Search dblp for Publications

export results for "toc:db/conf/ima/ima2005.bht:"

 download as .bib file

@inproceedings{DBLP:conf/ima/BarbosaF05,
  author       = {Manuel Barbosa and
                  Pooya Farshim},
  editor       = {Nigel P. Smart},
  title        = {Efficient Identity-Based Key Encapsulation to Multiple Parties},
  booktitle    = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester,
                  UK, December 19-21, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3796},
  pages        = {428--441},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11586821\_28},
  doi          = {10.1007/11586821\_28},
  timestamp    = {Wed, 18 Mar 2020 16:00:57 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/BarbosaF05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/BarbosaP05,
  author       = {Manuel Barbosa and
                  Dan Page},
  editor       = {Nigel P. Smart},
  title        = {On the Automatic Construction of Indistinguishable Operations},
  booktitle    = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester,
                  UK, December 19-21, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3796},
  pages        = {233--247},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11586821\_16},
  doi          = {10.1007/11586821\_16},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/BarbosaP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/Bentahar05,
  author       = {Kamel Bentahar},
  editor       = {Nigel P. Smart},
  title        = {The Equivalence Between the {DHP} and {DLP} for Elliptic Curves Used
                  in Practical Applications, Revisited},
  booktitle    = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester,
                  UK, December 19-21, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3796},
  pages        = {376--391},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11586821\_25},
  doi          = {10.1007/11586821\_25},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/Bentahar05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/BraekenP05,
  author       = {An Braeken and
                  Bart Preneel},
  editor       = {Nigel P. Smart},
  title        = {Probabilistic Algebraic Attacks},
  booktitle    = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester,
                  UK, December 19-21, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3796},
  pages        = {290--303},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11586821\_20},
  doi          = {10.1007/11586821\_20},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/BraekenP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/BraekenWP05,
  author       = {An Braeken and
                  Christopher Wolf and
                  Bart Preneel},
  editor       = {Nigel P. Smart},
  title        = {Normality of Vectorial Functions},
  booktitle    = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester,
                  UK, December 19-21, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3796},
  pages        = {186--200},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11586821\_13},
  doi          = {10.1007/11586821\_13},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/BraekenWP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/BrownMS05,
  author       = {Andrew Brown and
                  Lorenz Minder and
                  Amin Shokrollahi},
  editor       = {Nigel P. Smart},
  title        = {Improved Decoding of Interleaved {AG} Codes},
  booktitle    = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester,
                  UK, December 19-21, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3796},
  pages        = {37--46},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11586821\_3},
  doi          = {10.1007/11586821\_3},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/BrownMS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/CaiC05,
  author       = {Canhui Cai and
                  Jing Chen},
  editor       = {Nigel P. Smart},
  title        = {Tessellation Based Multiple Description Coding},
  booktitle    = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester,
                  UK, December 19-21, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3796},
  pages        = {68--77},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11586821\_6},
  doi          = {10.1007/11586821\_6},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/CaiC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/ChenC05,
  author       = {Liqun Chen and
                  Zhaohui Cheng},
  editor       = {Nigel P. Smart},
  title        = {Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme},
  booktitle    = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester,
                  UK, December 19-21, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3796},
  pages        = {442--459},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11586821\_29},
  doi          = {10.1007/11586821\_29},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ima/ChenC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/CidMR05,
  author       = {Carlos Cid and
                  Sean Murphy and
                  Matthew J. B. Robshaw},
  editor       = {Nigel P. Smart},
  title        = {An Algebraic Framework for Cipher Embeddings},
  booktitle    = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester,
                  UK, December 19-21, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3796},
  pages        = {278--289},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11586821\_19},
  doi          = {10.1007/11586821\_19},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/CidMR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/DentM05,
  author       = {Alexander W. Dent and
                  John Malone{-}Lee},
  editor       = {Nigel P. Smart},
  title        = {The Physically Observable Security of Signature Schemes},
  booktitle    = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester,
                  UK, December 19-21, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3796},
  pages        = {220--232},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11586821\_15},
  doi          = {10.1007/11586821\_15},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/DentM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/DingGSWY05,
  author       = {Jintai Ding and
                  Jason E. Gower and
                  Dieter Schmidt and
                  Christopher Wolf and
                  Zhijun Yin},
  editor       = {Nigel P. Smart},
  title        = {Complexity Estimates for the F\({}_{\mbox{4}}\) Attack on the Perturbed
                  Matsumoto-Imai Cryptosystem},
  booktitle    = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester,
                  UK, December 19-21, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3796},
  pages        = {262--277},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11586821\_18},
  doi          = {10.1007/11586821\_18},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/DingGSWY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/DodsSS05,
  author       = {C. Dods and
                  Nigel P. Smart and
                  Martijn Stam},
  editor       = {Nigel P. Smart},
  title        = {Hash Based Digital Signature Schemes},
  booktitle    = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester,
                  UK, December 19-21, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3796},
  pages        = {96--115},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11586821\_8},
  doi          = {10.1007/11586821\_8},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/DodsSS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/GalbraithM05,
  author       = {Steven D. Galbraith and
                  James F. McKee},
  editor       = {Nigel P. Smart},
  title        = {Pairings on Elliptic Curves over Finite Commutative Rings},
  booktitle    = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester,
                  UK, December 19-21, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3796},
  pages        = {392--409},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11586821\_26},
  doi          = {10.1007/11586821\_26},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/GalbraithM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/Hedabou05,
  author       = {Mustapha Hedabou},
  editor       = {Nigel P. Smart},
  title        = {Efficient Countermeasures for Thwarting the {SCA} Attacks on the Frobenius
                  Based Methods},
  booktitle    = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester,
                  UK, December 19-21, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3796},
  pages        = {248--261},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11586821\_17},
  doi          = {10.1007/11586821\_17},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/Hedabou05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/Jakimoski05,
  author       = {Goce Jakimoski},
  editor       = {Nigel P. Smart},
  title        = {Unconditionally Secure Information Authentication in Presence of Erasures},
  booktitle    = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester,
                  UK, December 19-21, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3796},
  pages        = {304--321},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11586821\_21},
  doi          = {10.1007/11586821\_21},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/Jakimoski05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/KimKJ05,
  author       = {Woo Tae Kim and
                  Se H. Kang and
                  Eon Kyeong Joo},
  editor       = {Nigel P. Smart},
  title        = {Performance Improvement of Turbo Code Based on the Extrinsic Information
                  Transition Characteristics},
  booktitle    = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester,
                  UK, December 19-21, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3796},
  pages        = {47--58},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11586821\_4},
  doi          = {10.1007/11586821\_4},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/KimKJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/KoblitzM05,
  author       = {Neal Koblitz and
                  Alfred Menezes},
  editor       = {Nigel P. Smart},
  title        = {Pairing-Based Cryptography at High Security Levels},
  booktitle    = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester,
                  UK, December 19-21, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3796},
  pages        = {13--36},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11586821\_2},
  doi          = {10.1007/11586821\_2},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/KoblitzM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/KonigM05,
  author       = {Robert K{\"{o}}nig and
                  Ueli M. Maurer},
  editor       = {Nigel P. Smart},
  title        = {Generalized Strong Extractors and Deterministic Privacy Amplification},
  booktitle    = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester,
                  UK, December 19-21, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3796},
  pages        = {322--339},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11586821\_22},
  doi          = {10.1007/11586821\_22},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/KonigM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/KudlaP05,
  author       = {Caroline Kudla and
                  Kenneth G. Paterson},
  editor       = {Nigel P. Smart},
  title        = {Non-interactive Designated Verifier Proofs and Undeniable Signatures},
  booktitle    = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester,
                  UK, December 19-21, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3796},
  pages        = {136--154},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11586821\_10},
  doi          = {10.1007/11586821\_10},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/KudlaP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/LeeKSHLM05,
  author       = {Changhoon Lee and
                  Jongsung Kim and
                  Jaechul Sung and
                  Seokhie Hong and
                  Sangjin Lee and
                  Dukjae Moon},
  editor       = {Nigel P. Smart},
  title        = {Related-Key Differential Attacks on Cobra-H64 and Cobra-H128},
  booktitle    = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester,
                  UK, December 19-21, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3796},
  pages        = {201--219},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11586821\_14},
  doi          = {10.1007/11586821\_14},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ima/LeeKSHLM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/Malone-Lee05,
  author       = {John Malone{-}Lee},
  editor       = {Nigel P. Smart},
  title        = {A General Construction for Simultaneous Signing and Encrypting},
  booktitle    = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester,
                  UK, December 19-21, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3796},
  pages        = {116--135},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11586821\_9},
  doi          = {10.1007/11586821\_9},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/Malone-Lee05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/Maurer05,
  author       = {Ueli M. Maurer},
  editor       = {Nigel P. Smart},
  title        = {Abstract Models of Computation in Cryptography},
  booktitle    = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester,
                  UK, December 19-21, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3796},
  pages        = {1--12},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11586821\_1},
  doi          = {10.1007/11586821\_1},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/Maurer05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/MaurerS05,
  author       = {Ueli M. Maurer and
                  Johan Sj{\"{o}}din},
  editor       = {Nigel P. Smart},
  title        = {Domain Expansion of MACs: Alternative Uses of the {FIL-MAC}},
  booktitle    = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester,
                  UK, December 19-21, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3796},
  pages        = {168--185},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11586821\_12},
  doi          = {10.1007/11586821\_12},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/MaurerS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/Mitchell05,
  author       = {Chris J. Mitchell},
  editor       = {Nigel P. Smart},
  title        = {Partial Key Recovery Attacks on XCBC, {TMAC} and {OMAC}},
  booktitle    = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester,
                  UK, December 19-21, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3796},
  pages        = {155--167},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11586821\_11},
  doi          = {10.1007/11586821\_11},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/Mitchell05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/PramstallerRR05,
  author       = {Norbert Pramstaller and
                  Christian Rechberger and
                  Vincent Rijmen},
  editor       = {Nigel P. Smart},
  title        = {Exploiting Coding Theory for Collision Attacks on {SHA-1}},
  booktitle    = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester,
                  UK, December 19-21, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3796},
  pages        = {78--95},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11586821\_7},
  doi          = {10.1007/11586821\_7},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ima/PramstallerRR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/Saez05,
  author       = {Germ{\'{a}}n S{\'{a}}ez},
  editor       = {Nigel P. Smart},
  title        = {On Threshold Self-healing Key Distribution Schemes},
  booktitle    = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester,
                  UK, December 19-21, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3796},
  pages        = {340--354},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11586821\_23},
  doi          = {10.1007/11586821\_23},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/Saez05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/SchaathunC05,
  author       = {Hans Georg Schaathun and
                  G{\'{e}}rard D. Cohen},
  editor       = {Nigel P. Smart},
  title        = {A Trellis-Based Bound on (2, 1)-Separating Codes},
  booktitle    = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester,
                  UK, December 19-21, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3796},
  pages        = {59--67},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11586821\_5},
  doi          = {10.1007/11586821\_5},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/SchaathunC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/SidorenkoS05,
  author       = {Andrey Sidorenko and
                  Berry Schoenmakers},
  editor       = {Nigel P. Smart},
  title        = {Concrete Security of the Blum-Blum-Shub Pseudorandom Generator},
  booktitle    = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester,
                  UK, December 19-21, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3796},
  pages        = {355--375},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11586821\_24},
  doi          = {10.1007/11586821\_24},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/SidorenkoS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/Stam05,
  author       = {Martijn Stam},
  editor       = {Nigel P. Smart},
  title        = {A Key Encapsulation Mechanism for {NTRU}},
  booktitle    = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester,
                  UK, December 19-21, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3796},
  pages        = {410--427},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11586821\_27},
  doi          = {10.1007/11586821\_27},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/Stam05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ima/2005,
  editor       = {Nigel P. Smart},
  title        = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester,
                  UK, December 19-21, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3796},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11586821},
  doi          = {10.1007/11586821},
  isbn         = {3-540-30276-X},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics