BibTeX records: Tancrède Lepoint

download as .bib file

@inproceedings{DBLP:conf/lpar/BjornerJLRS17,
  author    = {Nikolaj Bjorner and
               Dejan Jovanovic and
               Tancr{\`{e}}de Lepoint and
               Philipp R{\"{u}}mmer and
               Martin Sch{\"{a}}f},
  title     = {Abduction by Non-Experts},
  booktitle = {IWIL@LPAR 2017 Workshop and {LPAR-21} Short Presentations, Maun, Botswana,
               May 7-12, 2017},
  year      = {2017},
  crossref  = {DBLP:conf/lpar/2017iwil},
  url       = {http://www.easychair.org/publications/paper/342982},
  timestamp = {Tue, 27 Jun 2017 18:13:16 +0200},
  biburl    = {http://dblp2.uni-trier.de/rec/bib/conf/lpar/BjornerJLRS17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CoronLLT17,
  author    = {Jean{-}S{\'{e}}bastien Coron and
               Moon Sung Lee and
               Tancr{\`{e}}de Lepoint and
               Mehdi Tibouchi},
  title     = {Zeroizing Attacks on Indistinguishability Obfuscation over {CLT13}},
  booktitle = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
               on Practice and Theory in Public-Key Cryptography, Amsterdam, The
               Netherlands, March 28-31, 2017, Proceedings, Part {I}},
  pages     = {41--58},
  year      = {2017},
  crossref  = {DBLP:conf/pkc/2017-1},
  url       = {https://doi.org/10.1007/978-3-662-54365-8_3},
  doi       = {10.1007/978-3-662-54365-8_3},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp2.uni-trier.de/rec/bib/conf/pkc/CoronLLT17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BenarrochBL17,
  author    = {Daniel Benarroch and
               Zvika Brakerski and
               Tancr{\`{e}}de Lepoint},
  title     = {{FHE} over the Integers: Decomposed and Batched in the Post-Quantum
               Regime},
  booktitle = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
               on Practice and Theory in Public-Key Cryptography, Amsterdam, The
               Netherlands, March 28-31, 2017, Proceedings, Part {II}},
  pages     = {271--301},
  year      = {2017},
  crossref  = {DBLP:conf/pkc/2017-2},
  url       = {https://doi.org/10.1007/978-3-662-54388-7_10},
  doi       = {10.1007/978-3-662-54388-7_10},
  timestamp = {Wed, 24 May 2017 08:27:52 +0200},
  biburl    = {http://dblp2.uni-trier.de/rec/bib/conf/pkc/BenarrochBL17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/soda/BenhamoudaLMZ17,
  author    = {Fabrice Benhamouda and
               Tancr{\`{e}}de Lepoint and
               Claire Mathieu and
               Hang Zhou},
  title     = {Optimization of Bootstrapping in Circuits},
  booktitle = {Proceedings of the Twenty-Eighth Annual {ACM-SIAM} Symposium on Discrete
               Algorithms, {SODA} 2017, Barcelona, Spain, Hotel Porta Fira, January
               16-19},
  pages     = {2423--2433},
  year      = {2017},
  crossref  = {DBLP:conf/soda/2017},
  url       = {https://doi.org/10.1137/1.9781611974782.160},
  doi       = {10.1137/1.9781611974782.160},
  timestamp = {Wed, 24 May 2017 08:31:21 +0200},
  biburl    = {http://dblp2.uni-trier.de/rec/bib/conf/soda/BenhamoudaLMZ17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BenarrochBL17,
  author    = {Daniel Benarroch and
               Zvika Brakerski and
               Tancr{\`{e}}de Lepoint},
  title     = {{FHE} Over the Integers: Decomposed and Batched in the Post-Quantum
               Regime},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {65},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/065},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp2.uni-trier.de/rec/bib/journals/iacr/BenarrochBL17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CoronLLT16,
  author    = {Jean{-}S{\'{e}}bastien Coron and
               Moon Sung Lee and
               Tancr{\`{e}}de Lepoint and
               Mehdi Tibouchi},
  title     = {Cryptanalysis of {GGH15} Multilinear Maps},
  booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
               Proceedings, Part {II}},
  pages     = {607--628},
  year      = {2016},
  crossref  = {DBLP:conf/crypto/2016-2},
  url       = {https://doi.org/10.1007/978-3-662-53008-5_21},
  doi       = {10.1007/978-3-662-53008-5_21},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp2.uni-trier.de/rec/bib/conf/crypto/CoronLLT16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/MelchorBGGKL16,
  author    = {Carlos Aguilar Melchor and
               Joris Barrier and
               Serge Guelton and
               Adrien Guinet and
               Marc{-}Olivier Killijian and
               Tancr{\`{e}}de Lepoint},
  title     = {NFLlib: NTT-Based Fast Lattice Library},
  booktitle = {Topics in Cryptology - {CT-RSA} 2016 - The Cryptographers' Track at
               the {RSA} Conference 2016, San Francisco, CA, USA, February 29 - March
               4, 2016, Proceedings},
  pages     = {341--356},
  year      = {2016},
  crossref  = {DBLP:conf/ctrsa/2016},
  url       = {https://doi.org/10.1007/978-3-319-29485-8_20},
  doi       = {10.1007/978-3-319-29485-8_20},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {http://dblp2.uni-trier.de/rec/bib/conf/ctrsa/MelchorBGGKL16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fse/CanteautCFLNPS16,
  author    = {Anne Canteaut and
               Sergiu Carpov and
               Caroline Fontaine and
               Tancr{\`{e}}de Lepoint and
               Mar{\'{\i}}a Naya{-}Plasencia and
               Pascal Paillier and
               Renaud Sirdey},
  title     = {Stream Ciphers: {A} Practical Solution for Efficient Homomorphic-Ciphertext
               Compression},
  booktitle = {Fast Software Encryption - 23rd International Conference, {FSE} 2016,
               Bochum, Germany, March 20-23, 2016, Revised Selected Papers},
  pages     = {313--333},
  year      = {2016},
  crossref  = {DBLP:conf/fse/2016},
  url       = {https://doi.org/10.1007/978-3-662-52993-5_16},
  doi       = {10.1007/978-3-662-52993-5_16},
  timestamp = {Tue, 23 May 2017 01:12:11 +0200},
  biburl    = {http://dblp2.uni-trier.de/rec/bib/conf/fse/CanteautCFLNPS16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/BenhamoudaLM016,
  author    = {Fabrice Benhamouda and
               Tancr{\`{e}}de Lepoint and
               Claire Mathieu and
               Hang Zhou},
  title     = {Optimization of Bootstrapping in Circuits},
  journal   = {CoRR},
  volume    = {abs/1608.04535},
  year      = {2016},
  url       = {http://arxiv.org/abs/1608.04535},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp2.uni-trier.de/rec/bib/journals/corr/BenhamoudaLM016},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BenhamoudaLM016,
  author    = {Fabrice Benhamouda and
               Tancr{\`{e}}de Lepoint and
               Claire Mathieu and
               Hang Zhou},
  title     = {Optimization of Bootstrapping in Circuits},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {785},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/785},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp2.uni-trier.de/rec/bib/journals/iacr/BenhamoudaLM016},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/CoronLLT16,
  author    = {Jean{-}S{\'{e}}bastien Coron and
               Moon Sung Lee and
               Tancr{\`{e}}de Lepoint and
               Mehdi Tibouchi},
  title     = {Zeroizing Attacks on Indistinguishability Obfuscation over {CLT13}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {1011},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/1011},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp2.uni-trier.de/rec/bib/journals/iacr/CoronLLT16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BaiLLSS15,
  author    = {Shi Bai and
               Adeline Langlois and
               Tancr{\`{e}}de Lepoint and
               Damien Stehl{\'{e}} and
               Ron Steinfeld},
  title     = {Improved Security Proofs in Lattice-Based Cryptography: Using the
               R{\'{e}}nyi Divergence Rather Than the Statistical Distance},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
               on the Theory and Application of Cryptology and Information Security,
               Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
               Part {I}},
  pages     = {3--24},
  year      = {2015},
  crossref  = {DBLP:conf/asiacrypt/2015-1},
  url       = {https://doi.org/10.1007/978-3-662-48797-6_1},
  doi       = {10.1007/978-3-662-48797-6_1},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {http://dblp2.uni-trier.de/rec/bib/conf/asiacrypt/BaiLLSS15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CoronGHLMM0ST15,
  author    = {Jean{-}S{\'{e}}bastien Coron and
               Craig Gentry and
               Shai Halevi and
               Tancr{\`{e}}de Lepoint and
               Hemanta K. Maji and
               Eric Miles and
               Mariana Raykova and
               Amit Sahai and
               Mehdi Tibouchi},
  title     = {Zeroizing Without Low-Level Zeroes: New {MMAP} Attacks and their Limitations},
  booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  pages     = {247--266},
  year      = {2015},
  crossref  = {DBLP:conf/crypto/2015-1},
  url       = {https://doi.org/10.1007/978-3-662-47989-6_12},
  doi       = {10.1007/978-3-662-47989-6_12},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp2.uni-trier.de/rec/bib/conf/crypto/CoronGHLMM0ST15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CoronLT15,
  author    = {Jean{-}S{\'{e}}bastien Coron and
               Tancr{\`{e}}de Lepoint and
               Mehdi Tibouchi},
  title     = {New Multilinear Maps Over the Integers},
  booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  pages     = {267--286},
  year      = {2015},
  crossref  = {DBLP:conf/crypto/2015-1},
  url       = {https://doi.org/10.1007/978-3-662-47989-6_13},
  doi       = {10.1007/978-3-662-47989-6_13},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp2.uni-trier.de/rec/bib/conf/crypto/CoronLT15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FouqueLLT15,
  author    = {Pierre{-}Alain Fouque and
               Moon Sung Lee and
               Tancr{\`{e}}de Lepoint and
               Mehdi Tibouchi},
  title     = {Cryptanalysis of the Co-ACD Assumption},
  booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  pages     = {561--580},
  year      = {2015},
  crossref  = {DBLP:conf/crypto/2015-1},
  url       = {https://doi.org/10.1007/978-3-662-47989-6_27},
  doi       = {10.1007/978-3-662-47989-6_27},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp2.uni-trier.de/rec/bib/conf/crypto/FouqueLLT15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fc/LepointT15,
  author    = {Tancr{\`{e}}de Lepoint and
               Mehdi Tibouchi},
  title     = {Cryptanalysis of a (Somewhat) Additively Homomorphic Encryption Scheme
               Used in {PIR}},
  booktitle = {Financial Cryptography and Data Security - {FC} 2015 International
               Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January
               30, 2015, Revised Selected Papers},
  pages     = {184--193},
  year      = {2015},
  crossref  = {DBLP:conf/fc/2015w},
  url       = {https://doi.org/10.1007/978-3-662-48051-9_14},
  doi       = {10.1007/978-3-662-48051-9_14},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp2.uni-trier.de/rec/bib/conf/fc/LepointT15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/LepointT15,
  author    = {Tancr{\`{e}}de Lepoint and
               Mehdi Tibouchi},
  title     = {Cryptanalysis of a (Somewhat) Additively Homomorphic Encryption Scheme
               Used in {PIR}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {12},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/012},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp2.uni-trier.de/rec/bib/journals/iacr/LepointT15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/CanteautCFLNPS15,
  author    = {Anne Canteaut and
               Sergiu Carpov and
               Caroline Fontaine and
               Tancr{\`{e}}de Lepoint and
               Mar{\'{\i}}a Naya{-}Plasencia and
               Pascal Paillier and
               Renaud Sirdey},
  title     = {How to Compress Homomorphic Ciphertexts},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {113},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/113},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp2.uni-trier.de/rec/bib/journals/iacr/CanteautCFLNPS15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/CoronLT15,
  author    = {Jean{-}S{\'{e}}bastien Coron and
               Tancr{\`{e}}de Lepoint and
               Mehdi Tibouchi},
  title     = {New Multilinear Maps over the Integers},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {162},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/162},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp2.uni-trier.de/rec/bib/journals/iacr/CoronLT15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BaiLLSS15,
  author    = {Shi Bai and
               Adeline Langlois and
               Tancr{\`{e}}de Lepoint and
               Damien Stehl{\'{e}} and
               Ron Steinfeld},
  title     = {Improved security proofs in lattice-based cryptography: using the
               R{\'{e}}nyi divergence rather than the statistical distance},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {483},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/483},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp2.uni-trier.de/rec/bib/journals/iacr/BaiLLSS15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/CoronGHLMM0ST15,
  author    = {Jean{-}S{\'{e}}bastien Coron and
               Craig Gentry and
               Shai Halevi and
               Tancr{\`{e}}de Lepoint and
               Hemanta K. Maji and
               Eric Miles and
               Mariana Raykova and
               Amit Sahai and
               Mehdi Tibouchi},
  title     = {Zeroizing Without Low-Level Zeroes: New {MMAP} Attacks and Their Limitations},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {596},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/596},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp2.uni-trier.de/rec/bib/journals/iacr/CoronGHLMM0ST15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BrakerskiGHLST15,
  author    = {Zvika Brakerski and
               Craig Gentry and
               Shai Halevi and
               Tancr{\`{e}}de Lepoint and
               Amit Sahai and
               Mehdi Tibouchi},
  title     = {Cryptanalysis of the Quadratic Zero-Testing of {GGH}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {845},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/845},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp2.uni-trier.de/rec/bib/journals/iacr/BrakerskiGHLST15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BaigneresDFGLR15,
  author    = {Thomas Baign{\`{e}}res and
               C{\'{e}}cile Delerabl{\'{e}}e and
               Matthieu Finiasz and
               Louis Goubin and
               Tancr{\`{e}}de Lepoint and
               Matthieu Rivain},
  title     = {Trap Me If You Can - Million Dollar Curve},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {1249},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/1249},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp2.uni-trier.de/rec/bib/journals/iacr/BaigneresDFGLR15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@phdthesis{DBLP:phd/hal/Lepoint14,
  author    = {Tancr{\`{e}}de Lepoint},
  title     = {Design and Implementation of Lattice-Based Cryptography. (Conception
               and impl{\'{e}}mentation de cryptographie {\`{a}} base de r{\'{e}}seaux)},
  school    = {{\'{E}}cole Normale Sup{\'{e}}rieure, Paris, France},
  year      = {2014},
  url       = {https://tel.archives-ouvertes.fr/tel-01069864},
  timestamp = {Thu, 30 Jun 2016 01:00:00 +0200},
  biburl    = {http://dblp2.uni-trier.de/rec/bib/phd/hal/Lepoint14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/LepointN14,
  author    = {Tancr{\`{e}}de Lepoint and
               Michael Naehrig},
  title     = {A Comparison of the Homomorphic Encryption Schemes {FV} and {YASHE}},
  booktitle = {Progress in Cryptology - {AFRICACRYPT} 2014 - 7th International Conference
               on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings},
  pages     = {318--335},
  year      = {2014},
  crossref  = {DBLP:conf/africacrypt/2014},
  url       = {https://doi.org/10.1007/978-3-319-06734-6_20},
  doi       = {10.1007/978-3-319-06734-6_20},
  timestamp = {Mon, 22 May 2017 17:11:10 +0200},
  biburl    = {http://dblp2.uni-trier.de/rec/bib/conf/africacrypt/LepointN14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CoronLT14,
  author    = {Jean{-}S{\'{e}}bastien Coron and
               Tancr{\`{e}}de Lepoint and
               Mehdi Tibouchi},
  title     = {Scale-Invariant Fully Homomorphic Encryption over the Integers},
  booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
               on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
               March 26-28, 2014. Proceedings},
  pages     = {311--328},
  year      = {2014},
  crossref  = {DBLP:conf/pkc/2014},
  url       = {https://doi.org/10.1007/978-3-642-54631-0_18},
  doi       = {10.1007/978-3-642-54631-0_18},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp2.uni-trier.de/rec/bib/conf/pkc/CoronLT14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/CoronLT14,
  author    = {Jean{-}S{\'{e}}bastien Coron and
               Tancr{\`{e}}de Lepoint and
               Mehdi Tibouchi},
  title     = {Scale-Invariant Fully Homomorphic Encryption over the Integers},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {32},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/032},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp2.uni-trier.de/rec/bib/journals/iacr/CoronLT14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/LepointN14,
  author    = {Tancr{\`{e}}de Lepoint and
               Michael Naehrig},
  title     = {A Comparison of the Homomorphic Encryption Schemes {FV} and {YASHE}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {62},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/062},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp2.uni-trier.de/rec/bib/journals/iacr/LepointN14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/CoronLT14a,
  author    = {Jean{-}S{\'{e}}bastien Coron and
               Tancr{\`{e}}de Lepoint and
               Mehdi Tibouchi},
  title     = {Cryptanalysis of Two Candidate Fixes of Multilinear Maps over the
               Integers},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {975},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/975},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp2.uni-trier.de/rec/bib/journals/iacr/CoronLT14a},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DucasDLL13,
  author    = {L{\'{e}}o Ducas and
               Alain Durmus and
               Tancr{\`{e}}de Lepoint and
               Vadim Lyubashevsky},
  title     = {Lattice Signatures and Bimodal Gaussians},
  booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  pages     = {40--56},
  year      = {2013},
  crossref  = {DBLP:conf/crypto/2013-1},
  url       = {https://doi.org/10.1007/978-3-642-40041-4_3},
  doi       = {10.1007/978-3-642-40041-4_3},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp2.uni-trier.de/rec/bib/conf/crypto/DucasDLL13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CoronLT13,
  author    = {Jean{-}S{\'{e}}bastien Coron and
               Tancr{\`{e}}de Lepoint and
               Mehdi Tibouchi},
  title     = {Practical Multilinear Maps over the Integers},
  booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  pages     = {476--493},
  year      = {2013},
  crossref  = {DBLP:conf/crypto/2013-1},
  url       = {https://doi.org/10.1007/978-3-642-40041-4_26},
  doi       = {10.1007/978-3-642-40041-4_26},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp2.uni-trier.de/rec/bib/conf/crypto/CoronLT13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CheonCKLLTY13,
  author    = {Jung Hee Cheon and
               Jean{-}S{\'{e}}bastien Coron and
               Jinsu Kim and
               Moon Sung Lee and
               Tancr{\`{e}}de Lepoint and
               Mehdi Tibouchi and
               Aaram Yun},
  title     = {Batch Fully Homomorphic Encryption over the Integers},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Athens, Greece, May 26-30, 2013. Proceedings},
  pages     = {315--335},
  year      = {2013},
  crossref  = {DBLP:conf/eurocrypt/2013},
  url       = {https://doi.org/10.1007/978-3-642-38348-9_20},
  doi       = {10.1007/978-3-642-38348-9_20},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp2.uni-trier.de/rec/bib/conf/eurocrypt/CheonCKLLTY13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fc/LepointP13,
  author    = {Tancr{\`{e}}de Lepoint and
               Pascal Paillier},
  title     = {On the Minimal Number of Bootstrappings in Homomorphic Circuits},
  booktitle = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC}
               and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers},
  pages     = {189--200},
  year      = {2013},
  crossref  = {DBLP:conf/fc/2013w},
  url       = {https://doi.org/10.1007/978-3-642-41320-9_13},
  doi       = {10.1007/978-3-642-41320-9_13},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp2.uni-trier.de/rec/bib/conf/fc/LepointP13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/DelerableeLPR13,
  author    = {C{\'{e}}cile Delerabl{\'{e}}e and
               Tancr{\`{e}}de Lepoint and
               Pascal Paillier and
               Matthieu Rivain},
  title     = {White-Box Security Notions for Symmetric Encryption Schemes},
  booktitle = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference,
               Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers},
  pages     = {247--264},
  year      = {2013},
  crossref  = {DBLP:conf/sacrypt/2013},
  url       = {https://doi.org/10.1007/978-3-662-43414-7_13},
  doi       = {10.1007/978-3-662-43414-7_13},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {http://dblp2.uni-trier.de/rec/bib/conf/sacrypt/DelerableeLPR13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/LepointRMRP13,
  author    = {Tancr{\`{e}}de Lepoint and
               Matthieu Rivain and
               Yoni De Mulder and
               Peter Roelse and
               Bart Preneel},
  title     = {Two Attacks on a White-Box {AES} Implementation},
  booktitle = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference,
               Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers},
  pages     = {265--285},
  year      = {2013},
  crossref  = {DBLP:conf/sacrypt/2013},
  url       = {https://doi.org/10.1007/978-3-662-43414-7_14},
  doi       = {10.1007/978-3-662-43414-7_14},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {http://dblp2.uni-trier.de/rec/bib/conf/sacrypt/LepointRMRP13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/CoronLT13,
  author    = {Jean{-}S{\'{e}}bastien Coron and
               Tancr{\`{e}}de Lepoint and
               Mehdi Tibouchi},
  title     = {Batch Fully Homomorphic Encryption over the Integers},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {36},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/036},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp2.uni-trier.de/rec/bib/journals/iacr/CoronLT13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/CoronLT13a,
  author    = {Jean{-}S{\'{e}}bastien Coron and
               Tancr{\`{e}}de Lepoint and
               Mehdi Tibouchi},
  title     = {Practical Multilinear Maps over the Integers},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {183},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/183},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp2.uni-trier.de/rec/bib/journals/iacr/CoronLT13a},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/DucasDLL13,
  author    = {L{\'{e}}o Ducas and
               Alain Durmus and
               Tancr{\`{e}}de Lepoint and
               Vadim Lyubashevsky},
  title     = {Lattice Signatures and Bimodal Gaussians},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {383},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/383},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp2.uni-trier.de/rec/bib/journals/iacr/DucasDLL13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/LepointR13,
  author    = {Tancr{\`{e}}de Lepoint and
               Matthieu Rivain},
  title     = {Another Nail in the Coffin of White-Box {AES} Implementations},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {455},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/455},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp2.uni-trier.de/rec/bib/journals/iacr/LepointR13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/DelerableeLPR13,
  author    = {C{\'{e}}cile Delerabl{\'{e}}e and
               Tancr{\`{e}}de Lepoint and
               Pascal Paillier and
               Matthieu Rivain},
  title     = {White-Box Security Notions for Symmetric Encryption Schemes},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {523},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/523},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp2.uni-trier.de/rec/bib/journals/iacr/DelerableeLPR13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ispec/JoyeL12,
  author    = {Marc Joye and
               Tancr{\`{e}}de Lepoint},
  title     = {Partial Key Exposure on {RSA} with Private Exponents Larger Than {N}},
  booktitle = {Information Security Practice and Experience - 8th International Conference,
               {ISPEC} 2012, Hangzhou, China, April 9-12, 2012. Proceedings},
  pages     = {369--380},
  year      = {2012},
  crossref  = {DBLP:conf/ispec/2012},
  url       = {https://doi.org/10.1007/978-3-642-29101-2_25},
  doi       = {10.1007/978-3-642-29101-2_25},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {http://dblp2.uni-trier.de/rec/bib/conf/ispec/JoyeL12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/drm/JoyeL11,
  author    = {Marc Joye and
               Tancr{\`{e}}de Lepoint},
  title     = {Traitor tracing schemes for protected software implementations},
  booktitle = {Proceedings of the 11th {ACM} Workshop on Digital Rights Management,
               Chicago, Illinois, USA, October 21, 2011},
  pages     = {15--22},
  year      = {2011},
  crossref  = {DBLP:conf/drm/2011},
  url       = {http://doi.acm.org/10.1145/2046631.2046636},
  doi       = {10.1145/2046631.2046636},
  timestamp = {Tue, 16 Dec 2014 17:33:05 +0100},
  biburl    = {http://dblp2.uni-trier.de/rec/bib/conf/drm/JoyeL11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/lpar/2017iwil,
  editor    = {Thomas Eiter and
               David Sands and
               Geoff Sutcliffe and
               Andrei Voronkov},
  title     = {IWIL@LPAR 2017 Workshop and {LPAR-21} Short Presentations, Maun, Botswana,
               May 7-12, 2017},
  series    = {Kalpa Publications in Computing},
  volume    = {1},
  publisher = {EasyChair},
  year      = {2017},
  url       = {https://easychair.org/publications/volume/LPAR-21S},
  timestamp = {Tue, 27 Jun 2017 18:13:16 +0200},
  biburl    = {http://dblp2.uni-trier.de/rec/bib/conf/lpar/2017iwil},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/pkc/2017-1,
  editor    = {Serge Fehr},
  title     = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
               on Practice and Theory in Public-Key Cryptography, Amsterdam, The
               Netherlands, March 28-31, 2017, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10174},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-662-54365-8},
  doi       = {10.1007/978-3-662-54365-8},
  isbn      = {978-3-662-54364-1},
  timestamp = {Wed, 24 May 2017 08:27:52 +0200},
  biburl    = {http://dblp2.uni-trier.de/rec/bib/conf/pkc/2017-1},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/pkc/2017-2,
  editor    = {Serge Fehr},
  title     = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
               on Practice and Theory in Public-Key Cryptography, Amsterdam, The
               Netherlands, March 28-31, 2017, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10175},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-662-54388-7},
  doi       = {10.1007/978-3-662-54388-7},
  isbn      = {978-3-662-54387-0},
  timestamp = {Wed, 24 May 2017 08:27:52 +0200},
  biburl    = {http://dblp2.uni-trier.de/rec/bib/conf/pkc/2017-2},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/soda/2017,
  editor    = {Philip N. Klein},
  title     = {Proceedings of the Twenty-Eighth Annual {ACM-SIAM} Symposium on Discrete
               Algorithms, {SODA} 2017, Barcelona, Spain, Hotel Porta Fira, January
               16-19},
  publisher = {{SIAM}},
  year      = {2017},
  url       = {https://doi.org/10.1137/1.9781611974782},
  doi       = {10.1137/1.9781611974782},
  isbn      = {978-1-61197-478-2},
  timestamp = {Wed, 24 May 2017 08:31:21 +0200},
  biburl    = {http://dblp2.uni-trier.de/rec/bib/conf/soda/2017},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/2016-2,
  editor    = {Matthew Robshaw and
               Jonathan Katz},
  title     = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
               Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9815},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-53008-5},
  doi       = {10.1007/978-3-662-53008-5},
  isbn      = {978-3-662-53007-8},
  timestamp = {Fri, 26 May 2017 00:50:20 +0200},
  biburl    = {http://dblp2.uni-trier.de/rec/bib/conf/crypto/2016-2},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ctrsa/2016,
  editor    = {Kazue Sako},
  title     = {Topics in Cryptology - {CT-RSA} 2016 - The Cryptographers' Track at
               the {RSA} Conference 2016, San Francisco, CA, USA, February 29 - March
               4, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9610},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-29485-8},
  doi       = {10.1007/978-3-319-29485-8},
  isbn      = {978-3-319-29484-1},
  timestamp = {Sun, 21 May 2017 00:20:21 +0200},
  biburl    = {http://dblp2.uni-trier.de/rec/bib/conf/ctrsa/2016},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fse/2016,
  editor    = {Thomas Peyrin},
  title     = {Fast Software Encryption - 23rd International Conference, {FSE} 2016,
               Bochum, Germany, March 20-23, 2016, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {9783},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-52993-5},
  doi       = {10.1007/978-3-662-52993-5},
  isbn      = {978-3-662-52992-8},
  timestamp = {Tue, 23 May 2017 01:12:11 +0200},
  biburl    = {http://dblp2.uni-trier.de/rec/bib/conf/fse/2016},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2015-1,
  editor    = {Tetsu Iwata and
               Jung Hee Cheon},
  title     = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
               on the Theory and Application of Cryptology and Information Security,
               Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
               Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9452},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-662-48797-6},
  doi       = {10.1007/978-3-662-48797-6},
  isbn      = {978-3-662-48796-9},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {http://dblp2.uni-trier.de/rec/bib/conf/asiacrypt/2015-1},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/2015-1,
  editor    = {Rosario Gennaro and
               Matthew Robshaw},
  title     = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9215},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-662-47989-6},
  doi       = {10.1007/978-3-662-47989-6},
  isbn      = {978-3-662-47988-9},
  timestamp = {Fri, 26 May 2017 00:50:20 +0200},
  biburl    = {http://dblp2.uni-trier.de/rec/bib/conf/crypto/2015-1},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fc/2015w,
  editor    = {Michael Brenner and
               Nicolas Christin and
               Benjamin Johnson and
               Kurt Rohloff},
  title     = {Financial Cryptography and Data Security - {FC} 2015 International
               Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January
               30, 2015, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {8976},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-662-48051-9},
  doi       = {10.1007/978-3-662-48051-9},
  isbn      = {978-3-662-48050-2},
  timestamp = {Fri, 26 May 2017 00:50:26 +0200},
  biburl    = {http://dblp2.uni-trier.de/rec/bib/conf/fc/2015w},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/africacrypt/2014,
  editor    = {David Pointcheval and
               Damien Vergnaud},
  title     = {Progress in Cryptology - {AFRICACRYPT} 2014 - 7th International Conference
               on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8469},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-06734-6},
  doi       = {10.1007/978-3-319-06734-6},
  isbn      = {978-3-319-06733-9},
  timestamp = {Mon, 22 May 2017 17:11:10 +0200},
  biburl    = {http://dblp2.uni-trier.de/rec/bib/conf/africacrypt/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/pkc/2014,
  editor    = {Hugo Krawczyk},
  title     = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
               on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
               March 26-28, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8383},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-642-54631-0},
  doi       = {10.1007/978-3-642-54631-0},
  isbn      = {978-3-642-54630-3},
  timestamp = {Wed, 24 May 2017 08:27:51 +0200},
  biburl    = {http://dblp2.uni-trier.de/rec/bib/conf/pkc/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/2013-1,
  editor    = {Ran Canetti and
               Juan A. Garay},
  title     = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8042},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-40041-4},
  doi       = {10.1007/978-3-642-40041-4},
  isbn      = {978-3-642-40040-7},
  timestamp = {Fri, 26 May 2017 00:50:20 +0200},
  biburl    = {http://dblp2.uni-trier.de/rec/bib/conf/crypto/2013-1},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2013,
  editor    = {Thomas Johansson and
               Phong Q. Nguyen},
  title     = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Athens, Greece, May 26-30, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7881},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-38348-9},
  doi       = {10.1007/978-3-642-38348-9},
  isbn      = {978-3-642-38347-2},
  timestamp = {Wed, 24 May 2017 08:31:21 +0200},
  biburl    = {http://dblp2.uni-trier.de/rec/bib/conf/eurocrypt/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fc/2013w,
  editor    = {Andrew A. Adams and
               Michael Brenner and
               Matthew Smith},
  title     = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC}
               and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {7862},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-41320-9},
  doi       = {10.1007/978-3-642-41320-9},
  isbn      = {978-3-642-41319-3},
  timestamp = {Fri, 26 May 2017 00:50:26 +0200},
  biburl    = {http://dblp2.uni-trier.de/rec/bib/conf/fc/2013w},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/sacrypt/2013,
  editor    = {Tanja Lange and
               Kristin E. Lauter and
               Petr Lisonek},
  title     = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference,
               Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {8282},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-662-43414-7},
  doi       = {10.1007/978-3-662-43414-7},
  isbn      = {978-3-662-43413-0},
  timestamp = {Sun, 21 May 2017 00:19:12 +0200},
  biburl    = {http://dblp2.uni-trier.de/rec/bib/conf/sacrypt/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ispec/2012,
  editor    = {Mark Dermot Ryan and
               Ben Smyth and
               Guilin Wang},
  title     = {Information Security Practice and Experience - 8th International Conference,
               {ISPEC} 2012, Hangzhou, China, April 9-12, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7232},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-29101-2},
  doi       = {10.1007/978-3-642-29101-2},
  isbn      = {978-3-642-29100-5},
  timestamp = {Sun, 21 May 2017 00:18:03 +0200},
  biburl    = {http://dblp2.uni-trier.de/rec/bib/conf/ispec/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/drm/2011,
  editor    = {Yan Chen and
               Stefan Katzenbeisser and
               Ahmad{-}Reza Sadeghi},
  title     = {Proceedings of the 11th {ACM} Workshop on Digital Rights Management,
               Chicago, Illinois, USA, October 21, 2011},
  publisher = {{ACM}},
  year      = {2011},
  url       = {http://dl.acm.org/citation.cfm?id=2046631},
  isbn      = {978-1-4503-1005-5},
  timestamp = {Tue, 16 Dec 2014 17:33:05 +0100},
  biburl    = {http://dblp2.uni-trier.de/rec/bib/conf/drm/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
maintained by Schloss Dagstuhl LZI at University of Trier