Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "stream:series/isc:"
@book{DBLP:series/isc/Chuat22, author = {Laurent Chuat and Markus Legner and David A. Basin and David Hausheer and Samuel Hitz and Peter M{\"{u}}ller and Adrian Perrig}, title = {The Complete Guide to {SCION} - From Design Principles to Formal Verification}, series = {Information Security and Cryptography}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-05288-0}, doi = {10.1007/978-3-031-05288-0}, isbn = {978-3-031-05287-3}, timestamp = {Wed, 25 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/Chuat22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/isc/Schwenk22, author = {J{\"{o}}rg Schwenk}, title = {Guide to Internet Cryptography - Security Protocols and Real-World Attack Implications}, series = {Information Security and Cryptography}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-19439-9}, doi = {10.1007/978-3-031-19439-9}, isbn = {978-3-031-19438-2}, timestamp = {Thu, 22 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/isc/Schwenk22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/isc/Lin21, author = {Yan Lin}, title = {Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity}, series = {Information Security and Cryptography}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-73141-0}, doi = {10.1007/978-3-030-73141-0}, isbn = {978-3-030-73140-3}, timestamp = {Mon, 03 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/Lin21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/isc/MittelbachF21, author = {Arno Mittelbach and Marc Fischlin}, title = {The Theory of Hash Functions and Random Oracles - An Approach to Modern Cryptography}, series = {Information Security and Cryptography}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-63287-8}, doi = {10.1007/978-3-030-63287-8}, isbn = {978-3-030-63286-1}, timestamp = {Fri, 29 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/isc/MittelbachF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/isc/Oorschot21, author = {Paul C. van Oorschot}, title = {Computer Security and the Internet - Tools and Jewels from Malware to Bitcoin, Second Edition}, series = {Information Security and Cryptography}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-83411-1}, doi = {10.1007/978-3-030-83411-1}, isbn = {978-3-030-83410-4}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/Oorschot21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/isc/AlvimCMMPS20, author = {M{\'{a}}rio S. Alvim and Konstantinos Chatzikokolakis and Annabelle McIver and Carroll Morgan and Catuscia Palamidessi and Geoffrey Smith}, title = {The Science of Quantitative Information Flow}, series = {Information Security and Cryptography}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-319-96131-6}, doi = {10.1007/978-3-319-96131-6}, isbn = {978-3-319-96129-3}, timestamp = {Wed, 19 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/AlvimCMMPS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/isc/BoydMS20, author = {Colin Boyd and Anish Mathuria and Douglas Stebila}, title = {Protocols for Authentication and Key Establishment, Second Edition}, series = {Information Security and Cryptography}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-662-58146-9}, doi = {10.1007/978-3-662-58146-9}, isbn = {978-3-662-58145-2}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/BoydMS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/isc/DaemenR20, author = {Joan Daemen and Vincent Rijmen}, title = {The Design of Rijndael - The Advanced Encryption Standard (AES), Second Edition}, series = {Information Security and Cryptography}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-662-60769-5}, doi = {10.1007/978-3-662-60769-5}, isbn = {978-3-662-60768-8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/DaemenR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/isc/Oorschot20, author = {Paul C. van Oorschot}, title = {Computer Security and the Internet - Tools and Jewels}, series = {Information Security and Cryptography}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-33649-3}, doi = {10.1007/978-3-030-33649-3}, isbn = {978-3-030-33648-6}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/Oorschot20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/isc/Giustolisi18, author = {Rosario Giustolisi}, title = {Modelling and Verification of Secure Exams}, series = {Information Security and Cryptography}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-67107-9}, doi = {10.1007/978-3-319-67107-9}, isbn = {978-3-319-67106-2}, timestamp = {Tue, 20 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/isc/Giustolisi18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/isc/PerrigSRC17, author = {Adrian Perrig and Pawel Szalachowski and Raphael M. Reischuk and Laurent Chuat}, title = {{SCION:} {A} Secure Internet Architecture}, series = {Information Security and Cryptography}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-67080-5}, doi = {10.1007/978-3-319-67080-5}, isbn = {978-3-319-67079-9}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/isc/PerrigSRC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/isc/Reardon16, author = {Joel Reardon}, title = {Secure Data Deletion}, series = {Information Security and Cryptography}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-28778-2}, doi = {10.1007/978-3-319-28778-2}, isbn = {978-3-319-28777-5}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/Reardon16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/isc/Smart16, author = {Nigel P. Smart}, title = {Cryptography Made Simple}, series = {Information Security and Cryptography}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-21936-3}, doi = {10.1007/978-3-319-21936-3}, isbn = {978-3-319-21935-6}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/Smart16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/isc/DelfsK15, author = {Hans Delfs and Helmut Knebl}, title = {Introduction to Cryptography - Principles and Applications, Third Edition}, series = {Information Security and Cryptography}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47974-2}, doi = {10.1007/978-3-662-47974-2}, isbn = {978-3-662-47973-5}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/DelfsK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/isc/Applebaum14, author = {Benny Applebaum}, title = {Cryptography in Constant Parallel Time}, series = {Information Security and Cryptography}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-17367-7}, doi = {10.1007/978-3-642-17367-7}, isbn = {978-3-642-17366-0}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/Applebaum14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/isc/AumassonMPH14, author = {Jean{-}Philippe Aumasson and Willi Meier and Raphael C.{-}W. Phan and Luca Henzen}, title = {The Hash Function {BLAKE}}, series = {Information Security and Cryptography}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44757-4}, doi = {10.1007/978-3-662-44757-4}, isbn = {978-3-662-44756-7}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/AumassonMPH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/Cremers12, author = {Cas Cremers and Sjouke Mauw}, title = {Operational Semantics and Verification of Security Protocols}, series = {Information Security and Cryptography}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-540-78636-8}, doi = {10.1007/978-3-540-78636-8}, isbn = {978-3-540-78636-8}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/Cremers12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/AkdemirWKS12, author = {Kahraman D. Akdemir and Zhen Wang and Mark G. Karpovsky and Berk Sunar}, editor = {Marc Joye and Michael Tunstall}, title = {Design of Cryptographic Devices Resilient to Fault Injection Attacks Using Nonlinear Robust Codes}, booktitle = {Fault Analysis in Cryptography}, series = {Information Security and Cryptography}, pages = {171--199}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29656-7\_11}, doi = {10.1007/978-3-642-29656-7\_11}, timestamp = {Fri, 27 Mar 2020 08:31:50 +0100}, biburl = {https://dblp.org/rec/series/isc/AkdemirWKS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/AlkhoraidlyDH12, author = {Abdulaziz Alkhoraidly and Agustin Dominguez{-}Oviedo and M. Anwar Hasan}, editor = {Marc Joye and Michael Tunstall}, title = {Fault Attacks on Elliptic Curve Cryptosystems}, booktitle = {Fault Analysis in Cryptography}, series = {Information Security and Cryptography}, pages = {137--155}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29656-7\_9}, doi = {10.1007/978-3-642-29656-7\_9}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/AlkhoraidlyDH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/BarenghiBBPP12, author = {Alessandro Barenghi and Guido Marco Bertoni and Luca Breveglieri and Mauro Pellicioli and Gerardo Pelosi}, editor = {Marc Joye and Michael Tunstall}, title = {Injection Technologies for Fault Attacks on Microprocessors}, booktitle = {Fault Analysis in Cryptography}, series = {Information Security and Cryptography}, pages = {275--293}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29656-7\_16}, doi = {10.1007/978-3-642-29656-7\_16}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/isc/BarenghiBBPP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/BarenghiT12, author = {Alessandro Barenghi and Elena Trichina}, editor = {Marc Joye and Michael Tunstall}, title = {Fault Attacks on Stream Ciphers}, booktitle = {Fault Analysis in Cryptography}, series = {Information Security and Cryptography}, pages = {239--255}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29656-7\_14}, doi = {10.1007/978-3-642-29656-7\_14}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/BarenghiT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/BerzatiCG12, author = {Alexandre Berzati and C{\'{e}}cile Canovas{-}Dumas and Louis Goubin}, editor = {Marc Joye and Michael Tunstall}, title = {A Survey of Differential Fault Analysis Against Classical {RSA} Implementations}, booktitle = {Fault Analysis in Cryptography}, series = {Information Security and Cryptography}, pages = {111--124}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29656-7\_7}, doi = {10.1007/978-3-642-29656-7\_7}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/BerzatiCG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/BousselamNFR12, author = {Kaouthar Bousselam and Giorgio Di Natale and Marie{-}Lise Flottes and Bruno Rouzeyre}, editor = {Marc Joye and Michael Tunstall}, title = {On Countermeasures Against Fault Attacks on the Advanced Encryption Standard}, booktitle = {Fault Analysis in Cryptography}, series = {Information Security and Cryptography}, pages = {89--108}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29656-7\_6}, doi = {10.1007/978-3-642-29656-7\_6}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/BousselamNFR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/Clavier12, author = {Christophe Clavier}, editor = {Marc Joye and Michael Tunstall}, title = {Attacking Block Ciphers}, booktitle = {Fault Analysis in Cryptography}, series = {Information Security and Cryptography}, pages = {19--35}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29656-7\_2}, doi = {10.1007/978-3-642-29656-7\_2}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/Clavier12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/Giraud12, author = {Christophe Giraud}, editor = {Marc Joye and Michael Tunstall}, title = {Differential Fault Analysis of the Advanced Encryption Standard}, booktitle = {Fault Analysis in Cryptography}, series = {Information Security and Cryptography}, pages = {55--72}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29656-7\_4}, doi = {10.1007/978-3-642-29656-7\_4}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/Giraud12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/GuilleyD12, author = {Sylvain Guilley and Jean{-}Luc Danger}, editor = {Marc Joye and Michael Tunstall}, title = {Global Faults on Cryptographic Circuits}, booktitle = {Fault Analysis in Cryptography}, series = {Information Security and Cryptography}, pages = {295--311}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29656-7\_17}, doi = {10.1007/978-3-642-29656-7\_17}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/GuilleyD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/HaririR12, author = {Arash Hariri and Arash Reyhani{-}Masoleh}, editor = {Marc Joye and Michael Tunstall}, title = {On Countermeasures Against Fault Attacks on Elliptic Curve Cryptography Using Fault Detection}, booktitle = {Fault Analysis in Cryptography}, series = {Information Security and Cryptography}, pages = {157--169}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29656-7\_10}, doi = {10.1007/978-3-642-29656-7\_10}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/HaririR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/KimQ12, author = {Chong Hee Kim and Jean{-}Jacques Quisquater}, editor = {Marc Joye and Michael Tunstall}, title = {Fault Attacks Against {RSA-CRT} Implementation}, booktitle = {Fault Analysis in Cryptography}, series = {Information Security and Cryptography}, pages = {125--136}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29656-7\_8}, doi = {10.1007/978-3-642-29656-7\_8}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/KimQ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/MrabetPV12, author = {Nadia El Mrabet and Dan Page and Frederik Vercauteren}, editor = {Marc Joye and Michael Tunstall}, title = {Fault Attacks on Pairing-Based Cryptography}, booktitle = {Fault Analysis in Cryptography}, series = {Information Security and Cryptography}, pages = {221--236}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29656-7\_13}, doi = {10.1007/978-3-642-29656-7\_13}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/MrabetPV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/NguyenT12, author = {Phong Q. Nguyen and Mehdi Tibouchi}, editor = {Marc Joye and Michael Tunstall}, title = {Lattice-Based Fault Attacks on Signatures}, booktitle = {Fault Analysis in Cryptography}, series = {Information Security and Cryptography}, pages = {201--220}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29656-7\_12}, doi = {10.1007/978-3-642-29656-7\_12}, timestamp = {Wed, 14 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/NguyenT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/OswaldS12, author = {Elisabeth Oswald and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Marc Joye and Michael Tunstall}, title = {Side-Channel Analysis and Its Relevance to Fault Attacks}, booktitle = {Fault Analysis in Cryptography}, series = {Information Security and Cryptography}, pages = {3--15}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29656-7\_1}, doi = {10.1007/978-3-642-29656-7\_1}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/isc/OswaldS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/RegazzoniBIK12, author = {Francesco Regazzoni and Luca Breveglieri and Paolo Ienne and Israel Koren}, editor = {Marc Joye and Michael Tunstall}, title = {Interaction Between Fault Attack Countermeasures and the Resistance Against Power Analysis Attacks}, booktitle = {Fault Analysis in Cryptography}, series = {Information Security and Cryptography}, pages = {257--272}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29656-7\_15}, doi = {10.1007/978-3-642-29656-7\_15}, timestamp = {Tue, 31 Mar 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/RegazzoniBIK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/Rivain12, author = {Matthieu Rivain}, editor = {Marc Joye and Michael Tunstall}, title = {Differential Fault Analysis of {DES}}, booktitle = {Fault Analysis in Cryptography}, series = {Information Security and Cryptography}, pages = {37--54}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29656-7\_3}, doi = {10.1007/978-3-642-29656-7\_3}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/Rivain12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/SchmidtM12, author = {J{\"{o}}rn{-}Marc Schmidt and Marcel Medwed}, editor = {Marc Joye and Michael Tunstall}, title = {Countermeasures for Symmetric Key Ciphers}, booktitle = {Fault Analysis in Cryptography}, series = {Information Security and Cryptography}, pages = {73--87}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29656-7\_5}, doi = {10.1007/978-3-642-29656-7\_5}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/SchmidtM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/TakahashiFGLSO12, author = {Junko Takahashi and Toshinori Fukunaga and Shigeto Gomisawa and Yang Li and Kazuo Sakiyama and Kazuo Ohta}, editor = {Marc Joye and Michael Tunstall}, title = {Fault Injection and Key Retrieval Experiments on an Evaluation Board}, booktitle = {Fault Analysis in Cryptography}, series = {Information Security and Cryptography}, pages = {313--331}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29656-7\_18}, doi = {10.1007/978-3-642-29656-7\_18}, timestamp = {Thu, 22 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/TakahashiFGLSO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/isc/364229655, editor = {Marc Joye and Michael Tunstall}, title = {Fault Analysis in Cryptography}, series = {Information Security and Cryptography}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29656-7}, doi = {10.1007/978-3-642-29656-7}, isbn = {978-3-642-29655-0}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/isc/364229655.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/daglib/0028270, author = {Lars R. Knudsen and Matthew Robshaw}, title = {The Block Cipher Companion}, series = {Information Security and Cryptography}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-17342-4}, doi = {10.1007/978-3-642-17342-4}, isbn = {978-3-642-17341-7}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/daglib/0028270.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/isc/Bohme10, author = {Rainer B{\"{o}}hme}, title = {Advanced Statistical Steganalysis}, series = {Information Security and Cryptography}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14313-7}, doi = {10.1007/978-3-642-14313-7}, isbn = {978-3-642-14312-0}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/Bohme10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/isc/HazayL10, author = {Carmit Hazay and Yehuda Lindell}, title = {Efficient Secure Two-Party Protocols - Techniques and Constructions}, series = {Information Security and Cryptography}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14303-8}, doi = {10.1007/978-3-642-14303-8}, isbn = {978-3-642-14302-1}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/HazayL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/isc/Yekhanin10, author = {Sergey Yekhanin}, title = {Locally Decodable Codes and Private Information Retrieval Schemes}, series = {Information Security and Cryptography}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14358-8}, doi = {10.1007/978-3-642-14358-8}, isbn = {978-3-642-14357-1}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/Yekhanin10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/AardalE10, author = {Karen I. Aardal and Friedrich Eisenbrand}, editor = {Phong Q. Nguyen and Brigitte Vall{\'{e}}e}, title = {The {LLL} Algorithm and Integer Programming}, booktitle = {The {LLL} Algorithm - Survey and Applications}, series = {Information Security and Cryptography}, pages = {293--314}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-02295-1\_9}, doi = {10.1007/978-3-642-02295-1\_9}, timestamp = {Tue, 25 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/AardalE10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/AnR10, author = {Jee Hea An and Tal Rabin}, editor = {Alexander W. Dent and Yuliang Zheng}, title = {Security for Signcryption: The Two-User Model}, booktitle = {Practical Signcryption}, series = {Information Security and Cryptography}, pages = {21--42}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-540-89411-7\_2}, doi = {10.1007/978-3-540-89411-7\_2}, timestamp = {Tue, 30 Nov 2021 15:21:24 +0100}, biburl = {https://dblp.org/rec/series/isc/AnR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/ArmknechtMSST10, author = {Frederik Armknecht and Roel Maes and Ahmad{-}Reza Sadeghi and Berk Sunar and Pim Tuyls}, editor = {Ahmad{-}Reza Sadeghi and David Naccache}, title = {Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions}, booktitle = {Towards Hardware-Intrinsic Security - Foundations and Practice}, series = {Information Security and Cryptography}, pages = {135--164}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14452-3\_6}, doi = {10.1007/978-3-642-14452-3\_6}, timestamp = {Tue, 16 May 2017 14:24:21 +0200}, biburl = {https://dblp.org/rec/series/isc/ArmknechtMSST10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/BaekGKN10, author = {Yoo{-}Jin Baek and Vanessa Gratzer and Sung{-}Hyun Kim and David Naccache}, editor = {Ahmad{-}Reza Sadeghi and David Naccache}, title = {Extracting Unknown Keys from Unknown Algorithms Encrypting Unknown Fixed Messages and Returning No Results}, booktitle = {Towards Hardware-Intrinsic Security - Foundations and Practice}, series = {Information Security and Cryptography}, pages = {189--197}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14452-3\_8}, doi = {10.1007/978-3-642-14452-3\_8}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/BaekGKN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/BaekS10, author = {Joonsang Baek and Ron Steinfeld}, editor = {Alexander W. Dent and Yuliang Zheng}, title = {Security for Signcryption: The Multi-User Model}, booktitle = {Practical Signcryption}, series = {Information Security and Cryptography}, pages = {43--53}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-540-89411-7\_3}, doi = {10.1007/978-3-540-89411-7\_3}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/BaekS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/BarretoLMQ10, author = {Paulo S. L. M. Barreto and Beno{\^{\i}}t Libert and Noel McCullagh and Jean{-}Jacques Quisquater}, editor = {Alexander W. Dent and Yuliang Zheng}, title = {Signcryption Schemes Based on the Diffie-Hellman Problem}, booktitle = {Practical Signcryption}, series = {Information Security and Cryptography}, pages = {57--69}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-540-89411-7\_4}, doi = {10.1007/978-3-540-89411-7\_4}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/BarretoLMQ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/BarretoLMQ10a, author = {Paulo S. L. M. Barreto and Beno{\^{\i}}t Libert and Noel McCullagh and Jean{-}Jacques Quisquater}, editor = {Alexander W. Dent and Yuliang Zheng}, title = {Signcryption Schemes Based on Bilinear Maps}, booktitle = {Practical Signcryption}, series = {Information Security and Cryptography}, pages = {71--97}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-540-89411-7\_5}, doi = {10.1007/978-3-540-89411-7\_5}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/BarretoLMQ10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/Bjorstad10, author = {Tor E. Bj{\o}rstad}, editor = {Alexander W. Dent and Yuliang Zheng}, title = {Hybrid Signcryption}, booktitle = {Practical Signcryption}, series = {Information Security and Cryptography}, pages = {121--147}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-540-89411-7\_7}, doi = {10.1007/978-3-540-89411-7\_7}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/Bjorstad10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/Boyen10, author = {Xavier Boyen}, editor = {Alexander W. Dent and Yuliang Zheng}, title = {Identity-Based Signcryption}, booktitle = {Practical Signcryption}, series = {Information Security and Cryptography}, pages = {195--216}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-540-89411-7\_10}, doi = {10.1007/978-3-540-89411-7\_10}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/Boyen10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/CuiH10, author = {Yang Cui and Goichiro Hanaoka}, editor = {Alexander W. Dent and Yuliang Zheng}, title = {Applications of Signcryption}, booktitle = {Practical Signcryption}, series = {Information Security and Cryptography}, pages = {241--256}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-540-89411-7\_12}, doi = {10.1007/978-3-540-89411-7\_12}, timestamp = {Wed, 08 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/CuiH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/DengCS10, author = {Daniel Y. Deng and Andrew H. Chan and G. Edward Suh}, editor = {Ahmad{-}Reza Sadeghi and David Naccache}, title = {Authentication of Processor Hardware Leveraging Performance Limits in Detailed Simulations and Emulations}, booktitle = {Towards Hardware-Intrinsic Security - Foundations and Practice}, series = {Information Security and Cryptography}, pages = {309--329}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14452-3\_14}, doi = {10.1007/978-3-642-14452-3\_14}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/DengCS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/Dent10, author = {Alexander W. Dent}, editor = {Alexander W. Dent and Yuliang Zheng}, title = {Key Establishment Using Signcryption Techniques}, booktitle = {Practical Signcryption}, series = {Information Security and Cryptography}, pages = {217--240}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-540-89411-7\_11}, doi = {10.1007/978-3-540-89411-7\_11}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/Dent10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/DentM10, author = {Alexander W. Dent and John Malone{-}Lee}, editor = {Alexander W. Dent and Yuliang Zheng}, title = {Signcryption Schemes Based on the {RSA} Problem}, booktitle = {Practical Signcryption}, series = {Information Security and Cryptography}, pages = {99--117}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-540-89411-7\_6}, doi = {10.1007/978-3-540-89411-7\_6}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/DentM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/Dodis10, author = {Yevgeniy Dodis}, editor = {Alexander W. Dent and Yuliang Zheng}, title = {Concealment and Its Applications to Authenticated Encryption}, booktitle = {Practical Signcryption}, series = {Information Security and Cryptography}, pages = {149--173}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-540-89411-7\_8}, doi = {10.1007/978-3-540-89411-7\_8}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/Dodis10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/DuflotGLM10, author = {Lo{\"{\i}}c Duflot and Olivier Grumelard and Olivier Levillain and Benjamin Morin}, editor = {Ahmad{-}Reza Sadeghi and David Naccache}, title = {On the Limits of Hypervisor- and Virtual Machine Monitor-Based Isolation}, booktitle = {Towards Hardware-Intrinsic Security - Foundations and Practice}, series = {Information Security and Cryptography}, pages = {349--366}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14452-3\_16}, doi = {10.1007/978-3-642-14452-3\_16}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/DuflotGLM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/Gentry10, author = {Craig Gentry}, editor = {Phong Q. Nguyen and Brigitte Vall{\'{e}}e}, title = {The Geometry of Provable Security: Some Proofs of Security in Which Lattices Make a Surprise Appearance}, booktitle = {The {LLL} Algorithm - Survey and Applications}, series = {Information Security and Cryptography}, pages = {391--426}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-02295-1\_12}, doi = {10.1007/978-3-642-02295-1\_12}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/Gentry10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/GuajardoAP10, author = {Jorge Guajardo and Muhammad Asim and Milan Petkovic}, editor = {Ahmad{-}Reza Sadeghi and David Naccache}, title = {Towards Reliable Remote Healthcare Applications Using Combined Fuzzy Extraction}, booktitle = {Towards Hardware-Intrinsic Security - Foundations and Practice}, series = {Information Security and Cryptography}, pages = {387--407}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14452-3\_18}, doi = {10.1007/978-3-642-14452-3\_18}, timestamp = {Thu, 18 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/GuajardoAP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/HammouriDS10, author = {Ghaith Hammouri and Aykutlu Dana and Berk Sunar}, editor = {Ahmad{-}Reza Sadeghi and David Naccache}, title = {License Distribution Protocols from Optical Media Fingerprints}, booktitle = {Towards Hardware-Intrinsic Security - Foundations and Practice}, series = {Information Security and Cryptography}, pages = {201--222}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14452-3\_9}, doi = {10.1007/978-3-642-14452-3\_9}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/HammouriDS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/HandschuhST10, author = {Helena Handschuh and Geert Jan Schrijen and Pim Tuyls}, editor = {Ahmad{-}Reza Sadeghi and David Naccache}, title = {Hardware Intrinsic Security from Physically Unclonable Functions}, booktitle = {Towards Hardware-Intrinsic Security - Foundations and Practice}, series = {Information Security and Cryptography}, pages = {39--53}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14452-3\_2}, doi = {10.1007/978-3-642-14452-3\_2}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/HandschuhST10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/Hanrot10, author = {Guillaume Hanrot}, editor = {Phong Q. Nguyen and Brigitte Vall{\'{e}}e}, title = {{LLL:} {A} Tool for Effective Diophantine Approximation}, booktitle = {The {LLL} Algorithm - Survey and Applications}, series = {Information Security and Cryptography}, pages = {215--263}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-02295-1\_6}, doi = {10.1007/978-3-642-02295-1\_6}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/Hanrot10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/HoffsteinHPW10, author = {Jeffrey Hoffstein and Nick Howgrave{-}Graham and Jill Pipher and William Whyte}, editor = {Phong Q. Nguyen and Brigitte Vall{\'{e}}e}, title = {Practical Lattice-Based Cryptography: NTRUEncrypt and NTRUSign}, booktitle = {The {LLL} Algorithm - Survey and Applications}, series = {Information Security and Cryptography}, pages = {349--390}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-02295-1\_11}, doi = {10.1007/978-3-642-02295-1\_11}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/HoffsteinHPW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/JarvinenKS010, author = {Kimmo J{\"{a}}rvinen and Vladimir Kolesnikov and Ahmad{-}Reza Sadeghi and Thomas Schneider}, editor = {Ahmad{-}Reza Sadeghi and David Naccache}, title = {Efficient Secure Two-Party Computation with Untrusted Hardware Tokens (Full Version)}, booktitle = {Towards Hardware-Intrinsic Security - Foundations and Practice}, series = {Information Security and Cryptography}, pages = {367--386}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14452-3\_17}, doi = {10.1007/978-3-642-14452-3\_17}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/isc/JarvinenKS010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/Khot10, author = {Subhash Khot}, editor = {Phong Q. Nguyen and Brigitte Vall{\'{e}}e}, title = {Inapproximability Results for Computational Problems on Lattices}, booktitle = {The {LLL} Algorithm - Survey and Applications}, series = {Information Security and Cryptography}, pages = {453--473}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-02295-1\_14}, doi = {10.1007/978-3-642-02295-1\_14}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/Khot10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/KimMNSVZ10, author = {Inyoung Kim and Abhranil Maiti and Leyla Nazhandali and Patrick Schaumont and Vignesh Vivekraja and Huaiye Zhang}, editor = {Ahmad{-}Reza Sadeghi and David Naccache}, title = {From Statistics to Circuits: Foundations for Future Physical Unclonable Functions}, booktitle = {Towards Hardware-Intrinsic Security - Foundations and Practice}, series = {Information Security and Cryptography}, pages = {55--78}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14452-3\_3}, doi = {10.1007/978-3-642-14452-3\_3}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/KimMNSVZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/Kirovski10, author = {Darko Kirovski}, editor = {Ahmad{-}Reza Sadeghi and David Naccache}, title = {Anti-counterfeiting: Mixing the Physical and the Digital World}, booktitle = {Towards Hardware-Intrinsic Security - Foundations and Practice}, series = {Information Security and Cryptography}, pages = {223--233}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14452-3\_10}, doi = {10.1007/978-3-642-14452-3\_10}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/Kirovski10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/Kluners10, author = {J{\"{u}}rgen Kl{\"{u}}ners}, editor = {Phong Q. Nguyen and Brigitte Vall{\'{e}}e}, title = {The van Hoeij Algorithm for Factoring Polynomials}, booktitle = {The {LLL} Algorithm - Survey and Applications}, series = {Information Security and Cryptography}, pages = {283--291}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-02295-1\_8}, doi = {10.1007/978-3-642-02295-1\_8}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/Kluners10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/Kuhn10, author = {Markus G. Kuhn}, editor = {Ahmad{-}Reza Sadeghi and David Naccache}, title = {Signal Authentication in Trusted Satellite Navigation Receivers}, booktitle = {Towards Hardware-Intrinsic Security - Foundations and Practice}, series = {Information Security and Cryptography}, pages = {331--348}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14452-3\_15}, doi = {10.1007/978-3-642-14452-3\_15}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/Kuhn10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/LeeBSPV10, author = {Yong Ki Lee and Lejla Batina and Dave Singel{\'{e}}e and Bart Preneel and Ingrid Verbauwhede}, editor = {Ahmad{-}Reza Sadeghi and David Naccache}, title = {Anti-counterfeiting, Untraceability and Other Security Challenges for {RFID} Systems: Public-Key-Based Protocols and Hardware}, booktitle = {Towards Hardware-Intrinsic Security - Foundations and Practice}, series = {Information Security and Cryptography}, pages = {237--257}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14452-3\_11}, doi = {10.1007/978-3-642-14452-3\_11}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/LeeBSPV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/MaesV10, author = {Roel Maes and Ingrid Verbauwhede}, editor = {Ahmad{-}Reza Sadeghi and David Naccache}, title = {Physically Unclonable Functions: {A} Study on the State of the Art and Future Research Directions}, booktitle = {Towards Hardware-Intrinsic Security - Foundations and Practice}, series = {Information Security and Cryptography}, pages = {3--37}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14452-3\_1}, doi = {10.1007/978-3-642-14452-3\_1}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/isc/MaesV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/May10, author = {Alexander May}, editor = {Phong Q. Nguyen and Brigitte Vall{\'{e}}e}, title = {Using LLL-Reduction for Solving {RSA} and Factorization Problems}, booktitle = {The {LLL} Algorithm - Survey and Applications}, series = {Information Security and Cryptography}, pages = {315--348}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-02295-1\_10}, doi = {10.1007/978-3-642-02295-1\_10}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/isc/May10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/Micciancio10, author = {Daniele Micciancio}, editor = {Phong Q. Nguyen and Brigitte Vall{\'{e}}e}, title = {Cryptographic Functions from Worst-Case Complexity Assumptions}, booktitle = {The {LLL} Algorithm - Survey and Applications}, series = {Information Security and Cryptography}, pages = {427--452}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-02295-1\_13}, doi = {10.1007/978-3-642-02295-1\_13}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/isc/Micciancio10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/Nguyen10, author = {Phong Q. Nguyen}, editor = {Phong Q. Nguyen and Brigitte Vall{\'{e}}e}, title = {Hermite's Constant and Lattice Algorithms}, booktitle = {The {LLL} Algorithm - Survey and Applications}, series = {Information Security and Cryptography}, pages = {19--69}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-02295-1\_2}, doi = {10.1007/978-3-642-02295-1\_2}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/Nguyen10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/PieprzykP10, author = {Josef Pieprzyk and David Pointcheval}, editor = {Alexander W. Dent and Yuliang Zheng}, title = {Parallel Signcryption}, booktitle = {Practical Signcryption}, series = {Information Security and Cryptography}, pages = {175--192}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-540-89411-7\_9}, doi = {10.1007/978-3-540-89411-7\_9}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/isc/PieprzykP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/Regev10, author = {Oded Regev}, editor = {Phong Q. Nguyen and Brigitte Vall{\'{e}}e}, title = {On the Complexity of Lattice Problems with Polynomial Approximation Factors}, booktitle = {The {LLL} Algorithm - Survey and Applications}, series = {Information Security and Cryptography}, pages = {475--496}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-02295-1\_15}, doi = {10.1007/978-3-642-02295-1\_15}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/Regev10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/RuhrmairBK10, author = {Ulrich R{\"{u}}hrmair and Heike Busch and Stefan Katzenbeisser}, editor = {Ahmad{-}Reza Sadeghi and David Naccache}, title = {Strong PUFs: Models, Constructions, and Security Proofs}, booktitle = {Towards Hardware-Intrinsic Security - Foundations and Practice}, series = {Information Security and Cryptography}, pages = {79--96}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14452-3\_4}, doi = {10.1007/978-3-642-14452-3\_4}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/RuhrmairBK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/SadeghiVW10, author = {Ahmad{-}Reza Sadeghi and Ivan Visconti and Christian Wachsmann}, editor = {Ahmad{-}Reza Sadeghi and David Naccache}, title = {Enhancing {RFID} Security and Privacy by Physically Unclonable Functions}, booktitle = {Towards Hardware-Intrinsic Security - Foundations and Practice}, series = {Information Security and Cryptography}, pages = {281--305}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14452-3\_13}, doi = {10.1007/978-3-642-14452-3\_13}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/SadeghiVW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/Schnorr10, author = {Claus{-}Peter Schnorr}, editor = {Phong Q. Nguyen and Brigitte Vall{\'{e}}e}, title = {Progress on {LLL} and Lattice Reduction}, booktitle = {The {LLL} Algorithm - Survey and Applications}, series = {Information Security and Cryptography}, pages = {145--178}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-02295-1\_4}, doi = {10.1007/978-3-642-02295-1\_4}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/Schnorr10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/Simon10, author = {Denis Simon}, editor = {Phong Q. Nguyen and Brigitte Vall{\'{e}}e}, title = {Selected Applications of {LLL} in Number Theory}, booktitle = {The {LLL} Algorithm - Survey and Applications}, series = {Information Security and Cryptography}, pages = {265--282}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-02295-1\_7}, doi = {10.1007/978-3-642-02295-1\_7}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/Simon10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/SmeetsLLLB10, author = {Ionica Smeets and Arjen K. Lenstra and Hendrik Lenstra and L{\'{a}}szl{\'{o}} Lov{\'{a}}sz and Peter van Emde Boas}, editor = {Phong Q. Nguyen and Brigitte Vall{\'{e}}e}, title = {The History of the LLL-Algorithm}, booktitle = {The {LLL} Algorithm - Survey and Applications}, series = {Information Security and Cryptography}, pages = {1--17}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-02295-1\_1}, doi = {10.1007/978-3-642-02295-1\_1}, timestamp = {Tue, 06 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/SmeetsLLLB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/StandaertPYQYO10, author = {Fran{\c{c}}ois{-}Xavier Standaert and Olivier Pereira and Yu Yu and Jean{-}Jacques Quisquater and Moti Yung and Elisabeth Oswald}, editor = {Ahmad{-}Reza Sadeghi and David Naccache}, title = {Leakage Resilient Cryptography in Practice}, booktitle = {Towards Hardware-Intrinsic Security - Foundations and Practice}, series = {Information Security and Cryptography}, pages = {99--134}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14452-3\_5}, doi = {10.1007/978-3-642-14452-3\_5}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/isc/StandaertPYQYO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/Stehle10, author = {Damien Stehl{\'{e}}}, editor = {Phong Q. Nguyen and Brigitte Vall{\'{e}}e}, title = {Floating-Point {LLL:} Theoretical and Practical Aspects}, booktitle = {The {LLL} Algorithm - Survey and Applications}, series = {Information Security and Cryptography}, pages = {179--213}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-02295-1\_5}, doi = {10.1007/978-3-642-02295-1\_5}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/Stehle10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/TehranipoorS10, author = {Mohammad Tehranipoor and Berk Sunar}, editor = {Ahmad{-}Reza Sadeghi and David Naccache}, title = {Hardware Trojan Horses}, booktitle = {Towards Hardware-Intrinsic Security - Foundations and Practice}, series = {Information Security and Cryptography}, pages = {167--187}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14452-3\_7}, doi = {10.1007/978-3-642-14452-3\_7}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/TehranipoorS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/UllmannV10, author = {Markus Ullmann and Matthias V{\"{o}}geler}, editor = {Ahmad{-}Reza Sadeghi and David Naccache}, title = {Contactless Security Token Enhanced Security by Using New Hardware Features in Cryptographic-Based Security Mechanisms}, booktitle = {Towards Hardware-Intrinsic Security - Foundations and Practice}, series = {Information Security and Cryptography}, pages = {259--279}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14452-3\_12}, doi = {10.1007/978-3-642-14452-3\_12}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/UllmannV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/ValleeV10, author = {Brigitte Vall{\'{e}}e and Antonio Vera}, editor = {Phong Q. Nguyen and Brigitte Vall{\'{e}}e}, title = {Probabilistic Analyses of Lattice Reduction Algorithms}, booktitle = {The {LLL} Algorithm - Survey and Applications}, series = {Information Security and Cryptography}, pages = {71--143}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-02295-1\_3}, doi = {10.1007/978-3-642-02295-1\_3}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/ValleeV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/Zheng10, author = {Yuliang Zheng}, editor = {Alexander W. Dent and Yuliang Zheng}, title = {Introduction}, booktitle = {Practical Signcryption}, series = {Information Security and Cryptography}, pages = {1--18}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-540-89411-7\_1}, doi = {10.1007/978-3-540-89411-7\_1}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/isc/Zheng10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/isc/354089409, editor = {Alexander W. Dent and Yuliang Zheng}, title = {Practical Signcryption}, series = {Information Security and Cryptography}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-540-89411-7}, doi = {10.1007/978-3-540-89411-7}, isbn = {978-3-540-89409-4}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/isc/354089409.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/isc/364202294, editor = {Phong Q. Nguyen and Brigitte Vall{\'{e}}e}, title = {The {LLL} Algorithm - Survey and Applications}, series = {Information Security and Cryptography}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-02295-1}, doi = {10.1007/978-3-642-02295-1}, isbn = {978-3-642-02294-4}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/364202294.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/isc/364214451, editor = {Ahmad{-}Reza Sadeghi and David Naccache}, title = {Towards Hardware-Intrinsic Security - Foundations and Practice}, series = {Information Security and Cryptography}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14452-3}, doi = {10.1007/978-3-642-14452-3}, isbn = {978-3-642-14451-6}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/364214451.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/isc/Bella07, author = {Giampaolo Bella}, title = {Formal Correctness of Security Protocols - With 62 Figures and 4 Tables}, series = {Information Security and Cryptography}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-68136-6}, doi = {10.1007/978-3-540-68136-6}, isbn = {978-3-540-68134-2}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/Bella07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/isc/DelfsK07, author = {Hans Delfs and Helmut Knebl}, title = {Introduction to Cryptography - Principles and Applications, Second Edition}, series = {Information Security and Cryptography}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/3-540-49244-5}, doi = {10.1007/3-540-49244-5}, isbn = {978-3-540-49243-6}, timestamp = {Tue, 09 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/DelfsK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/Rosen06, author = {Alon Rosen}, title = {Concurrent Zero-Knowledge - With Additional Background by Oded Goldreich}, series = {Information Security and Cryptography}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/3-540-32939-0}, doi = {10.1007/3-540-32939-0}, isbn = {978-3-540-32938-1}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/Rosen06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/isc/BoydM03, author = {Colin Boyd and Anish Mathuria}, title = {Protocols for Authentication and Key Establishment}, series = {Information Security and Cryptography}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-662-09527-0}, doi = {10.1007/978-3-662-09527-0}, isbn = {978-3-642-07716-6}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/isc/BoydM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/DaemenR02, author = {Joan Daemen and Vincent Rijmen}, title = {The Design of Rijndael: {AES} - The Advanced Encryption Standard}, series = {Information Security and Cryptography}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-662-04722-4}, doi = {10.1007/978-3-662-04722-4}, isbn = {3-540-42580-2}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/DaemenR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/DelfsK02, author = {Hans Delfs and Helmut Knebl}, title = {Introduction to Cryptography - Principles and Applications}, series = {Information Security and Cryptography}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-642-87126-9}, doi = {10.1007/978-3-642-87126-9}, isbn = {3-540-42278-1}, timestamp = {Tue, 09 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/DelfsK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.