default search action
Search dblp for Publications
export results for "toc:db/conf/scn/scn2016.bht:"
@inproceedings{DBLP:conf/scn/AttrapadungHOOW16, author = {Nuttapong Attrapadung and Goichiro Hanaoka and Kazuto Ogawa and Go Ohtake and Hajime Watanabe and Shota Yamada}, editor = {Vassilis Zikas and Roberto De Prisco}, title = {Attribute-Based Encryption for Range Attributes}, booktitle = {Security and Cryptography for Networks - 10th International Conference, {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9841}, pages = {42--61}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44618-9\_3}, doi = {10.1007/978-3-319-44618-9\_3}, timestamp = {Thu, 23 Jun 2022 19:58:57 +0200}, biburl = {https://dblp.org/rec/conf/scn/AttrapadungHOOW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/Baum16, author = {Carsten Baum}, editor = {Vassilis Zikas and Roberto De Prisco}, title = {On Garbling Schemes with and Without Privacy}, booktitle = {Security and Cryptography for Networks - 10th International Conference, {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9841}, pages = {468--485}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44618-9\_25}, doi = {10.1007/978-3-319-44618-9\_25}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/Baum16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/Beierle16, author = {Christof Beierle}, editor = {Vassilis Zikas and Roberto De Prisco}, title = {Pen and Paper Arguments for {SIMON} and SIMON-like Designs}, booktitle = {Security and Cryptography for Networks - 10th International Conference, {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9841}, pages = {431--446}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44618-9\_23}, doi = {10.1007/978-3-319-44618-9\_23}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/Beierle16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/BeimelFP16, author = {Amos Beimel and Oriol Farr{\`{a}}s and Naty Peter}, editor = {Vassilis Zikas and Roberto De Prisco}, title = {Secret Sharing Schemes for Dense Forbidden Graphs}, booktitle = {Security and Cryptography for Networks - 10th International Conference, {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9841}, pages = {509--528}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44618-9\_27}, doi = {10.1007/978-3-319-44618-9\_27}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scn/BeimelFP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/BiagioniMV16, author = {Silvio Biagioni and Daniel Masny and Daniele Venturi}, editor = {Vassilis Zikas and Roberto De Prisco}, title = {Naor-Yung Paradigm with Shared Randomness and Applications}, booktitle = {Security and Cryptography for Networks - 10th International Conference, {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9841}, pages = {62--80}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44618-9\_4}, doi = {10.1007/978-3-319-44618-9\_4}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/BiagioniMV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/BoldyrevaKLW16, author = {Alexandra Boldyreva and Taesoo Kim and Richard J. Lipton and Bogdan Warinschi}, editor = {Vassilis Zikas and Roberto De Prisco}, title = {Provably-Secure Remote Memory Attestation for Heap Overflow Protection}, booktitle = {Security and Cryptography for Networks - 10th International Conference, {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9841}, pages = {83--103}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44618-9\_5}, doi = {10.1007/978-3-319-44618-9\_5}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/BoldyrevaKLW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/BradleyFT16, author = {Tatiana Bradley and Sky Faber and Gene Tsudik}, editor = {Vassilis Zikas and Roberto De Prisco}, title = {Bounded Size-Hiding Private Set Intersection}, booktitle = {Security and Cryptography for Networks - 10th International Conference, {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9841}, pages = {449--467}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44618-9\_24}, doi = {10.1007/978-3-319-44618-9\_24}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/BradleyFT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/BrakerskiD16, author = {Zvika Brakerski and Or Dagmi}, editor = {Vassilis Zikas and Roberto De Prisco}, title = {Shorter Circuit Obfuscation in Challenging Security Models}, booktitle = {Security and Cryptography for Networks - 10th International Conference, {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9841}, pages = {551--570}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44618-9\_29}, doi = {10.1007/978-3-319-44618-9\_29}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/BrakerskiD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/CamenischEM16, author = {Jan Camenisch and Robert R. Enderlein and Ueli Maurer}, editor = {Vassilis Zikas and Roberto De Prisco}, title = {Memory Erasability Amplification}, booktitle = {Security and Cryptography for Networks - 10th International Conference, {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9841}, pages = {104--125}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44618-9\_6}, doi = {10.1007/978-3-319-44618-9\_6}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/CamenischEM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/CamenischLNS16, author = {Jan Camenisch and Anja Lehmann and Gregory Neven and Kai Samelin}, editor = {Vassilis Zikas and Roberto De Prisco}, title = {Virtual Smart Cards: How to Sign with a Password and a Server}, booktitle = {Security and Cryptography for Networks - 10th International Conference, {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9841}, pages = {353--371}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44618-9\_19}, doi = {10.1007/978-3-319-44618-9\_19}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/CamenischLNS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/CatalanoRF16, author = {Dario Catalano and Mario Di Raimondo and Simone Faro}, editor = {Vassilis Zikas and Roberto De Prisco}, title = {Verifiable Pattern Matching on Outsourced Texts}, booktitle = {Security and Cryptography for Networks - 10th International Conference, {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9841}, pages = {333--350}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44618-9\_18}, doi = {10.1007/978-3-319-44618-9\_18}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/CatalanoRF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/ChenLR16, author = {Jie Chen and Beno{\^{\i}}t Libert and Somindu C. Ramanna}, editor = {Vassilis Zikas and Roberto De Prisco}, title = {Non-zero Inner Product Encryption with Short Ciphertexts and Private Keys}, booktitle = {Security and Cryptography for Networks - 10th International Conference, {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9841}, pages = {23--41}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44618-9\_2}, doi = {10.1007/978-3-319-44618-9\_2}, timestamp = {Wed, 16 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/ChenLR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/ChoudhuryOPS16, author = {Ashish Choudhury and Emmanuela Orsini and Arpita Patra and Nigel P. Smart}, editor = {Vassilis Zikas and Roberto De Prisco}, title = {Linear Overhead Optimally-Resilient Robust {MPC} Using Preprocessing}, booktitle = {Security and Cryptography for Networks - 10th International Conference, {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9841}, pages = {147--168}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44618-9\_8}, doi = {10.1007/978-3-319-44618-9\_8}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/ChoudhuryOPS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/CohenP16, author = {Ran Cohen and Chris Peikert}, editor = {Vassilis Zikas and Roberto De Prisco}, title = {On Adaptively Secure Multiparty Computation with a Short {CRS}}, booktitle = {Security and Cryptography for Networks - 10th International Conference, {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9841}, pages = {129--146}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44618-9\_7}, doi = {10.1007/978-3-319-44618-9\_7}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/CohenP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/DengGLWY16, author = {Yi Deng and Juan A. Garay and San Ling and Huaxiong Wang and Moti Yung}, editor = {Vassilis Zikas and Roberto De Prisco}, title = {On the Implausibility of Constant-Round Public-Coin Zero-Knowledge Proofs}, booktitle = {Security and Cryptography for Networks - 10th International Conference, {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9841}, pages = {237--253}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44618-9\_13}, doi = {10.1007/978-3-319-44618-9\_13}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/DengGLWY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/DolevDLOY16, author = {Shlomi Dolev and Karim El Defrawy and Joshua Lampkins and Rafail Ostrovsky and Moti Yung}, editor = {Vassilis Zikas and Roberto De Prisco}, title = {Proactive Secret Sharing with a Dishonest Majority}, booktitle = {Security and Cryptography for Networks - 10th International Conference, {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9841}, pages = {529--548}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44618-9\_28}, doi = {10.1007/978-3-319-44618-9\_28}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/DolevDLOY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/FuchsbauerHKS16, author = {Georg Fuchsbauer and Christian Hanser and Chethan Kamath and Daniel Slamanig}, editor = {Vassilis Zikas and Roberto De Prisco}, title = {Practical Round-Optimal Blind Signatures in the Standard Model from Weaker Assumptions}, booktitle = {Security and Cryptography for Networks - 10th International Conference, {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9841}, pages = {391--408}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44618-9\_21}, doi = {10.1007/978-3-319-44618-9\_21}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/FuchsbauerHKS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/Fujisaki16, author = {Eiichiro Fujisaki}, editor = {Vassilis Zikas and Roberto De Prisco}, title = {Improving Practical UC-Secure Commitments Based on the {DDH} Assumption}, booktitle = {Security and Cryptography for Networks - 10th International Conference, {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9841}, pages = {257--272}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44618-9\_14}, doi = {10.1007/978-3-319-44618-9\_14}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/Fujisaki16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/GhoshGOT16, author = {Esha Ghosh and Michael T. Goodrich and Olga Ohrimenko and Roberto Tamassia}, editor = {Vassilis Zikas and Roberto De Prisco}, title = {Verifiable Zero-Knowledge Order Queries and Updates for Fully Dynamic Lists and Trees}, booktitle = {Security and Cryptography for Networks - 10th International Conference, {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9841}, pages = {216--236}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44618-9\_12}, doi = {10.1007/978-3-319-44618-9\_12}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/GhoshGOT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/Gnam16, author = {Trotta Gnam}, editor = {Vassilis Zikas and Roberto De Prisco}, title = {Zero-Knowledge Made Easy so It Won't Make You Dizzy - {(A} Tale of Transaction Put in Verse About an Illicit Kind of Commerce)}, booktitle = {Security and Cryptography for Networks - 10th International Conference, {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9841}, pages = {191--197}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44618-9\_10}, doi = {10.1007/978-3-319-44618-9\_10}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/Gnam16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/GreenKMZ16, author = {Matthew D. Green and Jonathan Katz and Alex J. Malozemoff and Hong{-}Sheng Zhou}, editor = {Vassilis Zikas and Roberto De Prisco}, title = {A Unified Approach to Idealized Model Separations via Indistinguishability Obfuscation}, booktitle = {Security and Cryptography for Networks - 10th International Conference, {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9841}, pages = {587--603}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44618-9\_31}, doi = {10.1007/978-3-319-44618-9\_31}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/GreenKMZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/HazayV16, author = {Carmit Hazay and Muthuramakrishnan Venkitasubramaniam}, editor = {Vassilis Zikas and Roberto De Prisco}, title = {What Security Can We Achieve Within 4 Rounds?}, booktitle = {Security and Cryptography for Networks - 10th International Conference, {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9841}, pages = {486--505}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44618-9\_26}, doi = {10.1007/978-3-319-44618-9\_26}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/HazayV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/HazayZ16, author = {Carmit Hazay and Hila Zarosim}, editor = {Vassilis Zikas and Roberto De Prisco}, title = {The Feasibility of Outsourced Database Search in the Plain Model}, booktitle = {Security and Cryptography for Networks - 10th International Conference, {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9841}, pages = {313--332}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44618-9\_17}, doi = {10.1007/978-3-319-44618-9\_17}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/HazayZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/HemenwayLOW16, author = {Brett Hemenway and Steve Lu and Rafail Ostrovsky and William Welser IV}, editor = {Vassilis Zikas and Roberto De Prisco}, title = {High-Precision Secure Computation of Satellite Collision Probabilities}, booktitle = {Security and Cryptography for Networks - 10th International Conference, {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9841}, pages = {169--187}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44618-9\_9}, doi = {10.1007/978-3-319-44618-9\_9}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scn/HemenwayLOW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/KimSGA16, author = {Jongkil Kim and Willy Susilo and Fuchun Guo and Man Ho Au}, editor = {Vassilis Zikas and Roberto De Prisco}, title = {A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups}, booktitle = {Security and Cryptography for Networks - 10th International Conference, {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9841}, pages = {3--22}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44618-9\_1}, doi = {10.1007/978-3-319-44618-9\_1}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/KimSGA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/MarcedonePS16, author = {Antonio Marcedone and Rafael Pass and Abhi Shelat}, editor = {Vassilis Zikas and Roberto De Prisco}, title = {Bounded {KDM} Security from iO and {OWF}}, booktitle = {Security and Cryptography for Networks - 10th International Conference, {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9841}, pages = {571--586}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44618-9\_30}, doi = {10.1007/978-3-319-44618-9\_30}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/MarcedonePS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/MittelbachV16, author = {Arno Mittelbach and Daniele Venturi}, editor = {Vassilis Zikas and Roberto De Prisco}, title = {Fiat-Shamir for Highly Sound Protocols Is Instantiable}, booktitle = {Security and Cryptography for Networks - 10th International Conference, {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9841}, pages = {198--215}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44618-9\_11}, doi = {10.1007/978-3-319-44618-9\_11}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/MittelbachV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/Peikert16, author = {Chris Peikert}, editor = {Vassilis Zikas and Roberto De Prisco}, title = {How (Not) to Instantiate Ring-LWE}, booktitle = {Security and Cryptography for Networks - 10th International Conference, {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9841}, pages = {411--430}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44618-9\_22}, doi = {10.1007/978-3-319-44618-9\_22}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/Peikert16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/PinoLP16, author = {Rafa{\"{e}}l del Pino and Vadim Lyubashevsky and David Pointcheval}, editor = {Vassilis Zikas and Roberto De Prisco}, title = {The Whole is Less Than the Sum of Its Parts: Constructing More Efficient Lattice-Based AKEs}, booktitle = {Security and Cryptography for Networks - 10th International Conference, {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9841}, pages = {273--291}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44618-9\_15}, doi = {10.1007/978-3-319-44618-9\_15}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/PinoLP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/ReyzinY16, author = {Leonid Reyzin and Sophia Yakoubov}, editor = {Vassilis Zikas and Roberto De Prisco}, title = {Efficient Asynchronous Accumulators for Distributed {PKI}}, booktitle = {Security and Cryptography for Networks - 10th International Conference, {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9841}, pages = {292--309}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44618-9\_16}, doi = {10.1007/978-3-319-44618-9\_16}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/ReyzinY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/Wang0HT16, author = {Yuyu Wang and Takahiro Matsuda and Goichiro Hanaoka and Keisuke Tanaka}, editor = {Vassilis Zikas and Roberto De Prisco}, title = {Signatures Resilient to Uninvertible Leakage}, booktitle = {Security and Cryptography for Networks - 10th International Conference, {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9841}, pages = {372--390}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44618-9\_20}, doi = {10.1007/978-3-319-44618-9\_20}, timestamp = {Mon, 21 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/Wang0HT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/scn/2016, editor = {Vassilis Zikas and Roberto De Prisco}, title = {Security and Cryptography for Networks - 10th International Conference, {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9841}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44618-9}, doi = {10.1007/978-3-319-44618-9}, isbn = {978-3-319-44617-2}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.