Search dblp for Publications

export results for "toc:db/conf/scn/scn2016.bht:"

 download as .bib file

@inproceedings{DBLP:conf/scn/AttrapadungHOOW16,
  author       = {Nuttapong Attrapadung and
                  Goichiro Hanaoka and
                  Kazuto Ogawa and
                  Go Ohtake and
                  Hajime Watanabe and
                  Shota Yamada},
  editor       = {Vassilis Zikas and
                  Roberto De Prisco},
  title        = {Attribute-Based Encryption for Range Attributes},
  booktitle    = {Security and Cryptography for Networks - 10th International Conference,
                  {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9841},
  pages        = {42--61},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44618-9\_3},
  doi          = {10.1007/978-3-319-44618-9\_3},
  timestamp    = {Thu, 23 Jun 2022 19:58:57 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/AttrapadungHOOW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/Baum16,
  author       = {Carsten Baum},
  editor       = {Vassilis Zikas and
                  Roberto De Prisco},
  title        = {On Garbling Schemes with and Without Privacy},
  booktitle    = {Security and Cryptography for Networks - 10th International Conference,
                  {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9841},
  pages        = {468--485},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44618-9\_25},
  doi          = {10.1007/978-3-319-44618-9\_25},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/Baum16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/Beierle16,
  author       = {Christof Beierle},
  editor       = {Vassilis Zikas and
                  Roberto De Prisco},
  title        = {Pen and Paper Arguments for {SIMON} and SIMON-like Designs},
  booktitle    = {Security and Cryptography for Networks - 10th International Conference,
                  {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9841},
  pages        = {431--446},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44618-9\_23},
  doi          = {10.1007/978-3-319-44618-9\_23},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/Beierle16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/BeimelFP16,
  author       = {Amos Beimel and
                  Oriol Farr{\`{a}}s and
                  Naty Peter},
  editor       = {Vassilis Zikas and
                  Roberto De Prisco},
  title        = {Secret Sharing Schemes for Dense Forbidden Graphs},
  booktitle    = {Security and Cryptography for Networks - 10th International Conference,
                  {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9841},
  pages        = {509--528},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44618-9\_27},
  doi          = {10.1007/978-3-319-44618-9\_27},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scn/BeimelFP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/BiagioniMV16,
  author       = {Silvio Biagioni and
                  Daniel Masny and
                  Daniele Venturi},
  editor       = {Vassilis Zikas and
                  Roberto De Prisco},
  title        = {Naor-Yung Paradigm with Shared Randomness and Applications},
  booktitle    = {Security and Cryptography for Networks - 10th International Conference,
                  {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9841},
  pages        = {62--80},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44618-9\_4},
  doi          = {10.1007/978-3-319-44618-9\_4},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/BiagioniMV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/BoldyrevaKLW16,
  author       = {Alexandra Boldyreva and
                  Taesoo Kim and
                  Richard J. Lipton and
                  Bogdan Warinschi},
  editor       = {Vassilis Zikas and
                  Roberto De Prisco},
  title        = {Provably-Secure Remote Memory Attestation for Heap Overflow Protection},
  booktitle    = {Security and Cryptography for Networks - 10th International Conference,
                  {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9841},
  pages        = {83--103},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44618-9\_5},
  doi          = {10.1007/978-3-319-44618-9\_5},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/BoldyrevaKLW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/BradleyFT16,
  author       = {Tatiana Bradley and
                  Sky Faber and
                  Gene Tsudik},
  editor       = {Vassilis Zikas and
                  Roberto De Prisco},
  title        = {Bounded Size-Hiding Private Set Intersection},
  booktitle    = {Security and Cryptography for Networks - 10th International Conference,
                  {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9841},
  pages        = {449--467},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44618-9\_24},
  doi          = {10.1007/978-3-319-44618-9\_24},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/BradleyFT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/BrakerskiD16,
  author       = {Zvika Brakerski and
                  Or Dagmi},
  editor       = {Vassilis Zikas and
                  Roberto De Prisco},
  title        = {Shorter Circuit Obfuscation in Challenging Security Models},
  booktitle    = {Security and Cryptography for Networks - 10th International Conference,
                  {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9841},
  pages        = {551--570},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44618-9\_29},
  doi          = {10.1007/978-3-319-44618-9\_29},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/BrakerskiD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/CamenischEM16,
  author       = {Jan Camenisch and
                  Robert R. Enderlein and
                  Ueli Maurer},
  editor       = {Vassilis Zikas and
                  Roberto De Prisco},
  title        = {Memory Erasability Amplification},
  booktitle    = {Security and Cryptography for Networks - 10th International Conference,
                  {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9841},
  pages        = {104--125},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44618-9\_6},
  doi          = {10.1007/978-3-319-44618-9\_6},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/CamenischEM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/CamenischLNS16,
  author       = {Jan Camenisch and
                  Anja Lehmann and
                  Gregory Neven and
                  Kai Samelin},
  editor       = {Vassilis Zikas and
                  Roberto De Prisco},
  title        = {Virtual Smart Cards: How to Sign with a Password and a Server},
  booktitle    = {Security and Cryptography for Networks - 10th International Conference,
                  {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9841},
  pages        = {353--371},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44618-9\_19},
  doi          = {10.1007/978-3-319-44618-9\_19},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/CamenischLNS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/CatalanoRF16,
  author       = {Dario Catalano and
                  Mario Di Raimondo and
                  Simone Faro},
  editor       = {Vassilis Zikas and
                  Roberto De Prisco},
  title        = {Verifiable Pattern Matching on Outsourced Texts},
  booktitle    = {Security and Cryptography for Networks - 10th International Conference,
                  {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9841},
  pages        = {333--350},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44618-9\_18},
  doi          = {10.1007/978-3-319-44618-9\_18},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/CatalanoRF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/ChenLR16,
  author       = {Jie Chen and
                  Beno{\^{\i}}t Libert and
                  Somindu C. Ramanna},
  editor       = {Vassilis Zikas and
                  Roberto De Prisco},
  title        = {Non-zero Inner Product Encryption with Short Ciphertexts and Private
                  Keys},
  booktitle    = {Security and Cryptography for Networks - 10th International Conference,
                  {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9841},
  pages        = {23--41},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44618-9\_2},
  doi          = {10.1007/978-3-319-44618-9\_2},
  timestamp    = {Wed, 16 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/ChenLR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/ChoudhuryOPS16,
  author       = {Ashish Choudhury and
                  Emmanuela Orsini and
                  Arpita Patra and
                  Nigel P. Smart},
  editor       = {Vassilis Zikas and
                  Roberto De Prisco},
  title        = {Linear Overhead Optimally-Resilient Robust {MPC} Using Preprocessing},
  booktitle    = {Security and Cryptography for Networks - 10th International Conference,
                  {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9841},
  pages        = {147--168},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44618-9\_8},
  doi          = {10.1007/978-3-319-44618-9\_8},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/ChoudhuryOPS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/CohenP16,
  author       = {Ran Cohen and
                  Chris Peikert},
  editor       = {Vassilis Zikas and
                  Roberto De Prisco},
  title        = {On Adaptively Secure Multiparty Computation with a Short {CRS}},
  booktitle    = {Security and Cryptography for Networks - 10th International Conference,
                  {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9841},
  pages        = {129--146},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44618-9\_7},
  doi          = {10.1007/978-3-319-44618-9\_7},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/CohenP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/DengGLWY16,
  author       = {Yi Deng and
                  Juan A. Garay and
                  San Ling and
                  Huaxiong Wang and
                  Moti Yung},
  editor       = {Vassilis Zikas and
                  Roberto De Prisco},
  title        = {On the Implausibility of Constant-Round Public-Coin Zero-Knowledge
                  Proofs},
  booktitle    = {Security and Cryptography for Networks - 10th International Conference,
                  {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9841},
  pages        = {237--253},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44618-9\_13},
  doi          = {10.1007/978-3-319-44618-9\_13},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/DengGLWY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/DolevDLOY16,
  author       = {Shlomi Dolev and
                  Karim El Defrawy and
                  Joshua Lampkins and
                  Rafail Ostrovsky and
                  Moti Yung},
  editor       = {Vassilis Zikas and
                  Roberto De Prisco},
  title        = {Proactive Secret Sharing with a Dishonest Majority},
  booktitle    = {Security and Cryptography for Networks - 10th International Conference,
                  {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9841},
  pages        = {529--548},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44618-9\_28},
  doi          = {10.1007/978-3-319-44618-9\_28},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/DolevDLOY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/FuchsbauerHKS16,
  author       = {Georg Fuchsbauer and
                  Christian Hanser and
                  Chethan Kamath and
                  Daniel Slamanig},
  editor       = {Vassilis Zikas and
                  Roberto De Prisco},
  title        = {Practical Round-Optimal Blind Signatures in the Standard Model from
                  Weaker Assumptions},
  booktitle    = {Security and Cryptography for Networks - 10th International Conference,
                  {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9841},
  pages        = {391--408},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44618-9\_21},
  doi          = {10.1007/978-3-319-44618-9\_21},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/FuchsbauerHKS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/Fujisaki16,
  author       = {Eiichiro Fujisaki},
  editor       = {Vassilis Zikas and
                  Roberto De Prisco},
  title        = {Improving Practical UC-Secure Commitments Based on the {DDH} Assumption},
  booktitle    = {Security and Cryptography for Networks - 10th International Conference,
                  {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9841},
  pages        = {257--272},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44618-9\_14},
  doi          = {10.1007/978-3-319-44618-9\_14},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/Fujisaki16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/GhoshGOT16,
  author       = {Esha Ghosh and
                  Michael T. Goodrich and
                  Olga Ohrimenko and
                  Roberto Tamassia},
  editor       = {Vassilis Zikas and
                  Roberto De Prisco},
  title        = {Verifiable Zero-Knowledge Order Queries and Updates for Fully Dynamic
                  Lists and Trees},
  booktitle    = {Security and Cryptography for Networks - 10th International Conference,
                  {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9841},
  pages        = {216--236},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44618-9\_12},
  doi          = {10.1007/978-3-319-44618-9\_12},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/GhoshGOT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/Gnam16,
  author       = {Trotta Gnam},
  editor       = {Vassilis Zikas and
                  Roberto De Prisco},
  title        = {Zero-Knowledge Made Easy so It Won't Make You Dizzy - {(A} Tale of
                  Transaction Put in Verse About an Illicit Kind of Commerce)},
  booktitle    = {Security and Cryptography for Networks - 10th International Conference,
                  {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9841},
  pages        = {191--197},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44618-9\_10},
  doi          = {10.1007/978-3-319-44618-9\_10},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/Gnam16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/GreenKMZ16,
  author       = {Matthew D. Green and
                  Jonathan Katz and
                  Alex J. Malozemoff and
                  Hong{-}Sheng Zhou},
  editor       = {Vassilis Zikas and
                  Roberto De Prisco},
  title        = {A Unified Approach to Idealized Model Separations via Indistinguishability
                  Obfuscation},
  booktitle    = {Security and Cryptography for Networks - 10th International Conference,
                  {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9841},
  pages        = {587--603},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44618-9\_31},
  doi          = {10.1007/978-3-319-44618-9\_31},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/GreenKMZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/HazayV16,
  author       = {Carmit Hazay and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Vassilis Zikas and
                  Roberto De Prisco},
  title        = {What Security Can We Achieve Within 4 Rounds?},
  booktitle    = {Security and Cryptography for Networks - 10th International Conference,
                  {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9841},
  pages        = {486--505},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44618-9\_26},
  doi          = {10.1007/978-3-319-44618-9\_26},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/HazayV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/HazayZ16,
  author       = {Carmit Hazay and
                  Hila Zarosim},
  editor       = {Vassilis Zikas and
                  Roberto De Prisco},
  title        = {The Feasibility of Outsourced Database Search in the Plain Model},
  booktitle    = {Security and Cryptography for Networks - 10th International Conference,
                  {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9841},
  pages        = {313--332},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44618-9\_17},
  doi          = {10.1007/978-3-319-44618-9\_17},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/HazayZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/HemenwayLOW16,
  author       = {Brett Hemenway and
                  Steve Lu and
                  Rafail Ostrovsky and
                  William Welser IV},
  editor       = {Vassilis Zikas and
                  Roberto De Prisco},
  title        = {High-Precision Secure Computation of Satellite Collision Probabilities},
  booktitle    = {Security and Cryptography for Networks - 10th International Conference,
                  {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9841},
  pages        = {169--187},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44618-9\_9},
  doi          = {10.1007/978-3-319-44618-9\_9},
  timestamp    = {Tue, 15 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scn/HemenwayLOW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/KimSGA16,
  author       = {Jongkil Kim and
                  Willy Susilo and
                  Fuchun Guo and
                  Man Ho Au},
  editor       = {Vassilis Zikas and
                  Roberto De Prisco},
  title        = {A Tag Based Encoding: An Efficient Encoding for Predicate Encryption
                  in Prime Order Groups},
  booktitle    = {Security and Cryptography for Networks - 10th International Conference,
                  {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9841},
  pages        = {3--22},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44618-9\_1},
  doi          = {10.1007/978-3-319-44618-9\_1},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/KimSGA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/MarcedonePS16,
  author       = {Antonio Marcedone and
                  Rafael Pass and
                  Abhi Shelat},
  editor       = {Vassilis Zikas and
                  Roberto De Prisco},
  title        = {Bounded {KDM} Security from iO and {OWF}},
  booktitle    = {Security and Cryptography for Networks - 10th International Conference,
                  {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9841},
  pages        = {571--586},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44618-9\_30},
  doi          = {10.1007/978-3-319-44618-9\_30},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/MarcedonePS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/MittelbachV16,
  author       = {Arno Mittelbach and
                  Daniele Venturi},
  editor       = {Vassilis Zikas and
                  Roberto De Prisco},
  title        = {Fiat-Shamir for Highly Sound Protocols Is Instantiable},
  booktitle    = {Security and Cryptography for Networks - 10th International Conference,
                  {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9841},
  pages        = {198--215},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44618-9\_11},
  doi          = {10.1007/978-3-319-44618-9\_11},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/MittelbachV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/Peikert16,
  author       = {Chris Peikert},
  editor       = {Vassilis Zikas and
                  Roberto De Prisco},
  title        = {How (Not) to Instantiate Ring-LWE},
  booktitle    = {Security and Cryptography for Networks - 10th International Conference,
                  {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9841},
  pages        = {411--430},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44618-9\_22},
  doi          = {10.1007/978-3-319-44618-9\_22},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/Peikert16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/PinoLP16,
  author       = {Rafa{\"{e}}l del Pino and
                  Vadim Lyubashevsky and
                  David Pointcheval},
  editor       = {Vassilis Zikas and
                  Roberto De Prisco},
  title        = {The Whole is Less Than the Sum of Its Parts: Constructing More Efficient
                  Lattice-Based AKEs},
  booktitle    = {Security and Cryptography for Networks - 10th International Conference,
                  {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9841},
  pages        = {273--291},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44618-9\_15},
  doi          = {10.1007/978-3-319-44618-9\_15},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/PinoLP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/ReyzinY16,
  author       = {Leonid Reyzin and
                  Sophia Yakoubov},
  editor       = {Vassilis Zikas and
                  Roberto De Prisco},
  title        = {Efficient Asynchronous Accumulators for Distributed {PKI}},
  booktitle    = {Security and Cryptography for Networks - 10th International Conference,
                  {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9841},
  pages        = {292--309},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44618-9\_16},
  doi          = {10.1007/978-3-319-44618-9\_16},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/ReyzinY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/Wang0HT16,
  author       = {Yuyu Wang and
                  Takahiro Matsuda and
                  Goichiro Hanaoka and
                  Keisuke Tanaka},
  editor       = {Vassilis Zikas and
                  Roberto De Prisco},
  title        = {Signatures Resilient to Uninvertible Leakage},
  booktitle    = {Security and Cryptography for Networks - 10th International Conference,
                  {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9841},
  pages        = {372--390},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44618-9\_20},
  doi          = {10.1007/978-3-319-44618-9\_20},
  timestamp    = {Mon, 21 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/Wang0HT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/scn/2016,
  editor       = {Vassilis Zikas and
                  Roberto De Prisco},
  title        = {Security and Cryptography for Networks - 10th International Conference,
                  {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9841},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44618-9},
  doi          = {10.1007/978-3-319-44618-9},
  isbn         = {978-3-319-44617-2},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics