aboutsummaryrefslogtreecommitdiff
path: root/doc/paper/rom.bib
blob: cd41052181e8255b90cf42eccc5e37dd0ee8b7b8 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92




@inproceedings{BR-RandomOracles,
  dblp = {DBLP:conf/ccs/BellareR93},
  author    = {Mihir Bellare and
               Phillip Rogaway},
  title     = {Random Oracles are Practical: {A} Paradigm for Designing Efficient
               Protocols},
  booktitle = {{CCS} '93, Proceedings of the 1st {ACM} Conference on Computer and
               Communications Security, Fairfax, Virginia, USA, November 3-5, 1993.},
  pages     = {62--73},
  year      = {1993},
  crossref  = {DBLP:conf/ccs/1993},
  url       = {http://doi.acm.org/10.1145/168588.168596},
  doi       = {10.1145/168588.168596},
  timestamp = {Fri, 23 Dec 2011 14:54:25 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/BellareR93},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}

@proceedings{DBLP:conf/ccs/1993,
  editor    = {Dorothy E. Denning and
               Raymond Pyle and
               Ravi Ganesan and
               Ravi S. Sandhu and
               Victoria Ashby},
  title     = {{CCS} '93, Proceedings of the 1st {ACM} Conference on Computer and
               Communications Security, Fairfax, Virginia, USA, November 3-5, 1993},
  publisher = {{ACM}},
  year      = {1993},
  url       = {http://dl.acm.org/citation.cfm?id=168588},
  isbn      = {0-89791-629-8},
  timestamp = {Fri, 09 Dec 2011 14:34:06 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/1993},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}




@inproceedings{Rudich88,
  dblp = {DBLP:conf/crypto/ImpagliazzoR88},
  author    = {Russell Impagliazzo and
               Steven Rudich},
  title     = {Limits on the Provable Consequences of One-way Permutations},
  booktitle = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
               Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
  pages     = {8--26},
  year      = {1988},
  crossref  = {DBLP:conf/crypto/1988},
  url       = {http://dx.doi.org/10.1007/0-387-34799-2_2},
  doi       = {10.1007/0-387-34799-2_2},
  timestamp = {Fri, 18 Sep 2009 08:51:10 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/ImpagliazzoR88},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}

@proceedings{DBLP:conf/crypto/1988,
  editor    = {Shafi Goldwasser},
  title     = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
               Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {403},
  publisher = {Springer},
  year      = {1990},
  isbn      = {3-540-97196-3},
  timestamp = {Thu, 07 Feb 2002 09:41:39 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/1988},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}




@Inbook{Abdalla2000,
  author="Abdalla, Michel and Bellare, Mihir",
  editor="Okamoto, Tatsuaki",
  title="Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-keying Techniques",
  bookTitle="Advances in Cryptology --- ASIACRYPT 2000: 6th International Conference on the Theory and Application of Cryptology and Information Security Kyoto, Japan, December 3--7, 2000 Proceedings",
  year="2000",
  publisher="Springer Berlin Heidelberg",
  address="Berlin, Heidelberg",
  pages="546--559",
  isbn="978-3-540-44448-0",
  doi="10.1007/3-540-44448-3_42",
  doi_url="http://dx.doi.org/10.1007/3-540-44448-3_42",
  url="https://link.springer.com/chapter/10.1007/3-540-44448-3_42"
}