BibTeX records: Keita Xagawa

download as .bib file

@article{DBLP:journals/ijisec/SeoEXY18,
  author    = {Jae Hong Seo and
               Keita Emura and
               Keita Xagawa and
               Kazuki Yoneyama},
  title     = {Accumulable optimistic fair exchange from verifiably encrypted homomorphic
               signatures},
  journal   = {Int. J. Inf. Sec.},
  volume    = {17},
  number    = {2},
  pages     = {193--220},
  year      = {2018},
  url       = {https://doi.org/10.1007/s10207-017-0367-z},
  doi       = {10.1007/s10207-017-0367-z},
  timestamp = {Thu, 01 Mar 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ijisec/SeoEXY18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/BootleTX18,
  author    = {Jonathan Bootle and
               Mehdi Tibouchi and
               Keita Xagawa},
  title     = {Cryptanalysis of Compact-LWE},
  booktitle = {Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers' Track at
               the {RSA} Conference 2018, San Francisco, CA, USA, April 16-20, 2018,
               Proceedings},
  pages     = {80--97},
  year      = {2018},
  crossref  = {DBLP:conf/ctrsa/2018},
  url       = {https://doi.org/10.1007/978-3-319-76953-0\_5},
  doi       = {10.1007/978-3-319-76953-0\_5},
  timestamp = {Sat, 05 May 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ctrsa/BootleTX18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/SaitoXY18,
  author    = {Tsunekazu Saito and
               Keita Xagawa and
               Takashi Yamakawa},
  title     = {Tightly-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle
               Model},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {III}},
  pages     = {520--551},
  year      = {2018},
  crossref  = {DBLP:conf/eurocrypt/2018-3},
  url       = {https://doi.org/10.1007/978-3-319-78372-7\_17},
  doi       = {10.1007/978-3-319-78372-7\_17},
  timestamp = {Sat, 05 May 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/SaitoXY18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/Xagawa18,
  author    = {Keita Xagawa},
  title     = {Practical Cryptanalysis of a Public-Key Encryption Scheme Based on
               Non-linear Indeterminate Equations at {SAC} 2017},
  booktitle = {Post-Quantum Cryptography - 9th International Conference, PQCrypto
               2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedings},
  pages     = {142--161},
  year      = {2018},
  crossref  = {DBLP:conf/pqcrypto/2018},
  url       = {https://doi.org/10.1007/978-3-319-79063-3\_7},
  doi       = {10.1007/978-3-319-79063-3\_7},
  timestamp = {Thu, 05 Apr 2018 12:57:36 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pqcrypto/Xagawa18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/HosoyamadaSX17,
  author    = {Akinori Hosoyamada and
               Yu Sasaki and
               Keita Xagawa},
  title     = {Quantum Multicollision-Finding Algorithm},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference
               on the Theory and Applications of Cryptology and Information Security,
               Hong Kong, China, December 3-7, 2017, Proceedings, Part {II}},
  pages     = {179--210},
  year      = {2017},
  crossref  = {DBLP:conf/asiacrypt/2017-2},
  url       = {https://doi.org/10.1007/978-3-319-70697-9\_7},
  doi       = {10.1007/978-3-319-70697-9\_7},
  timestamp = {Wed, 22 Nov 2017 13:46:44 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/HosoyamadaSX17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigmod/HorstKX17,
  author    = {Caleb Horst and
               Ryo Kikuchi and
               Keita Xagawa},
  title     = {Cryptanalysis of Comparable Encryption in SIGMOD'16},
  booktitle = {Proceedings of the 2017 {ACM} International Conference on Management
               of Data, {SIGMOD} Conference 2017, Chicago, IL, USA, May 14-19, 2017},
  pages     = {1069--1084},
  year      = {2017},
  crossref  = {DBLP:conf/sigmod/2017},
  url       = {http://doi.acm.org/10.1145/3035918.3035948},
  doi       = {10.1145/3035918.3035948},
  timestamp = {Wed, 10 May 2017 22:12:12 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sigmod/HorstKX17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HosoyamadaSX17,
  author    = {Akinori Hosoyamada and
               Yu Sasaki and
               Keita Xagawa},
  title     = {Quantum Multicollision-Finding Algorithm},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {864},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/864},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/HosoyamadaSX17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SaitoXY17,
  author    = {Tsunekazu Saito and
               Keita Xagawa and
               Takashi Yamakawa},
  title     = {Tightly-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle
               Model},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {1005},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/1005},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/SaitoXY17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Xagawa17,
  author    = {Keita Xagawa},
  title     = {Practical Cryptanalysis of a Public-key Encryption Scheme Based on
               Non-linear Indeterminate Equations at {SAC} 2017},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {1224},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/1224},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/Xagawa17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/FujisakiX16,
  author    = {Eiichiro Fujisaki and
               Keita Xagawa},
  title     = {Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage
               of Arbitrary Functions},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
               on the Theory and Application of Cryptology and Information Security,
               Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {I}},
  pages     = {908--938},
  year      = {2016},
  crossref  = {DBLP:conf/asiacrypt/2016-1},
  url       = {https://doi.org/10.1007/978-3-662-53887-6\_33},
  doi       = {10.1007/978-3-662-53887-6\_33},
  timestamp = {Fri, 19 May 2017 01:26:32 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/FujisakiX16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Xagawa16,
  author    = {Keita Xagawa},
  title     = {Groth-Sahai Proofs Revisited Again: {A} Bug in "Optimized"
               Randomization},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {476},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/476},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/Xagawa16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/FujiokaSXY15,
  author    = {Atsushi Fujioka and
               Koutarou Suzuki and
               Keita Xagawa and
               Kazuki Yoneyama},
  title     = {Strongly secure authenticated key exchange from factoring, codes,
               and lattices},
  journal   = {Des. Codes Cryptography},
  volume    = {76},
  number    = {3},
  pages     = {469--504},
  year      = {2015},
  url       = {https://doi.org/10.1007/s10623-014-9972-2},
  doi       = {10.1007/s10623-014-9972-2},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/dcc/FujiokaSXY15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/NishimakiX15,
  author    = {Ryo Nishimaki and
               Keita Xagawa},
  title     = {Verifiably encrypted signatures with short keys based on the decisional
               linear problem and obfuscation for encrypted {VES}},
  journal   = {Des. Codes Cryptography},
  volume    = {77},
  number    = {1},
  pages     = {61--98},
  year      = {2015},
  url       = {https://doi.org/10.1007/s10623-014-9986-9},
  doi       = {10.1007/s10623-014-9986-9},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/dcc/NishimakiX15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/NishimakiX15,
  author    = {Ryo Nishimaki and
               Keita Xagawa},
  title     = {Key-Private Proxy Re-Encryption from Lattices, Revisited},
  journal   = {{IEICE} Transactions},
  volume    = {98-A},
  number    = {1},
  pages     = {100--116},
  year      = {2015},
  url       = {http://search.ieice.org/bin/summary.php?id=e98-a\_1\_100},
  timestamp = {Tue, 19 May 2015 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ieicet/NishimakiX15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/SeoEXY15,
  author    = {Jae Hong Seo and
               Keita Emura and
               Keita Xagawa and
               Kazuki Yoneyama},
  title     = {Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic
               Signatures},
  booktitle = {Applied Cryptography and Network Security - 13th International Conference,
               {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers},
  pages     = {192--214},
  year      = {2015},
  crossref  = {DBLP:conf/acns/2015},
  url       = {https://doi.org/10.1007/978-3-319-28166-7\_10},
  doi       = {10.1007/978-3-319-28166-7\_10},
  timestamp = {Tue, 23 May 2017 01:13:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acns/SeoEXY15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latincrypt/FujisakiX15,
  author    = {Eiichiro Fujisaki and
               Keita Xagawa},
  title     = {Efficient RKA-Secure {KEM} and {IBE} Schemes Against Invertible Functions},
  booktitle = {Progress in Cryptology - {LATINCRYPT} 2015 - 4th International Conference
               on Cryptology and Information Security in Latin America, Guadalajara,
               Mexico, August 23-26, 2015, Proceedings},
  pages     = {3--20},
  year      = {2015},
  crossref  = {DBLP:conf/latincrypt/2015},
  url       = {https://doi.org/10.1007/978-3-319-22174-8\_1},
  doi       = {10.1007/978-3-319-22174-8\_1},
  timestamp = {Wed, 24 May 2017 08:28:38 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/latincrypt/FujisakiX15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NishimakiX15,
  author    = {Ryo Nishimaki and
               Keita Xagawa},
  title     = {Verifiably Encrypted Signatures with Short Keys based on the Decisional
               Linear Problem and Obfuscation for Encrypted {VES}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {248},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/248},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/NishimakiX15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Xagawa15,
  author    = {Keita Xagawa},
  title     = {Improved (Hierarchical) Inner-Product Encryption from Lattices},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {249},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/249},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/Xagawa15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChandranCLNX15,
  author    = {Nishanth Chandran and
               Melissa Chase and
               Feng{-}Hao Liu and
               Ryo Nishimaki and
               Keita Xagawa},
  title     = {Re-encryption, functional re-encryption, and multi-hop re-encryption:
               {A} framework for achieving obfuscation-based security and instantiations
               from lattices},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {491},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/491},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/ChandranCLNX15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FujisakiX15,
  author    = {Eiichiro Fujisaki and
               Keita Xagawa},
  title     = {Note on the {RKA} security of Continuously Non-Malleable Key-Derivation
               Function from {PKC} 2015},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {1088},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/1088},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/FujisakiX15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/FujiokaSX14,
  author    = {Atsushi Fujioka and
               Taiichi Saito and
               Keita Xagawa},
  title     = {Secure Hierarchical Identity-Based Identification without Random Oracles},
  journal   = {{IEICE} Transactions},
  volume    = {97-A},
  number    = {6},
  pages     = {1307--1317},
  year      = {2014},
  url       = {http://search.ieice.org/bin/summary.php?id=e97-a\_6\_1307},
  timestamp = {Mon, 16 Jun 2014 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ieicet/FujiokaSX14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/FujiokaFX14,
  author    = {Atsushi Fujioka and
               Eiichiro Fujisaki and
               Keita Xagawa},
  title     = {Non-malleable Multiple Public-Key Encryption},
  journal   = {{IEICE} Transactions},
  volume    = {97-A},
  number    = {6},
  pages     = {1318--1334},
  year      = {2014},
  url       = {http://search.ieice.org/bin/summary.php?id=e97-a\_6\_1318},
  timestamp = {Mon, 16 Jun 2014 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ieicet/FujiokaFX14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ChandranCLNX14,
  author    = {Nishanth Chandran and
               Melissa Chase and
               Feng{-}Hao Liu and
               Ryo Nishimaki and
               Keita Xagawa},
  title     = {Re-encryption, Functional Re-encryption, and Multi-hop Re-encryption:
               {A} Framework for Achieving Obfuscation-Based Security and Instantiations
               from Lattices},
  booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
               on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
               March 26-28, 2014. Proceedings},
  pages     = {95--112},
  year      = {2014},
  crossref  = {DBLP:conf/pkc/2014},
  url       = {https://doi.org/10.1007/978-3-642-54631-0\_6},
  doi       = {10.1007/978-3-642-54631-0\_6},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/ChandranCLNX14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AlbrechtFFPTX14,
  author    = {Martin R. Albrecht and
               Jean{-}Charles Faug{\`{e}}re and
               Robert Fitzpatrick and
               Ludovic Perret and
               Yosuke Todo and
               Keita Xagawa},
  title     = {Practical Cryptanalysis of a Public-Key Encryption Scheme Based on
               New Multivariate Quadratic Assumptions},
  booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
               on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
               March 26-28, 2014. Proceedings},
  pages     = {446--464},
  year      = {2014},
  crossref  = {DBLP:conf/pkc/2014},
  url       = {https://doi.org/10.1007/978-3-642-54631-0\_26},
  doi       = {10.1007/978-3-642-54631-0\_26},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/AlbrechtFFPTX14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FujiokaSXY13,
  author    = {Atsushi Fujioka and
               Koutarou Suzuki and
               Keita Xagawa and
               Kazuki Yoneyama},
  title     = {Practical and post-quantum authenticated key exchange from one-way
               secure key encapsulation mechanism},
  booktitle = {8th {ACM} Symposium on Information, Computer and Communications Security,
               {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013},
  pages     = {83--94},
  year      = {2013},
  crossref  = {DBLP:conf/ccs/2013asia},
  url       = {http://doi.acm.org/10.1145/2484313.2484323},
  doi       = {10.1145/2484313.2484323},
  timestamp = {Tue, 21 Nov 2017 18:32:23 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/FujiokaSXY13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Xagawa13,
  author    = {Keita Xagawa},
  title     = {Improved (Hierarchical) Inner-Product Encryption from Lattices},
  booktitle = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference
               on Practice and Theory in Public-Key Cryptography, Nara, Japan, February
               26 - March 1, 2013. Proceedings},
  pages     = {235--252},
  year      = {2013},
  crossref  = {DBLP:conf/pkc/2013},
  url       = {https://doi.org/10.1007/978-3-642-36362-7\_15},
  doi       = {10.1007/978-3-642-36362-7\_15},
  timestamp = {Wed, 24 May 2017 08:27:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/Xagawa13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/NishimakiX13,
  author    = {Ryo Nishimaki and
               Keita Xagawa},
  title     = {Verifiably Encrypted Signatures with Short Keys Based on the Decisional
               Linear Problem and Obfuscation for Encrypted {VES}},
  booktitle = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference
               on Practice and Theory in Public-Key Cryptography, Nara, Japan, February
               26 - March 1, 2013. Proceedings},
  pages     = {405--422},
  year      = {2013},
  crossref  = {DBLP:conf/pkc/2013},
  url       = {https://doi.org/10.1007/978-3-642-36362-7\_25},
  doi       = {10.1007/978-3-642-36362-7\_25},
  timestamp = {Wed, 24 May 2017 08:27:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/NishimakiX13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Xagawa13,
  author    = {Keita Xagawa},
  title     = {Message Authentication Codes Secure against Additively Related-Key
               Attacks},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {111},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/111},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/Xagawa13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TodoX13,
  author    = {Yosuke Todo and
               Keita Xagawa},
  title     = {Cryptanalysis of the Huang-Liu-Yang Cryptosystem from {PKC} 2012},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {481},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/481},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/TodoX13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/FujiokaSX12,
  author    = {Atsushi Fujioka and
               Taiichi Saito and
               Keita Xagawa},
  title     = {Security Enhancements by OR-Proof in Identity-Based Identification},
  booktitle = {Applied Cryptography and Network Security - 10th International Conference,
               {ACNS} 2012, Singapore, June 26-29, 2012. Proceedings},
  pages     = {135--152},
  year      = {2012},
  crossref  = {DBLP:conf/acns/2012},
  url       = {https://doi.org/10.1007/978-3-642-31284-7\_9},
  doi       = {10.1007/978-3-642-31284-7\_9},
  timestamp = {Mon, 06 Nov 2017 02:05:53 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acns/FujiokaSX12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/FujiokaSX12,
  author    = {Atsushi Fujioka and
               Taiichi Saito and
               Keita Xagawa},
  title     = {Applicability of OR-Proof Techniques to Hierarchical Identity-Based
               Identification},
  booktitle = {Cryptology and Network Security, 11th International Conference, {CANS}
               2012, Darmstadt, Germany, December 12-14, 2012. Proceedings},
  pages     = {169--184},
  year      = {2012},
  crossref  = {DBLP:conf/cans/2012},
  url       = {https://doi.org/10.1007/978-3-642-35404-5\_14},
  doi       = {10.1007/978-3-642-35404-5\_14},
  timestamp = {Wed, 24 May 2017 08:27:41 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cans/FujiokaSX12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/FujiokaSX12,
  author    = {Atsushi Fujioka and
               Taiichi Saito and
               Keita Xagawa},
  title     = {Security Enhancement of Identity-Based Identification with Reversibility},
  booktitle = {Information and Communications Security - 14th International Conference,
               {ICICS} 2012, Hong Kong, China, October 29-31, 2012. Proceedings},
  pages     = {202--213},
  year      = {2012},
  crossref  = {DBLP:conf/icics/2012},
  url       = {https://doi.org/10.1007/978-3-642-34129-8\_18},
  doi       = {10.1007/978-3-642-34129-8\_18},
  timestamp = {Tue, 23 May 2017 01:08:06 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icics/FujiokaSX12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/FujiokaSX12,
  author    = {Atsushi Fujioka and
               Taiichi Saito and
               Keita Xagawa},
  title     = {Secure Hierarchical Identity-Based Identification without Random Oracles},
  booktitle = {Information Security - 15th International Conference, {ISC} 2012,
               Passau, Germany, September 19-21, 2012. Proceedings},
  pages     = {258--273},
  year      = {2012},
  crossref  = {DBLP:conf/isw/2012},
  url       = {https://doi.org/10.1007/978-3-642-33383-5\_16},
  doi       = {10.1007/978-3-642-33383-5\_16},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isw/FujiokaSX12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FujiokaSXY12,
  author    = {Atsushi Fujioka and
               Koutarou Suzuki and
               Keita Xagawa and
               Kazuki Yoneyama},
  title     = {Strongly Secure Authenticated Key Exchange from Factoring, Codes,
               and Lattices},
  booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
               on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
               May 21-23, 2012. Proceedings},
  pages     = {467--484},
  year      = {2012},
  crossref  = {DBLP:conf/pkc/2012},
  url       = {https://doi.org/10.1007/978-3-642-30057-8\_28},
  doi       = {10.1007/978-3-642-30057-8\_28},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/FujiokaSXY12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FujiokaSXY12,
  author    = {Atsushi Fujioka and
               Koutarou Suzuki and
               Keita Xagawa and
               Kazuki Yoneyama},
  title     = {Strongly Secure Authenticated Key Exchange from Factoring, Codes,
               and Lattices},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2012},
  pages     = {211},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/211},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/FujiokaSXY12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KawachiNTX10,
  author    = {Akinori Kawachi and
               Akira Numayama and
               Keisuke Tanaka and
               Keita Xagawa},
  title     = {Security of Encryption Schemes in Weakened Random Oracle Models},
  booktitle = {Public Key Cryptography - {PKC} 2010, 13th International Conference
               on Practice and Theory in Public Key Cryptography, Paris, France,
               May 26-28, 2010. Proceedings},
  pages     = {403--419},
  year      = {2010},
  crossref  = {DBLP:conf/pkc/2010},
  url       = {https://doi.org/10.1007/978-3-642-13013-7\_24},
  doi       = {10.1007/978-3-642-13013-7\_24},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/KawachiNTX10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KawachiNTX10,
  author    = {Akinori Kawachi and
               Akira Numayama and
               Keisuke Tanaka and
               Keita Xagawa},
  title     = {Security of Encryption Schemes in Weakened Random Oracle Models},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2010},
  pages     = {122},
  year      = {2010},
  url       = {http://eprint.iacr.org/2010/122},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/KawachiNTX10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/StehleSTX09,
  author    = {Damien Stehl{\'{e}} and
               Ron Steinfeld and
               Keisuke Tanaka and
               Keita Xagawa},
  title     = {Efficient Public Key Encryption Based on Ideal Lattices},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Tokyo, Japan, December 6-10, 2009. Proceedings},
  pages     = {617--635},
  year      = {2009},
  crossref  = {DBLP:conf/asiacrypt/2009},
  url       = {https://doi.org/10.1007/978-3-642-10366-7\_36},
  doi       = {10.1007/978-3-642-10366-7\_36},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/StehleSTX09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/XagawaT09,
  author    = {Keita Xagawa and
               Keisuke Tanaka},
  title     = {Zero-Knowledge Protocols for {NTRU:} Application to Identification
               and Proof of Plaintext Knowledge},
  booktitle = {Provable Security, Third International Conference, ProvSec 2009, Guangzhou,
               China, November 11-13, 2009. Proceedings},
  pages     = {198--213},
  year      = {2009},
  crossref  = {DBLP:conf/provsec/2009},
  url       = {https://doi.org/10.1007/978-3-642-04642-1\_17},
  doi       = {10.1007/978-3-642-04642-1\_17},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/provsec/XagawaT09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/StehleSTX09,
  author    = {Damien Stehl{\'{e}} and
               Ron Steinfeld and
               Keisuke Tanaka and
               Keita Xagawa},
  title     = {Efficient Public Key Encryption Based on Ideal Lattices},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2009},
  pages     = {285},
  year      = {2009},
  url       = {http://eprint.iacr.org/2009/285},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/StehleSTX09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KawachiTX08,
  author    = {Akinori Kawachi and
               Keisuke Tanaka and
               Keita Xagawa},
  title     = {Concurrently Secure Identification Schemes Based on the Worst-Case
               Hardness of Lattice Problems},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2008, 14th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Melbourne, Australia, December 7-11, 2008. Proceedings},
  pages     = {372--389},
  year      = {2008},
  crossref  = {DBLP:conf/asiacrypt/2008},
  url       = {https://doi.org/10.1007/978-3-540-89255-7\_23},
  doi       = {10.1007/978-3-540-89255-7\_23},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/KawachiTX08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KawachiTX07,
  author    = {Akinori Kawachi and
               Keisuke Tanaka and
               Keita Xagawa},
  title     = {Multi-bit Cryptosystems Based on Lattice Problems},
  booktitle = {Public Key Cryptography - {PKC} 2007, 10th International Conference
               on Practice and Theory in Public-Key Cryptography, Beijing, China,
               April 16-20, 2007, Proceedings},
  pages     = {315--329},
  year      = {2007},
  crossref  = {DBLP:conf/pkc/2007},
  url       = {https://doi.org/10.1007/978-3-540-71677-8\_21},
  doi       = {10.1007/978-3-540-71677-8\_21},
  timestamp = {Fri, 02 Jun 2017 13:01:06 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/KawachiTX07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ctrsa/2018,
  editor    = {Nigel P. Smart},
  title     = {Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers' Track at
               the {RSA} Conference 2018, San Francisco, CA, USA, April 16-20, 2018,
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10808},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-76953-0},
  doi       = {10.1007/978-3-319-76953-0},
  isbn      = {978-3-319-76952-3},
  timestamp = {Wed, 11 Apr 2018 14:39:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ctrsa/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2018-3,
  editor    = {Jesper Buus Nielsen and
               Vincent Rijmen},
  title     = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {III}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10822},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-78372-7},
  doi       = {10.1007/978-3-319-78372-7},
  isbn      = {978-3-319-78371-0},
  timestamp = {Mon, 16 Apr 2018 14:12:13 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/2018-3},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pqcrypto/2018,
  editor    = {Tanja Lange and
               Rainer Steinwandt},
  title     = {Post-Quantum Cryptography - 9th International Conference, PQCrypto
               2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10786},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-79063-3},
  doi       = {10.1007/978-3-319-79063-3},
  isbn      = {978-3-319-79062-6},
  timestamp = {Thu, 05 Apr 2018 12:57:36 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pqcrypto/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2017-2,
  editor    = {Tsuyoshi Takagi and
               Thomas Peyrin},
  title     = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference
               on the Theory and Applications of Cryptology and Information Security,
               Hong Kong, China, December 3-7, 2017, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10625},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-70697-9},
  doi       = {10.1007/978-3-319-70697-9},
  isbn      = {978-3-319-70696-2},
  timestamp = {Wed, 22 Nov 2017 13:46:44 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/2017-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sigmod/2017,
  editor    = {Semih Salihoglu and
               Wenchao Zhou and
               Rada Chirkova and
               Jun Yang and
               Dan Suciu},
  title     = {Proceedings of the 2017 {ACM} International Conference on Management
               of Data, {SIGMOD} Conference 2017, Chicago, IL, USA, May 14-19, 2017},
  publisher = {{ACM}},
  year      = {2017},
  url       = {http://dl.acm.org/citation.cfm?id=3035918},
  isbn      = {978-1-4503-4197-4},
  timestamp = {Wed, 10 May 2017 22:12:12 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sigmod/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2016-1,
  editor    = {Jung Hee Cheon and
               Tsuyoshi Takagi},
  title     = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
               on the Theory and Application of Cryptology and Information Security,
               Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10031},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-53887-6},
  doi       = {10.1007/978-3-662-53887-6},
  isbn      = {978-3-662-53886-9},
  timestamp = {Fri, 19 May 2017 01:26:32 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/2016-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2015,
  editor    = {Tal Malkin and
               Vladimir Kolesnikov and
               Allison Bishop Lewko and
               Michalis Polychronakis},
  title     = {Applied Cryptography and Network Security - 13th International Conference,
               {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {9092},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-28166-7},
  doi       = {10.1007/978-3-319-28166-7},
  isbn      = {978-3-319-28165-0},
  timestamp = {Tue, 23 May 2017 01:13:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acns/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/latincrypt/2015,
  editor    = {Kristin E. Lauter and
               Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez},
  title     = {Progress in Cryptology - {LATINCRYPT} 2015 - 4th International Conference
               on Cryptology and Information Security in Latin America, Guadalajara,
               Mexico, August 23-26, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9230},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-22174-8},
  doi       = {10.1007/978-3-319-22174-8},
  isbn      = {978-3-319-22173-1},
  timestamp = {Wed, 24 May 2017 08:28:38 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/latincrypt/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2014,
  editor    = {Hugo Krawczyk},
  title     = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
               on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
               March 26-28, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8383},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-642-54631-0},
  doi       = {10.1007/978-3-642-54631-0},
  isbn      = {978-3-642-54630-3},
  timestamp = {Wed, 24 May 2017 08:27:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2013asia,
  editor    = {Kefei Chen and
               Qi Xie and
               Weidong Qiu and
               Ninghui Li and
               Wen{-}Guey Tzeng},
  title     = {8th {ACM} Symposium on Information, Computer and Communications Security,
               {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013},
  publisher = {{ACM}},
  year      = {2013},
  url       = {http://dl.acm.org/citation.cfm?id=2484313},
  isbn      = {978-1-4503-1767-2},
  timestamp = {Tue, 21 Nov 2017 18:32:23 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2013asia},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2013,
  editor    = {Kaoru Kurosawa and
               Goichiro Hanaoka},
  title     = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference
               on Practice and Theory in Public-Key Cryptography, Nara, Japan, February
               26 - March 1, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7778},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-36362-7},
  doi       = {10.1007/978-3-642-36362-7},
  isbn      = {978-3-642-36361-0},
  timestamp = {Wed, 24 May 2017 08:27:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2012,
  editor    = {Feng Bao and
               Pierangela Samarati and
               Jianying Zhou},
  title     = {Applied Cryptography and Network Security - 10th International Conference,
               {ACNS} 2012, Singapore, June 26-29, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7341},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-31284-7},
  doi       = {10.1007/978-3-642-31284-7},
  isbn      = {978-3-642-31283-0},
  timestamp = {Mon, 06 Nov 2017 02:05:53 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acns/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cans/2012,
  editor    = {Josef Pieprzyk and
               Ahmad{-}Reza Sadeghi and
               Mark Manulis},
  title     = {Cryptology and Network Security, 11th International Conference, {CANS}
               2012, Darmstadt, Germany, December 12-14, 2012. Proceedings},
  volume    = {7712},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-35404-5},
  doi       = {10.1007/978-3-642-35404-5},
  isbn      = {978-3-642-35403-8},
  timestamp = {Wed, 24 May 2017 08:27:41 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cans/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icics/2012,
  editor    = {Tat Wing Chim and
               Tsz Hon Yuen},
  title     = {Information and Communications Security - 14th International Conference,
               {ICICS} 2012, Hong Kong, China, October 29-31, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7618},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-34129-8},
  doi       = {10.1007/978-3-642-34129-8},
  isbn      = {978-3-642-34128-1},
  timestamp = {Tue, 23 May 2017 01:08:06 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icics/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isw/2012,
  editor    = {Dieter Gollmann and
               Felix C. Freiling},
  title     = {Information Security - 15th International Conference, {ISC} 2012,
               Passau, Germany, September 19-21, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7483},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-33383-5},
  doi       = {10.1007/978-3-642-33383-5},
  isbn      = {978-3-642-33382-8},
  timestamp = {Sun, 21 May 2017 00:20:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isw/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2012,
  editor    = {Marc Fischlin and
               Johannes A. Buchmann and
               Mark Manulis},
  title     = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
               on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
               May 21-23, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7293},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-30057-8},
  doi       = {10.1007/978-3-642-30057-8},
  isbn      = {978-3-642-30056-1},
  timestamp = {Wed, 24 May 2017 08:27:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2010,
  editor    = {Phong Q. Nguyen and
               David Pointcheval},
  title     = {Public Key Cryptography - {PKC} 2010, 13th International Conference
               on Practice and Theory in Public Key Cryptography, Paris, France,
               May 26-28, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6056},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-13013-7},
  doi       = {10.1007/978-3-642-13013-7},
  isbn      = {978-3-642-13012-0},
  timestamp = {Wed, 24 May 2017 08:27:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2009,
  editor    = {Mitsuru Matsui},
  title     = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Tokyo, Japan, December 6-10, 2009. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5912},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-10366-7},
  doi       = {10.1007/978-3-642-10366-7},
  isbn      = {978-3-642-10365-0},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/provsec/2009,
  editor    = {Josef Pieprzyk and
               Fangguo Zhang},
  title     = {Provable Security, Third International Conference, ProvSec 2009, Guangzhou,
               China, November 11-13, 2009. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5848},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-04642-1},
  doi       = {10.1007/978-3-642-04642-1},
  isbn      = {978-3-642-04641-4},
  timestamp = {Sun, 21 May 2017 00:20:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/provsec/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2008,
  editor    = {Josef Pieprzyk},
  title     = {Advances in Cryptology - {ASIACRYPT} 2008, 14th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Melbourne, Australia, December 7-11, 2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5350},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-89255-7},
  doi       = {10.1007/978-3-540-89255-7},
  isbn      = {978-3-540-89254-0},
  timestamp = {Tue, 13 Jun 2017 10:37:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2007,
  editor    = {Tatsuaki Okamoto and
               Xiaoyun Wang},
  title     = {Public Key Cryptography - {PKC} 2007, 10th International Conference
               on Practice and Theory in Public-Key Cryptography, Beijing, China,
               April 16-20, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4450},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-71677-8},
  doi       = {10.1007/978-3-540-71677-8},
  isbn      = {978-3-540-71676-1},
  timestamp = {Fri, 02 Jun 2017 13:01:06 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
maintained by Schloss Dagstuhl LZI at University of Trier