rom.bib (3555B)
1 2 3 4 5 @inproceedings{BR-RandomOracles, 6 dblp = {DBLP:conf/ccs/BellareR93}, 7 author = {Mihir Bellare and 8 Phillip Rogaway}, 9 title = {Random Oracles are Practical: {A} Paradigm for Designing Efficient 10 Protocols}, 11 booktitle = {{CCS} '93, Proceedings of the 1st {ACM} Conference on Computer and 12 Communications Security, Fairfax, Virginia, USA, November 3-5, 1993.}, 13 pages = {62--73}, 14 year = {1993}, 15 crossref = {DBLP:conf/ccs/1993}, 16 url = {http://doi.acm.org/10.1145/168588.168596}, 17 doi = {10.1145/168588.168596}, 18 timestamp = {Fri, 23 Dec 2011 14:54:25 +0100}, 19 biburl = {http://dblp.uni-trier.de/rec/bib/conf/ccs/BellareR93}, 20 bibsource = {dblp computer science bibliography, http://dblp.org} 21 } 22 23 @proceedings{DBLP:conf/ccs/1993, 24 editor = {Dorothy E. Denning and 25 Raymond Pyle and 26 Ravi Ganesan and 27 Ravi S. Sandhu and 28 Victoria Ashby}, 29 title = {{CCS} '93, Proceedings of the 1st {ACM} Conference on Computer and 30 Communications Security, Fairfax, Virginia, USA, November 3-5, 1993}, 31 publisher = {{ACM}}, 32 year = {1993}, 33 url = {http://dl.acm.org/citation.cfm?id=168588}, 34 isbn = {0-89791-629-8}, 35 timestamp = {Fri, 09 Dec 2011 14:34:06 +0100}, 36 biburl = {http://dblp.uni-trier.de/rec/bib/conf/ccs/1993}, 37 bibsource = {dblp computer science bibliography, http://dblp.org} 38 } 39 40 41 42 43 @inproceedings{Rudich88, 44 dblp = {DBLP:conf/crypto/ImpagliazzoR88}, 45 author = {Russell Impagliazzo and 46 Steven Rudich}, 47 title = {Limits on the Provable Consequences of One-way Permutations}, 48 booktitle = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology 49 Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings}, 50 pages = {8--26}, 51 year = {1988}, 52 crossref = {DBLP:conf/crypto/1988}, 53 url = {http://dx.doi.org/10.1007/0-387-34799-2_2}, 54 doi = {10.1007/0-387-34799-2_2}, 55 timestamp = {Fri, 18 Sep 2009 08:51:10 +0200}, 56 biburl = {http://dblp.uni-trier.de/rec/bib/conf/crypto/ImpagliazzoR88}, 57 bibsource = {dblp computer science bibliography, http://dblp.org} 58 } 59 60 @proceedings{DBLP:conf/crypto/1988, 61 editor = {Shafi Goldwasser}, 62 title = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology 63 Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings}, 64 series = {Lecture Notes in Computer Science}, 65 volume = {403}, 66 publisher = {Springer}, 67 year = {1990}, 68 isbn = {3-540-97196-3}, 69 timestamp = {Thu, 07 Feb 2002 09:41:39 +0100}, 70 biburl = {http://dblp.uni-trier.de/rec/bib/conf/crypto/1988}, 71 bibsource = {dblp computer science bibliography, http://dblp.org} 72 } 73 74 75 76 77 @Inbook{Abdalla2000, 78 author="Abdalla, Michel and Bellare, Mihir", 79 editor="Okamoto, Tatsuaki", 80 title="Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-keying Techniques", 81 bookTitle="Advances in Cryptology --- ASIACRYPT 2000: 6th International Conference on the Theory and Application of Cryptology and Information Security Kyoto, Japan, December 3--7, 2000 Proceedings", 82 year="2000", 83 publisher="Springer Berlin Heidelberg", 84 address="Berlin, Heidelberg", 85 pages="546--559", 86 isbn="978-3-540-44448-0", 87 doi="10.1007/3-540-44448-3_42", 88 doi_url="http://dx.doi.org/10.1007/3-540-44448-3_42", 89 url="https://link.springer.com/chapter/10.1007/3-540-44448-3_42" 90 } 91 92