93 lines
3.5 KiB
BibTeX
93 lines
3.5 KiB
BibTeX
|
|
|
|
|
|
|
|
@inproceedings{BR-RandomOracles,
|
|
dblp = {DBLP:conf/ccs/BellareR93},
|
|
author = {Mihir Bellare and
|
|
Phillip Rogaway},
|
|
title = {Random Oracles are Practical: {A} Paradigm for Designing Efficient
|
|
Protocols},
|
|
booktitle = {{CCS} '93, Proceedings of the 1st {ACM} Conference on Computer and
|
|
Communications Security, Fairfax, Virginia, USA, November 3-5, 1993.},
|
|
pages = {62--73},
|
|
year = {1993},
|
|
crossref = {DBLP:conf/ccs/1993},
|
|
url = {http://doi.acm.org/10.1145/168588.168596},
|
|
doi = {10.1145/168588.168596},
|
|
timestamp = {Fri, 23 Dec 2011 14:54:25 +0100},
|
|
biburl = {http://dblp.uni-trier.de/rec/bib/conf/ccs/BellareR93},
|
|
bibsource = {dblp computer science bibliography, http://dblp.org}
|
|
}
|
|
|
|
@proceedings{DBLP:conf/ccs/1993,
|
|
editor = {Dorothy E. Denning and
|
|
Raymond Pyle and
|
|
Ravi Ganesan and
|
|
Ravi S. Sandhu and
|
|
Victoria Ashby},
|
|
title = {{CCS} '93, Proceedings of the 1st {ACM} Conference on Computer and
|
|
Communications Security, Fairfax, Virginia, USA, November 3-5, 1993},
|
|
publisher = {{ACM}},
|
|
year = {1993},
|
|
url = {http://dl.acm.org/citation.cfm?id=168588},
|
|
isbn = {0-89791-629-8},
|
|
timestamp = {Fri, 09 Dec 2011 14:34:06 +0100},
|
|
biburl = {http://dblp.uni-trier.de/rec/bib/conf/ccs/1993},
|
|
bibsource = {dblp computer science bibliography, http://dblp.org}
|
|
}
|
|
|
|
|
|
|
|
|
|
@inproceedings{Rudich88,
|
|
dblp = {DBLP:conf/crypto/ImpagliazzoR88},
|
|
author = {Russell Impagliazzo and
|
|
Steven Rudich},
|
|
title = {Limits on the Provable Consequences of One-way Permutations},
|
|
booktitle = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
|
|
Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
|
|
pages = {8--26},
|
|
year = {1988},
|
|
crossref = {DBLP:conf/crypto/1988},
|
|
url = {http://dx.doi.org/10.1007/0-387-34799-2_2},
|
|
doi = {10.1007/0-387-34799-2_2},
|
|
timestamp = {Fri, 18 Sep 2009 08:51:10 +0200},
|
|
biburl = {http://dblp.uni-trier.de/rec/bib/conf/crypto/ImpagliazzoR88},
|
|
bibsource = {dblp computer science bibliography, http://dblp.org}
|
|
}
|
|
|
|
@proceedings{DBLP:conf/crypto/1988,
|
|
editor = {Shafi Goldwasser},
|
|
title = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
|
|
Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
|
|
series = {Lecture Notes in Computer Science},
|
|
volume = {403},
|
|
publisher = {Springer},
|
|
year = {1990},
|
|
isbn = {3-540-97196-3},
|
|
timestamp = {Thu, 07 Feb 2002 09:41:39 +0100},
|
|
biburl = {http://dblp.uni-trier.de/rec/bib/conf/crypto/1988},
|
|
bibsource = {dblp computer science bibliography, http://dblp.org}
|
|
}
|
|
|
|
|
|
|
|
|
|
@Inbook{Abdalla2000,
|
|
author="Abdalla, Michel and Bellare, Mihir",
|
|
editor="Okamoto, Tatsuaki",
|
|
title="Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-keying Techniques",
|
|
bookTitle="Advances in Cryptology --- ASIACRYPT 2000: 6th International Conference on the Theory and Application of Cryptology and Information Security Kyoto, Japan, December 3--7, 2000 Proceedings",
|
|
year="2000",
|
|
publisher="Springer Berlin Heidelberg",
|
|
address="Berlin, Heidelberg",
|
|
pages="546--559",
|
|
isbn="978-3-540-44448-0",
|
|
doi="10.1007/3-540-44448-3_42",
|
|
doi_url="http://dx.doi.org/10.1007/3-540-44448-3_42",
|
|
url="https://link.springer.com/chapter/10.1007/3-540-44448-3_42"
|
|
}
|
|
|
|
|