Search dblp for Publications

export results for "toc:db/conf/ctrsa/ctrsa2014.bht:"

 download as .bib file

@inproceedings{DBLP:conf/ctrsa/0001KNWW14,
  author       = {Jian Guo and
                  Pierre Karpman and
                  Ivica Nikolic and
                  Lei Wang and
                  Shuang Wu},
  editor       = {Josh Benaloh},
  title        = {Analysis of {BLAKE2}},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2014 - The Cryptographer's Track at
                  the {RSA} Conference 2014, San Francisco, CA, USA, February 25-28,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8366},
  pages        = {402--423},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-04852-9\_21},
  doi          = {10.1007/978-3-319-04852-9\_21},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/0001KNWW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/ArmknechtM14,
  author       = {Frederik Armknecht and
                  Vasily Mikhalev},
  editor       = {Josh Benaloh},
  title        = {On Increasing the Throughput of Stream Ciphers},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2014 - The Cryptographer's Track at
                  the {RSA} Conference 2014, San Francisco, CA, USA, February 25-28,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8366},
  pages        = {132--151},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-04852-9\_7},
  doi          = {10.1007/978-3-319-04852-9\_7},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/ArmknechtM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/BaiG14,
  author       = {Shi Bai and
                  Steven D. Galbraith},
  editor       = {Josh Benaloh},
  title        = {An Improved Compression Technique for Signatures Based on Learning
                  with Errors},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2014 - The Cryptographer's Track at
                  the {RSA} Conference 2014, San Francisco, CA, USA, February 25-28,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8366},
  pages        = {28--47},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-04852-9\_2},
  doi          = {10.1007/978-3-319-04852-9\_2},
  timestamp    = {Tue, 30 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/BaiG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/BiryukovV14,
  author       = {Alex Biryukov and
                  Vesselin Velichkov},
  editor       = {Josh Benaloh},
  title        = {Automatic Search for Differential Trails in {ARX} Ciphers},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2014 - The Cryptographer's Track at
                  the {RSA} Conference 2014, San Francisco, CA, USA, February 25-28,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8366},
  pages        = {227--250},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-04852-9\_12},
  doi          = {10.1007/978-3-319-04852-9\_12},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/BiryukovV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/CalderonMSW14,
  author       = {Theresa Calderon and
                  Sarah Meiklejohn and
                  Hovav Shacham and
                  Brent Waters},
  editor       = {Josh Benaloh},
  title        = {Rethinking Verifiably Encrypted Signatures: {A} Gap in Functionality
                  and Potential Solutions},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2014 - The Cryptographer's Track at
                  the {RSA} Conference 2014, San Francisco, CA, USA, February 25-28,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8366},
  pages        = {349--366},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-04852-9\_18},
  doi          = {10.1007/978-3-319-04852-9\_18},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/CalderonMSW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/ChowFZ14,
  author       = {Sherman S. M. Chow and
                  Matthew K. Franklin and
                  Haibin Zhang},
  editor       = {Josh Benaloh},
  title        = {Practical Dual-Receiver Encryption - Soundness, Complete Non-malleability,
                  and Applications},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2014 - The Cryptographer's Track at
                  the {RSA} Conference 2014, San Francisco, CA, USA, February 25-28,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8366},
  pages        = {85--105},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-04852-9\_5},
  doi          = {10.1007/978-3-319-04852-9\_5},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/ChowFZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/DaviesS14,
  author       = {Gareth T. Davies and
                  Martijn Stam},
  editor       = {Josh Benaloh},
  title        = {{KDM} Security in the Hybrid Framework},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2014 - The Cryptographer's Track at
                  the {RSA} Conference 2014, San Francisco, CA, USA, February 25-28,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8366},
  pages        = {461--480},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-04852-9\_24},
  doi          = {10.1007/978-3-319-04852-9\_24},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/DaviesS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/DelvauxV14,
  author       = {Jeroen Delvaux and
                  Ingrid Verbauwhede},
  editor       = {Josh Benaloh},
  title        = {Attacking PUF-Based Pattern Matching Key Generators via Helper Data
                  Manipulation},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2014 - The Cryptographer's Track at
                  the {RSA} Conference 2014, San Francisco, CA, USA, February 25-28,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8366},
  pages        = {106--131},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-04852-9\_6},
  doi          = {10.1007/978-3-319-04852-9\_6},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/DelvauxV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/Faz-HernandezLS14,
  author       = {Armando Faz{-}Hern{\'{a}}ndez and
                  Patrick Longa and
                  Ana Helena S{\'{a}}nchez},
  editor       = {Josh Benaloh},
  title        = {Efficient and Secure Algorithms for GLV-Based Scalar Multiplication
                  and Their Implementation on {GLV-GLS} Curves},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2014 - The Cryptographer's Track at
                  the {RSA} Conference 2014, San Francisco, CA, USA, February 25-28,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8366},
  pages        = {1--27},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-04852-9\_1},
  doi          = {10.1007/978-3-319-04852-9\_1},
  timestamp    = {Thu, 19 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/Faz-HernandezLS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/FazioNP14,
  author       = {Nelly Fazio and
                  Antonio Nicolosi and
                  Irippuge Milinda Perera},
  editor       = {Josh Benaloh},
  title        = {Broadcast Steganography},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2014 - The Cryptographer's Track at
                  the {RSA} Conference 2014, San Francisco, CA, USA, February 25-28,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8366},
  pages        = {64--84},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-04852-9\_4},
  doi          = {10.1007/978-3-319-04852-9\_4},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/FazioNP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/GasparLS14,
  author       = {Lubos Gaspar and
                  Ga{\"{e}}tan Leurent and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Josh Benaloh},
  title        = {Hardware Implementation and Side-Channel Analysis of Lapin},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2014 - The Cryptographer's Track at
                  the {RSA} Conference 2014, San Francisco, CA, USA, February 25-28,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8366},
  pages        = {206--226},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-04852-9\_11},
  doi          = {10.1007/978-3-319-04852-9\_11},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/GasparLS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/HofheinzS14,
  author       = {Dennis Hofheinz and
                  Christoph Striecks},
  editor       = {Josh Benaloh},
  title        = {A Generic View on Trace-and-Revoke Broadcast Encryption Schemes},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2014 - The Cryptographer's Track at
                  the {RSA} Conference 2014, San Francisco, CA, USA, February 25-28,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8366},
  pages        = {48--63},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-04852-9\_3},
  doi          = {10.1007/978-3-319-04852-9\_3},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/HofheinzS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/HuangWS14,
  author       = {Qiong Huang and
                  Duncan S. Wong and
                  Willy Susilo},
  editor       = {Josh Benaloh},
  title        = {{P2OFE:} Privacy-Preserving Optimistic Fair Exchange of Digital Signatures},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2014 - The Cryptographer's Track at
                  the {RSA} Conference 2014, San Francisco, CA, USA, February 25-28,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8366},
  pages        = {367--384},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-04852-9\_19},
  doi          = {10.1007/978-3-319-04852-9\_19},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/HuangWS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/KaafaraniGK14,
  author       = {Ali {El Kaafarani} and
                  Essam Ghadafi and
                  Dalia Khader},
  editor       = {Josh Benaloh},
  title        = {Decentralized Traceable Attribute-Based Signatures},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2014 - The Cryptographer's Track at
                  the {RSA} Conference 2014, San Francisco, CA, USA, February 25-28,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8366},
  pages        = {327--348},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-04852-9\_17},
  doi          = {10.1007/978-3-319-04852-9\_17},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/KaafaraniGK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/Khovratovich14,
  author       = {Dmitry Khovratovich},
  editor       = {Josh Benaloh},
  title        = {Key Wrapping with a Fixed Permutation},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2014 - The Cryptographer's Track at
                  the {RSA} Conference 2014, San Francisco, CA, USA, February 25-28,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8366},
  pages        = {481--499},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-04852-9\_25},
  doi          = {10.1007/978-3-319-04852-9\_25},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/Khovratovich14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/KurosawaF14,
  author       = {Kaoru Kurosawa and
                  Jun Furukawa},
  editor       = {Josh Benaloh},
  title        = {2-Pass Key Exchange Protocols from CPA-Secure {KEM}},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2014 - The Cryptographer's Track at
                  the {RSA} Conference 2014, San Francisco, CA, USA, February 25-28,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8366},
  pages        = {385--401},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-04852-9\_20},
  doi          = {10.1007/978-3-319-04852-9\_20},
  timestamp    = {Sat, 30 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/KurosawaF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/LeRT14,
  author       = {Duc{-}Phong Le and
                  Matthieu Rivain and
                  Chik How Tan},
  editor       = {Josh Benaloh},
  title        = {On Double Exponentiation for Securing {RSA} against Fault Analysis},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2014 - The Cryptographer's Track at
                  the {RSA} Conference 2014, San Francisco, CA, USA, February 25-28,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8366},
  pages        = {152--168},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-04852-9\_8},
  doi          = {10.1007/978-3-319-04852-9\_8},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/LeRT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/LibertJ14,
  author       = {Beno{\^{\i}}t Libert and
                  Marc Joye},
  editor       = {Josh Benaloh},
  title        = {Group Signatures with Message-Dependent Opening in the Standard Model},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2014 - The Cryptographer's Track at
                  the {RSA} Conference 2014, San Francisco, CA, USA, February 25-28,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8366},
  pages        = {286--306},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-04852-9\_15},
  doi          = {10.1007/978-3-319-04852-9\_15},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/LibertJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/ProuffRR14,
  author       = {Emmanuel Prouff and
                  Matthieu Rivain and
                  Thomas Roche},
  editor       = {Josh Benaloh},
  title        = {On the Practical Security of a Leakage Resilient Masking Scheme},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2014 - The Cryptographer's Track at
                  the {RSA} Conference 2014, San Francisco, CA, USA, February 25-28,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8366},
  pages        = {169--182},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-04852-9\_9},
  doi          = {10.1007/978-3-319-04852-9\_9},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/ProuffRR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/Saarinen14,
  author       = {Markku{-}Juhani O. Saarinen},
  editor       = {Josh Benaloh},
  title        = {{CBEAM:} Efficient Authenticated Encryption from Feebly One-Way {\(\phi\)}
                  Functions},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2014 - The Cryptographer's Track at
                  the {RSA} Conference 2014, San Francisco, CA, USA, February 25-28,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8366},
  pages        = {251--269},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-04852-9\_13},
  doi          = {10.1007/978-3-319-04852-9\_13},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/Saarinen14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/Saarinen14a,
  author       = {Markku{-}Juhani O. Saarinen},
  editor       = {Josh Benaloh},
  title        = {Beyond Modes: Building a Secure Record Protocol from a Cryptographic
                  Sponge Permutation},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2014 - The Cryptographer's Track at
                  the {RSA} Conference 2014, San Francisco, CA, USA, February 25-28,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8366},
  pages        = {270--285},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-04852-9\_14},
  doi          = {10.1007/978-3-319-04852-9\_14},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/Saarinen14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/SasakiTWIO14,
  author       = {Yu Sasaki and
                  Yuuki Tokushige and
                  Lei Wang and
                  Mitsugu Iwamoto and
                  Kazuo Ohta},
  editor       = {Josh Benaloh},
  title        = {An Automated Evaluation Tool for Improved Rebound Attack: New Distinguishers
                  and Proposals of ShiftBytes Parameters for Gr{\o}stl},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2014 - The Cryptographer's Track at
                  the {RSA} Conference 2014, San Francisco, CA, USA, February 25-28,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8366},
  pages        = {424--443},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-04852-9\_22},
  doi          = {10.1007/978-3-319-04852-9\_22},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/SasakiTWIO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/Wang14,
  author       = {Gaoli Wang},
  editor       = {Josh Benaloh},
  title        = {Practical Collision Attack on 40-Step {RIPEMD-128}},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2014 - The Cryptographer's Track at
                  the {RSA} Conference 2014, San Francisco, CA, USA, February 25-28,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8366},
  pages        = {444--460},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-04852-9\_23},
  doi          = {10.1007/978-3-319-04852-9\_23},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/Wang14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/WangWWCQL14,
  author       = {Yujue Wang and
                  Duncan S. Wong and
                  Qianhong Wu and
                  Sherman S. M. Chow and
                  Bo Qin and
                  Jianwei Liu},
  editor       = {Josh Benaloh},
  title        = {Practical Distributed Signatures in the Standard Model},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2014 - The Cryptographer's Track at
                  the {RSA} Conference 2014, San Francisco, CA, USA, February 25-28,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8366},
  pages        = {307--326},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-04852-9\_16},
  doi          = {10.1007/978-3-319-04852-9\_16},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/WangWWCQL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/WhitnallOS14,
  author       = {Carolyn Whitnall and
                  Elisabeth Oswald and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Josh Benaloh},
  title        = {The Myth of Generic DPA...and the Magic of Learning},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2014 - The Cryptographer's Track at
                  the {RSA} Conference 2014, San Francisco, CA, USA, February 25-28,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8366},
  pages        = {183--205},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-04852-9\_10},
  doi          = {10.1007/978-3-319-04852-9\_10},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/WhitnallOS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ctrsa/2014,
  editor       = {Josh Benaloh},
  title        = {Topics in Cryptology - {CT-RSA} 2014 - The Cryptographer's Track at
                  the {RSA} Conference 2014, San Francisco, CA, USA, February 25-28,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8366},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-04852-9},
  doi          = {10.1007/978-3-319-04852-9},
  isbn         = {978-3-319-04851-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics