Search dblp for Publications

export results for "stream:series/isc:"

 download as .bib file

@book{DBLP:series/isc/Chuat22,
  author       = {Laurent Chuat and
                  Markus Legner and
                  David A. Basin and
                  David Hausheer and
                  Samuel Hitz and
                  Peter M{\"{u}}ller and
                  Adrian Perrig},
  title        = {The Complete Guide to {SCION} - From Design Principles to Formal Verification},
  series       = {Information Security and Cryptography},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-05288-0},
  doi          = {10.1007/978-3-031-05288-0},
  isbn         = {978-3-031-05287-3},
  timestamp    = {Wed, 25 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/Chuat22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/isc/Schwenk22,
  author       = {J{\"{o}}rg Schwenk},
  title        = {Guide to Internet Cryptography - Security Protocols and Real-World
                  Attack Implications},
  series       = {Information Security and Cryptography},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-19439-9},
  doi          = {10.1007/978-3-031-19439-9},
  isbn         = {978-3-031-19438-2},
  timestamp    = {Thu, 22 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/isc/Schwenk22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/isc/Lin21,
  author       = {Yan Lin},
  title        = {Novel Techniques in Recovering, Embedding, and Enforcing Policies
                  for Control-Flow Integrity},
  series       = {Information Security and Cryptography},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-73141-0},
  doi          = {10.1007/978-3-030-73141-0},
  isbn         = {978-3-030-73140-3},
  timestamp    = {Mon, 03 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/Lin21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/isc/MittelbachF21,
  author       = {Arno Mittelbach and
                  Marc Fischlin},
  title        = {The Theory of Hash Functions and Random Oracles - An Approach to Modern
                  Cryptography},
  series       = {Information Security and Cryptography},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-63287-8},
  doi          = {10.1007/978-3-030-63287-8},
  isbn         = {978-3-030-63286-1},
  timestamp    = {Fri, 29 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/isc/MittelbachF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/isc/Oorschot21,
  author       = {Paul C. van Oorschot},
  title        = {Computer Security and the Internet - Tools and Jewels from Malware
                  to Bitcoin, Second Edition},
  series       = {Information Security and Cryptography},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-83411-1},
  doi          = {10.1007/978-3-030-83411-1},
  isbn         = {978-3-030-83410-4},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/Oorschot21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/isc/AlvimCMMPS20,
  author       = {M{\'{a}}rio S. Alvim and
                  Konstantinos Chatzikokolakis and
                  Annabelle McIver and
                  Carroll Morgan and
                  Catuscia Palamidessi and
                  Geoffrey Smith},
  title        = {The Science of Quantitative Information Flow},
  series       = {Information Security and Cryptography},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-319-96131-6},
  doi          = {10.1007/978-3-319-96131-6},
  isbn         = {978-3-319-96129-3},
  timestamp    = {Wed, 19 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/AlvimCMMPS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/isc/BoydMS20,
  author       = {Colin Boyd and
                  Anish Mathuria and
                  Douglas Stebila},
  title        = {Protocols for Authentication and Key Establishment, Second Edition},
  series       = {Information Security and Cryptography},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-662-58146-9},
  doi          = {10.1007/978-3-662-58146-9},
  isbn         = {978-3-662-58145-2},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/BoydMS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/isc/DaemenR20,
  author       = {Joan Daemen and
                  Vincent Rijmen},
  title        = {The Design of Rijndael - The Advanced Encryption Standard (AES), Second
                  Edition},
  series       = {Information Security and Cryptography},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-662-60769-5},
  doi          = {10.1007/978-3-662-60769-5},
  isbn         = {978-3-662-60768-8},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/DaemenR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/isc/Oorschot20,
  author       = {Paul C. van Oorschot},
  title        = {Computer Security and the Internet - Tools and Jewels},
  series       = {Information Security and Cryptography},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-33649-3},
  doi          = {10.1007/978-3-030-33649-3},
  isbn         = {978-3-030-33648-6},
  timestamp    = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/Oorschot20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/isc/Giustolisi18,
  author       = {Rosario Giustolisi},
  title        = {Modelling and Verification of Secure Exams},
  series       = {Information Security and Cryptography},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-67107-9},
  doi          = {10.1007/978-3-319-67107-9},
  isbn         = {978-3-319-67106-2},
  timestamp    = {Tue, 20 Mar 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/isc/Giustolisi18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/isc/PerrigSRC17,
  author       = {Adrian Perrig and
                  Pawel Szalachowski and
                  Raphael M. Reischuk and
                  Laurent Chuat},
  title        = {{SCION:} {A} Secure Internet Architecture},
  series       = {Information Security and Cryptography},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-67080-5},
  doi          = {10.1007/978-3-319-67080-5},
  isbn         = {978-3-319-67079-9},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/isc/PerrigSRC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/isc/Reardon16,
  author       = {Joel Reardon},
  title        = {Secure Data Deletion},
  series       = {Information Security and Cryptography},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-28778-2},
  doi          = {10.1007/978-3-319-28778-2},
  isbn         = {978-3-319-28777-5},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/Reardon16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/isc/Smart16,
  author       = {Nigel P. Smart},
  title        = {Cryptography Made Simple},
  series       = {Information Security and Cryptography},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-21936-3},
  doi          = {10.1007/978-3-319-21936-3},
  isbn         = {978-3-319-21935-6},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/Smart16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/isc/DelfsK15,
  author       = {Hans Delfs and
                  Helmut Knebl},
  title        = {Introduction to Cryptography - Principles and Applications, Third
                  Edition},
  series       = {Information Security and Cryptography},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47974-2},
  doi          = {10.1007/978-3-662-47974-2},
  isbn         = {978-3-662-47973-5},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/DelfsK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/isc/Applebaum14,
  author       = {Benny Applebaum},
  title        = {Cryptography in Constant Parallel Time},
  series       = {Information Security and Cryptography},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-17367-7},
  doi          = {10.1007/978-3-642-17367-7},
  isbn         = {978-3-642-17366-0},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/Applebaum14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/isc/AumassonMPH14,
  author       = {Jean{-}Philippe Aumasson and
                  Willi Meier and
                  Raphael C.{-}W. Phan and
                  Luca Henzen},
  title        = {The Hash Function {BLAKE}},
  series       = {Information Security and Cryptography},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44757-4},
  doi          = {10.1007/978-3-662-44757-4},
  isbn         = {978-3-662-44756-7},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/AumassonMPH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/Cremers12,
  author       = {Cas Cremers and
                  Sjouke Mauw},
  title        = {Operational Semantics and Verification of Security Protocols},
  series       = {Information Security and Cryptography},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-540-78636-8},
  doi          = {10.1007/978-3-540-78636-8},
  isbn         = {978-3-540-78636-8},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/Cremers12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/AkdemirWKS12,
  author       = {Kahraman D. Akdemir and
                  Zhen Wang and
                  Mark G. Karpovsky and
                  Berk Sunar},
  editor       = {Marc Joye and
                  Michael Tunstall},
  title        = {Design of Cryptographic Devices Resilient to Fault Injection Attacks
                  Using Nonlinear Robust Codes},
  booktitle    = {Fault Analysis in Cryptography},
  series       = {Information Security and Cryptography},
  pages        = {171--199},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29656-7\_11},
  doi          = {10.1007/978-3-642-29656-7\_11},
  timestamp    = {Fri, 27 Mar 2020 08:31:50 +0100},
  biburl       = {https://dblp.org/rec/series/isc/AkdemirWKS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/AlkhoraidlyDH12,
  author       = {Abdulaziz Alkhoraidly and
                  Agustin Dominguez{-}Oviedo and
                  M. Anwar Hasan},
  editor       = {Marc Joye and
                  Michael Tunstall},
  title        = {Fault Attacks on Elliptic Curve Cryptosystems},
  booktitle    = {Fault Analysis in Cryptography},
  series       = {Information Security and Cryptography},
  pages        = {137--155},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29656-7\_9},
  doi          = {10.1007/978-3-642-29656-7\_9},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/AlkhoraidlyDH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/BarenghiBBPP12,
  author       = {Alessandro Barenghi and
                  Guido Marco Bertoni and
                  Luca Breveglieri and
                  Mauro Pellicioli and
                  Gerardo Pelosi},
  editor       = {Marc Joye and
                  Michael Tunstall},
  title        = {Injection Technologies for Fault Attacks on Microprocessors},
  booktitle    = {Fault Analysis in Cryptography},
  series       = {Information Security and Cryptography},
  pages        = {275--293},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29656-7\_16},
  doi          = {10.1007/978-3-642-29656-7\_16},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/isc/BarenghiBBPP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/BarenghiT12,
  author       = {Alessandro Barenghi and
                  Elena Trichina},
  editor       = {Marc Joye and
                  Michael Tunstall},
  title        = {Fault Attacks on Stream Ciphers},
  booktitle    = {Fault Analysis in Cryptography},
  series       = {Information Security and Cryptography},
  pages        = {239--255},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29656-7\_14},
  doi          = {10.1007/978-3-642-29656-7\_14},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/BarenghiT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/BerzatiCG12,
  author       = {Alexandre Berzati and
                  C{\'{e}}cile Canovas{-}Dumas and
                  Louis Goubin},
  editor       = {Marc Joye and
                  Michael Tunstall},
  title        = {A Survey of Differential Fault Analysis Against Classical {RSA} Implementations},
  booktitle    = {Fault Analysis in Cryptography},
  series       = {Information Security and Cryptography},
  pages        = {111--124},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29656-7\_7},
  doi          = {10.1007/978-3-642-29656-7\_7},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/BerzatiCG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/BousselamNFR12,
  author       = {Kaouthar Bousselam and
                  Giorgio Di Natale and
                  Marie{-}Lise Flottes and
                  Bruno Rouzeyre},
  editor       = {Marc Joye and
                  Michael Tunstall},
  title        = {On Countermeasures Against Fault Attacks on the Advanced Encryption
                  Standard},
  booktitle    = {Fault Analysis in Cryptography},
  series       = {Information Security and Cryptography},
  pages        = {89--108},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29656-7\_6},
  doi          = {10.1007/978-3-642-29656-7\_6},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/BousselamNFR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/Clavier12,
  author       = {Christophe Clavier},
  editor       = {Marc Joye and
                  Michael Tunstall},
  title        = {Attacking Block Ciphers},
  booktitle    = {Fault Analysis in Cryptography},
  series       = {Information Security and Cryptography},
  pages        = {19--35},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29656-7\_2},
  doi          = {10.1007/978-3-642-29656-7\_2},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/Clavier12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/Giraud12,
  author       = {Christophe Giraud},
  editor       = {Marc Joye and
                  Michael Tunstall},
  title        = {Differential Fault Analysis of the Advanced Encryption Standard},
  booktitle    = {Fault Analysis in Cryptography},
  series       = {Information Security and Cryptography},
  pages        = {55--72},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29656-7\_4},
  doi          = {10.1007/978-3-642-29656-7\_4},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/Giraud12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/GuilleyD12,
  author       = {Sylvain Guilley and
                  Jean{-}Luc Danger},
  editor       = {Marc Joye and
                  Michael Tunstall},
  title        = {Global Faults on Cryptographic Circuits},
  booktitle    = {Fault Analysis in Cryptography},
  series       = {Information Security and Cryptography},
  pages        = {295--311},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29656-7\_17},
  doi          = {10.1007/978-3-642-29656-7\_17},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/GuilleyD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/HaririR12,
  author       = {Arash Hariri and
                  Arash Reyhani{-}Masoleh},
  editor       = {Marc Joye and
                  Michael Tunstall},
  title        = {On Countermeasures Against Fault Attacks on Elliptic Curve Cryptography
                  Using Fault Detection},
  booktitle    = {Fault Analysis in Cryptography},
  series       = {Information Security and Cryptography},
  pages        = {157--169},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29656-7\_10},
  doi          = {10.1007/978-3-642-29656-7\_10},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/HaririR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/KimQ12,
  author       = {Chong Hee Kim and
                  Jean{-}Jacques Quisquater},
  editor       = {Marc Joye and
                  Michael Tunstall},
  title        = {Fault Attacks Against {RSA-CRT} Implementation},
  booktitle    = {Fault Analysis in Cryptography},
  series       = {Information Security and Cryptography},
  pages        = {125--136},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29656-7\_8},
  doi          = {10.1007/978-3-642-29656-7\_8},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/KimQ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/MrabetPV12,
  author       = {Nadia El Mrabet and
                  Dan Page and
                  Frederik Vercauteren},
  editor       = {Marc Joye and
                  Michael Tunstall},
  title        = {Fault Attacks on Pairing-Based Cryptography},
  booktitle    = {Fault Analysis in Cryptography},
  series       = {Information Security and Cryptography},
  pages        = {221--236},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29656-7\_13},
  doi          = {10.1007/978-3-642-29656-7\_13},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/MrabetPV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/NguyenT12,
  author       = {Phong Q. Nguyen and
                  Mehdi Tibouchi},
  editor       = {Marc Joye and
                  Michael Tunstall},
  title        = {Lattice-Based Fault Attacks on Signatures},
  booktitle    = {Fault Analysis in Cryptography},
  series       = {Information Security and Cryptography},
  pages        = {201--220},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29656-7\_12},
  doi          = {10.1007/978-3-642-29656-7\_12},
  timestamp    = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/NguyenT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/OswaldS12,
  author       = {Elisabeth Oswald and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Marc Joye and
                  Michael Tunstall},
  title        = {Side-Channel Analysis and Its Relevance to Fault Attacks},
  booktitle    = {Fault Analysis in Cryptography},
  series       = {Information Security and Cryptography},
  pages        = {3--15},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29656-7\_1},
  doi          = {10.1007/978-3-642-29656-7\_1},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/isc/OswaldS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/RegazzoniBIK12,
  author       = {Francesco Regazzoni and
                  Luca Breveglieri and
                  Paolo Ienne and
                  Israel Koren},
  editor       = {Marc Joye and
                  Michael Tunstall},
  title        = {Interaction Between Fault Attack Countermeasures and the Resistance
                  Against Power Analysis Attacks},
  booktitle    = {Fault Analysis in Cryptography},
  series       = {Information Security and Cryptography},
  pages        = {257--272},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29656-7\_15},
  doi          = {10.1007/978-3-642-29656-7\_15},
  timestamp    = {Tue, 31 Mar 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/RegazzoniBIK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/Rivain12,
  author       = {Matthieu Rivain},
  editor       = {Marc Joye and
                  Michael Tunstall},
  title        = {Differential Fault Analysis of {DES}},
  booktitle    = {Fault Analysis in Cryptography},
  series       = {Information Security and Cryptography},
  pages        = {37--54},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29656-7\_3},
  doi          = {10.1007/978-3-642-29656-7\_3},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/Rivain12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/SchmidtM12,
  author       = {J{\"{o}}rn{-}Marc Schmidt and
                  Marcel Medwed},
  editor       = {Marc Joye and
                  Michael Tunstall},
  title        = {Countermeasures for Symmetric Key Ciphers},
  booktitle    = {Fault Analysis in Cryptography},
  series       = {Information Security and Cryptography},
  pages        = {73--87},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29656-7\_5},
  doi          = {10.1007/978-3-642-29656-7\_5},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/SchmidtM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/TakahashiFGLSO12,
  author       = {Junko Takahashi and
                  Toshinori Fukunaga and
                  Shigeto Gomisawa and
                  Yang Li and
                  Kazuo Sakiyama and
                  Kazuo Ohta},
  editor       = {Marc Joye and
                  Michael Tunstall},
  title        = {Fault Injection and Key Retrieval Experiments on an Evaluation Board},
  booktitle    = {Fault Analysis in Cryptography},
  series       = {Information Security and Cryptography},
  pages        = {313--331},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29656-7\_18},
  doi          = {10.1007/978-3-642-29656-7\_18},
  timestamp    = {Thu, 22 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/TakahashiFGLSO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/isc/364229655,
  editor       = {Marc Joye and
                  Michael Tunstall},
  title        = {Fault Analysis in Cryptography},
  series       = {Information Security and Cryptography},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29656-7},
  doi          = {10.1007/978-3-642-29656-7},
  isbn         = {978-3-642-29655-0},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/isc/364229655.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0028270,
  author       = {Lars R. Knudsen and
                  Matthew Robshaw},
  title        = {The Block Cipher Companion},
  series       = {Information Security and Cryptography},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-17342-4},
  doi          = {10.1007/978-3-642-17342-4},
  isbn         = {978-3-642-17341-7},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/0028270.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/isc/Bohme10,
  author       = {Rainer B{\"{o}}hme},
  title        = {Advanced Statistical Steganalysis},
  series       = {Information Security and Cryptography},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14313-7},
  doi          = {10.1007/978-3-642-14313-7},
  isbn         = {978-3-642-14312-0},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/Bohme10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/isc/HazayL10,
  author       = {Carmit Hazay and
                  Yehuda Lindell},
  title        = {Efficient Secure Two-Party Protocols - Techniques and Constructions},
  series       = {Information Security and Cryptography},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14303-8},
  doi          = {10.1007/978-3-642-14303-8},
  isbn         = {978-3-642-14302-1},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/HazayL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/isc/Yekhanin10,
  author       = {Sergey Yekhanin},
  title        = {Locally Decodable Codes and Private Information Retrieval Schemes},
  series       = {Information Security and Cryptography},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14358-8},
  doi          = {10.1007/978-3-642-14358-8},
  isbn         = {978-3-642-14357-1},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/Yekhanin10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/AardalE10,
  author       = {Karen I. Aardal and
                  Friedrich Eisenbrand},
  editor       = {Phong Q. Nguyen and
                  Brigitte Vall{\'{e}}e},
  title        = {The {LLL} Algorithm and Integer Programming},
  booktitle    = {The {LLL} Algorithm - Survey and Applications},
  series       = {Information Security and Cryptography},
  pages        = {293--314},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-02295-1\_9},
  doi          = {10.1007/978-3-642-02295-1\_9},
  timestamp    = {Tue, 25 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/AardalE10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/AnR10,
  author       = {Jee Hea An and
                  Tal Rabin},
  editor       = {Alexander W. Dent and
                  Yuliang Zheng},
  title        = {Security for Signcryption: The Two-User Model},
  booktitle    = {Practical Signcryption},
  series       = {Information Security and Cryptography},
  pages        = {21--42},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-540-89411-7\_2},
  doi          = {10.1007/978-3-540-89411-7\_2},
  timestamp    = {Tue, 30 Nov 2021 15:21:24 +0100},
  biburl       = {https://dblp.org/rec/series/isc/AnR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/ArmknechtMSST10,
  author       = {Frederik Armknecht and
                  Roel Maes and
                  Ahmad{-}Reza Sadeghi and
                  Berk Sunar and
                  Pim Tuyls},
  editor       = {Ahmad{-}Reza Sadeghi and
                  David Naccache},
  title        = {Memory Leakage-Resilient Encryption Based on Physically Unclonable
                  Functions},
  booktitle    = {Towards Hardware-Intrinsic Security - Foundations and Practice},
  series       = {Information Security and Cryptography},
  pages        = {135--164},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14452-3\_6},
  doi          = {10.1007/978-3-642-14452-3\_6},
  timestamp    = {Tue, 16 May 2017 14:24:21 +0200},
  biburl       = {https://dblp.org/rec/series/isc/ArmknechtMSST10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/BaekGKN10,
  author       = {Yoo{-}Jin Baek and
                  Vanessa Gratzer and
                  Sung{-}Hyun Kim and
                  David Naccache},
  editor       = {Ahmad{-}Reza Sadeghi and
                  David Naccache},
  title        = {Extracting Unknown Keys from Unknown Algorithms Encrypting Unknown
                  Fixed Messages and Returning No Results},
  booktitle    = {Towards Hardware-Intrinsic Security - Foundations and Practice},
  series       = {Information Security and Cryptography},
  pages        = {189--197},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14452-3\_8},
  doi          = {10.1007/978-3-642-14452-3\_8},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/BaekGKN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/BaekS10,
  author       = {Joonsang Baek and
                  Ron Steinfeld},
  editor       = {Alexander W. Dent and
                  Yuliang Zheng},
  title        = {Security for Signcryption: The Multi-User Model},
  booktitle    = {Practical Signcryption},
  series       = {Information Security and Cryptography},
  pages        = {43--53},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-540-89411-7\_3},
  doi          = {10.1007/978-3-540-89411-7\_3},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/BaekS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/BarretoLMQ10,
  author       = {Paulo S. L. M. Barreto and
                  Beno{\^{\i}}t Libert and
                  Noel McCullagh and
                  Jean{-}Jacques Quisquater},
  editor       = {Alexander W. Dent and
                  Yuliang Zheng},
  title        = {Signcryption Schemes Based on the Diffie-Hellman Problem},
  booktitle    = {Practical Signcryption},
  series       = {Information Security and Cryptography},
  pages        = {57--69},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-540-89411-7\_4},
  doi          = {10.1007/978-3-540-89411-7\_4},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/BarretoLMQ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/BarretoLMQ10a,
  author       = {Paulo S. L. M. Barreto and
                  Beno{\^{\i}}t Libert and
                  Noel McCullagh and
                  Jean{-}Jacques Quisquater},
  editor       = {Alexander W. Dent and
                  Yuliang Zheng},
  title        = {Signcryption Schemes Based on Bilinear Maps},
  booktitle    = {Practical Signcryption},
  series       = {Information Security and Cryptography},
  pages        = {71--97},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-540-89411-7\_5},
  doi          = {10.1007/978-3-540-89411-7\_5},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/BarretoLMQ10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/Bjorstad10,
  author       = {Tor E. Bj{\o}rstad},
  editor       = {Alexander W. Dent and
                  Yuliang Zheng},
  title        = {Hybrid Signcryption},
  booktitle    = {Practical Signcryption},
  series       = {Information Security and Cryptography},
  pages        = {121--147},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-540-89411-7\_7},
  doi          = {10.1007/978-3-540-89411-7\_7},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/Bjorstad10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/Boyen10,
  author       = {Xavier Boyen},
  editor       = {Alexander W. Dent and
                  Yuliang Zheng},
  title        = {Identity-Based Signcryption},
  booktitle    = {Practical Signcryption},
  series       = {Information Security and Cryptography},
  pages        = {195--216},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-540-89411-7\_10},
  doi          = {10.1007/978-3-540-89411-7\_10},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/Boyen10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/CuiH10,
  author       = {Yang Cui and
                  Goichiro Hanaoka},
  editor       = {Alexander W. Dent and
                  Yuliang Zheng},
  title        = {Applications of Signcryption},
  booktitle    = {Practical Signcryption},
  series       = {Information Security and Cryptography},
  pages        = {241--256},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-540-89411-7\_12},
  doi          = {10.1007/978-3-540-89411-7\_12},
  timestamp    = {Wed, 08 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/CuiH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/DengCS10,
  author       = {Daniel Y. Deng and
                  Andrew H. Chan and
                  G. Edward Suh},
  editor       = {Ahmad{-}Reza Sadeghi and
                  David Naccache},
  title        = {Authentication of Processor Hardware Leveraging Performance Limits
                  in Detailed Simulations and Emulations},
  booktitle    = {Towards Hardware-Intrinsic Security - Foundations and Practice},
  series       = {Information Security and Cryptography},
  pages        = {309--329},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14452-3\_14},
  doi          = {10.1007/978-3-642-14452-3\_14},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/DengCS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/Dent10,
  author       = {Alexander W. Dent},
  editor       = {Alexander W. Dent and
                  Yuliang Zheng},
  title        = {Key Establishment Using Signcryption Techniques},
  booktitle    = {Practical Signcryption},
  series       = {Information Security and Cryptography},
  pages        = {217--240},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-540-89411-7\_11},
  doi          = {10.1007/978-3-540-89411-7\_11},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/Dent10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/DentM10,
  author       = {Alexander W. Dent and
                  John Malone{-}Lee},
  editor       = {Alexander W. Dent and
                  Yuliang Zheng},
  title        = {Signcryption Schemes Based on the {RSA} Problem},
  booktitle    = {Practical Signcryption},
  series       = {Information Security and Cryptography},
  pages        = {99--117},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-540-89411-7\_6},
  doi          = {10.1007/978-3-540-89411-7\_6},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/DentM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/Dodis10,
  author       = {Yevgeniy Dodis},
  editor       = {Alexander W. Dent and
                  Yuliang Zheng},
  title        = {Concealment and Its Applications to Authenticated Encryption},
  booktitle    = {Practical Signcryption},
  series       = {Information Security and Cryptography},
  pages        = {149--173},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-540-89411-7\_8},
  doi          = {10.1007/978-3-540-89411-7\_8},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/Dodis10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/DuflotGLM10,
  author       = {Lo{\"{\i}}c Duflot and
                  Olivier Grumelard and
                  Olivier Levillain and
                  Benjamin Morin},
  editor       = {Ahmad{-}Reza Sadeghi and
                  David Naccache},
  title        = {On the Limits of Hypervisor- and Virtual Machine Monitor-Based Isolation},
  booktitle    = {Towards Hardware-Intrinsic Security - Foundations and Practice},
  series       = {Information Security and Cryptography},
  pages        = {349--366},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14452-3\_16},
  doi          = {10.1007/978-3-642-14452-3\_16},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/DuflotGLM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/Gentry10,
  author       = {Craig Gentry},
  editor       = {Phong Q. Nguyen and
                  Brigitte Vall{\'{e}}e},
  title        = {The Geometry of Provable Security: Some Proofs of Security in Which
                  Lattices Make a Surprise Appearance},
  booktitle    = {The {LLL} Algorithm - Survey and Applications},
  series       = {Information Security and Cryptography},
  pages        = {391--426},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-02295-1\_12},
  doi          = {10.1007/978-3-642-02295-1\_12},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/Gentry10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/GuajardoAP10,
  author       = {Jorge Guajardo and
                  Muhammad Asim and
                  Milan Petkovic},
  editor       = {Ahmad{-}Reza Sadeghi and
                  David Naccache},
  title        = {Towards Reliable Remote Healthcare Applications Using Combined Fuzzy
                  Extraction},
  booktitle    = {Towards Hardware-Intrinsic Security - Foundations and Practice},
  series       = {Information Security and Cryptography},
  pages        = {387--407},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14452-3\_18},
  doi          = {10.1007/978-3-642-14452-3\_18},
  timestamp    = {Thu, 18 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/GuajardoAP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/HammouriDS10,
  author       = {Ghaith Hammouri and
                  Aykutlu Dana and
                  Berk Sunar},
  editor       = {Ahmad{-}Reza Sadeghi and
                  David Naccache},
  title        = {License Distribution Protocols from Optical Media Fingerprints},
  booktitle    = {Towards Hardware-Intrinsic Security - Foundations and Practice},
  series       = {Information Security and Cryptography},
  pages        = {201--222},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14452-3\_9},
  doi          = {10.1007/978-3-642-14452-3\_9},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/HammouriDS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/HandschuhST10,
  author       = {Helena Handschuh and
                  Geert Jan Schrijen and
                  Pim Tuyls},
  editor       = {Ahmad{-}Reza Sadeghi and
                  David Naccache},
  title        = {Hardware Intrinsic Security from Physically Unclonable Functions},
  booktitle    = {Towards Hardware-Intrinsic Security - Foundations and Practice},
  series       = {Information Security and Cryptography},
  pages        = {39--53},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14452-3\_2},
  doi          = {10.1007/978-3-642-14452-3\_2},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/HandschuhST10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/Hanrot10,
  author       = {Guillaume Hanrot},
  editor       = {Phong Q. Nguyen and
                  Brigitte Vall{\'{e}}e},
  title        = {{LLL:} {A} Tool for Effective Diophantine Approximation},
  booktitle    = {The {LLL} Algorithm - Survey and Applications},
  series       = {Information Security and Cryptography},
  pages        = {215--263},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-02295-1\_6},
  doi          = {10.1007/978-3-642-02295-1\_6},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/Hanrot10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/HoffsteinHPW10,
  author       = {Jeffrey Hoffstein and
                  Nick Howgrave{-}Graham and
                  Jill Pipher and
                  William Whyte},
  editor       = {Phong Q. Nguyen and
                  Brigitte Vall{\'{e}}e},
  title        = {Practical Lattice-Based Cryptography: NTRUEncrypt and NTRUSign},
  booktitle    = {The {LLL} Algorithm - Survey and Applications},
  series       = {Information Security and Cryptography},
  pages        = {349--390},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-02295-1\_11},
  doi          = {10.1007/978-3-642-02295-1\_11},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/HoffsteinHPW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/JarvinenKS010,
  author       = {Kimmo J{\"{a}}rvinen and
                  Vladimir Kolesnikov and
                  Ahmad{-}Reza Sadeghi and
                  Thomas Schneider},
  editor       = {Ahmad{-}Reza Sadeghi and
                  David Naccache},
  title        = {Efficient Secure Two-Party Computation with Untrusted Hardware Tokens
                  (Full Version)},
  booktitle    = {Towards Hardware-Intrinsic Security - Foundations and Practice},
  series       = {Information Security and Cryptography},
  pages        = {367--386},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14452-3\_17},
  doi          = {10.1007/978-3-642-14452-3\_17},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/isc/JarvinenKS010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/Khot10,
  author       = {Subhash Khot},
  editor       = {Phong Q. Nguyen and
                  Brigitte Vall{\'{e}}e},
  title        = {Inapproximability Results for Computational Problems on Lattices},
  booktitle    = {The {LLL} Algorithm - Survey and Applications},
  series       = {Information Security and Cryptography},
  pages        = {453--473},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-02295-1\_14},
  doi          = {10.1007/978-3-642-02295-1\_14},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/Khot10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/KimMNSVZ10,
  author       = {Inyoung Kim and
                  Abhranil Maiti and
                  Leyla Nazhandali and
                  Patrick Schaumont and
                  Vignesh Vivekraja and
                  Huaiye Zhang},
  editor       = {Ahmad{-}Reza Sadeghi and
                  David Naccache},
  title        = {From Statistics to Circuits: Foundations for Future Physical Unclonable
                  Functions},
  booktitle    = {Towards Hardware-Intrinsic Security - Foundations and Practice},
  series       = {Information Security and Cryptography},
  pages        = {55--78},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14452-3\_3},
  doi          = {10.1007/978-3-642-14452-3\_3},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/KimMNSVZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/Kirovski10,
  author       = {Darko Kirovski},
  editor       = {Ahmad{-}Reza Sadeghi and
                  David Naccache},
  title        = {Anti-counterfeiting: Mixing the Physical and the Digital World},
  booktitle    = {Towards Hardware-Intrinsic Security - Foundations and Practice},
  series       = {Information Security and Cryptography},
  pages        = {223--233},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14452-3\_10},
  doi          = {10.1007/978-3-642-14452-3\_10},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/Kirovski10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/Kluners10,
  author       = {J{\"{u}}rgen Kl{\"{u}}ners},
  editor       = {Phong Q. Nguyen and
                  Brigitte Vall{\'{e}}e},
  title        = {The van Hoeij Algorithm for Factoring Polynomials},
  booktitle    = {The {LLL} Algorithm - Survey and Applications},
  series       = {Information Security and Cryptography},
  pages        = {283--291},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-02295-1\_8},
  doi          = {10.1007/978-3-642-02295-1\_8},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/Kluners10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/Kuhn10,
  author       = {Markus G. Kuhn},
  editor       = {Ahmad{-}Reza Sadeghi and
                  David Naccache},
  title        = {Signal Authentication in Trusted Satellite Navigation Receivers},
  booktitle    = {Towards Hardware-Intrinsic Security - Foundations and Practice},
  series       = {Information Security and Cryptography},
  pages        = {331--348},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14452-3\_15},
  doi          = {10.1007/978-3-642-14452-3\_15},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/Kuhn10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/LeeBSPV10,
  author       = {Yong Ki Lee and
                  Lejla Batina and
                  Dave Singel{\'{e}}e and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  editor       = {Ahmad{-}Reza Sadeghi and
                  David Naccache},
  title        = {Anti-counterfeiting, Untraceability and Other Security Challenges
                  for {RFID} Systems: Public-Key-Based Protocols and Hardware},
  booktitle    = {Towards Hardware-Intrinsic Security - Foundations and Practice},
  series       = {Information Security and Cryptography},
  pages        = {237--257},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14452-3\_11},
  doi          = {10.1007/978-3-642-14452-3\_11},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/LeeBSPV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/MaesV10,
  author       = {Roel Maes and
                  Ingrid Verbauwhede},
  editor       = {Ahmad{-}Reza Sadeghi and
                  David Naccache},
  title        = {Physically Unclonable Functions: {A} Study on the State of the Art
                  and Future Research Directions},
  booktitle    = {Towards Hardware-Intrinsic Security - Foundations and Practice},
  series       = {Information Security and Cryptography},
  pages        = {3--37},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14452-3\_1},
  doi          = {10.1007/978-3-642-14452-3\_1},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/isc/MaesV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/May10,
  author       = {Alexander May},
  editor       = {Phong Q. Nguyen and
                  Brigitte Vall{\'{e}}e},
  title        = {Using LLL-Reduction for Solving {RSA} and Factorization Problems},
  booktitle    = {The {LLL} Algorithm - Survey and Applications},
  series       = {Information Security and Cryptography},
  pages        = {315--348},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-02295-1\_10},
  doi          = {10.1007/978-3-642-02295-1\_10},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/isc/May10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/Micciancio10,
  author       = {Daniele Micciancio},
  editor       = {Phong Q. Nguyen and
                  Brigitte Vall{\'{e}}e},
  title        = {Cryptographic Functions from Worst-Case Complexity Assumptions},
  booktitle    = {The {LLL} Algorithm - Survey and Applications},
  series       = {Information Security and Cryptography},
  pages        = {427--452},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-02295-1\_13},
  doi          = {10.1007/978-3-642-02295-1\_13},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/isc/Micciancio10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/Nguyen10,
  author       = {Phong Q. Nguyen},
  editor       = {Phong Q. Nguyen and
                  Brigitte Vall{\'{e}}e},
  title        = {Hermite's Constant and Lattice Algorithms},
  booktitle    = {The {LLL} Algorithm - Survey and Applications},
  series       = {Information Security and Cryptography},
  pages        = {19--69},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-02295-1\_2},
  doi          = {10.1007/978-3-642-02295-1\_2},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/Nguyen10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/PieprzykP10,
  author       = {Josef Pieprzyk and
                  David Pointcheval},
  editor       = {Alexander W. Dent and
                  Yuliang Zheng},
  title        = {Parallel Signcryption},
  booktitle    = {Practical Signcryption},
  series       = {Information Security and Cryptography},
  pages        = {175--192},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-540-89411-7\_9},
  doi          = {10.1007/978-3-540-89411-7\_9},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/isc/PieprzykP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/Regev10,
  author       = {Oded Regev},
  editor       = {Phong Q. Nguyen and
                  Brigitte Vall{\'{e}}e},
  title        = {On the Complexity of Lattice Problems with Polynomial Approximation
                  Factors},
  booktitle    = {The {LLL} Algorithm - Survey and Applications},
  series       = {Information Security and Cryptography},
  pages        = {475--496},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-02295-1\_15},
  doi          = {10.1007/978-3-642-02295-1\_15},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/Regev10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/RuhrmairBK10,
  author       = {Ulrich R{\"{u}}hrmair and
                  Heike Busch and
                  Stefan Katzenbeisser},
  editor       = {Ahmad{-}Reza Sadeghi and
                  David Naccache},
  title        = {Strong PUFs: Models, Constructions, and Security Proofs},
  booktitle    = {Towards Hardware-Intrinsic Security - Foundations and Practice},
  series       = {Information Security and Cryptography},
  pages        = {79--96},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14452-3\_4},
  doi          = {10.1007/978-3-642-14452-3\_4},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/RuhrmairBK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/SadeghiVW10,
  author       = {Ahmad{-}Reza Sadeghi and
                  Ivan Visconti and
                  Christian Wachsmann},
  editor       = {Ahmad{-}Reza Sadeghi and
                  David Naccache},
  title        = {Enhancing {RFID} Security and Privacy by Physically Unclonable Functions},
  booktitle    = {Towards Hardware-Intrinsic Security - Foundations and Practice},
  series       = {Information Security and Cryptography},
  pages        = {281--305},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14452-3\_13},
  doi          = {10.1007/978-3-642-14452-3\_13},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/SadeghiVW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/Schnorr10,
  author       = {Claus{-}Peter Schnorr},
  editor       = {Phong Q. Nguyen and
                  Brigitte Vall{\'{e}}e},
  title        = {Progress on {LLL} and Lattice Reduction},
  booktitle    = {The {LLL} Algorithm - Survey and Applications},
  series       = {Information Security and Cryptography},
  pages        = {145--178},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-02295-1\_4},
  doi          = {10.1007/978-3-642-02295-1\_4},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/Schnorr10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/Simon10,
  author       = {Denis Simon},
  editor       = {Phong Q. Nguyen and
                  Brigitte Vall{\'{e}}e},
  title        = {Selected Applications of {LLL} in Number Theory},
  booktitle    = {The {LLL} Algorithm - Survey and Applications},
  series       = {Information Security and Cryptography},
  pages        = {265--282},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-02295-1\_7},
  doi          = {10.1007/978-3-642-02295-1\_7},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/Simon10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/SmeetsLLLB10,
  author       = {Ionica Smeets and
                  Arjen K. Lenstra and
                  Hendrik Lenstra and
                  L{\'{a}}szl{\'{o}} Lov{\'{a}}sz and
                  Peter van Emde Boas},
  editor       = {Phong Q. Nguyen and
                  Brigitte Vall{\'{e}}e},
  title        = {The History of the LLL-Algorithm},
  booktitle    = {The {LLL} Algorithm - Survey and Applications},
  series       = {Information Security and Cryptography},
  pages        = {1--17},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-02295-1\_1},
  doi          = {10.1007/978-3-642-02295-1\_1},
  timestamp    = {Tue, 06 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/SmeetsLLLB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/StandaertPYQYO10,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Olivier Pereira and
                  Yu Yu and
                  Jean{-}Jacques Quisquater and
                  Moti Yung and
                  Elisabeth Oswald},
  editor       = {Ahmad{-}Reza Sadeghi and
                  David Naccache},
  title        = {Leakage Resilient Cryptography in Practice},
  booktitle    = {Towards Hardware-Intrinsic Security - Foundations and Practice},
  series       = {Information Security and Cryptography},
  pages        = {99--134},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14452-3\_5},
  doi          = {10.1007/978-3-642-14452-3\_5},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/isc/StandaertPYQYO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/Stehle10,
  author       = {Damien Stehl{\'{e}}},
  editor       = {Phong Q. Nguyen and
                  Brigitte Vall{\'{e}}e},
  title        = {Floating-Point {LLL:} Theoretical and Practical Aspects},
  booktitle    = {The {LLL} Algorithm - Survey and Applications},
  series       = {Information Security and Cryptography},
  pages        = {179--213},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-02295-1\_5},
  doi          = {10.1007/978-3-642-02295-1\_5},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/Stehle10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/TehranipoorS10,
  author       = {Mohammad Tehranipoor and
                  Berk Sunar},
  editor       = {Ahmad{-}Reza Sadeghi and
                  David Naccache},
  title        = {Hardware Trojan Horses},
  booktitle    = {Towards Hardware-Intrinsic Security - Foundations and Practice},
  series       = {Information Security and Cryptography},
  pages        = {167--187},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14452-3\_7},
  doi          = {10.1007/978-3-642-14452-3\_7},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/TehranipoorS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/UllmannV10,
  author       = {Markus Ullmann and
                  Matthias V{\"{o}}geler},
  editor       = {Ahmad{-}Reza Sadeghi and
                  David Naccache},
  title        = {Contactless Security Token Enhanced Security by Using New Hardware
                  Features in Cryptographic-Based Security Mechanisms},
  booktitle    = {Towards Hardware-Intrinsic Security - Foundations and Practice},
  series       = {Information Security and Cryptography},
  pages        = {259--279},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14452-3\_12},
  doi          = {10.1007/978-3-642-14452-3\_12},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/UllmannV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/ValleeV10,
  author       = {Brigitte Vall{\'{e}}e and
                  Antonio Vera},
  editor       = {Phong Q. Nguyen and
                  Brigitte Vall{\'{e}}e},
  title        = {Probabilistic Analyses of Lattice Reduction Algorithms},
  booktitle    = {The {LLL} Algorithm - Survey and Applications},
  series       = {Information Security and Cryptography},
  pages        = {71--143},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-02295-1\_3},
  doi          = {10.1007/978-3-642-02295-1\_3},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/ValleeV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/Zheng10,
  author       = {Yuliang Zheng},
  editor       = {Alexander W. Dent and
                  Yuliang Zheng},
  title        = {Introduction},
  booktitle    = {Practical Signcryption},
  series       = {Information Security and Cryptography},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-540-89411-7\_1},
  doi          = {10.1007/978-3-540-89411-7\_1},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/isc/Zheng10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/isc/354089409,
  editor       = {Alexander W. Dent and
                  Yuliang Zheng},
  title        = {Practical Signcryption},
  series       = {Information Security and Cryptography},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-540-89411-7},
  doi          = {10.1007/978-3-540-89411-7},
  isbn         = {978-3-540-89409-4},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/isc/354089409.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/isc/364202294,
  editor       = {Phong Q. Nguyen and
                  Brigitte Vall{\'{e}}e},
  title        = {The {LLL} Algorithm - Survey and Applications},
  series       = {Information Security and Cryptography},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-02295-1},
  doi          = {10.1007/978-3-642-02295-1},
  isbn         = {978-3-642-02294-4},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/364202294.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/isc/364214451,
  editor       = {Ahmad{-}Reza Sadeghi and
                  David Naccache},
  title        = {Towards Hardware-Intrinsic Security - Foundations and Practice},
  series       = {Information Security and Cryptography},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14452-3},
  doi          = {10.1007/978-3-642-14452-3},
  isbn         = {978-3-642-14451-6},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/364214451.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/isc/Bella07,
  author       = {Giampaolo Bella},
  title        = {Formal Correctness of Security Protocols - With 62 Figures and 4 Tables},
  series       = {Information Security and Cryptography},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-68136-6},
  doi          = {10.1007/978-3-540-68136-6},
  isbn         = {978-3-540-68134-2},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/Bella07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/isc/DelfsK07,
  author       = {Hans Delfs and
                  Helmut Knebl},
  title        = {Introduction to Cryptography - Principles and Applications, Second
                  Edition},
  series       = {Information Security and Cryptography},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/3-540-49244-5},
  doi          = {10.1007/3-540-49244-5},
  isbn         = {978-3-540-49243-6},
  timestamp    = {Tue, 09 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/DelfsK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/Rosen06,
  author       = {Alon Rosen},
  title        = {Concurrent Zero-Knowledge - With Additional Background by Oded Goldreich},
  series       = {Information Security and Cryptography},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/3-540-32939-0},
  doi          = {10.1007/3-540-32939-0},
  isbn         = {978-3-540-32938-1},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/Rosen06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/isc/BoydM03,
  author       = {Colin Boyd and
                  Anish Mathuria},
  title        = {Protocols for Authentication and Key Establishment},
  series       = {Information Security and Cryptography},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-662-09527-0},
  doi          = {10.1007/978-3-662-09527-0},
  isbn         = {978-3-642-07716-6},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/isc/BoydM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/DaemenR02,
  author       = {Joan Daemen and
                  Vincent Rijmen},
  title        = {The Design of Rijndael: {AES} - The Advanced Encryption Standard},
  series       = {Information Security and Cryptography},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-662-04722-4},
  doi          = {10.1007/978-3-662-04722-4},
  isbn         = {3-540-42580-2},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/DaemenR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/DelfsK02,
  author       = {Hans Delfs and
                  Helmut Knebl},
  title        = {Introduction to Cryptography - Principles and Applications},
  series       = {Information Security and Cryptography},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-642-87126-9},
  doi          = {10.1007/978-3-642-87126-9},
  isbn         = {3-540-42278-1},
  timestamp    = {Tue, 09 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/DelfsK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics