1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
|
@inproceedings{BR-RandomOracles,
dblp = {DBLP:conf/ccs/BellareR93},
author = {Mihir Bellare and
Phillip Rogaway},
title = {Random Oracles are Practical: {A} Paradigm for Designing Efficient
Protocols},
booktitle = {{CCS} '93, Proceedings of the 1st {ACM} Conference on Computer and
Communications Security, Fairfax, Virginia, USA, November 3-5, 1993.},
pages = {62--73},
year = {1993},
crossref = {DBLP:conf/ccs/1993},
url = {http://doi.acm.org/10.1145/168588.168596},
doi = {10.1145/168588.168596},
timestamp = {Fri, 23 Dec 2011 14:54:25 +0100},
biburl = {http://dblp.uni-trier.de/rec/bib/conf/ccs/BellareR93},
bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ccs/1993,
editor = {Dorothy E. Denning and
Raymond Pyle and
Ravi Ganesan and
Ravi S. Sandhu and
Victoria Ashby},
title = {{CCS} '93, Proceedings of the 1st {ACM} Conference on Computer and
Communications Security, Fairfax, Virginia, USA, November 3-5, 1993},
publisher = {{ACM}},
year = {1993},
url = {http://dl.acm.org/citation.cfm?id=168588},
isbn = {0-89791-629-8},
timestamp = {Fri, 09 Dec 2011 14:34:06 +0100},
biburl = {http://dblp.uni-trier.de/rec/bib/conf/ccs/1993},
bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{Rudich88,
dblp = {DBLP:conf/crypto/ImpagliazzoR88},
author = {Russell Impagliazzo and
Steven Rudich},
title = {Limits on the Provable Consequences of One-way Permutations},
booktitle = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
pages = {8--26},
year = {1988},
crossref = {DBLP:conf/crypto/1988},
url = {http://dx.doi.org/10.1007/0-387-34799-2_2},
doi = {10.1007/0-387-34799-2_2},
timestamp = {Fri, 18 Sep 2009 08:51:10 +0200},
biburl = {http://dblp.uni-trier.de/rec/bib/conf/crypto/ImpagliazzoR88},
bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/1988,
editor = {Shafi Goldwasser},
title = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {403},
publisher = {Springer},
year = {1990},
isbn = {3-540-97196-3},
timestamp = {Thu, 07 Feb 2002 09:41:39 +0100},
biburl = {http://dblp.uni-trier.de/rec/bib/conf/crypto/1988},
bibsource = {dblp computer science bibliography, http://dblp.org}
}
@Inbook{Abdalla2000,
author="Abdalla, Michel and Bellare, Mihir",
editor="Okamoto, Tatsuaki",
title="Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-keying Techniques",
bookTitle="Advances in Cryptology --- ASIACRYPT 2000: 6th International Conference on the Theory and Application of Cryptology and Information Security Kyoto, Japan, December 3--7, 2000 Proceedings",
year="2000",
publisher="Springer Berlin Heidelberg",
address="Berlin, Heidelberg",
pages="546--559",
isbn="978-3-540-44448-0",
doi="10.1007/3-540-44448-3_42",
doi_url="http://dx.doi.org/10.1007/3-540-44448-3_42",
url="https://link.springer.com/chapter/10.1007/3-540-44448-3_42"
}
|