BibTeX records: Vanishree Rao

download as .bib file

@inproceedings{DBLP:conf/codaspy/BindschaedlerRB17,
  author    = {Vincent Bindschaedler and
               Shantanu Rane and
               Alejandro E. Brito and
               Vanishree Rao and
               Ersin Uzun},
  title     = {Achieving Differential Privacy in Secure Multiparty Data Aggregation
               Protocols on Star Networks},
  booktitle = {Proceedings of the Seventh {ACM} on Conference on Data and Application
               Security and Privacy, {CODASPY} 2017, Scottsdale, AZ, USA, March 22-24,
               2017},
  pages     = {115--125},
  year      = {2017},
  crossref  = {DBLP:conf/codaspy/2017},
  url       = {https://doi.org/10.1145/3029806.3029829},
  doi       = {10.1145/3029806.3029829},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/codaspy/BindschaedlerRB17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DamgardPR16,
  author    = {Ivan Damg{\aa}rd and
               Antigoni Polychroniadou and
               Vanishree Rao},
  title     = {Adaptively Secure Multi-Party Computation from {LWE} (via Equivocal
               {FHE)}},
  booktitle = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference
               on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan,
               March 6-9, 2016, Proceedings, Part {II}},
  pages     = {208--233},
  year      = {2016},
  crossref  = {DBLP:conf/pkc/2016-2},
  url       = {https://doi.org/10.1007/978-3-662-49387-8\_9},
  doi       = {10.1007/978-3-662-49387-8\_9},
  timestamp = {Wed, 24 May 2017 08:27:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/DamgardPR16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/HofheinzRW16,
  author    = {Dennis Hofheinz and
               Vanishree Rao and
               Daniel Wichs},
  title     = {Standard Security Does Not Imply Indistinguishability Under Selective
               Opening},
  booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
               Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}},
  pages     = {121--145},
  year      = {2016},
  crossref  = {DBLP:conf/tcc/2016b2},
  url       = {https://doi.org/10.1007/978-3-662-53644-5\_5},
  doi       = {10.1007/978-3-662-53644-5\_5},
  timestamp = {Tue, 23 May 2017 01:06:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/HofheinzRW16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/basesearch/HanumanthaRao15,
  author    = {Vanishree Rao},
  title     = {Adaptively-secure Multiparty Non-interactive Key Exchange},
  school    = {University of California, Los Angeles, {USA}},
  year      = {2015},
  url       = {http://www.escholarship.org/uc/item/55g8v0ws},
  timestamp = {Thu, 11 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/phd/basesearch/HanumanthaRao15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KhuranaRS15,
  author    = {Dakshita Khurana and
               Vanishree Rao and
               Amit Sahai},
  title     = {Multi-party Key Exchange for Unbounded Parties from Indistinguishability
               Obfuscation},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
               on the Theory and Application of Cryptology and Information Security,
               Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
               Part {I}},
  pages     = {52--75},
  year      = {2015},
  crossref  = {DBLP:conf/asiacrypt/2015-1},
  url       = {https://doi.org/10.1007/978-3-662-48797-6\_3},
  doi       = {10.1007/978-3-662-48797-6\_3},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/KhuranaRS15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Dachman-SoledKR15,
  author    = {Dana Dachman{-}Soled and
               Jonathan Katz and
               Vanishree Rao},
  title     = {Adaptively Secure, Universally Composable, Multiparty Computation
               in Constant Rounds},
  booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
               2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}},
  pages     = {586--613},
  year      = {2015},
  crossref  = {DBLP:conf/tcc/2015-2},
  url       = {https://doi.org/10.1007/978-3-662-46497-7\_23},
  doi       = {10.1007/978-3-662-46497-7\_23},
  timestamp = {Sat, 16 Sep 2017 12:07:36 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/Dachman-SoledKR15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HofheinzRW15,
  author    = {Dennis Hofheinz and
               Vanishree Rao and
               Daniel Wichs},
  title     = {Standard Security Does Not Imply Indistinguishability Under Selective
               Opening},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {792},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/792},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/HofheinzRW15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/FuchsbauerKPR14,
  author    = {Georg Fuchsbauer and
               Momchil Konstantinov and
               Krzysztof Pietrzak and
               Vanishree Rao},
  title     = {Adaptive Security of Constrained PRFs},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part
               {II}},
  pages     = {82--101},
  year      = {2014},
  crossref  = {DBLP:conf/asiacrypt/2014},
  url       = {https://doi.org/10.1007/978-3-662-45608-8\_5},
  doi       = {10.1007/978-3-662-45608-8\_5},
  timestamp = {Tue, 04 Sep 2018 09:35:41 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/FuchsbauerKPR14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/OstrovskyRV14,
  author    = {Rafail Ostrovsky and
               Vanishree Rao and
               Ivan Visconti},
  title     = {On Selective-Opening Attacks against Encryption Schemes},
  booktitle = {Security and Cryptography for Networks - 9th International Conference,
               {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings},
  pages     = {578--597},
  year      = {2014},
  crossref  = {DBLP:conf/scn/2014},
  url       = {https://doi.org/10.1007/978-3-319-10879-7\_33},
  doi       = {10.1007/978-3-319-10879-7\_33},
  timestamp = {Sat, 16 Sep 2017 12:10:18 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/scn/OstrovskyRV14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/OrlandiORSV14,
  author    = {Claudio Orlandi and
               Rafail Ostrovsky and
               Vanishree Rao and
               Amit Sahai and
               Ivan Visconti},
  title     = {Statistical Concurrent Non-malleable Zero Knowledge},
  booktitle = {Theory of Cryptography - 11th Theory of Cryptography Conference, {TCC}
               2014, San Diego, CA, USA, February 24-26, 2014. Proceedings},
  pages     = {167--191},
  year      = {2014},
  crossref  = {DBLP:conf/tcc/2014},
  url       = {https://doi.org/10.1007/978-3-642-54242-8\_8},
  doi       = {10.1007/978-3-642-54242-8\_8},
  timestamp = {Fri, 02 Nov 2018 09:44:20 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/OrlandiORSV14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OrlandiORSV14,
  author    = {Claudio Orlandi and
               Rafail Ostrovsky and
               Vanishree Rao and
               Amit Sahai and
               Ivan Visconti},
  title     = {Statistical Concurrent Non-Malleable Zero Knowledge},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {143},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/143},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/OrlandiORSV14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FuchsbauerKPR14,
  author    = {Georg Fuchsbauer and
               Momchil Konstantinov and
               Krzysztof Pietrzak and
               Vanishree Rao},
  title     = {Adaptive Security of Constrained PRFs},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {416},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/416},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/FuchsbauerKPR14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgaardPR14,
  author    = {Ivan Damg{\aa}rd and
               Antigoni Polychroniadou and
               Vanishree Rao},
  title     = {Adaptively Secure {UC} Constant Round Multi-Party Computation Protocols},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {830},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/830},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/DamgaardPR14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dachman-SoledKR14,
  author    = {Dana Dachman{-}Soled and
               Jonathan Katz and
               Vanishree Rao},
  title     = {Adaptively Secure, Universally Composable, Multi-Party Computation
               in Constant Rounds},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {858},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/858},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/Dachman-SoledKR14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Rao14,
  author    = {Vanishree Rao},
  title     = {Adaptive Multiparty Non-interactive Key Exchange Without Setup In
               The Standard Model},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {910},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/910},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/Rao14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/AnanthBGR13,
  author    = {Prabhanjan Ananth and
               Raghav Bhaskar and
               Vipul Goyal and
               Vanishree Rao},
  title     = {On the (In)security of Fischlin's Paradigm},
  booktitle = {Theory of Cryptography - 10th Theory of Cryptography Conference, {TCC}
               2013, Tokyo, Japan, March 3-6, 2013. Proceedings},
  pages     = {202--221},
  year      = {2013},
  crossref  = {DBLP:conf/tcc/2013},
  url       = {https://doi.org/10.1007/978-3-642-36594-2\_12},
  doi       = {10.1007/978-3-642-36594-2\_12},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/AnanthBGR13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/OstrovskyRSV13,
  author    = {Rafail Ostrovsky and
               Vanishree Rao and
               Alessandra Scafuro and
               Ivan Visconti},
  title     = {Revisiting Lower and Upper Bounds for Selective Decommitments},
  booktitle = {Theory of Cryptography - 10th Theory of Cryptography Conference, {TCC}
               2013, Tokyo, Japan, March 3-6, 2013. Proceedings},
  pages     = {559--578},
  year      = {2013},
  crossref  = {DBLP:conf/tcc/2013},
  url       = {https://doi.org/10.1007/978-3-642-36594-2\_31},
  doi       = {10.1007/978-3-642-36594-2\_31},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/OstrovskyRSV13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AnanthBGR12,
  author    = {Prabhanjan Ananth and
               Raghav Bhaskar and
               Vipul Goyal and
               Vanishree Rao},
  title     = {On the (In)security of Fischlin's Paradigm},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2012},
  pages     = {721},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/721},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/AnanthBGR12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GargRSSU11,
  author    = {Sanjam Garg and
               Vanishree Rao and
               Amit Sahai and
               Dominique Schr{\"{o}}der and
               Dominique Unruh},
  title     = {Round Optimal Blind Signatures},
  booktitle = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 14-18, 2011. Proceedings},
  pages     = {630--648},
  year      = {2011},
  crossref  = {DBLP:conf/crypto/2011},
  url       = {https://doi.org/10.1007/978-3-642-22792-9\_36},
  doi       = {10.1007/978-3-642-22792-9\_36},
  timestamp = {Wed, 14 Nov 2018 10:51:40 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/GargRSSU11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GoyalOR11,
  author    = {Vipul Goyal and
               Adam O'Neill and
               Vanishree Rao},
  title     = {Correlated-Input Secure Hash Functions},
  booktitle = {Theory of Cryptography - 8th Theory of Cryptography Conference, {TCC}
               2011, Providence, RI, USA, March 28-30, 2011. Proceedings},
  pages     = {182--200},
  year      = {2011},
  crossref  = {DBLP:conf/tcc/2011},
  url       = {https://doi.org/10.1007/978-3-642-19571-6\_12},
  doi       = {10.1007/978-3-642-19571-6\_12},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/GoyalOR11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoyalOR11,
  author    = {Vipul Goyal and
               Adam O'Neill and
               Vanishree Rao},
  title     = {Correlated-Input Secure Hash Functions},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2011},
  pages     = {233},
  year      = {2011},
  url       = {http://eprint.iacr.org/2011/233},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/GoyalOR11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OstrovskyRSV11,
  author    = {Rafail Ostrovsky and
               Vanishree Rao and
               Alessandra Scafuro and
               Ivan Visconti},
  title     = {Revisiting Lower and Upper Bounds for Selective Decommitments},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2011},
  pages     = {536},
  year      = {2011},
  url       = {http://eprint.iacr.org/2011/536},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/OstrovskyRSV11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/codaspy/2017,
  editor    = {Gail{-}Joon Ahn and
               Alexander Pretschner and
               Gabriel Ghinita},
  title     = {Proceedings of the Seventh {ACM} on Conference on Data and Application
               Security and Privacy, {CODASPY} 2017, Scottsdale, AZ, USA, March 22-24,
               2017},
  publisher = {{ACM}},
  year      = {2017},
  url       = {http://dl.acm.org/citation.cfm?id=3029806},
  isbn      = {978-1-4503-4523-1},
  timestamp = {Sat, 18 Mar 2017 19:19:49 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/codaspy/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2016-2,
  editor    = {Chen{-}Mou Cheng and
               Kai{-}Min Chung and
               Giuseppe Persiano and
               Bo{-}Yin Yang},
  title     = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference
               on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan,
               March 6-9, 2016, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9615},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-49387-8},
  doi       = {10.1007/978-3-662-49387-8},
  isbn      = {978-3-662-49386-1},
  timestamp = {Wed, 24 May 2017 08:27:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/2016-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tcc/2016b2,
  editor    = {Martin Hirt and
               Adam D. Smith},
  title     = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
               Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9986},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-53644-5},
  doi       = {10.1007/978-3-662-53644-5},
  isbn      = {978-3-662-53643-8},
  timestamp = {Tue, 23 May 2017 01:06:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/2016b2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2015-1,
  editor    = {Tetsu Iwata and
               Jung Hee Cheon},
  title     = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
               on the Theory and Application of Cryptology and Information Security,
               Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
               Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9452},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-662-48797-6},
  doi       = {10.1007/978-3-662-48797-6},
  isbn      = {978-3-662-48796-9},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/2015-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tcc/2015-2,
  editor    = {Yevgeniy Dodis and
               Jesper Buus Nielsen},
  title     = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
               2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9015},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-662-46497-7},
  doi       = {10.1007/978-3-662-46497-7},
  isbn      = {978-3-662-46496-0},
  timestamp = {Sat, 16 Sep 2017 12:07:36 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/2015-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2014,
  editor    = {Palash Sarkar and
               Tetsu Iwata},
  title     = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part
               {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8874},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-662-45608-8},
  doi       = {10.1007/978-3-662-45608-8},
  isbn      = {978-3-662-45607-1},
  timestamp = {Tue, 04 Sep 2018 09:35:41 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/scn/2014,
  editor    = {Michel Abdalla and
               Roberto De Prisco},
  title     = {Security and Cryptography for Networks - 9th International Conference,
               {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8642},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-10879-7},
  doi       = {10.1007/978-3-319-10879-7},
  isbn      = {978-3-319-10878-0},
  timestamp = {Sat, 16 Sep 2017 12:10:18 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/scn/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tcc/2014,
  editor    = {Yehuda Lindell},
  title     = {Theory of Cryptography - 11th Theory of Cryptography Conference, {TCC}
               2014, San Diego, CA, USA, February 24-26, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8349},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-642-54242-8},
  doi       = {10.1007/978-3-642-54242-8},
  isbn      = {978-3-642-54241-1},
  timestamp = {Fri, 02 Nov 2018 09:44:20 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tcc/2013,
  editor    = {Amit Sahai},
  title     = {Theory of Cryptography - 10th Theory of Cryptography Conference, {TCC}
               2013, Tokyo, Japan, March 3-6, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7785},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-36594-2},
  doi       = {10.1007/978-3-642-36594-2},
  isbn      = {978-3-642-36593-5},
  timestamp = {Tue, 23 May 2017 01:06:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2011,
  editor    = {Phillip Rogaway},
  title     = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 14-18, 2011. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6841},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-22792-9},
  doi       = {10.1007/978-3-642-22792-9},
  isbn      = {978-3-642-22791-2},
  timestamp = {Wed, 14 Nov 2018 10:51:40 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tcc/2011,
  editor    = {Yuval Ishai},
  title     = {Theory of Cryptography - 8th Theory of Cryptography Conference, {TCC}
               2011, Providence, RI, USA, March 28-30, 2011. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6597},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-19571-6},
  doi       = {10.1007/978-3-642-19571-6},
  isbn      = {978-3-642-19570-9},
  timestamp = {Tue, 13 Jun 2017 11:30:16 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
maintained by Schloss Dagstuhl LZI at University of Trier