@inproceedings{BR-RandomOracles, dblp = {DBLP:conf/ccs/BellareR93}, author = {Mihir Bellare and Phillip Rogaway}, title = {Random Oracles are Practical: {A} Paradigm for Designing Efficient Protocols}, booktitle = {{CCS} '93, Proceedings of the 1st {ACM} Conference on Computer and Communications Security, Fairfax, Virginia, USA, November 3-5, 1993.}, pages = {62--73}, year = {1993}, crossref = {DBLP:conf/ccs/1993}, url = {http://doi.acm.org/10.1145/168588.168596}, doi = {10.1145/168588.168596}, timestamp = {Fri, 23 Dec 2011 14:54:25 +0100}, biburl = {http://dblp.uni-trier.de/rec/bib/conf/ccs/BellareR93}, bibsource = {dblp computer science bibliography, http://dblp.org} } @proceedings{DBLP:conf/ccs/1993, editor = {Dorothy E. Denning and Raymond Pyle and Ravi Ganesan and Ravi S. Sandhu and Victoria Ashby}, title = {{CCS} '93, Proceedings of the 1st {ACM} Conference on Computer and Communications Security, Fairfax, Virginia, USA, November 3-5, 1993}, publisher = {{ACM}}, year = {1993}, url = {http://dl.acm.org/citation.cfm?id=168588}, isbn = {0-89791-629-8}, timestamp = {Fri, 09 Dec 2011 14:34:06 +0100}, biburl = {http://dblp.uni-trier.de/rec/bib/conf/ccs/1993}, bibsource = {dblp computer science bibliography, http://dblp.org} } @inproceedings{Rudich88, dblp = {DBLP:conf/crypto/ImpagliazzoR88}, author = {Russell Impagliazzo and Steven Rudich}, title = {Limits on the Provable Consequences of One-way Permutations}, booktitle = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings}, pages = {8--26}, year = {1988}, crossref = {DBLP:conf/crypto/1988}, url = {http://dx.doi.org/10.1007/0-387-34799-2_2}, doi = {10.1007/0-387-34799-2_2}, timestamp = {Fri, 18 Sep 2009 08:51:10 +0200}, biburl = {http://dblp.uni-trier.de/rec/bib/conf/crypto/ImpagliazzoR88}, bibsource = {dblp computer science bibliography, http://dblp.org} } @proceedings{DBLP:conf/crypto/1988, editor = {Shafi Goldwasser}, title = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {403}, publisher = {Springer}, year = {1990}, isbn = {3-540-97196-3}, timestamp = {Thu, 07 Feb 2002 09:41:39 +0100}, biburl = {http://dblp.uni-trier.de/rec/bib/conf/crypto/1988}, bibsource = {dblp computer science bibliography, http://dblp.org} } @Inbook{Abdalla2000, author="Abdalla, Michel and Bellare, Mihir", editor="Okamoto, Tatsuaki", title="Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-keying Techniques", bookTitle="Advances in Cryptology --- ASIACRYPT 2000: 6th International Conference on the Theory and Application of Cryptology and Information Security Kyoto, Japan, December 3--7, 2000 Proceedings", year="2000", publisher="Springer Berlin Heidelberg", address="Berlin, Heidelberg", pages="546--559", isbn="978-3-540-44448-0", doi="10.1007/3-540-44448-3_42", doi_url="http://dx.doi.org/10.1007/3-540-44448-3_42", url="https://link.springer.com/chapter/10.1007/3-540-44448-3_42" }