoNS04,
  author       = {Mar{\'{\i}}a Isabel Gonz{\'{a}}lez Vasco and
                  Mats N{\"{a}}slund and
                  Igor E. Shparlinski},
  editor       = {Feng Bao and
                  Robert H. Deng and
                  Jianying Zhou},
  title        = {New Results on the Hardness of Diffie-Hellman Bits},
  booktitle    = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on
                  Theory and Practice in Public Key Cryptography, Singapore, March 1-4,
                  2004},
  series       = {Lecture Notes in Computer Science},
  volume       = {2947},
  pages        = {159--172},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24632-9\_12},
  doi          = {10.1007/978-3-540-24632-9\_12},
  timestamp    = {Mon, 31 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/VascoNS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ZhangHSI04,
  author       = {Rui Zhang and
                  Goichiro Hanaoka and
                  Junji Shikata and
                  Hideki Imai},
  editor       = {Feng Bao and
                  Robert H. Deng and
                  Jianying Zhou},
  title        = {On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?},
  booktitle    = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on
                  Theory and Practice in Public Key Cryptography, Singapore, March 1-4,
                  2004},
  series       = {Lecture Notes in Computer Science},
  volume       = {2947},
  pages        = {360--374},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24632-9\_26},
  doi          = {10.1007/978-3-540-24632-9\_26},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/ZhangHSI04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ZhangSS04,
  author       = {Fangguo Zhang and
                  Reihaneh Safavi{-}Naini and
                  Willy Susilo},
  editor       = {Feng Bao and
                  Robert H. Deng and
                  Jianying Zhou},
  title        = {An Efficient Signature Scheme from Bilinear Pairings and Its Applications},
  booktitle    = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on
                  Theory and Practice in Public Key Cryptography, Singapore, March 1-4,
                  2004},
  series       = {Lecture Notes in Computer Science},
  volume       = {2947},
  pages        = {277--290},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24632-9\_20},
  doi          = {10.1007/978-3-540-24632-9\_20},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/ZhangSS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Zhu04,
  author       = {Huafei Zhu},
  editor       = {Feng Bao and
                  Robert H. Deng and
                  Jianying Zhou},
  title        = {Constructing Committed Signatures from Strong-RSA Assumption in the
                  Standard Complexity Model},
  booktitle    = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on
                  Theory and Practice in Public Key Cryptography, Singapore, March 1-4,
                  2004},
  series       = {Lecture Notes in Computer Science},
  volume       = {2947},
  pages        = {101--114},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24632-9\_8},
  doi          = {10.1007/978-3-540-24632-9\_8},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Zhu04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2004,
  editor       = {Feng Bao and
                  Robert H. Deng and
                  Jianying Zhou},
  title        = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on
                  Theory and Practice in Public Key Cryptography, Singapore, March 1-4,
                  2004},
  series       = {Lecture Notes in Computer Science},
  volume       = {2947},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/b95631},
  doi          = {10.1007/B95631},
  isbn         = {3-540-21018-0},
  timestamp    = {Fri, 01 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AkkarCDG03,
  author       = {Mehdi{-}Laurent Akkar and
                  Nicolas T. Courtois and
                  Romain Duteuil and
                  Louis Goubin},
  editor       = {Yvo Desmedt},
  title        = {A Fast and Secure Implementation of Sflash},
  booktitle    = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on
                  Theory and Practice in Public Key Cryptography, Miami, FL, USA, January
                  6-8, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2567},
  pages        = {267--278},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36288-6\_20},
  doi          = {10.1007/3-540-36288-6\_20},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AkkarCDG03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AntipaBMSV03,
  author       = {Adrian Antipa and
                  Daniel R. L. Brown and
                  Alfred Menezes and
                  Ren{\'{e}} Struik and
                  Scott A. Vanstone},
  editor       = {Yvo Desmedt},
  title        = {Validation of Elliptic Curve Public Keys},
  booktitle    = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on
                  Theory and Practice in Public Key Cryptography, Miami, FL, USA, January
                  6-8, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2567},
  pages        = {211--223},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36288-6\_16},
  doi          = {10.1007/3-540-36288-6\_16},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AntipaBMSV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BellareBS03,
  author       = {Mihir Bellare and
                  Alexandra Boldyreva and
                  Jessica Staddon},
  editor       = {Yvo Desmedt},
  title        = {Randomness Re-use in Multi-recipient Encryption Schemeas},
  booktitle    = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on
                  Theory and Practice in Public Key Cryptography, Miami, FL, USA, January
                  6-8, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2567},
  pages        = {85--99},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36288-6\_7},
  doi          = {10.1007/3-540-36288-6\_7},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BellareBS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Boldyreva03,
  author       = {Alexandra Boldyreva},
  editor       = {Yvo Desmedt},
  title        = {Threshold Signatures, Multisignatures and Blind Signatures Based on
                  the Gap-Diffie-Hellman-Group Signature Scheme},
  booktitle    = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on
                  Theory and Practice in Public Key Cryptography, Miami, FL, USA, January
                  6-8, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2567},
  pages        = {31--46},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36288-6\_3},
  doi          = {10.1007/3-540-36288-6\_3},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Boldyreva03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BoydN03,
  author       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  editor       = {Yvo Desmedt},
  title        = {Round-Optimal Contributory Conference Key Agreement},
  booktitle    = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on
                  Theory and Practice in Public Key Cryptography, Miami, FL, USA, January
                  6-8, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2567},
  pages        = {161--174},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36288-6\_12},
  doi          = {10.1007/3-540-36288-6\_12},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BoydN03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ChaC03,
  author       = {Jae Choon Cha and
                  Jung Hee Cheon},
  editor       = {Yvo Desmedt},
  title        = {An Identity-Based Signature from Gap Diffie-Hellman Groups},
  booktitle    = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on
                  Theory and Practice in Public Key Cryptography, Miami, FL, USA, January
                  6-8, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2567},
  pages        = {18--30},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36288-6\_2},
  doi          = {10.1007/3-540-36288-6\_2},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/ChaC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Courtois03,
  author       = {Nicolas T. Courtois},
  editor       = {Yvo Desmedt},
  title        = {Generic Attacks and the Security of Quartz},
  booktitle    = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on
                  Theory and Practice in Public Key Cryptography, Miami, FL, USA, January
                  6-8, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2567},
  pages        = {351--364},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36288-6\_26},
  doi          = {10.1007/3-540-36288-6\_26},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Courtois03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CourtoisDF03,
  author       = {Nicolas T. Courtois and
                  Magnus Daum and
                  Patrick Felke},
  editor       = {Yvo Desmedt},
  title        = {On the Security of HFE, HFEv- and Quartz},
  booktitle    = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on
                  Theory and Practice in Public Key Cryptography, Miami, FL, USA, January
                  6-8, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2567},
  pages        = {337--350},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36288-6\_25},
  doi          = {10.1007/3-540-36288-6\_25},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/CourtoisDF03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Dodis03,
  author       = {Yevgeniy Dodis},
  editor       = {Yvo Desmedt},
  title        = {Efficient Construction of (Distributed) Verifiable Random Functions},
  booktitle    = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on
                  Theory and Practice in Public Key Cryptography, Miami, FL, USA, January
                  6-8, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2567},
  pages        = {1--17},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36288-6\_1},
  doi          = {10.1007/3-540-36288-6\_1},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Dodis03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DodisF03,
  author       = {Yevgeniy Dodis and
                  Nelly Fazio},
  editor       = {Yvo Desmedt},
  title        = {Public Key Trace and Revoke Scheme Secure against Adaptive Chosen
                  Ciphertext Attack},
  booktitle    = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on
                  Theory and Practice in Public Key Cryptography, Miami, FL, USA, January
                  6-8, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2567},
  pages        = {100--115},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36288-6\_8},
  doi          = {10.1007/3-540-36288-6\_8},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DodisF03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DodisKXY03,
  author       = {Yevgeniy Dodis and
                  Jonathan Katz and
                  Shouhuai Xu and
                  Moti Yung},
  editor       = {Yvo Desmedt},
  title        = {Strong Key-Insulated Signature Schemes},
  booktitle    = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on
                  Theory and Practice in Public Key Cryptography, Miami, FL, USA, January
                  6-8, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2567},
  pages        = {130--144},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36288-6\_10},
  doi          = {10.1007/3-540-36288-6\_10},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DodisKXY03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Fischlin03,
  author       = {Marc Fischlin},
  editor       = {Yvo Desmedt},
  title        = {The Cramer-Shoup Strong-RSASignature Scheme Revisited},
  booktitle    = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on
                  Theory and Practice in Public Key Cryptography, Miami, FL, USA, January
                  6-8, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2567},
  pages        = {116--129},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36288-6\_9},
  doi          = {10.1007/3-540-36288-6\_9},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Fischlin03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GalindoMMV03,
  author       = {David Galindo and
                  Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and
                  Paz Morillo and
                  Jorge Luis Villar},
  editor       = {Yvo Desmedt},
  title        = {A Practical Public Key Cryptosystem from Paillier and Rabin Schemes},
  booktitle    = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on
                  Theory and Practice in Public Key Cryptography, Miami, FL, USA, January
                  6-8, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2567},
  pages        = {279--291},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36288-6\_21},
  doi          = {10.1007/3-540-36288-6\_21},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/GalindoMMV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GeiselmannS03,
  author       = {Willi Geiselmann and
                  Rainer Steinwandt},
  editor       = {Yvo Desmedt},
  title        = {A Dedicated Sieving Hardware},
  booktitle    = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on
                  Theory and Practice in Public Key Cryptography, Miami, FL, USA, January
                  6-8, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2567},
  pages        = {254--266},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36288-6\_19},
  doi          = {10.1007/3-540-36288-6\_19},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/GeiselmannS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Goubin03,
  author       = {Louis Goubin},
  editor       = {Yvo Desmedt},
  title        = {A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems},
  booktitle    = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on
                  Theory and Practice in Public Key Cryptography, Miami, FL, USA, January
                  6-8, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2567},
  pages        = {199--210},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36288-6\_15},
  doi          = {10.1007/3-540-36288-6\_15},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Goubin03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Groth03,
  author       = {Jens Groth},
  editor       = {Yvo Desmedt},
  title        = {A Verifiable Secret Shuffle of Homomorphic Encryptions},
  booktitle    = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on
                  Theory and Practice in Public Key Cryptography, Miami, FL, USA, January
                  6-8, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2567},
  pages        = {145--160},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36288-6\_11},
  doi          = {10.1007/3-540-36288-6\_11},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Groth03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HofheinzS03,
  author       = {Dennis Hofheinz and
                  Rainer Steinwandt},
  editor       = {Yvo Desmedt},
  title        = {A Practical Attack on Some Braid Group Based Cryptographic Primitives},
  booktitle    = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on
                  Theory and Practice in Public Key Cryptography, Miami, FL, USA, January
                  6-8, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2567},
  pages        = {187--198},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36288-6\_14},
  doi          = {10.1007/3-540-36288-6\_14},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HofheinzS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/IzuT03,
  author       = {Tetsuya Izu and
                  Tsuyoshi Takagi},
  editor       = {Yvo Desmedt},
  title        = {Exceptional Procedure Attack on Elliptic Curve Cryptosystems},
  booktitle    = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on
                  Theory and Practice in Public Key Cryptography, Miami, FL, USA, January
                  6-8, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2567},
  pages        = {224--239},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36288-6\_17},
  doi          = {10.1007/3-540-36288-6\_17},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/IzuT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Kuhn03,
  author       = {Ulrich K{\"{u}}hn},
  editor       = {Yvo Desmedt},
  title        = {Side-Channel Attacks on Textbook {RSA} and ElGamal Encryption},
  booktitle    = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on
                  Theory and Practice in Public Key Cryptography, Miami, FL, USA, January
                  6-8, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2567},
  pages        = {324--336},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36288-6\_24},
  doi          = {10.1007/3-540-36288-6\_24},
  timestamp    = {Mon, 05 Mar 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/Kuhn03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/MacKenzie03,
  author       = {Philip D. MacKenzie},
  editor       = {Yvo Desmedt},
  title        = {An Efficient Two-Party Public Key Cryptosystem Secure against Adaptive
                  Chosen Ciphertext Attack},
  booktitle    = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on
                  Theory and Practice in Public Key Cryptography, Miami, FL, USA, January
                  6-8, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2567},
  pages        = {47--61},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36288-6\_4},
  doi          = {10.1007/3-540-36288-6\_4},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/MacKenzie03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/NaslundSW03,
  author       = {Mats N{\"{a}}slund and
                  Igor E. Shparlinski and
                  William Whyte},
  editor       = {Yvo Desmedt},
  title        = {On the Bit Security of NTRUEncrypt},
  booktitle    = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on
                  Theory and Practice in Public Key Cryptography, Miami, FL, USA, January
                  6-8, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2567},
  pages        = {62--70},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36288-6\_5},
  doi          = {10.1007/3-540-36288-6\_5},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/NaslundSW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/PaengJH03,
  author       = {Seong{-}Hun Paeng and
                  Bae Eun Jung and
                  Kil{-}Chan Ha},
  editor       = {Yvo Desmedt},
  title        = {A Lattice Based Public Key Cryptosystem Using Polynomial Representations},
  booktitle    = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on
                  Theory and Practice in Public Key Cryptography, Miami, FL, USA, January
                  6-8, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2567},
  pages        = {292--308},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36288-6\_22},
  doi          = {10.1007/3-540-36288-6\_22},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/PaengJH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Stam03,
  author       = {Martijn Stam},
  editor       = {Yvo Desmedt},
  title        = {On Montgomery-Like Representationsfor Elliptic Curves over GF(2\({}^{\mbox{k}}\))},
  booktitle    = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on
                  Theory and Practice in Public Key Cryptography, Miami, FL, USA, January
                  6-8, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2567},
  pages        = {240--253},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36288-6\_18},
  doi          = {10.1007/3-540-36288-6\_18},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Stam03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Tobias03,
  author       = {Christian Tobias},
  editor       = {Yvo Desmedt},
  title        = {Security Analysis of the {MOR} Cryptosystem},
  booktitle    = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on
                  Theory and Practice in Public Key Cryptography, Miami, FL, USA, January
                  6-8, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2567},
  pages        = {175--186},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36288-6\_13},
  doi          = {10.1007/3-540-36288-6\_13},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Tobias03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Vaudenay03,
  author       = {Serge Vaudenay},
  editor       = {Yvo Desmedt},
  title        = {The Security of {DSA} and {ECDSA}},
  booktitle    = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on
                  Theory and Practice in Public Key Cryptography, Miami, FL, USA, January
                  6-8, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2567},
  pages        = {309--323},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36288-6\_23},
  doi          = {10.1007/3-540-36288-6\_23},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Vaudenay03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/WatanabeSI03,
  author       = {Yodai Watanabe and
                  Junji Shikata and
                  Hideki Imai},
  editor       = {Yvo Desmedt},
  title        = {Equivalence between Semantic Security and Indistinguishability against
                  Chosen Ciphertext Attacks},
  booktitle    = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on
                  Theory and Practice in Public Key Cryptography, Miami, FL, USA, January
                  6-8, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2567},
  pages        = {71--84},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36288-6\_6},
  doi          = {10.1007/3-540-36288-6\_6},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/WatanabeSI03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AbeS02,
  author       = {Masayuki Abe and
                  Koutarou Suzuki},
  editor       = {David Naccache and
                  Pascal Paillier},
  title        = {M+1-st Price Auction Using Homomorphic Encryption},
  booktitle    = {Public Key Cryptography, 5th International Workshop on Practice and
                  Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February
                  12-14, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2274},
  pages        = {115--124},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45664-3\_8},
  doi          = {10.1007/3-540-45664-3\_8},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AbeS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BaekSZ02,
  author       = {Joonsang Baek and
                  Ron Steinfeld and
                  Yuliang Zheng},
  editor       = {David Naccache and
                  Pascal Paillier},
  title        = {Formal Proofs for the Security of Signcryption},
  booktitle    = {Public Key Cryptography, 5th International Workshop on Practice and
                  Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February
                  12-14, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2274},
  pages        = {80--98},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45664-3\_6},
  doi          = {10.1007/3-540-45664-3\_6},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/BaekSZ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BrierJ02,
  author       = {Eric Brier and
                  Marc Joye},
  editor       = {David Naccache and
                  Pascal Paillier},
  title        = {Weierstra{\ss} Elliptic Curves and Side-Channel Attacks},
  booktitle    = {Public Key Cryptography, 5th International Workshop on Practice and
                  Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February
                  12-14, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2274},
  pages        = {335--345},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45664-3\_24},
  doi          = {10.1007/3-540-45664-3\_24},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BrierJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CoronHJPPT02,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Helena Handschuh and
                  Marc Joye and
                  Pascal Paillier and
                  David Pointcheval and
                  Christophe Tymen},
  editor       = {David Naccache and
                  Pascal Paillier},
  title        = {Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages},
  booktitle    = {Public Key Cryptography, 5th International Workshop on Practice and
                  Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February
                  12-14, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2274},
  pages        = {17--33},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45664-3\_2},
  doi          = {10.1007/3-540-45664-3\_2},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/CoronHJPPT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CourtoisGMT02,
  author       = {Nicolas T. Courtois and
                  Louis Goubin and
                  Willi Meier and
                  Jean{-}Daniel Tacier},
  editor       = {David Naccache and
                  Pascal Paillier},
  title        = {Solving Underdefined Systems of Multivariate Quadratic Equations},
  booktitle    = {Public Key Cryptography, 5th International Workshop on Practice and
                  Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February
                  12-14, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2274},
  pages        = {211--227},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45664-3\_15},
  doi          = {10.1007/3-540-45664-3\_15},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/CourtoisGMT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DamgardJ02,
  author       = {Ivan Damg{\aa}rd and
                  Mads Jurik},
  editor       = {David Naccache and
                  Pascal Paillier},
  title        = {Client/Server Tradeoffs for Online Elections},
  booktitle    = {Public Key Cryptography, 5th International Workshop on Practice and
                  Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February
                  12-14, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2274},
  pages        = {125--140},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45664-3\_9},
  doi          = {10.1007/3-540-45664-3\_9},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DamgardJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HanaokaSZI02,
  author       = {Goichiro Hanaoka and
                  Junji Shikata and
                  Yuliang Zheng and
                  Hideki Imai},
  editor       = {David Naccache and
                  Pascal Paillier},
  title        = {Efficient and Unconditionally Secure Digital Signatures and a Security
                  Analysis of a Multireceiver Authentication Code},
  booktitle    = {Public Key Cryptography, 5th International Workshop on Practice and
                  Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February
                  12-14, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2274},
  pages        = {64--79},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45664-3\_5},
  doi          = {10.1007/3-540-45664-3\_5},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/HanaokaSZI02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/IzuT02,
  author       = {Tetsuya Izu and
                  Tsuyoshi Takagi},
  editor       = {David Naccache and
                  Pascal Paillier},
  title        = {A Fast Parallel Elliptic Curve Multiplication Resistant against Side
                  Channel Attacks},
  booktitle    = {Public Key Cryptography, 5th International Workshop on Practice and
                  Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February
                  12-14, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2274},
  pages        = {280--296},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45664-3\_20},
  doi          = {10.1007/3-540-45664-3\_20},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/IzuT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/JoyeY02,
  author       = {Marc Joye and
                  Sung{-}Ming Yen},
  editor       = {David Naccache and
                  Pascal Paillier},
  title        = {One-Way Cross-Trees and Their Applications},
  booktitle    = {Public Key Cryptography, 5th International Workshop on Practice and
                  Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February
                  12-14, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2274},
  pages        = {346--356},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45664-3\_25},
  doi          = {10.1007/3-540-45664-3\_25},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/JoyeY02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/JoyeY02a,
  author       = {Marc Joye and
                  Sung{-}Ming Yen},
  editor       = {David Naccache and
                  Pascal Paillier},
  title        = {New Minimal Modified Radix-r Representation with Applications to Smart
                  Cards},
  booktitle    = {Public Key Cryptography, 5th International Workshop on Practice and
                  Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February
                  12-14, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2274},
  pages        = {375--384},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45664-3\_27},
  doi          = {10.1007/3-540-45664-3\_27},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/JoyeY02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/JuelsG02,
  author       = {Ari Juels and
                  Jorge Guajardo},
  editor       = {David Naccache and
                  Pascal Paillier},
  title        = {{RSA} Key Generation with Verifiable Randomness},
  booktitle    = {Public Key Cryptography, 5th International Workshop on Practice and
                  Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February
                  12-14, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2274},
  pages        = {357--374},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45664-3\_26},
  doi          = {10.1007/3-540-45664-3\_26},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/JuelsG02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KiayiasY02,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  editor       = {David Naccache and
                  Pascal Paillier},
  title        = {Self-tallying Elections and Perfect Ballot Secrecy},
  booktitle    = {Public Key Cryptography, 5th International Workshop on Practice and
                  Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February
                  12-14, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2274},
  pages        = {141--158},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45664-3\_10},
  doi          = {10.1007/3-540-45664-3\_10},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/KiayiasY02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KobaraI02,
  author       = {Kazukuni Kobara and
                  Hideki Imai},
  editor       = {David Naccache and
                  Pascal Paillier},
  title        = {New Chosen-Plaintext Attacks on the One-Wayness of the Modified McEliece
                  {PKC} Proposed at Asiacrypt 2000},
  booktitle    = {Public Key Cryptography, 5th International Workshop on Practice and
                  Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February
                  12-14, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2274},
  pages        = {237--251},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45664-3\_17},
  doi          = {10.1007/3-540-45664-3\_17},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/KobaraI02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Koshiba02,
  author       = {Takeshi Koshiba},
  editor       = {David Naccache and
                  Pascal Paillier},
  title        = {On Sufficient Randomness for Secure Public-Key Cryptosystems},
  booktitle    = {Public Key Cryptography, 5th International Workshop on Practice and
                  Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February
                  12-14, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2274},
  pages        = {34--47},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45664-3\_3},
  doi          = {10.1007/3-540-45664-3\_3},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/Koshiba02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Kurosawa02,
  author       = {Kaoru Kurosawa},
  editor       = {David Naccache and
                  Pascal Paillier},
  title        = {Multi-recipient Public-Key Encryption with Shortened Ciphertext},
  booktitle    = {Public Key Cryptography, 5th International Workshop on Practice and
                  Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February
                  12-14, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2274},
  pages        = {48--63},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45664-3\_4},
  doi          = {10.1007/3-540-45664-3\_4},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Kurosawa02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KurosawaY02,
  author       = {Kaoru Kurosawa and
                  Takuya Yoshida},
  editor       = {David Naccache and
                  Pascal Paillier},
  title        = {Linear Code Implies Public-Key Traitor Tracing},
  booktitle    = {Public Key Cryptography, 5th International Workshop on Practice and
                  Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February
                  12-14, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2274},
  pages        = {172--187},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45664-3\_12},
  doi          = {10.1007/3-540-45664-3\_12},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/KurosawaY02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LeeDZ02,
  author       = {Chan H. Lee and
                  Xiaotie Deng and
                  Huafei Zhu},
  editor       = {David Naccache and
                  Pascal Paillier},
  title        = {Design and Security Analysis of Anonymous Group Identification Protocols},
  booktitle    = {Public Key Cryptography, 5th International Workshop on Practice and
                  Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February
                  12-14, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2274},
  pages        = {188--198},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45664-3\_13},
  doi          = {10.1007/3-540-45664-3\_13},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/LeeDZ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LenstraS02,
  author       = {Arjen K. Lenstra and
                  Igor E. Shparlinski},
  editor       = {David Naccache and
                  Pascal Paillier},
  title        = {Selective Forgery of {RSA} Signatures with Fixed-Pattern Padding},
  booktitle    = {Public Key Cryptography, 5th International Workshop on Practice and
                  Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February
                  12-14, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2274},
  pages        = {228--236},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45664-3\_16},
  doi          = {10.1007/3-540-45664-3\_16},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LenstraS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/MaitlandB02,
  author       = {Greg Maitland and
                  Colin Boyd},
  editor       = {David Naccache and
                  Pascal Paillier},
  title        = {A Provably Secure Restrictive Partially Blind Signature Scheme},
  booktitle    = {Public Key Cryptography, 5th International Workshop on Practice and
                  Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February
                  12-14, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2274},
  pages        = {99--114},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45664-3\_7},
  doi          = {10.1007/3-540-45664-3\_7},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/MaitlandB02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Novak02,
  author       = {Roman Novak},
  editor       = {David Naccache and
                  Pascal Paillier},
  title        = {SPA-Based Adaptive Chosen-Ciphertext Attack on {RSA} Implementation},
  booktitle    = {Public Key Cryptography, 5th International Workshop on Practice and
                  Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February
                  12-14, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2274},
  pages        = {252--262},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45664-3\_18},
  doi          = {10.1007/3-540-45664-3\_18},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Novak02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ParkJKL02,
  author       = {Young{-}Ho Park and
                  Sangtae Jeong and
                  Chang Han Kim and
                  Jongin Lim},
  editor       = {David Naccache and
                  Pascal Paillier},
  title        = {An Alternate Decomposition of an Integer for Faster Point Multiplication
                  on Certain Elliptic Curves},
  booktitle    = {Public Key Cryptography, 5th International Workshop on Practice and
                  Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February
                  12-14, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2274},
  pages        = {323--334},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45664-3\_23},
  doi          = {10.1007/3-540-45664-3\_23},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/ParkJKL02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ParkOLLS02,
  author       = {Young{-}Ho Park and
                  Sangho Oh and
                  Sangjin Lee and
                  Jongin Lim and
                  Maenghee Sung},
  editor       = {David Naccache and
                  Pascal Paillier},
  title        = {An Improved Method of Multiplication on Certain Elliptic Curves},
  booktitle    = {Public Key Cryptography, 5th International Workshop on Practice and
                  Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February
                  12-14, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2274},
  pages        = {310--322},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45664-3\_22},
  doi          = {10.1007/3-540-45664-3\_22},
  timestamp    = {Sat, 26 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/ParkOLLS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Preneel02,
  author       = {Bart Preneel},
  editor       = {David Naccache and
                  Pascal Paillier},
  title        = {New European Schemes for Signature, Integrity and Encryption {(NESSIE):}
                  {A} Status Report},
  booktitle    = {Public Key Cryptography, 5th International Workshop on Practice and
                  Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February
                  12-14, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2274},
  pages        = {297--309},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45664-3\_21},
  doi          = {10.1007/3-540-45664-3\_21},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Preneel02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/QuisquaterPV02,
  author       = {Micha{\"{e}}l Quisquater and
                  Bart Preneel and
                  Joos Vandewalle},
  editor       = {David Naccache and
                  Pascal Paillier},
  title        = {On the Security of the Threshold Scheme Based on the Chinese Remainder
                  Theorem},
  booktitle    = {Public Key Cryptography, 5th International Workshop on Practice and
                  Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February
                  12-14, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2274},
  pages        = {199--210},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45664-3\_14},
  doi          = {10.1007/3-540-45664-3\_14},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/QuisquaterPV02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/SakuraiT02,
  author       = {Kouichi Sakurai and
                  Tsuyoshi Takagi},
  editor       = {David Naccache and
                  Pascal Paillier},
  title        = {New Semantically Secure Public-Key Cryptosystems from the RSA-Primitive},
  booktitle    = {Public Key Cryptography, 5th International Workshop on Practice and
                  Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February
                  12-14, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2274},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45664-3\_1},
  doi          = {10.1007/3-540-45664-3\_1},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/SakuraiT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Schindler02,
  author       = {Werner Schindler},
  editor       = {David Naccache and
                  Pascal Paillier},
  title        = {A Combined Timing and Power Attack},
  booktitle    = {Public Key Cryptography, 5th International Workshop on Practice and
                  Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February
                  12-14, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2274},
  pages        = {263--279},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45664-3\_19},
  doi          = {10.1007/3-540-45664-3\_19},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Schindler02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Tzeng02,
  author       = {Wen{-}Guey Tzeng},
  editor       = {David Naccache and
                  Pascal Paillier},
  title        = {Efficient 1-Out-n Oblivious Transfer Schemes},
  booktitle    = {Public Key Cryptography, 5th International Workshop on Practice and
                  Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February
                  12-14, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2274},
  pages        = {159--171},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45664-3\_11},
  doi          = {10.1007/3-540-45664-3\_11},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Tzeng02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2002,
  editor       = {David Naccache and
                  Pascal Paillier},
  title        = {Public Key Cryptography, 5th International Workshop on Practice and
                  Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February
                  12-14, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2274},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45664-3},
  doi          = {10.1007/3-540-45664-3},
  isbn         = {3-540-43168-3},
  timestamp    = {Fri, 01 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/2002.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2003,
  editor       = {Yvo Desmedt},
  title        = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on
                  Theory and Practice in Public Key Cryptography, Miami, FL, USA, January
                  6-8, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2567},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36288-6},
  doi          = {10.1007/3-540-36288-6},
  isbn         = {3-540-00324-X},
  timestamp    = {Fri, 01 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/2003.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AbeH01,
  author       = {Masayuki Abe and
                  Fumitaka Hoshino},
  editor       = {Kwangjo Kim},
  title        = {Remarks on Mix-Network Based on Permutation Networks},
  booktitle    = {Public Key Cryptography, 4th International Workshop on Practice and
                  Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea,
                  February 13-15, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1992},
  pages        = {317--324},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44586-2\_23},
  doi          = {10.1007/3-540-44586-2\_23},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AbeH01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AnsperBRW01,
  author       = {Arne Ansper and
                  Ahto Buldas and
                  Meelis Roos and
                  Jan Willemson},
  editor       = {Kwangjo Kim},
  title        = {Efficient Long-Term Validation of Digital Signatures},
  booktitle    = {Public Key Cryptography, 4th International Workshop on Practice and
                  Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea,
                  February 13-15, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1992},
  pages        = {402--415},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44586-2\_29},
  doi          = {10.1007/3-540-44586-2\_29},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AnsperBRW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BaoDGSSW01,
  author       = {Feng Bao and
                  Robert H. Deng and
                  Willi Geiselmann and
                  Claus{-}Peter Schnorr and
                  Rainer Steinwandt and
                  Hongjun Wu},
  editor       = {Kwangjo Kim},
  title        = {Cryptanalysis of Two Sparse Polynomial Based Public Key Cryptosystems},
  booktitle    = {Public Key Cryptography, 4th International Workshop on Practice and
                  Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea,
                  February 13-15, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1992},
  pages        = {153--164},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44586-2\_11},
  doi          = {10.1007/3-540-44586-2\_11},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/BaoDGSSW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BressonS01,
  author       = {Emmanuel Bresson and
                  Jacques Stern},
  editor       = {Kwangjo Kim},
  title        = {Efficient Revocation in Group Signatures},
  booktitle    = {Public Key Cryptography, 4th International Workshop on Practice and
                  Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea,
                  February 13-15, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1992},
  pages        = {190--206},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44586-2\_15},
  doi          = {10.1007/3-540-44586-2\_15},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BressonS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DamgardJ01,
  author       = {Ivan Damg{\aa}rd and
                  Mads Jurik},
  editor       = {Kwangjo Kim},
  title        = {A Generalisation, a Simplification and Some Applications of Paillier's
                  Probabilistic Public-Key System},
  booktitle    = {Public Key Cryptography, 4th International Workshop on Practice and
                  Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea,
                  February 13-15, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1992},
  pages        = {119--136},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44586-2\_9},
  doi          = {10.1007/3-540-44586-2\_9},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DamgardJ01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DesmedtBS01,
  author       = {Yvo Desmedt and
                  Mike Burmester and
                  Jennifer Seberry},
  editor       = {Kwangjo Kim},
  title        = {Equitability in Retroactive Data Confiscation versus Proactive Key
                  Escrow},
  booktitle    = {Public Key Cryptography, 4th International Workshop on Practice and
                  Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea,
                  February 13-15, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1992},
  pages        = {277--286},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44586-2\_20},
  doi          = {10.1007/3-540-44586-2\_20},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DesmedtBS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FouqueS01,
  author       = {Pierre{-}Alain Fouque and
                  Jacques Stern},
  editor       = {Kwangjo Kim},
  title        = {One Round Threshold Discrete-Log Key Generation without Private Channels},
  booktitle    = {Public Key Cryptography, 4th International Workshop on Practice and
                  Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea,
                  February 13-15, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1992},
  pages        = {300--316},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44586-2\_22},
  doi          = {10.1007/3-540-44586-2\_22},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/FouqueS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FrankelMY01,
  author       = {Yair Frankel and
                  Philip D. MacKenzie and
                  Moti Yung},
  editor       = {Kwangjo Kim},
  title        = {Adaptive Security for the Additive-Sharing Based Proactive {RSA}},
  booktitle    = {Public Key Cryptography, 4th International Workshop on Practice and
                  Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea,
                  February 13-15, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1992},
  pages        = {240--263},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44586-2\_18},
  doi          = {10.1007/3-540-44586-2\_18},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/FrankelMY01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GeiselmannL01,
  author       = {Willi Geiselmann and
                  Harald Lukhaub},
  editor       = {Kwangjo Kim},
  title        = {Redundant Representation of Finite Fields},
  booktitle    = {Public Key Cryptography, 4th International Workshop on Practice and
                  Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea,
                  February 13-15, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1992},
  pages        = {339--352},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44586-2\_25},
  doi          = {10.1007/3-540-44586-2\_25},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/GeiselmannL01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GuajardoBKP01,
  author       = {Jorge Guajardo and
                  Rainer Bl{\"{u}}mel and
                  Uwe Krieger and
                  Christof Paar},
  editor       = {Kwangjo Kim},
  title        = {Efficient Implementation of Elliptic Curve Cryptosystems on the {TI}
                  {MSP} 430x33x Family of Microcontrollers},
  booktitle    = {Public Key Cryptography, 4th International Workshop on Practice and
                  Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea,
                  February 13-15, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1992},
  pages        = {365--382},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44586-2\_27},
  doi          = {10.1007/3-540-44586-2\_27},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/GuajardoBKP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/JakobssonW01,
  author       = {Markus Jakobsson and
                  Susanne Wetzel},
  editor       = {Kwangjo Kim},
  title        = {Secure Server-Aided Signature Generation},
  booktitle    = {Public Key Cryptography, 4th International Workshop on Practice and
                  Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea,
                  February 13-15, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1992},
  pages        = {383--401},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44586-2\_28},
  doi          = {10.1007/3-540-44586-2\_28},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/JakobssonW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/JaulmesJ01,
  author       = {{\'{E}}liane Jaulmes and
                  Antoine Joux},
  editor       = {Kwangjo Kim},
  title        = {Cryptanalysis of {PKP:} {A} New Approach},
  booktitle    = {Public Key Cryptography, 4th International Workshop on Practice and
                  Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea,
                  February 13-15, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1992},
  pages        = {165--172},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44586-2\_12},
  doi          = {10.1007/3-540-44586-2\_12},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/JaulmesJ01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/JoyeT01,
  author       = {Marc Joye and
                  Christophe Tymen},
  editor       = {Kwangjo Kim},
  title        = {Compact Encoding of Non-adjacent Forms with Applications to Elliptic
                  Curve Cryptography},
  booktitle    = {Public Key Cryptography, 4th International Workshop on Practice and
                  Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea,
                  February 13-15, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1992},
  pages        = {353--364},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44586-2\_26},
  doi          = {10.1007/3-540-44586-2\_26},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/JoyeT01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KimL01,
  author       = {Chong Hee Kim and
                  Pil Joong Lee},
  editor       = {Kwangjo Kim},
  title        = {New Key Recovery in {WAKE} Protocol},
  booktitle    = {Public Key Cryptography, 4th International Workshop on Practice and
                  Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea,
                  February 13-15, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1992},
  pages        = {325--338},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44586-2\_24},
  doi          = {10.1007/3-540-44586-2\_24},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/KimL01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KobaraI01,
  author       = {Kazukuni Kobara and
                  Hideki Imai},
  editor       = {Kwangjo Kim},
  title        = {Semantically Secure McEliece Public-Key Cryptosystems-Conversions
                  for McEliece {PKC}},
  booktitle    = {Public Key Cryptography, 4th International Workshop on Practice and
                  Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea,
                  February 13-15, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1992},
  pages        = {19--35},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44586-2\_2},
  doi          = {10.1007/3-540-44586-2\_2},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/KobaraI01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KomakiWHI01,
  author       = {Hirotaka Komaki and
                  Yuji Watanabe and
                  Goichiro Hanaoka and
                  Hideki Imai},
  editor       = {Kwangjo Kim},
  title        = {Efficient Asymmetric Self-Enforcement Scheme with Public Traceability},
  booktitle    = {Public Key Cryptography, 4th International Workshop on Practice and
                  Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea,
                  February 13-15, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1992},
  pages        = {225--239},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44586-2\_17},
  doi          = {10.1007/3-540-44586-2\_17},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/KomakiWHI01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Koshiba01,
  author       = {Takeshi Koshiba},
  editor       = {Kwangjo Kim},
  title        = {A New Aspect for Security Notions: Secure Randomness in Public-Key
                  Encryption Schemes},
  booktitle    = {Public Key Cryptography, 4th International Workshop on Practice and
                  Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea,
                  February 13-15, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1992},
  pages        = {87--103},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44586-2\_7},
  doi          = {10.1007/3-540-44586-2\_7},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Koshiba01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KuglerV01,
  author       = {Dennis K{\"{u}}gler and
                  Holger Vogt},
  editor       = {Kwangjo Kim},
  title        = {Marking: {A} Privacy Protecting Approach Against Blackmailing},
  booktitle    = {Public Key Cryptography, 4th International Workshop on Practice and
                  Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea,
                  February 13-15, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1992},
  pages        = {137--152},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44586-2\_10},
  doi          = {10.1007/3-540-44586-2\_10},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/KuglerV01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KurosawaOMM01,
  author       = {Kaoru Kurosawa and
                  Wakaha Ogata and
                  Toshihiko Matsuo and
                  Shuichi Makishima},
  editor       = {Kwangjo Kim},
  title        = {{IND-CCA} Public Key Schemes Equivalent to Factoring n=pq},
  booktitle    = {Public Key Cryptography, 4th International Workshop on Practice and
                  Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea,
                  February 13-15, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1992},
  pages        = {36--47},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44586-2\_3},
  doi          = {10.1007/3-540-44586-2\_3},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/KurosawaOMM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LenstraS01,
  author       = {Arjen K. Lenstra and
                  Igor E. Shparlinski},
  editor       = {Kwangjo Kim},
  title        = {On the Security of Lenstra's Variant of {DSA} without Long Inversions},
  booktitle    = {Public Key Cryptography, 4th International Workshop on Practice and
                  Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea,
                  February 13-15, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1992},
  pages        = {64--72},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44586-2\_5},
  doi          = {10.1007/3-540-44586-2\_5},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LenstraS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LenstraV01,
  author       = {Arjen K. Lenstra and
                  Eric R. Verheul},
  editor       = {Kwangjo Kim},
  title        = {Fast Irreducibility and Subgroup Membership Testing in {XTR}},
  booktitle    = {Public Key Cryptography, 4th International Workshop on Practice and
                  Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea,
                  February 13-15, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1992},
  pages        = {73--86},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44586-2\_6},
  doi          = {10.1007/3-540-44586-2\_6},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LenstraV01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/MoshopoulosP01,
  author       = {Nikos K. Moshopoulos and
                  Kiamal Z. Pekmestzi},
  editor       = {Kwangjo Kim},
  title        = {A Novel Systolic Architecture for Efficient {RSA} Implementation},
  booktitle    = {Public Key Cryptography, 4th International Workshop on Practice and
                  Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea,
                  February 13-15, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1992},
  pages        = {416--421},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44586-2\_30},
  doi          = {10.1007/3-540-44586-2\_30},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/MoshopoulosP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Muller01,
  author       = {Siguna M{\"{u}}ller},
  editor       = {Kwangjo Kim},
  title        = {On the Security of Williams Based Public Key Encryption Scheme},
  booktitle    = {Public Key Cryptography, 4th International Workshop on Practice and
                  Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea,
                  February 13-15, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1992},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44586-2\_1},
  doi          = {10.1007/3-540-44586-2\_1},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Muller01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/OkamotoP01,
  author       = {Tatsuaki Okamoto and
                  David Pointcheval},
  editor       = {Kwangjo Kim},
  title        = {The Gap-Problems: {A} New Class of Problems for the Security of Cryptographic
                  Schemes},
  booktitle    = {Public Key Cryptography, 4th International Workshop on Practice and
                  Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea,
                  February 13-15, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1992},
  pages        = {104--118},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44586-2\_8},
  doi          = {10.1007/3-540-44586-2\_8},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/OkamotoP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Steinwandt01,
  author       = {Rainer Steinwandt},
  editor       = {Kwangjo Kim},
  title        = {Loopholes in Two Public Key Cryptosystems Using the Modular Group},
  booktitle    = {Public Key Cryptography, 4th International Workshop on Practice and
                  Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea,
                  February 13-15, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1992},
  pages        = {180--189},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44586-2\_14},
  doi          = {10.1007/3-540-44586-2\_14},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Steinwandt01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/TzengT01,
  author       = {Wen{-}Guey Tzeng and
                  Zhi{-}Jia Tzeng},
  editor       = {Kwangjo Kim},
  title        = {A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic
                  Shares},
  booktitle    = {Public Key Cryptography, 4th International Workshop on Practice and
                  Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea,
                  February 13-15, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1992},
  pages        = {207--224},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44586-2\_16},
  doi          = {10.1007/3-540-44586-2\_16},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/TzengT01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/TzengT01a,
  author       = {Wen{-}Guey Tzeng and
                  Zhi{-}Jia Tzeng},
  editor       = {Kwangjo Kim},
  title        = {Robust Forward-Secure Signature Schemes with Proactive Security},
  booktitle    = {Public Key Cryptography, 4th International Workshop on Practice and
                  Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea,
                  February 13-15, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1992},
  pages        = {264--276},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44586-2\_19},
  doi          = {10.1007/3-540-44586-2\_19},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/TzengT01a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/WuBD01,
  author       = {Hongjun Wu and
                  Feng Bao and
                  Robert H. Deng},
  editor       = {Kwangjo Kim},
  title        = {Cryptanalysis of a Digital Signature Scheme on ID-Based Key-Sharing
                  Infrastructures},
  booktitle    = {Public Key Cryptography, 4th International Workshop on Practice and
                  Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea,
                  February 13-15, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1992},
  pages        = {173--179},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44586-2\_13},
  doi          = {10.1007/3-540-44586-2\_13},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/WuBD01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Young01,
  author       = {Adam L. Young and
                  Moti Yung},
  editor       = {Kwangjo Kim},
  title        = {A {PVSS} as Hard as Discrete Log and Shareholder Separability},
  booktitle    = {Public Key Cryptography, 4th International Workshop on Practice and
                  Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea,
                  February 13-15, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1992},
  pages        = {287--299},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44586-2\_21},
  doi          = {10.1007/3-540-44586-2\_21},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Young01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Zheng01,
  author       = {Yuliang Zheng},
  editor       = {Kwangjo Kim},
  title        = {Identification, Signature and Signcryption Using High Order Residues
                  Modulo an {RSA} Composite},
  booktitle    = {Public Key Cryptography, 4th International Workshop on Practice and
                  Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea,
                  February 13-15, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1992},
  pages        = {48--63},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44586-2\_4},
  doi          = {10.1007/3-540-44586-2\_4},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/Zheng01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2001,
  editor       = {Kwangjo Kim},
  title        = {Public Key Cryptography, 4th International Workshop on Practice and
                  Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea,
                  February 13-15, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1992},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44586-2},
  doi          = {10.1007/3-540-44586-2},
  isbn         = {3-540-41658-7},
  timestamp    = {Fri, 01 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/2001.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Arita00,
  author       = {Seigo Arita},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Gaudry's Variant against C\({}_{\mbox{ab}}\) Curves},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {58--67},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_5},
  doi          = {10.1007/978-3-540-46588-1\_5},
  timestamp    = {Tue, 30 Nov 2021 15:21:24 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/Arita00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BanksLS00,
  author       = {William D. Banks and
                  Daniel Lieman and
                  Igor E. Shparlinski},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {An Identification Scheme Based on Sparse Polynomials},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {68--74},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_6},
  doi          = {10.1007/978-3-540-46588-1\_6},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BanksLS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BohannonJS00,
  author       = {Philip Bohannon and
                  Markus Jakobsson and
                  Sukamol Srikwan},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Cryptographic Approaches to Provacy in Forensic {DNA} Databases},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {373--390},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_25},
  doi          = {10.1007/978-3-540-46588-1\_25},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BohannonJS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BrickellPVY00,
  author       = {Ernest F. Brickell and
                  David Pointcheval and
                  Serge Vaudenay and
                  Moti Yung},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Design Validations for Discrete Logarithm Based Signature Schemes},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {276--292},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_19},
  doi          = {10.1007/978-3-540-46588-1\_19},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/BrickellPVY00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BuldasLS00,
  author       = {Ahto Buldas and
                  Helger Lipmaa and
                  Berry Schoenmakers},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Optimally Efficient Accountable Time-Stamping},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {293--305},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_20},
  doi          = {10.1007/978-3-540-46588-1\_20},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BuldasLS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BurmesterDDMOTY00,
  author       = {Mike Burmester and
                  Yvo Desmedt and
                  Hiroshi Doi and
                  Masahiro Mambo and
                  Eiji Okamoto and
                  Mitsuru Tada and
                  Yuko Yoshifuji},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {A Structured ElGamal-Type Multisignature Scheme},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {466--483},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_31},
  doi          = {10.1007/978-3-540-46588-1\_31},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BurmesterDDMOTY00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CramerDM00,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Philip D. MacKenzie},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Efficient Zero-Knowledge Proofs of Knowledge Without Intractability
                  Assumptions},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {354--373},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_24},
  doi          = {10.1007/978-3-540-46588-1\_24},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/CramerDM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FrankelMY00,
  author       = {Yair Frankel and
                  Philip D. MacKenzie and
                  Moti Yung},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {"Psyeudorandom Intermixing": {A} Tool for Shared Cryptography},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {306--325},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_21},
  doi          = {10.1007/978-3-540-46588-1\_21},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/FrankelMY00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GasskoGM00,
  author       = {Irene Gassko and
                  Peter Gemmell and
                  Philip D. MacKenzie},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Efficient and Fresh Cerification},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {342--353},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_23},
  doi          = {10.1007/978-3-540-46588-1\_23},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/GasskoGM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HuhnleinM00,
  author       = {Detlef H{\"{u}}hnlein and
                  Johannes Merkle},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {An Efficient NICE-Schnorr-Type Signature Scheme},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {14--27},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_2},
  doi          = {10.1007/978-3-540-46588-1\_2},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HuhnleinM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/InoueS00,
  author       = {Toro Inoue and
                  Kouichi Sakurai},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Making Hash Functions From Block Ciphers Secure and Efficient by Using
                  Convolutional Codes},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {391--404},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_26},
  doi          = {10.1007/978-3-540-46588-1\_26},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/InoueS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/IzuKY00,
  author       = {Tetsuya Izu and
                  Jun Kogure and
                  Kazuhiro Yokoyama},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Efficient Implementation of Schoof's Algorithm in Case of Characteristic
                  2},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {210--222},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_15},
  doi          = {10.1007/978-3-540-46588-1\_15},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/IzuKY00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KohlasM00,
  author       = {Reto Kohlas and
                  Ueli M. Maurer},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Confidence Valuation in a Public-Key Infrastructure Based on Uncertain
                  Evidence},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {93--112},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_8},
  doi          = {10.1007/978-3-540-46588-1\_8},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/KohlasM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LenstraV00,
  author       = {Arjen K. Lenstra and
                  Eric R. Verheul},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Selecting Cryptographic Key Sizes},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {446--465},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_30},
  doi          = {10.1007/978-3-540-46588-1\_30},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LenstraV00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LimH00,
  author       = {Chae Hoon Lim and
                  Hyo Sun Hwang},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Fast Implementation of Elliptic Curve Arithmetic in GF(p\({}^{\mbox{n}}\))},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {405--421},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_27},
  doi          = {10.1007/978-3-540-46588-1\_27},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LimH00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LiuOHC00,
  author       = {Chuchang Liu and
                  Maris A. Ozols and
                  Marie Henderson and
                  Anthony Cant},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {A State-Based Model for Certificate Management Systems},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {75--92},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_7},
  doi          = {10.1007/978-3-540-46588-1\_7},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LiuOHC00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/OkeyaS00,
  author       = {Katsuyuki Okeya and
                  Hiroyuki Kurumatani and
                  Kouichi Sakurai},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Elliptic Curves with the Montgomery-Form and Their Cryptographic Applications},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {238--257},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_17},
  doi          = {10.1007/978-3-540-46588-1\_17},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/OkeyaS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ParkBD00,
  author       = {Juanma Gonz{\'{a}}lez Nieto and
                  DongGook Park and
                  Colin Boyd and
                  Ed Dawson},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Key Recovery in Third Generation Wireless Communication Systems},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {223--237},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_16},
  doi          = {10.1007/978-3-540-46588-1\_16},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/ParkBD00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ParkBM00,
  author       = {DongGook Park and
                  Colin Boyd and
                  Sang{-}Jae Moon},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Forward Secrecy and Its Application to Future Mobile Communications
                  Security},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {433--445},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_29},
  doi          = {10.1007/978-3-540-46588-1\_29},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/ParkBM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/PastuszakMS00,
  author       = {Jaroslaw Pastuszak and
                  Dariusz Michatek and
                  Josef Pieprzyk and
                  Jennifer Seberry},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Identification of Bad Signatures in Batches},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {28--45},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_3},
  doi          = {10.1007/978-3-540-46588-1\_3},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/PastuszakMS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Pointcheval00,
  author       = {David Pointcheval},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {The Composite Discrete Logarithm and Secure Authentication},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {113--128},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_9},
  doi          = {10.1007/978-3-540-46588-1\_9},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/Pointcheval00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Pointcheval00a,
  author       = {David Pointcheval},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Chosen-Ciphertext Security for Any One-Way Cryptosystem},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {129--146},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_10},
  doi          = {10.1007/978-3-540-46588-1\_10},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/Pointcheval00a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/PoupardS00,
  author       = {Guillaume Poupard and
                  Jacques Stern},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Short Proofs of Knowledge for Factoring},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {147--166},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_11},
  doi          = {10.1007/978-3-540-46588-1\_11},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/PoupardS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Sako00,
  author       = {Kazue Sako},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {An Auction Protocol Which Hides Bids of Losers},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {422--432},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_28},
  doi          = {10.1007/978-3-540-46588-1\_28},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Sako00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ShinSR00,
  author       = {Sang{-}Uk Shin and
                  Weon Shin and
                  Kyung Hyune Rhee},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {All-or-Nothing Transform and Remotely Keyed Encription Protocols},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {178--195},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_13},
  doi          = {10.1007/978-3-540-46588-1\_13},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/ShinSR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Tzeng00,
  author       = {Wen{-}Guey Tzeng},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {A Practical and Secure-Fault-Tolerant Conferenc-Key Agreement Protocol},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {1--13},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_1},
  doi          = {10.1007/978-3-540-46588-1\_1},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Tzeng00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Verheul00,
  author       = {Eric R. Verheul},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Certificates of Recoverability with Scale Recovery Agent Security},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {258--275},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_18},
  doi          = {10.1007/978-3-540-46588-1\_18},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Verheul00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/WangHCTCC00,
  author       = {Xiaoyun Wang and
                  Lucas Chi Kwong Hui and
                  Kam{-}Pui Chow and
                  Wai Wan Tsang and
                  C. F. Chong and
                  H. W. Chan},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Secure and Practical Tree-Structure Signature Schemes Based on Discrete
                  Logarithms},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {167--177},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_12},
  doi          = {10.1007/978-3-540-46588-1\_12},
  timestamp    = {Wed, 10 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/WangHCTCC00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/WenSM00,
  author       = {Wu Wen and
                  Takamichi Saito and
                  Fumio Mizoguchi},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Security of Public Key Certificate Based Authentication Protocols},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {196--209},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_14},
  doi          = {10.1007/978-3-540-46588-1\_14},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/WenSM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/YoungY00,
  author       = {Adam L. Young and
                  Moti Yung},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {RSA-Based Auto-recoverable Cryptosystems},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {326--341},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_22},
  doi          = {10.1007/978-3-540-46588-1\_22},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/YoungY00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ZhouDB00,
  author       = {Jianying Zhou and
                  Robert H. Deng and
                  Feng Bao},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Some Remarks on a Fair Exchange Protocol},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {46--57},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_4},
  doi          = {10.1007/978-3-540-46588-1\_4},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/ZhouDB00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2000,
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/b75033},
  doi          = {10.1007/B75033},
  isbn         = {3-540-66967-1},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/2000.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BaoD99,
  author       = {Feng Bao and
                  Robert H. Deng},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {A New type of "Magic Ink" Signatures - Towards Transcript-Irrelevant
                  Anonymity Revocation},
  booktitle    = {Public Key Cryptography, Second International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan,
                  March 1-3, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1560},
  pages        = {1--11},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-49162-7\_1},
  doi          = {10.1007/3-540-49162-7\_1},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/BaoD99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Blake-WilsonM99,
  author       = {Simon Blake{-}Wilson and
                  Alfred Menezes},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Unknown Key-Share Attacks on the Station-to-Station {(STS)} Protocol},
  booktitle    = {Public Key Cryptography, Second International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan,
                  March 1-3, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1560},
  pages        = {154--170},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-49162-7\_12},
  doi          = {10.1007/3-540-49162-7\_12},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/Blake-WilsonM99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Coron99,
  author       = {Jean{-}S{\'{e}}bastien Coron},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {On the Security of Random Sources},
  booktitle    = {Public Key Cryptography, Second International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan,
                  March 1-3, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1560},
  pages        = {29--42},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-49162-7\_3},
  doi          = {10.1007/3-540-49162-7\_3},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Coron99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CoronN99,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  David Naccache},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {On the Security of {RSA} Screening},
  booktitle    = {Public Key Cryptography, Second International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan,
                  March 1-3, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1560},
  pages        = {197--203},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-49162-7\_15},
  doi          = {10.1007/3-540-49162-7\_15},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/CoronN99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CoupeNS99,
  author       = {Christophe Coup{\'{e}} and
                  Phong Q. Nguyen and
                  Jacques Stern},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {The Effectiveness of Lattice Attacks Against Low-Exponent {RSA}},
  booktitle    = {Public Key Cryptography, Second International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan,
                  March 1-3, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1560},
  pages        = {204--218},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-49162-7\_16},
  doi          = {10.1007/3-540-49162-7\_16},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/CoupeNS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Ferrer99,
  author       = {Josep Domingo{-}Ferrer},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Anonymous Fingerprinting Based on Committed Oblivious Transfer},
  booktitle    = {Public Key Cryptography, Second International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan,
                  March 1-3, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1560},
  pages        = {43--52},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-49162-7\_4},
  doi          = {10.1007/3-540-49162-7\_4},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Ferrer99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FujisakiO99,
  author       = {Eiichiro Fujisaki and
                  Tatsuaki Okamoto},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {How to Enhance the Security of Public-Key Encryption at Minimum Cost},
  booktitle    = {Public Key Cryptography, Second International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan,
                  March 1-3, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1560},
  pages        = {53--68},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-49162-7\_5},
  doi          = {10.1007/3-540-49162-7\_5},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/FujisakiO99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GamageLZ99,
  author       = {Chandana Gamage and
                  Jussipekka Leiwo and
                  Yuliang Zheng},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Encrypted Message Authentication by Firewalls},
  booktitle    = {Public Key Cryptography, Second International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan,
                  March 1-3, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1560},
  pages        = {69--81},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-49162-7\_6},
  doi          = {10.1007/3-540-49162-7\_6},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/GamageLZ99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HadaT99,
  author       = {Satoshi Hada and
                  Toshiaki Tanaka},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {A Relationship between One-Wayness and Correlation Intractability},
  booktitle    = {Public Key Cryptography, Second International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan,
                  March 1-3, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1560},
  pages        = {82--96},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-49162-7\_7},
  doi          = {10.1007/3-540-49162-7\_7},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HadaT99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HandschuhTY99,
  author       = {Helena Handschuh and
                  Yiannis Tsiounis and
                  Moti Yung},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Decision Oracles are Equivalent to Matching Oracles},
  booktitle    = {Public Key Cryptography, Second International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan,
                  March 1-3, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1560},
  pages        = {276--289},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-49162-7\_22},
  doi          = {10.1007/3-540-49162-7\_22},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HandschuhTY99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Jakobsson99,
  author       = {Markus Jakobsson},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {On Quorum Controlled Asymmetric Proxy Re-encryption},
  booktitle    = {Public Key Cryptography, Second International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan,
                  March 1-3, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1560},
  pages        = {112--121},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-49162-7\_9},
  doi          = {10.1007/3-540-49162-7\_9},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Jakobsson99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Jakobsson99a,
  author       = {Markus Jakobsson},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Mini-Cash: {A} Minimalistic Approach to E-Commerce},
  booktitle    = {Public Key Cryptography, Second International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan,
                  March 1-3, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1560},
  pages        = {122--135},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-49162-7\_10},
  doi          = {10.1007/3-540-49162-7\_10},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Jakobsson99a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LeL99,
  author       = {Chang{-}Hyi Le and
                  Jong In Lim},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {A New Aspect of Dual Basis for Efficient Field Arithmetic},
  booktitle    = {Public Key Cryptography, Second International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan,
                  March 1-3, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1560},
  pages        = {12--28},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-49162-7\_2},
  doi          = {10.1007/3-540-49162-7\_2},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/LeL99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LeeK99,
  author       = {Hyung{-}Woo Lee and
                  Tai{-}Yun Kim},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Message Recovery Fair Blind Signature},
  booktitle    = {Public Key Cryptography, Second International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan,
                  March 1-3, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1560},
  pages        = {97--111},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-49162-7\_8},
  doi          = {10.1007/3-540-49162-7\_8},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LeeK99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/MiyazakiKS99,
  author       = {Shingo Miyazaki and
                  Ikuko Kuroda and
                  Kouichi Sakurai},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Toward Fair International Key Escrow},
  booktitle    = {Public Key Cryptography, Second International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan,
                  March 1-3, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1560},
  pages        = {171--187},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-49162-7\_13},
  doi          = {10.1007/3-540-49162-7\_13},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/MiyazakiKS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/NaccacheSS99,
  author       = {David Naccache and
                  Adi Shamir and
                  Julien P. Stern},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {How to Copyright a Function?},
  booktitle    = {Public Key Cryptography, Second International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan,
                  March 1-3, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1560},
  pages        = {188--196},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-49162-7\_14},
  doi          = {10.1007/3-540-49162-7\_14},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/NaccacheSS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/NikanderKP99,
  author       = {Pekka Nikander and
                  Yki Kortesniemi and
                  Jonna Partanen},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Preserving Privacy in Distributed Delegation with Fast Certificates},
  booktitle    = {Public Key Cryptography, Second International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan,
                  March 1-3, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1560},
  pages        = {136--153},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-49162-7\_11},
  doi          = {10.1007/3-540-49162-7\_11},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/NikanderKP99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Paillier99,
  author       = {Pascal Paillier},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {A Trapdoor Permutation Equivalent to Factoring},
  booktitle    = {Public Key Cryptography, Second International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan,
                  March 1-3, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1560},
  pages        = {219--222},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-49162-7\_17},
  doi          = {10.1007/3-540-49162-7\_17},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Paillier99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Paillier99a,
  author       = {Pascal Paillier},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Low-Cost Double-Size Modular Exponentiation or How to Stretch Your
                  Cryptoprocessor},
  booktitle    = {Public Key Cryptography, Second International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan,
                  March 1-3, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1560},
  pages        = {223--234},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-49162-7\_18},
  doi          = {10.1007/3-540-49162-7\_18},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Paillier99a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Paillier99b,
  author       = {Pascal Paillier},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Evaluating Differential Fault Analysis of Unknown Cryptosystems},
  booktitle    = {Public Key Cryptography, Second International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan,
                  March 1-3, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1560},
  pages        = {235--244},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-49162-7\_19},
  doi          = {10.1007/3-540-49162-7\_19},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Paillier99b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/RubiaCM99,
  author       = {Montse Rubia and
                  Juan Carlos Cruellas and
                  Manuel Medina},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Removing Interoperability Barriers Between the {X.509} and {EDIFACT}
                  Public Key Infrastructures: The {DEDICA} Project},
  booktitle    = {Public Key Cryptography, Second International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan,
                  March 1-3, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1560},
  pages        = {245--262},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-49162-7\_20},
  doi          = {10.1007/3-540-49162-7\_20},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/RubiaCM99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ShinRY99,
  author       = {Sang{-}Uk Shin and
                  Kyung Hyune Rhee and
                  Jae Woo Yoon},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Hash Functions and the {MAC} Using All-or-Nothing Property},
  booktitle    = {Public Key Cryptography, Second International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan,
                  March 1-3, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1560},
  pages        = {263--275},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-49162-7\_21},
  doi          = {10.1007/3-540-49162-7\_21},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/ShinRY99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/WatanabeI99,
  author       = {Yuji Watanabe and
                  Hideki Imai},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Shared Generation of Random Number with Timestamp: How to Cope with
                  the Leakage of the CA's Secret},
  booktitle    = {Public Key Cryptography, Second International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan,
                  March 1-3, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1560},
  pages        = {290--305},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-49162-7\_23},
  doi          = {10.1007/3-540-49162-7\_23},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/WatanabeI99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/YoungY99,
  author       = {Adam L. Young and
                  Moti Yung},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Auto-Recoverable Cryptosystems with Faster Initialization and the
                  Escrow Hierarchy},
  booktitle    = {Public Key Cryptography, Second International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan,
                  March 1-3, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1560},
  pages        = {306--314},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-49162-7\_24},
  doi          = {10.1007/3-540-49162-7\_24},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/YoungY99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ZhouL99,
  author       = {Jianying Zhou and
                  Kwok{-}Yan Lam},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {A Secure Pay-per View Scheme for Web-Based Video Service},
  booktitle    = {Public Key Cryptography, Second International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan,
                  March 1-3, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1560},
  pages        = {315--326},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-49162-7\_25},
  doi          = {10.1007/3-540-49162-7\_25},
  timestamp    = {Sun, 07 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/ZhouL99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/1999,
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Public Key Cryptography, Second International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} '99, Kamakura, Japan,
                  March 1-3, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1560},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-49162-7},
  doi          = {10.1007/3-540-49162-7},
  isbn         = {3-540-65644-8},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/1999.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ArakiSM98,
  author       = {Kiyomichi Araki and
                  Takakazu Satoh and
                  Shinji Miura},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Overview of Elliptic Curve Cryptography},
  booktitle    = {Public Key Cryptography, First International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} '98, Pacifico Yokohama,
                  Japan, February 5-6, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1431},
  pages        = {29--49},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0054012},
  doi          = {10.1007/BFB0054012},
  timestamp    = {Tue, 30 Nov 2021 15:21:24 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/ArakiSM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BaoD98,
  author       = {Feng Bao and
                  Robert H. Deng},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {A Signcryption Scheme with Signature Directly Verifiable by Public
                  Key},
  booktitle    = {Public Key Cryptography, First International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} '98, Pacifico Yokohama,
                  Japan, February 5-6, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1431},
  pages        = {55--59},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0054014},
  doi          = {10.1007/BFB0054014},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BaoD98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ChangLHL98,
  author       = {Chin{-}Chen Chang and
                  Jyh{-}Jong Leu and
                  Pai{-}Cheng Huang and
                  Wei{-}Bin Lee},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {A Scheme for Obtaining a Message from the Digital Multisignature},
  booktitle    = {Public Key Cryptography, First International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} '98, Pacifico Yokohama,
                  Japan, February 5-6, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1431},
  pages        = {154--163},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0054022},
  doi          = {10.1007/BFB0054022},
  timestamp    = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/ChangLHL98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CheonPPK98,
  author       = {Jung Hee Cheon and
                  Sung{-}Mo Park and
                  Sangwoo Park and
                  Daeho Kim},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Two Efficient Algorithms for Arithmetic of Elliptic Curves Using Frobenius
                  Map},
  booktitle    = {Public Key Cryptography, First International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} '98, Pacifico Yokohama,
                  Japan, February 5-6, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1431},
  pages        = {195--202},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0054025},
  doi          = {10.1007/BFB0054025},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/CheonPPK98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DavidS98,
  author       = {Michael W. David and
                  Kouichi Sakurai},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Security Issues for Contactless Smart Cards},
  booktitle    = {Public Key Cryptography, First International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} '98, Pacifico Yokohama,
                  Japan, February 5-6, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1431},
  pages        = {247--252},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0054029},
  doi          = {10.1007/BFB0054029},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DavidS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FrankelY98,
  author       = {Yair Frankel and
                  Moti Yung},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Distributed Public Key Cryptosystems},
  booktitle    = {Public Key Cryptography, First International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} '98, Pacifico Yokohama,
                  Japan, February 5-6, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1431},
  pages        = {1--13},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0054010},
  doi          = {10.1007/BFB0054010},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/FrankelY98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HasegawaNM98,
  author       = {Toshio Hasegawa and
                  Junko Nakajima and
                  Mitsuru Matsui},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {A Practical Implementation of Elliptic Curve Cryptosystems over GF(p)
                  on a 16-bit Microcomputer},
  booktitle    = {Public Key Cryptography, First International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} '98, Pacifico Yokohama,
                  Japan, February 5-6, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1431},
  pages        = {182--194},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0054024},
  doi          = {10.1007/BFB0054024},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HasegawaNM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HiroseY98,
  author       = {Shoichi Hirose and
                  Susumu Yoshida},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {An Authenticated Diffie-Hellman Key Agreement Protocol Secure Against
                  Active Attacks},
  booktitle    = {Public Key Cryptography, First International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} '98, Pacifico Yokohama,
                  Japan, February 5-6, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1431},
  pages        = {135--148},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0054020},
  doi          = {10.1007/BFB0054020},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HiroseY98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/IzuKNY98,
  author       = {Tetsuya Izu and
                  Jun Kogure and
                  Masayuki Noro and
                  Kazuhiro Yokoyama},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Parameters for Secure Elliptic Curve Cryptosystem - Improvements on
                  Schoof's Algorithm},
  booktitle    = {Public Key Cryptography, First International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} '98, Pacifico Yokohama,
                  Japan, February 5-6, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1431},
  pages        = {253--257},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0054030},
  doi          = {10.1007/BFB0054030},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/IzuKNY98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LehtiN98,
  author       = {Ilari Lehti and
                  Pekka Nikander},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Certifying Trust},
  booktitle    = {Public Key Cryptography, First International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} '98, Pacifico Yokohama,
                  Japan, February 5-6, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1431},
  pages        = {83--98},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0054017},
  doi          = {10.1007/BFB0054017},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LehtiN98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/MamboS98,
  author       = {Masahiro Mambo and
                  Hiroki Shizuya},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {A Note on the Complexity of Breaking Okamoto-Tanaka ID-Based Key Exchange
                  Scheme},
  booktitle    = {Public Key Cryptography, First International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} '98, Pacifico Yokohama,
                  Japan, February 5-6, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1431},
  pages        = {258--262},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0054031},
  doi          = {10.1007/BFB0054031},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/MamboS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Mao98,
  author       = {Wenbo Mao},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Guaranteed Correct Sharing of Integer Factorization with Off-Line
                  Shareholders},
  booktitle    = {Public Key Cryptography, First International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} '98, Pacifico Yokohama,
                  Japan, February 5-6, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1431},
  pages        = {60--71},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0054015},
  doi          = {10.1007/BFB0054015},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Mao98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/MerkleW98,
  author       = {Johannes Merkle and
                  Ralph Werchner},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {On the Security of Server-Aided {RSA} Protocols},
  booktitle    = {Public Key Cryptography, First International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} '98, Pacifico Yokohama,
                  Japan, February 5-6, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1431},
  pages        = {99--116},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0054018},
  doi          = {10.1007/BFB0054018},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/MerkleW98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/MihaljevicZI98,
  author       = {Miodrag J. Mihaljevic and
                  Yuliang Zheng and
                  Hideki Imai},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {A Cellular Automaton Based Fast One-Way Hash Function Suitable for
                  Hardware Implementation},
  booktitle    = {Public Key Cryptography, First International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} '98, Pacifico Yokohama,
                  Japan, February 5-6, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1431},
  pages        = {217--233},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0054027},
  doi          = {10.1007/BFB0054027},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/MihaljevicZI98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Misarsky98,
  author       = {Jean{-}Fran{\c{c}}ois Misarsky},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {How (not) to Design {RSA} Signature Schemes},
  booktitle    = {Public Key Cryptography, First International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} '98, Pacifico Yokohama,
                  Japan, February 5-6, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1431},
  pages        = {14--28},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0054011},
  doi          = {10.1007/BFB0054011},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Misarsky98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Okamoto98,
  author       = {Tatsuaki Okamoto and
                  Moti Yung},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Lower Bounds on Term-Based Divisible Cash Systems},
  booktitle    = {Public Key Cryptography, First International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} '98, Pacifico Yokohama,
                  Japan, February 5-6, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1431},
  pages        = {72--82},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0054016},
  doi          = {10.1007/BFB0054016},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Okamoto98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/SaeedniaS98,
  author       = {Shahrokh Saeednia and
                  Reihaneh Safavi{-}Naini},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {On the Security of Girault's Identification Scheme},
  booktitle    = {Public Key Cryptography, First International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} '98, Pacifico Yokohama,
                  Japan, February 5-6, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1431},
  pages        = {149--153},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0054021},
  doi          = {10.1007/BFB0054021},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/SaeedniaS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/SakaiSI98,
  author       = {Yasuyuki Sakai and
                  Kouichi Sakurai and
                  Hirokazu Ishizuka},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Secure Hyperelliptic Cryptosystems and Their Performances},
  booktitle    = {Public Key Cryptography, First International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} '98, Pacifico Yokohama,
                  Japan, February 5-6, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1431},
  pages        = {164--181},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0054023},
  doi          = {10.1007/BFB0054023},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/SakaiSI98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ShinRRL98,
  author       = {Sang{-}Uk Shin and
                  Kyung Hyune Rhee and
                  DaeHyun Ryu and
                  Sangjin Lee},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {A New Hash Function Based on MDx-Family and Its Application to {MAC}},
  booktitle    = {Public Key Cryptography, First International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} '98, Pacifico Yokohama,
                  Japan, February 5-6, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1431},
  pages        = {234--246},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0054028},
  doi          = {10.1007/BFB0054028},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/ShinRRL98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Stern98,
  author       = {Jacques Stern},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Lattices and Cryptography: An Overview},
  booktitle    = {Public Key Cryptography, First International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} '98, Pacifico Yokohama,
                  Japan, February 5-6, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1431},
  pages        = {50--54},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0054013},
  doi          = {10.1007/BFB0054013},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Stern98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/TsiounisY98,
  author       = {Yiannis Tsiounis and
                  Moti Yung},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {On the Security of ElGamal Based Encryption},
  booktitle    = {Public Key Cryptography, First International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} '98, Pacifico Yokohama,
                  Japan, February 5-6, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1431},
  pages        = {117--134},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0054019},
  doi          = {10.1007/BFB0054019},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/TsiounisY98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Yamamura98,
  author       = {Akihiro Yamamura},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Public-Key Cryptosystems Using the Modular Group},
  booktitle    = {Public Key Cryptography, First International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} '98, Pacifico Yokohama,
                  Japan, February 5-6, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1431},
  pages        = {203--216},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0054026},
  doi          = {10.1007/BFB0054026},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Yamamura98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/1998,
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Public Key Cryptography, First International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} '98, Pacifico Yokohama,
                  Japan, February 5-6, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1431},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0054009},
  doi          = {10.1007/BFB0054009},
  isbn         = {3-540-64693-0},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/1998.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics