Valid HTML 4.0! Valid CSS!
%%% -*-BibTeX-*-
%%% ====================================================================
%%%  BibTeX-file{
%%%     author          = "Nelson H. F. Beebe",
%%%     version         = "1.529",
%%%     date            = "10 October 2024",
%%%     time            = "06:22:49 MDT",
%%%     filename        = "cryptography2010.bib",
%%%     address         = "University of Utah
%%%                        Department of Mathematics, 110 LCB
%%%                        155 S 1400 E RM 233
%%%                        Salt Lake City, UT 84112-0090
%%%                        USA",
%%%     telephone       = "+1 801 581 5254",
%%%     FAX             = "+1 801 581 4148",
%%%     URL             = "https://www.math.utah.edu/~beebe",
%%%     checksum        = "36197 101322 449800 4772315",
%%%     email           = "beebe at math.utah.edu, beebe at acm.org,
%%%                        beebe at computer.org (Internet)",
%%%     codetable       = "ISO/ASCII",
%%%     keywords        = "bibliography; BibTeX; Blowfish; cipher;
%%%                        Clipper; code breaking; cracking;
%%%                        cryptanalysis; crypto; cryptobytes;
%%%                        cryptography; cryptology; cryptosystem; data
%%%                        encryption algorithm; decryption; DES;
%%%                        Diffie; digital signature; encryption;
%%%                        Hellmann; International Data Encryption
%%%                        Algorithm (IDEA); Kahn; Kerberos; key escrow;
%%%                        kleptography; PGP; Pretty Good Privacy;
%%%                        Rivest; RSA; Schneier; Smart Card;
%%%                        steganography; Twofish; Zimmermann",
%%%     license         = "public domain",
%%%     supported       = "yes",
%%%     docstring       = "This is bibliography of publications on
%%%                        cryptography and related subjects, covering
%%%                        publications for the decade 2010--2019.  The
%%%                        companion file, cryptography.bib, covers
%%%                        1606--1999, and cryptography2000.bib covers
%%%                        2000-2009.
%%%
%%%                        Counterpane Systems maintains a Web site at
%%%
%%%                            http://www.counterpane.com/
%%%                            http://www.counterpane.com/publish.html
%%%
%%%                        with a substantial number of their technical
%%%                        reports and articles available in electronic
%%%                        form.
%%%
%%%                        The International Association for Cryptologic
%%%                        Research (IACR) is a ``non-profit scientific
%%%                        organization whose primary purpose is to
%%%                        further research in cryptology and related
%%%                        fields''.  It has a World-Wide Web site at
%%%
%%%                            http://www.iacr.org/index.html
%%%
%%%                        IACR publishes an email newsletter thrice
%%%                        yearly.  Back issues are available starting
%%%                        with Volume 15, Number 1, Fall 1998 at the
%%%                        above site.  It also supports a distinguished
%%%                        lecture series
%%%
%%%                            http://www.iacr.org/publications/dl/
%%%
%%%                        and a preprint server
%%%
%%%                            http://www.iacr.org/publications/preprint.html
%%%
%%%                        The Cryptography and Security Group at the
%%%                        Department of Computer Science and
%%%                        Engineering of the University of California
%%%                        at San Diego supports a World-Wide Web site,
%%%                        called the Theory of Cryptography Library, at
%%%
%%%                            http://philby.ucsd.edu/cryptolib/
%%%
%%%                        There is another site with cryptographic
%%%                        miscellanea and news articles at
%%%
%%%                            http://cryptome.org/
%%%
%%%                        There is an archive of the cryptography
%%%                        mailing list at
%%%
%%%                            http://www.mail-archive.com/cryptography%40wasabisystems.com/
%%%
%%%                        All of the cited references from all of the
%%%                        articles in the online journal CryptoBytes
%%%                        are also included, with referencedin key
%%%                        values recording the source of citations.
%%%
%%%                        However, publications in the journals
%%%
%%%                            * Cryptography and Communications,
%%%                            * Cryptologia,
%%%                            * Designs, Codes, and Cryptography,
%%%                            * Groups Complexity Cryptology,
%%%                            * Information Security Technical Report
%%%                            * International Journal of Information Security
%%%                            * Journal of Cryptographic Engineering,
%%%                            * Journal of Cryptology,
%%%                            * Journal of Discrete Mathematical
%%%                              Sciences and Cryptography
%%%                            * Journal of Mathematical Cryptology
%%%
%%%                        are generally excluded, unless they are
%%%                        cross-referenced by other entries in this
%%%                        bibliography, because they are covered in
%%%                        separate companion bibliographies,
%%%                        cryptologia.bib, designscodescryptogr.bib,
%%%                        intjinfosec.bib, jcryptoeng.bib,
%%%                        jcryptology.bib, jdiscrmathscicrypto.bib, and
%%%                        jmathcryptol.bib.
%%%
%%%                        At version 1.529, the year coverage looked
%%%                        like this:
%%%
%%%                             1970 (   1)    1987 (   0)    2004 (   0)
%%%                             1971 (   0)    1988 (   0)    2005 (   1)
%%%                             1972 (   0)    1989 (   0)    2006 (   3)
%%%                             1973 (   0)    1990 (   0)    2007 (   1)
%%%                             1974 (   0)    1991 (   0)    2008 (   3)
%%%                             1975 (   0)    1992 (   0)    2009 (   3)
%%%                             1976 (   0)    1993 (   0)    2010 ( 279)
%%%                             1977 (   0)    1994 (   0)    2011 ( 237)
%%%                             1978 (   0)    1995 (   0)    2012 ( 526)
%%%                             1979 (   0)    1996 (   0)    2013 ( 279)
%%%                             1980 (   0)    1997 (   0)    2014 ( 295)
%%%                             1981 (   0)    1998 (   0)    2015 ( 304)
%%%                             1982 (   0)    1999 (   0)    2016 ( 354)
%%%                             1983 (   0)    2000 (   0)    2017 ( 317)
%%%                             1984 (   0)    2001 (   0)    2018 ( 338)
%%%                             1985 (   0)    2002 (   2)    2019 ( 381)
%%%                             1986 (   0)    2003 (   1)    2020 (   4)
%%%
%%%                             Article:       2990
%%%                             Book:           106
%%%                             InBook:          10
%%%                             InCollection:     2
%%%                             InProceedings:   80
%%%                             Manual:           2
%%%                             MastersThesis:    1
%%%                             Misc:            41
%%%                             PhdThesis:        6
%%%                             Proceedings:     46
%%%                             TechReport:      45
%%%
%%%                             Total entries: 3329
%%%
%%%                        There is a hypertext bibliography of
%%%                        classical cryptography at
%%%
%%%                            http://ourworld.compuserve.com/homepages/crypto/BIB1XX.HTM
%%%
%%%                        CIPHER, the Electronic Newsletter of the
%%%                        Technical Committee on Security and Privacy,
%%%                        A Technical Committee of the Computer Society
%%%                        of the IEEE, is available on the World-Wide
%%%                        Web at
%%%
%%%                            http://www.itd.nrl.navy.mil/ITD/5540/ieee/cipher
%%%
%%%                        with pointers to all back issues (1994--1998).
%%%
%%%                        ``CRYPTO-GRAM is a free monthly newsletter
%%%                        providing summaries, analyses, insights, and
%%%                        commentaries on cryptography and computer
%%%                        security.  To subscribe, visit
%%%
%%%                            http://www.counterpane.com/crypto-gram.html
%%%
%%%                        or send a blank message to
%%%
%%%                            crypto-gram-subscribe at chaparraltree.com
%%%
%%%                        Back issues are available on
%%%
%%%                            http://www.counterpane.com''
%%%
%%%                        CRYPTO-GRAM is a good source of news of
%%%                        recent developments in the field, and
%%%                        contains many interesting essays on aspects
%%%                        of cryptography.
%%%
%%%                        There is a Web site on steganography at
%%%
%%%                            http://www.cl.cam.ac.uk/~fapp2/steganography/
%%%
%%%                        In this bibliography, entries are sorted
%%%                        first by ascending year, and within each
%%%                        year, alphabetically by author or editor,
%%%                        and then, if necessary, by the 3-letter
%%%                        abbreviation at the end of the BibTeX
%%%                        citation tag, using the bibsort -byyear
%%%                        utility.  Year order has been chosen to
%%%                        make it easier to identify the most recent
%%%                        work.
%%%
%%%                        The checksum field above contains a CRC-16
%%%                        checksum as the first value, followed by the
%%%                        equivalent of the standard UNIX wc (word
%%%                        count) utility output of lines, words, and
%%%                        characters.  This is produced by Robert
%%%                        Solovay's checksum utility.",
%%%  }
%%% ====================================================================
@Preamble{
    "\hyphenation{ }"
  # "\ifx \undefined \bbb       \def \bbb       #1{\mathbb{#1}}           \fi"
  # "\ifx \undefined \booktitle \def \booktitle #1{{{\em #1}}}            \fi"
  # "\ifx \undefined \cprime    \def \cprime      {$\mathsurround=0pt '$} \fi"
  # "\ifx \undefined \mathbb    \def \mathbb    #1{{\bf #1}}              \fi"
  # "\ifx \undefined \mathcal   \def \mathcal   #1{{\cal #1}}             \fi"
  # "\ifx \undefined \mathrm    \def \mathrm    #1{{\rm #1}}              \fi"
  # "\ifx \undefined \mathsf    \def \mathsf    #1{{\sf #1}}              \fi"
  # "\ifx \undefined \pkg       \def \pkg       #1{{{\tt #1}}}            \fi"
}

%%% ====================================================================
%%% Acknowledgement abbreviations:
@String{ack-bs =   "Bruce Schneier,
                    Counterpane Systems,
                    101 East Minnehaha Parkway,
                    Minneapolis, MN 55419,
                    e-mail: \path|schneier@counterpane.com"}

@String{ack-nhfb = "Nelson H. F. Beebe,
                    University of Utah,
                    Department of Mathematics, 110 LCB,
                    155 S 1400 E RM 233,
                    Salt Lake City, UT 84112-0090, USA,
                    Tel: +1 801 581 5254,
                    FAX: +1 801 581 4148,
                    e-mail: \path|beebe@math.utah.edu|,
                            \path|beebe@acm.org|,
                            \path|beebe@computer.org| (Internet),
                    URL: \path|https://www.math.utah.edu/~beebe/|"}

@String{ack-pb =     "Preston Briggs,
                     Tera Computer Company,
                     2815 Eastlake East,
                     Seattle, WA 98102,
                     USA,
                     Tel: +1 206 325-0800,
                     e-mail: \path|preston@tera.com|"}

@String{ack-r-project = "R Project Team"}

%%% ====================================================================
%%% Institution abbreviations:
@String{inst-COUNTERPANE-INTERNET-SECURITY = "Counterpane Internet Security"}
@String{inst-COUNTERPANE-INTERNET-SECURITY:adr = "3031 Tisch Way, Suite 100PE,
                                  San Jose, CA 95128, USA"}

@String{inst-COUNTERPANE-SYSTEMS = "Counterpane Systems"}
@String{inst-COUNTERPANE-SYSTEMS:adr = "101 East Minnehaha Parkway, Minneapolis,
                                   MN 55419"}

@String{inst-UTAH-MATH          = "University of Utah, Department of Mathematics"}
@String{inst-UTAH-MATH:adr      = "Salt Lake City, UT 84112-0090, USA"}

%%% ====================================================================
%%% Journal abbreviations:
@String{j-ACM-COMM-COMP-ALGEBRA = "ACM Communications in Computer Algebra"}

@String{j-ALGORITHMICA          = "Algorithmica"}

@String{j-ALGORITHMS-BASEL      = "Algorithms ({Basel})"}

@String{j-AMER-MATH-MONTHLY     = "American Mathematical Monthly"}

@String{j-AMER-STAT             = "The American Statistician"}

@String{j-APPL-ALGEBRA-ENG-COMMUN-COMPUT = "Applicable algebra in engineering,
                                  communication and computing"}

@String{j-APPL-MATH-COMP        = "Applied Mathematics and Computation"}

@String{j-BELL-LABS-TECH-J      = "Bell Labs Technical Journal"}

@String{j-BRITISH-J-HIST-MATH   = "British Journal for the History of
                                  Mathematics"}

@String{j-BRITISH-J-HIST-SCI    = "British Journal for the History of Science"}

@String{j-BSHM-BULL             = "BSHM Bulletin: Journal of the British Society
                                   for the History of Mathematics"}

@String{j-BULL-AUSTRAL-MATH-SOC = "Bulletin of the Australian Mathematical
                                  Society"}

@String{j-CACM                  = "Communications of the Association for
                                  Computing Machinery"}

@String{j-CAN-J-MATH            = "Canadian Journal of Mathematics = Journal
                                  canadien de math{\'e}matiques"}

@String{j-CAN-MATH-BULL         = "Bulletin canadien de
                                  math\-{\'e}\-mat\-iques = Canadian
                                  Mathematical Bulletin"}

@String{j-CCPE                  = "Concurrency and Computation: Prac\-tice and
                                   Experience"}

@String{j-CGF                   = "Com{\-}pu{\-}ter Graphics Forum"}

@String{j-CHIN-J-COMPUTERS      = "Chinese Journal of Computers = Chi suan chi
                                  hsueh pao"}

@String{j-CHIN-PHYS-LETT        = "Chinese Physics Letters"}

@String{j-COLLEGE-MATH-J        = "College Mathematics Journal"}

@String{j-COLLNET-J-SCIENTOMETRICS-INF-MANAGE = "Collnet Journal of
                                  Scientometrics and Information Management"}

@String{j-COMP-ARCH-NEWS        = "ACM SIGARCH Computer Architecture News"}

@String{j-COMP-J                = "The Computer Journal"}

@String{j-COMP-NET-AMSTERDAM    = "Computer Networks (Amsterdam, Netherlands:
                                  1999)"}

@String{j-COMP-SURV             = "ACM Computing Surveys"}

@String{j-COMP-VIS-IMAGE-UNDERSTANDING = "Computer Vision and Image
                                  Understanding: CVIU"}

@String{j-COMPLEX-SYSTEMS       = "Complex Systems"}

@String{j-COMPUT-AIDED-DES      = "Computer-Aided Design"}

@String{j-COMPUT-EDGE           = "ComputingEdge"}

@String{j-COMPUT-MATH-APPL      = "Computers and Mathematics with Applications"}

@String{j-COMPUT-SECUR          = "Computers \& Security"}

@String{j-COMPUT-SECUR-J        = "Computer Security Journal"}

@String{j-COMPUTER              = "Computer"}

@String{j-COMPUTERS-AND-GRAPHICS = "Computers and Graphics"}

@String{j-COMPUTERWORLD         = "ComputerWorld"}

@String{j-COMPUTING             = "Computing"}

@String{j-CONTEMP-PHYS          = "Contemporary Physics"}

@String{j-DDJ                   = "Dr. Dobb's Journal of Software Tools"}

@String{j-DISCRETE-APPL-MATH    = "Discrete Applied Mathematics"}

@String{j-ELECT-COMM-JAPAN-3-FUND-ELECT-SCI = "Electronics and communications
                                  in Japan. Part 3, Fundamental electronic
                                  science"}

@String{j-EURASIP-J-APPL-SIG-PROC = "EURASIP Journal on Applied Signal Processing"}

@String{j-EXP-MATH              = "Experimental Mathematics"}

@String{j-FORM-ASP-COMPUT       = "Formal Aspects of Computing"}

@String{j-FOUND-PHYS            = "Foundations of Physics"}

@String{j-FUND-INFO             = "Fundamenta Informaticae"}

@String{j-FUT-GEN-COMP-SYS      = "Future Generation Computer Systems"}

@String{j-FUTURE-INTERNET       = "Future Internet"}

@String{j-IBM-JRD               = "IBM Journal of Research and Development"}

@String{j-IEEE-ACCESS           = "IEEE Access"}

@String{j-IEEE-ACM-TASLP        = "IEEE\slash ACM Transactions on Audio, Speech,
                                  and Language Processing"}

@String{j-IEEE-ANN-HIST-COMPUT  = "IEEE Annals of the History of Computing"}

@String{j-IEEE-COMPUT-ARCHIT-LETT = "IEEE Computer Architecture Letters"}

@String{j-IEEE-DISTRIB-SYST-ONLINE = "IEEE Distributed Systems Online"}

@String{j-IEEE-MICRO            = "IEEE Micro"}

@String{j-IEEE-MULTIMEDIA       = "IEEE MultiMedia"}

@String{j-IEEE-SEC-PRIV         = "IEEE Security \& Privacy"}

@String{j-IEEE-SPECTRUM         = "IEEE Spectrum"}

@String{j-IEEE-SOFTWARE         = "IEEE Software"}

@String{j-IEEE-TRANS-BIG-DATA   = "IEEE Transactions on Big Data"}

@String{j-IEEE-TRANS-COMPUT     = "IEEE Transactions on Computers"}

@String{j-IEEE-TRANS-ELECTROMAGN-COMPAT = "IEEE Transactions on Electromagnetic
                                  Compatibility"}

@String{j-IEEE-TRANS-INF-THEORY = "IEEE Transactions on Information Theory"}

@String{j-IEEE-TRANS-NETWORKING = "IEEE\slash ACM Transactions on Networking"}

@String{j-IEEE-TRANS-PAR-DIST-SYS = "IEEE Transactions on Parallel and
                                  Distributed Systems"}

@String{j-IEEE-TRANS-SOFTW-ENG  = "IEEE Transactions on Software Engineering"}

@String{j-IEEE-TRANS-VIS-COMPUT-GRAPH = "IEEE Transactions on Visualization
                                   and Computer Graphics"}

@String{j-IJHPCA                = "The International Journal of High
                                  Performance Computing Applications"}

@String{j-IMWUT                 = "Proceedings of the ACM on Interactive,
                                  Mobile, Wearable and Ubiquitous
                                  Technologies (IMWUT)"}

@String{j-INF-COMPUT            = "Information and Computation"}

@String{j-INFO-PROC-LETT        = "Information Processing Letters"}

@String{j-INFORMATIK-SPEKTRUM   = "Informatik Spektrum"}

@String{j-INFORMATION-WEEK      = "Information Week"}

@String{j-INT-J-BIFURC-CHAOS-APPL-SCI-ENG = "International journal of
                                  bifurcation and chaos in applied sciences
                                  and engineering"}

@String{j-INT-J-COMPUT-APPL     = "International Journal of Computer
                                   Applications"}

@String{j-INT-J-COMPUT-GEOM-APPL = "International Journal of
                                  Computational Geometry and
                                  Applications (IJCGA)"}

@String{j-INT-J-COMPUT-MATH     = "International Journal of Computer
                                  Mathematics"}

@String{j-INT-J-COMPUT-SYST-SCI-ENG = "International Journal of Computer
                                  Systems Science and Engineering"}

@String{j-INT-J-ELECTRON        = "International Journal of Electronics
                                  Theoretical \& Experimental"}

@String{j-INT-J-FOUND-COMP-SCI  = "International Journal of Foundations of
                                  Computer Science (IJFCS)"}

@String{j-INT-J-IMAGE-GRAPHICS  = "International Journal of Image and Graphics
                                  (IJIG)"}

@String{j-INT-J-INFO-SEC        = "International Journal of Information
                                  Security"}

@String{j-INT-J-NUMBER-THEORY  = "International Journal of Number Theory (IJNT)"}

@String{j-INT-J-PARALLEL-PROG   = "International Journal of Parallel
                                  Programming"}

@String{j-INT-J-PAR-EMER-DIST-SYS = "International Journal of Parallel, Emergent
                                  and Distributed Systems: IJPEDS"}

@String{j-INT-J-STAT-PROBAB     = "International Journal of Statistics
                                  and Probability"}

@String{j-INT-J-SYST-SCI        = "International Journal of Systems Science"}

@String{j-INT-J-WAVELETS-MULTIRESOLUT-INF-PROCESS = "International Journal of
                                  Wavelets, Multiresolution and
                                  Information Processing"}

@String{j-INTELL-NATL-SECUR     = "Intelligence and National Security"}

@String{j-INTERNET-HIST         = "Internet Histories"}

@String{j-ISIS                  = "Isis"}

@String{j-IT-PRO                = "{IT} Professional"}

@String{j-J-ACM                 = "Journal of the ACM"}

@String{j-J-AM-SOC-INF-SCI-TECHNOL = "Journal of the American Society for
                                  Information Science and Technology: JASIST"}

@String{j-J-ASSOC-INF-SCI-TECHNOL = "Journal of the Association for Information
                                  Science and Technology"}

@String{j-J-AUTOM-REASON        = "Journal of Automated Reasoning"}

@String{j-J-COMP-SCI-TECH       = "Journal of computer science and technology"}

@String{j-J-COMP-SYS-SCI        = "Journal of Computer and System Sciences"}

@String{j-J-COMP-SECUR          = "Journal of Computer Security"}

@String{j-J-COMPUT-APPL-MATH    = "Journal of Computational and Applied
                                  Mathematics"}

@String{j-J-GRID-COMP           = "Journal of Grid Computing"}

@String{j-J-INFO-SCI-ENG        = "Journal of Information Science and
                                  Engineering"}

@String{j-J-LOGIC-ALG-PROG      = "Journal of Logic and Algebraic Programming"}

@String{j-J-MATH-PHYS           = "Journal of Mathematical Physics"}

@String{j-J-NETW-COMPUT-APPL    = "Journal of Network and Computer
                                  Applications"}

@String{j-J-NUMBER-THEORY       = "Journal of Number Theory"}

@String{j-J-PAR-DIST-COMP       = "Journal of Parallel and Distributed
                                  Computing"}

@String{j-J-SOUND-VIB           = "Journal of Sound and Vibration"}

@String{j-J-STAT-COMPUT-SIMUL   = "Journal of Statistical Computation and
                                   Simulation"}

@String{j-J-STAT-PHYS           = "Journal of Statistical Physics"}

@String{j-J-STAT-SOFT           = "Journal of Statistical Software"}

@String{j-J-SUPERCOMPUTING      = "The Journal of Supercomputing"}

@String{j-J-SYMBOLIC-COMP       = "Journal of Symbolic Computation"}

@String{j-J-SYST-SOFTW          = "The Journal of Systems and Software"}

@String{j-J-UCS                 = "J.UCS: Journal of Universal Computer
                                  Science"}

@String{j-JDIQ                  = "Journal of Data and Information
                                  Quality (JDIQ)"}

@String{j-JETC                  = "ACM Journal on Emerging Technologies
                                  in Computing Systems (JETC)"}

@String{j-LECT-NOTES-COMP-SCI   = "Lecture Notes in Computer Science"}

@String{j-LIN-MULT-ALGEBRA      = "Linear Multilinear Algebra"}

@String{j-LINEAR-ALGEBRA-APPL   = "Linear Algebra and its Applications"}

@String{j-LINUX-J               = "Linux Journal"}

@String{j-LMS-J-COMPUT-MATH     = "LMS Journal of Computation and Mathematics"}

@String{j-LOGIN                 = ";login: the USENIX Association newsletter"}

@String{j-MATH-COMPUT           = "Mathematics of Computation"}

@String{j-MATH-COMPUT-SCI       = "Mathematics in Computer Science"}

@String{j-MATH-GAZ              = "The Mathematical Gazette"}

@String{j-MATHEMATIKA           = "Mathematika"}

@String{j-MONTE-CARLO-METHODS-APPL = "Monte Carlo Methods and Applications"}

@String{j-NAMS                  = "Notices of the American Mathematical
                                  Society"}

@String{j-NATURE-COMMUN         = "Nature Communications"}

@String{j-NETWORK-SECURITY      = "Network Security"}

@String{j-NETWORK-WORLD         = "Network World"}

@String{j-NY-TIMES              = "New York Times"}

@String{j-OBZORNIK-MAT-FIZ      = "Dru{\\v{s}}tvo Matematikov, Fizikov in
                                  Astronomov SRS. Obzornik za Matematiko in
                                  Fiziko"}

@String{j-OPEN-J-DISCRETE-MATH  = "Open Journal of Discrete Mathematics"}

@String{j-OPER-SYS-REV          = "Operating Systems Review"}

@String{j-PARALLEL-COMPUTING    = "Parallel Computing"}

@String{j-PARALLEL-PROCESS-LETT = "Parallel Processing Letters"}

@String{j-PHILIPS-J-RES         = "Philips Journal of Research"}

@String{j-PHYS-LET-A            = "Physics Letters A"}

@String{j-PHYS-PERSPECT         = "Physics in Perspective (PIP)"}

@String{j-PHYS-REV-A            = "Physical Review A (Atomic, Molecular, and
                                  Optical Physics)"}

@String{j-PHYS-REV-LET          = "Physical Review Letters"}

@String{j-PHYS-REV-X            = "Physical Review X"}

@String{j-POMACS                = "Proceedings of the ACM on Measurement and
                                   Analysis of Computing Systems (POMACS)"}

@String{j-PROC-NATL-ACAD-SCI-USA = "Proceedings of the National Academy of
                                  Sciences of the United States of America"}

@String{j-PROC-VLDB-ENDOWMENT   = "Proceedings of the VLDB Endowment"}

@String{j-QUEUE                 = "ACM Queue: Tomorrow's Computing Today"}

@String{j-R-JOURNAL             = "The R Journal"}

@String{j-RES-DEV               = "Research \& Development"}

@String{j-REV-SCI-INSTRUM       = "Review of Scientific Instruments"}

@String{j-RUTHERFORD-J          = "Rutherford Journal"}

@String{j-SCI-ADV               = "Science Advances"}

@String{j-SCI-AMER              = "Scientific American"}

@String{j-SCI-COMPUT            = "Scientific Computing"}

@String{j-SCI-COMPUT-PROGRAM    = "Science of Computer Programming"}

@String{j-SCIENTOMETRICS        = "Scientometrics"}

@String{j-SCPE                  = "Scalable Computing: Practice and Experience"}

@String{j-SIAM-J-COMPUT         = "SIAM Journal on Computing"}

@String{j-SIAM-J-DISCR-MATH     = "SIAM Journal on Discrete Mathematics"}

@String{j-SIAM-J-IMAGING-SCI    = "SIAM Journal on Imaging Sciences"}

@String{j-SIAM-J-OPT            = "SIAM Journal on Optimization"}

@String{j-SIAM-REVIEW           = "SIAM Review"}

@String{j-SIGACT                = "ACM SIGACT News"}

@String{j-SIGADA-LETTERS        = "ACM SIGADA Ada Letters"}

@String{j-SIGAPP                = "ACM SIGAPP Applied Computing Review"}

@String{j-SIGCSE                = "SIGCSE Bulletin (ACM Special Interest Group
                                  on Computer Science Education)"}

@String{j-SIGMETRICS            = "ACM SIGMETRICS Performance Evaluation Review"}

@String{j-SIGMOD                = "SIGMOD Record (ACM Special Interest
                                  Group on Management of Data)"}

@String{j-SIGNIF                = "Significance ({Oxford, England})"}

@String{j-SIGPLAN               = "ACM SIG{\-}PLAN Notices"}

@String{j-SIGSAM                = "SIGSAM Bulletin (ACM Special Interest Group
                                  on Symbolic and Algebraic Manipulation)"}

@String{j-SIGSOFT               = "ACM SIGSOFT Software Engineering Notes"}

@String{j-SPE                   = "Soft\-ware\emdash Prac\-tice and Experience"}

@String{j-STAT-COMPUT           = "Statistics and Computing"}

@String{j-STAT-MED              = "Statistics in Medicine"}

@String{j-STAT-NEERLANDICA      = "Statistica Neerlandica"}

@String{j-STUD-HIST-PHILOS-SCI = "Studies in History and Philosophy of Science
                                  Part A"}

@String{j-SYS-ADMIN             = "Sys Admin: The Journal for UNIX Systems
                                  Administrators"}

@String{j-TAAS                  = "ACM Transactions on Autonomous and
                                  Adaptive Systems (TAAS)"}

@String{j-TACO                  = "ACM Transactions on Architecture and
                                  Code Optimization"}

@String{j-TALG                  = "ACM Transactions on Algorithms"}

@String{j-TALLIP                = "ACM Transactions on Asian and Low-Resource
                                  Language Information Processing (TALLIP)"}

@String{j-TCBB                  = "IEEE/ACM Transactions on Computational
                                  Biology and Bioinformatics"}

@String{j-TEAC                  = "ACM Transactions on Economics and
                                  Computation"}

@String{j-TECS                  = "ACM Transactions on Embedded Computing
                                  Systems"}

@String{j-THEOR-COMP-SCI        = "Theoretical Computer Science"}

@String{j-THEORY-PROBAB-APPL    = "Theory of Probability and its Applications"}

@String{j-TIIS                  = "ACM Transactions on Interactive Intelligent
                                  Systems (TIIS)"}

@String{j-TISSEC                = "ACM Transactions on Information and System
                                  Security"}

@String{j-TIST                 = "ACM Transactions on Intelligent Systems and
                                  Technology (TIST)"}

@String{j-TKDD                  = "ACM Transactions on Knowledge
                                  Discovery from Data (TKDD)"}

@String{j-TOCE                  = "ACM Transactions on Computing Education"}

@String{j-TOCHI                 = "ACM Transactions on Computer-Human
                                  Interaction"}

@String{j-TOCL                  = "ACM Transactions on Computational Logic"}

@String{j-TOCS                  = "ACM Transactions on Computer Systems"}

@String{j-TOCT                  = "ACM Transactions on Computation Theory"}

@String{j-TODAES                = "ACM Transactions on Design Automation of
                                  Electronic Systems"}

@String{j-TODS                  = "ACM Transactions on Database Systems"}

@String{j-TOIT                  = "ACM Transactions on Internet Technology
                                  (TOIT)"}

@String{j-TOG                   = "ACM Transactions on Graphics"}

@String{j-TOMACS                = "ACM Transactions on Modeling and Computer
                                  Simulation"}

@String{j-TOMCCAP               = "ACM Transactions on Multimedia Computing,
                                  Communications, and Applications"}

@String{j-TOMM                  = "ACM Transactions on Multimedia Computing,
                                  Communications, and Applications"}

@String{j-TOMS                  = "ACM Transactions on Mathematical Software"}

@String{j-TOPC                  = "ACM Transactions on Parallel Computing
                                  (TOPC)"}

@String{j-TOPLAS                = "ACM Transactions on Programming
                                  Languages and Systems"}

@String{j-TOPS                  = "ACM Transactions on Privacy and Security
                                  (TOPS)"}

@String{j-TOS                   = "ACM Transactions on Storage"}

@String{j-TOSEM                 = "ACM Transactions on Software Engineering and
                                   Methodology"}

@String{j-TOSN                  = "ACM Transactions on Sensor Networks"}

@String{j-TRETS                 = "ACM Transactions on Reconfigurable Technology
                                  and Systems"}

@String{j-TRANS-INFO-PROCESSING-SOC-JAPAN = "Transactions of the Information
                                  Processing Society of Japan"}

@String{j-TSAS                  = "ACM Transactions on Spatial Algorithms and
                                  Systems (TSAS)"}

@String{j-TWEB                  = "ACM Transactions on the Web (TWEB)"}

@String{j-VLDB-J                = "VLDB Journal: Very Large Data Bases"}

@String{j-WIRES                 = "WIREs Computational Statistics"}

%%% ====================================================================
%%% Publisher abbreviations:
@String{pub-A-K-PETERS          = "A. K. Peters, Ltd."}
@String{pub-A-K-PETERS:adr      = "Wellesley, MA, USA"}

@String{pub-ACADEMIC            = "Academic Press"}
@String{pub-ACADEMIC:adr        = "New York, NY, USA"}

@String{pub-ACM                 = "ACM Press"}
@String{pub-ACM:adr             = "New York, NY 10036, USA"}

@String{pub-AMS                 = "American Mathematical Society"}
@String{pub-AMS:adr             = "Providence, RI, USA"}

@String{pub-ANCHOR              = "Anchor Press/Doubleday"}
@String{pub-ANCHOR:adr          = "Garden City, NY, USA"}

@String{pub-ANSI                = "American National Standards Institute"}
@String{pub-ANSI:adr            = "1430 Broadway, New York, NY 10018, USA"}

@String{pub-APRESS              = "Apress"}
@String{pub-APRESS:adr          = "Berkeley, CA, USA"}

@String{pub-ARTECH              = "Artech House Inc."}
@String{pub-ARTECH:adr          = "Norwood, MA, USA"}

@String{pub-AW                  = "Ad{\-d}i{\-s}on-Wes{\-l}ey"}
@String{pub-AW:adr              = "Reading, MA, USA"}

@String{pub-BANTAM              = "Bantam Doubleday Dell Publishing Group Inc."}
@String{pub-BANTAM:adr          = "666 Fifth Avenue, New York, NY 10130, USA"}

@String{pub-BASIC-BOOKS         = "Basic Books"}
@String{pub-BASIC-BOOKS:adr     = "New York, NY, USA"}

@String{pub-BIRKHAUSER          = "Birkh{\"a}user Verlag"}
@String{pub-BIRKHAUSER:adr      = "Basel, Switzerland"}

@String{pub-BUTTERWORTH-HEINEMANN = "Butterworth-Heinemann"}
@String{pub-BUTTERWORTH-HEINEMANN:adr = "Boston, MA, USA"}

@String{pub-CAMBRIDGE           = "Cambridge University Press"}
@String{pub-CAMBRIDGE:adr       = "Cambridge, UK"}

@String{pub-CHAPMAN-HALL-CRC    = "Chapman and Hall/CRC"}
@String{pub-CHAPMAN-HALL-CRC:adr = "Boca Raton, FL, USA"}

@String{pub-CISCO               = "Cisco Press"}
@String{pub-CISCO:adr           = "Indianapolis, IN, USA"}

@String{pub-CLARENDON-PRESS     = "Clarendon Press"}
@String{pub-CLARENDON-PRESS:adr = "Oxford, UK"}

@String{pub-COPERNICUS          = "Copernicus (a division of Springer-Verlag
                                  New York, Inc.)"}
@String{pub-COPERNICUS:adr      = "175 Fifth Avenue, New York, NY 10010, USA"}

@String{pub-CRC                 = "CRC Press"}
@String{pub-CRC:adr             = "2000 N.W. Corporate Blvd., Boca Raton,
                                  FL 33431-9868, USA"}

@String{pub-DEKKER              = "Marcel Dekker, Inc."}
@String{pub-DEKKER:adr          = "New York, NY, USA"}

@String{pub-DP                  = "Digital Press"}
@String{pub-DP:adr              = "12 Crosby Drive, Bedford, MA 01730, USA"}

@String{pub-DOUBLEDAY           = "Doubleday"}
@String{pub-DOUBLEDAY:adr       = "New York, NY, USA"}

@String{pub-DOVER               = "Dover Publications, Inc."}
@String{pub-DOVER:adr           = "New York, NY, USA"}

@String{pub-ELSEVIER            = "Elsevier"}
@String{pub-ELSEVIER:adr        = "Amsterdam, The Netherlands"}

@String{pub-FREE                = "Free Press"}
@String{pub-FREE:adr            = "New York, NY, USA"}

@String{pub-GRUYTER             = "Walter de Gruyter"}
@String{pub-GRUYTER:adr         = "New York, NY, USA"}

@String{pub-HARPERCOLLINS       = "HarperCollins College Publishers"}
@String{pub-HARPERCOLLINS:adr   = "New York, NY, USA"}

@String{pub-HOUGHTON-MIFFLIN    = "Houghton-Mifflin"}
@String{pub-HOUGHTON-MIFFLIN:adr = "Boston, MA, USA"}

@String{pub-IBM                 = "IBM Corporation"}
@String{pub-IBM:adr             = "San Jose, CA, USA"}

@String{pub-IDG-WORLDWIDE       = "I D G Books Worldwide"}
@String{pub-IDG-WORLDWIDE:adr   = "Indianapolis, IN, USA"}

@String{pub-IEEE                = "IEEE Computer Society Press"}
@String{pub-IEEE:adr            = "1109 Spring Street, Suite 300, Silver
                                  Spring, MD 20910, USA"}

@String{pub-JONES-BARTLETT      = "Jones and Bartlett"}
@String{pub-JONES-BARTLETT:adr  = "Boston, MA, USA"}

@String{pub-KLUWER              = "Kluwer Academic Publishers"}
@String{pub-KLUWER:adr          = "Dordrecht, The Netherlands"}

@String{pub-KNOPF               = "Alfred A. Knopf"}
@String{pub-KNOPF:adr           = "New York, NY, USA"}

@String{pub-MATH-ASSOC-AMER     = "Mathematical Association of America"}
@String{pub-MATH-ASSOC-AMER:adr = "Washington, DC, USA"}

@String{pub-MCGRAW-HILL         = "Mc{\-}Graw-Hill"}
@String{pub-MCGRAW-HILL:adr     = "New York, NY, USA"}

@String{pub-MICROSOFT           = "Microsoft Press"}
@String{pub-MICROSOFT:adr       = "Redmond, WA, USA"}

@String{pub-MIT                 = "MIT Press"}
@String{pub-MIT:adr             = "Cambridge, MA, USA"}

@String{pub-MORGAN-KAUFMANN     = "Morgan Kaufmann Publishers"}
@String{pub-MORGAN-KAUFMANN:adr = "Los Altos, CA 94022, USA"}

@String{pub-MORGAN-KAUFMANN-SF  = "Morgan Kaufmann Publishers"}
@String{pub-MORGAN-KAUFMANN-SF:adr = "San Francisco, CA, USA"}

@String{pub-NEW-RIDERS          = "New Riders Publishing"}
@String{pub-NEW-RIDERS:adr      = "Carmel, IN, USA"}

@String{pub-NEWNES              = "Newnes Press"}
@String{pub-NEWNES:adr          = "Amsterdam, The Netherlands and Boston, MA,
                                  USA"}

@String{pub-NIST                = "National Institute for Standards and
                                  Technology"}
@String{pub-NIST:adr            = "Gaithersburg, MD 20899-8900, USA"}

@String{pub-NO-STARCH           = "No Starch Press"}
@String{pub-NO-STARCH:adr       = "San Francisco, CA, USA"}

@String{pub-NORTON              = "W. W. Norton \& Co."}
@String{pub-NORTON:adr          = "New York, NY, USA"}

@String{pub-ORA                 = "O'Reilly \& {Associates, Inc.}"}
@String{pub-ORA:adr             = "103a Morris Street,
                                   Sebastopol, CA 95472,
                                   USA,
                                   Tel: +1 707 829 0515,
                                   and
                                   90 Sherman Street,
                                   Cambridge, MA 02140,
                                   USA,
                                   Tel: +1 617 354 5800"}

@String{pub-ORA-MEDIA           = "O'Reilly Media, Inc."}
@String{pub-ORA-MEDIA:adr       = "1005 Gravenstein Highway North, Sebastopol,
                                  CA 95472, USA"}

@String{pub-OSBORNE-MCGRAW-HILL = "Osborne\slash Mc{\-}Graw-Hill"}
@String{pub-OSBORNE-MCGRAW-HILL:adr = "Berkeley, CA, USA"}

@String{pub-OXFORD              = "Oxford University Press"}
@String{pub-OXFORD:adr          = "Walton Street, Oxford OX2 6DP, UK"}

@String{pub-PENGUIN             = "Penguin"}
@String{pub-PENGUIN:adr         = "London, UK and New York, NY, USA"}

@String{pub-PH                  = "Pren{\-}tice-Hall, Inc."}
@String{pub-PH:adr              = "Upper Saddle River, NJ 07458, USA"}

@String{pub-PHPTR               = "Pren{\-}tice-Hall PTR"}
@String{pub-PHPTR:adr           = "Upper Saddle River, NJ 07458, USA"}

@String{pub-PPH                 = "Pearson Prentice Hall"}
@String{pub-PPH:adr             = "Upper Saddle River, NJ, USA"}

@String{pub-PRINCETON           = "Princeton University Press"}
@String{pub-PRINCETON:adr       = "Princeton, NJ, USA"}

@String{pub-RANDOM-HOUSE        = "Random House"}
@String{pub-RANDOM-HOUSE:adr    = "New York, NY, USA"}

@String{pub-RSA                 = "RSA Data Security, Inc."}
@String{pub-RSA:adr             = "Redwood City, CA, USA"}

@String{pub-SAMS                = "SAMS Publishing"}
@String{pub-SAMS:adr            = "Indianapolis, IN, USA"}

@String{pub-SPIE                = "Society of Photo-optical
                                  Instrumentation Engineers (SPIE)"}
@String{pub-SPIE:adr            = "Bellingham, WA, USA"}

@String{pub-SUN                 = "Sun Microsystems"}
@String{pub-SUN:adr             = "2550 Garcia Avenue, Mountain View,
                                  CA 94043, USA"}

@String{pub-SV                  = "Spring{\-}er-Ver{\-}lag"}
@String{pub-SV:adr              = "Berlin, Germany~/ Heidelberg, Germany~/
                                  London, UK~/ etc."}

@String{pub-SYNGRESS            = "Syngress Publishing, Inc."}
@String{pub-SYNGRESS:adr        = "Rockland, MA, USA"}

@String{pub-TAYLOR-FRANCIS      = "Taylor and Francis"}
@String{pub-TAYLOR-FRANCIS:adr  = "Boca Raton, FL, USA"}

@String{pub-USENIX              = "USENIX"}
@String{pub-USENIX:adr          = "Berkeley, CA, USA"}

@String{pub-USGPO               = "United States Government Printing Office"}
@String{pub-USGPO:adr           = "Washington, DC, USA"}

@String{pub-VIKING              = "Viking"}
@String{pub-VIKING:adr          = "New York, NY, USA"}

@String{pub-WILEY               = "John Wiley and Sons, Inc."}
@String{pub-WILEY:adr           = "New York, NY, USA"}

@String{pub-WILEY-INTERSCIENCE  = "Wiley-In{\-}ter{\-}sci{\-}ence"}
@String{pub-WILEY-INTERSCIENCE:adr = "New York, NY, USA"}

@String{pub-WORLD-SCI           = "World Scientific Publishing Co."}
@String{pub-WORLD-SCI:adr       = "Singapore; Philadelphia, PA, USA; River
                                  Edge, NJ, USA"}

@String{pub-YALE                = "Yale University Press"}
@String{pub-YALE:adr            = "New Haven, CT, USA"}

%%% ====================================================================
%%% Series abbreviations:
@String{ser-LNAI                = "Lecture Notes in Artificial Intelligence"}

@String{ser-LNCS                = "Lecture Notes in Computer Science"}

@String{ser-LNMATH              = "Lecture Notes in Mathematics"}

@String{ser-PROJECT-GUTENBERG   = "Project Gutenberg"}

@String{ser-SIGPLAN             = "ACM SIG{\-}PLAN Notices"}

%%% ====================================================================
%%% Bibliography entries, sorted by year, and then by citation label:
@InProceedings{Wani:1970:PEA,
  author =       "Abdul Raoof Wani and Q. P. Rana and Nitin Pandey",
  editor =       "Kanad Ray and Tarun K. Sharma and Sanyog Rawat and R.
                 K. Saini and Anirban Bandyopadhyay",
  booktitle =    "Soft Computing: Theories and Applications: Proceedings
                 of SoCTA 2017",
  title =        "Performance Evaluation and Analysis of Advanced
                 Symmetric key Cryptographic Algorithms for Cloud
                 Computing Security",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "261--270",
  year =         "1970",
  DOI =          "https://doi.org/10.1007/978-981-13-0589-4",
  ISBN =         "981-13-0588-9 (print), 981-13-0589-7 (e-book)",
  ISBN-13 =      "978-981-13-0588-7 (print), 978-981-13-0589-4
                 (e-book)",
  ISSN =         "2194-5357 (print), 2194-5365 (electronic)",
  LCCN =         "QA76.9.S63",
  bibdate =      "Sun Jun 07 13:19:38 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://link.springer.com/10.1007/978-981-13-0589-4",
  abstract =     "The book focuses on soft computing and its
                 applications to solve real-world problems occurring in
                 different domains ranging from medicine and healthcare,
                 and supply chain management to image processing and
                 cryptanalysis. It includes high-quality papers
                 presented in the International Conference on Soft
                 Computing: Theories and Applications (SoCTA 2017),
                 organized by Bundelkhand University, Jhansi, India.
                 Offering significant insights into soft computing for
                 teachers and researchers alike, the book inspires more
                 researchers to work in the field of soft computing.",
  acknowledgement = ack-nhfb,
  keywords =     "3DES; AES; Blowfish; DES; IDEA; RC4; TEA",
  tableofcontents = "1: An Analysis of Authors productivity in RFID and
                 Supply Chain Management \\
                 2: Meta Heuristic Techniques Study for Fault Tolerant
                 in Cloud Computing Environment: A Survey Work \\
                 3: Complexity Metrics for Component Based Software
                 System \\
                 4: Design and Analysis of On-Chip Low Power, Low
                 Drop-Out Voltage Regulator using FFRC and MCC
                 Techniques \\
                 5: Study and Analysis of Back-Propagation Approach in
                 Artificial Neural Network using HOG Descriptor for
                 Real-time Object Classification \\
                 6: Identification of relevant stochastic input
                 variables for prediction of daily PM10 using Artificial
                 Neural Networks \\
                 7: Field based Weighting Information Retrieval on
                 Document field of Ad hoc dataset",
}

@Book{Delfs:2002:ICP,
  author =       "Hans Delfs and Helmut Knebl",
  title =        "Introduction to Cryptography: Principles and
                 Applications",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xiv + 310",
  year =         "2002",
  DOI =          "https://doi.org/10.1007/978-3-642-87126-9",
  ISBN =         "3-642-87126-7 (e-book), 3-642-87128-3",
  ISBN-13 =      "978-3-642-87126-9 (e-book), 978-3-642-87128-3",
  ISSN =         "1619-7100 (print), 2197-845X (electronic)",
  ISSN-L =       "1619-7100",
  LCCN =         "QA76.9.A25",
  bibdate =      "Sat Jun 10 08:35:18 MDT 2017",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Information Security and Cryptography",
  URL =          "http://www.springerlink.com/content/978-3-642-87126-9",
  abstract =     "Due to the rapid growth of digital communication and
                 electronic data exchange, information security has
                 become a crucial issue in industry, business, and
                 administration. Modern cryptography provides essential
                 techniques for securing information and protecting
                 data. In the first part, this book covers the key
                 concepts of cryptography on an undergraduate level,
                 from encryption and digital signatures to cryptographic
                 protocols. Essential techniques are demonstrated in
                 protocols for key exchange, user identification,
                 electronic elections and digital cash. In the second
                 part, more advanced topics are addressed, such as the
                 bit security of one-way functions and computationally
                 perfect pseudorandom bit generators. The security of
                 cryptographic schemes is a central topic. Typical
                 examples of provably secure encryption and signature
                 schemes and their security proofs are given. Though
                 particular attention is given to the mathematical
                 foundations, no special background in mathematics is
                 presumed. The necessary algebra, number theory and
                 probability theory are included in the appendix. Each
                 chapter closes with a collection of exercises. The
                 second edition contains corrections, revisions and new
                 material, including a complete description of the AES,
                 an extended section on cryptographic hash functions, a
                 new section on random oracle proofs, and a new section
                 on public-key encryption schemes that are provably
                 secure against adaptively-chosen-ciphertext attacks.",
  acknowledgement = ack-nhfb,
  subject =      "Computer science; Data encryption (Computer science);
                 Coding theory; Coding theory; Computer science; Data
                 encryption (Computer science)",
  tableofcontents = "1. Introduction \\
                 1.1 Encryption and Secrecy \\
                 1.2 The Objectives of Cryptography \\
                 1.3 Attacks \\
                 1.4 Cryptographic Protocols \\
                 1.5 Provable Security \\
                 2. Symmetric-Key Encryption \\
                 2.1 Stream Ciphers \\
                 2.2 Block Ciphers \\
                 3. Public-Key Cryptography \\
                 3.1 The Concept of Public-Key Cryptography \\
                 3.2 Modular Arithmetic \\
                 3.3 RSA \\
                 3.4 Hash Functions \\
                 3.5 The Discrete Logarithm \\
                 3.6 Modular Squaring \\
                 4. Cryptographic Protocols \\
                 4.1 Key Exchange and Entity Authentication \\
                 4.2 Identification Schemes \\
                 4.3 Commitment Schemes \\
                 4.4 Electronic Elections \\
                 4.5 Digital Cash \\
                 5. Probabilistic Algorithms \\
                 5.1 Coin-Tossing Algorithms \\
                 5.2 Monte Carlo and Las Vegas Algorithms \\
                 6. One-Way Functions and the Basic Assumptions \\
                 6.1 A Notation for Probabilities \\
                 6.2 Discrete Exponential Function \\
                 6.3 Uniform Sampling Algorithms \\
                 6.4 Modular Powers \\
                 6.5 Modular Squaring \\
                 6.6 Quadratic Residuosity Property \\
                 6.7 Formal Definition of One-Way Functions \\
                 6.8 Hard-Core Predicates \\
                 7. Bit Security of One-Way Functions \\
                 7.1 Bit Security of the Exp Family \\
                 7.2 Bit Security of the RSA Family \\
                 7.3 Bit Security of the Square Family \\
                 8. One-Way Functions and Pseudorandomness \\
                 8.1 Computationally Perfect Pseudorandom Bit Generators
                 \\
                 8.2 Yao's Theorem \\
                 9. Provably Secure Encryption \\
                 9.1 Classical Information-Theoretic Security \\
                 9.2 Perfect Secrecy and Probabilistic Attacks \\
                 9.3 Public-Key One-Time Pads \\
                 9.4 Computationally Secret Encryption Schemes \\
                 9.5 Unconditional Security of Cryptosystems \\
                 10. Provably Secure Digital Signatures \\
                 10.1 Attacks and Levels of Security \\
                 10.2 Claw-Free Pairs and Collision-Resistant Hash
                 Functions \\
                 10.3 Authentication-Tree-Based Signatures \\
                 10.4 A State-Free Signature Scheme \\
                 A. Algebra and Number Theory \\
                 A.1 The Integers \\
                 A.2 Residues \\
                 A.3 The Chinese Remainder Theorem \\
                 A.4 Primitive Roots and the Discrete Logarithm \\
                 A.5 Quadratic Residues \\
                 A.6 Modular Square Roots \\
                 A.7 Primes and Primality Tests \\
                 B. Probabilities and Information Theory \\
                 B.1 Finite Probability Spaces and Random Variables \\
                 B.2 The Weak Law of Large Numbers \\
                 B.3 Distance Measures \\
                 B.4 Basic Concepts of Information Theory \\
                 References",
}

@Book{Nievergelt:2002:FLM,
  author =       "Yves Nievergelt",
  title =        "Foundations of Logic and Mathematics: Applications to
                 Computer Science and Cryptography",
  publisher =    pub-BIRKHAUSER,
  address =      pub-BIRKHAUSER:adr,
  pages =        "xvi + 415",
  year =         "2002",
  ISBN =         "0-8176-4249-8 , 3-7643-4249-8",
  ISBN-13 =      "978-0-8176-4249-5, 978-3-7643-4249-4",
  LCCN =         "QA9 .N53 2002",
  bibdate =      "Fri Mar 23 19:09:42 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://www.loc.gov/catdir/enhancements/fy0812/2001052551-d.html;
                 http://www.loc.gov/catdir/enhancements/fy0812/2001052551-t.html",
  acknowledgement = ack-nhfb,
  subject =      "Logic, Symbolic and mathematical; Set theory; Number
                 theory; Computer science; Mathematics",
  zz-isbn =      "0-8176-4249-8, 3-7643-4249-8",
}

@Book{Shparlinski:2003:CAA,
  author =       "Igor E. Shparlinski",
  title =        "Cryptographic Applications of Analytic Number Theory:
                 Complexity Lower Bounds and Pseudorandomness",
  volume =       "22",
  publisher =    pub-BIRKHAUSER,
  address =      pub-BIRKHAUSER:adr,
  pages =        "viii + 411",
  year =         "2003",
  ISBN =         "3-7643-6654-0 , 0-8176-6654-0",
  ISBN-13 =      "978-3-7643-6654-4, 978-0-8176-6654-5",
  LCCN =         "QA267.7 .S55 2003",
  bibdate =      "Fri Mar 23 10:30:16 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib;
                 jenson.stanford.edu:2210/unicorn",
  series =       "Progress in computer science and applied logic",
  acknowledgement = ack-nhfb,
  subject =      "Computational complexity; Coding theory; Combinatorial
                 number theory",
  zz-isbn =      "3-7643-6654-0, 0-8176-6654-0",
}

@InCollection{Huang:2005:EMP,
  author =       "Liusheng Huang and Hong Zhong and Hong Shen and
                 Yonglong Luo",
  editor =       "Hong Shen and Koji Nakano",
  booktitle =    "{Sixth International Conference on Parallel and
                 Distributed Computing, Applications and Technologies,
                 2005. PDCAT 2005: 5--8 December 2005, Dalian, China}",
  title =        "An Efficient Multiple-Precision Division Algorithm",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  bookpages =    "xxvi + 1091",
  pages =        "971--974",
  year =         "2005",
  DOI =          "https://doi.org/10.1109/PDCAT.2005.79",
  ISBN =         "0-7695-2405-2",
  ISBN-13 =      "978-0-7695-2405-4",
  LCCN =         "QA76.58 .I5752 2005",
  bibdate =      "Mon Dec 09 14:30:16 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/fparith.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib",
  note =         "The authors present an integer-division algorithm that
                 runs three to five times faster than Knuth's 1981
                 original. However, there is an error in the
                 renormalization algorithm that is corrected in
                 \cite{Mukhopadhyay:2014:EMP}, while retaining the
                 speedup.",
  acknowledgement = ack-nhfb,
  book-URL =     "http://ieeexplore.ieee.org/servlet/opac?punumber=10544",
}

@Book{Beissinger:2006:CUM,
  author =       "Janet Beissinger and Vera Pless",
  title =        "The Cryptoclub: Using Mathematics to Make and Break
                 Secret Codes",
  publisher =    pub-A-K-PETERS,
  address =      pub-A-K-PETERS:adr,
  pages =        "xvi + 199",
  year =         "2006",
  ISBN =         "1-56881-223-X",
  ISBN-13 =      "978-1-56881-223-6",
  LCCN =         "QA40.5 .B45 2006",
  bibdate =      "Fri Mar 23 19:22:49 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://www.loc.gov/catdir/toc/ecip067/2006002743.html",
  acknowledgement = ack-nhfb,
  subject =      "Mathematics; Juvenile literature; Cryptography",
}

@Article{Lee:2006:DCK,
  author =       "Patrick P. C. Lee and John C. S. Lui and David K. Y.
                 Yau",
  title =        "Distributed collaborative key agreement and
                 authentication protocols for dynamic peer groups",
  journal =      j-IEEE-TRANS-NETWORKING,
  volume =       "14",
  number =       "2",
  pages =        "263--276",
  month =        apr,
  year =         "2006",
  CODEN =        "IEANEP",
  DOI =          "https://doi.org/10.1109/TNET.2006.872575",
  ISSN =         "1063-6692 (print), 1558-2566 (electronic)",
  ISSN-L =       "1063-6692",
  bibdate =      "Sat Feb 8 09:00:28 MST 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
  abstract =     "We consider several distributed collaborative key
                 agreement and authentication protocols for dynamic peer
                 groups. There are several important characteristics
                 which make this problem different from traditional
                 secure group communication. They are: (1) distributed
                 nature in which there is no centralized key server; (2)
                 collaborative nature in which the group key is
                 contributory (i.e., each group member will
                 collaboratively contribute its part to the global group
                 key); and (3) dynamic nature in which existing members
                 may leave the group while new members may join. Instead
                 of performing individual rekeying operations, i.e.,
                 recomputing the group key after every join or leave
                 request, we discuss an interval-based approach of
                 rekeying. We consider three interval-based distributed
                 rekeying algorithms, or interval-based algorithms for
                 short, for updating the group key: (1) the Rebuild
                 algorithm; (2) the Batch algorithm; and (3) the
                 Queue-batch algorithm. Performance of these three
                 interval-based algorithms under different settings,
                 such as different join and leave probabilities, is
                 analyzed. We show that the interval-based algorithms
                 significantly outperform the individual rekeying
                 approach and that the Queue-batch algorithm performs
                 the best among the three interval-based algorithms.
                 More importantly, the Queue-batch algorithm can
                 substantially reduce the computation and communication
                 workload in a highly dynamic environment. We further
                 enhance the interval-based algorithms in two aspects:
                 authentication and implementation. Authentication
                 focuses on the security improvement, while
                 implementation realizes the interval-based algorithms
                 in real network settings. Our work provides a
                 fundamental understanding about establishing a group
                 key via a distributed and collaborative approach for a
                 dynamic peer group.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE\slash ACM Transactions on Networking",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J771",
}

@Book{Delfs:2007:ICP,
  author =       "Hans Delfs and Helmut Knebl",
  title =        "Introduction to Cryptography: Principles and
                 Applications",
  volume =       "1",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  edition =      "Second",
  pages =        "xvi + 367",
  year =         "2007",
  DOI =          "https://doi.org/10.1007/3-540-49244-5",
  ISBN =         "3-540-49243-7 (hardcover), 3-540-49244-5",
  ISBN-13 =      "978-3-540-49243-6 (hardcover), 978-3-540-49244-3",
  ISSN =         "1619-7100 (print), 2197-845X (electronic)",
  ISSN-L =       "1619-7100",
  LCCN =         "QA76.9A25 D44 2007; QA76.9.D35",
  bibdate =      "Sat Jun 10 08:34:43 MDT 2017",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Information Security and Cryptography",
  URL =          "http://www.springerlink.com/content/gm2886",
  abstract =     "In the first part, this book covers the key concepts
                 of cryptography on an undergraduate level, from
                 encryption and digital signatures to cryptographic
                 protocols. Essential techniques are demonstrated in
                 protocols for key exchange, user identification,
                 electronic elections and digital cash. In the second
                 part, more advanced topics are addressed, such as the
                 bit security of one-way functions and computationally
                 perfect pseudorandom bit generators. The security of
                 cryptographic schemes is a central topic. Typical
                 examples of provably secure encryption and signature
                 schemes and their security proofs are given. Though
                 particular attention is given to the mathematical
                 foundations, no special background in mathematics is
                 presumed. The necessary algebra, number theory and
                 probability theory are included in the appendix. Each
                 chapter closes with a collection of exercises.",
  acknowledgement = ack-nhfb,
  subject =      "Computer security; Cryptography; Computer networks;
                 Security measures; Cryptography; Security measures;
                 Computer security; Informatique; Security measures;
                 Computer security; Cryptography; Coding theory; Data
                 encryption (Computer science); Data protection; Data
                 structures (Computer science); Number theory; Coding
                 theory; Data encryption (Computer science); Data
                 protection; Data structures (Computer science); Number
                 theory.",
  tableofcontents = "1. Introduction \\
                 2. Symmetric-key encryption \\
                 3. Public-key cryptography \\
                 4. Cryptographic protocols \\
                 5. Probabilistic algorithms \\
                 6. One-way functions and the basic assumptions \\
                 7. Bit security of one-way functions \\
                 8. One-way functions and pseudorandomness \\
                 9. Provably secure encryption \\
                 10. Provably secure digital signatures \\
                 A. Algebra and number theory \\
                 B. Probabilities and information theory \\
                 References \\
                 Index",
}

@Book{Biggs:2008:CII,
  author =       "Norman Biggs",
  title =        "Codes: An introduction to Information Communication
                 and Cryptography",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "x + 273",
  year =         "2008",
  ISBN =         "1-84800-273-4 (e-book), 1-84800-272-6 (paperback)",
  ISBN-13 =      "978-1-84800-273-9 (e-book), 978-1-84800-272-2
                 (paperback)",
  LCCN =         "QA268 .B496 2008eb",
  bibdate =      "Fri Mar 23 10:32:24 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib;
                 jenson.stanford.edu:2210/unicorn",
  series =       "Springer undergraduate mathematics series",
  abstract =     "This book is an integrated introduction to the
                 mathematics of coding, that is, replacing information
                 expressed in symbols, such as a natural language or a
                 sequence of bits, by another message using (possibly)
                 different symbols. There are three main reasons for
                 doing this: economy, reliability, and security, and
                 each is covered in detail. Only a modest mathematical
                 background is assumed, the mathematical theory being
                 introduced at a level that enables the basic problems
                 to be stated carefully, but without unnecessary
                 abstraction.",
  acknowledgement = ack-nhfb,
  subject =      "Coding theory; Cryptography; Computer Science; IT;
                 COMPUTERS; Information Theory; Kryptologie",
  tableofcontents = "Coding and its uses \\
                 Prefix-free codes \\
                 Economical coding \\
                 Data compression \\
                 Noisy channels \\
                 The problem of reliable communication \\
                 The noisy coding theorems \\
                 Linear codes \\
                 Algebraic coding theory \\
                 Coding natural languages \\
                 The development of cryptography \\
                 Cryptography in theory and practice \\
                 The RSA cryptosystem \\
                 Cryptography and calculation \\
                 Elliptic curve cryptography",
}

@Book{Hoffstein:2008:IMC,
  author =       "Jeffrey Hoffstein and Jill Catherine Pipher and Joseph
                 H. Silverman",
  title =        "An Introduction to Mathematical Cryptography",
  volume =       "666",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xv + 523",
  year =         "2008",
  ISBN =         "0-387-77993-0 (hardcover)",
  ISBN-13 =      "978-0-387-77993-5 (hardcover)",
  LCCN =         "QA268 .H64 2008",
  bibdate =      "Thu Mar 22 12:29:21 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Undergraduate texts in mathematics",
  acknowledgement = ack-nhfb,
  subject =      "Coding theory; Cryptography; Mathematics",
  tableofcontents = "An introduction to cryptography \\
                 Discrete logarithms and Diffie-Hellman \\
                 Integer factorization and RSA \\
                 Combinatorics, probability, and information theory \\
                 Elliptic curves and cryptography \\
                 Lattices and cryptography \\
                 Digital signatures \\
                 Additional topics in cryptography",
}

@Book{Katz:2008:IMC,
  author =       "Jonathan Katz and Yehuda Lindell",
  title =        "Introduction to modern cryptography: Principles and
                 Protocols",
  publisher =    pub-CHAPMAN-HALL-CRC,
  address =      pub-CHAPMAN-HALL-CRC:adr,
  pages =        "xviii + 534",
  year =         "2008",
  ISBN =         "1-58488-551-3",
  ISBN-13 =      "978-1-58488-551-1",
  LCCN =         "QA76.9.A25 K36 2008",
  bibdate =      "Thu Mar 22 12:29:41 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Chapman and Hall/CRC cryptography and network
                 security",
  URL =          "http://www.loc.gov/catdir/enhancements/fy0807/2007017861-d.html;
                 http://www.loc.gov/catdir/toc/ecip0716/2007017861.html",
  acknowledgement = ack-nhfb,
  subject =      "Computer security; Cryptography",
  tableofcontents = "I. Introduction and Classical Cryptography \\
                 1. Introduction \\
                 2. Perfectly-Secret Encryption \\
                 II. Private-Key (Symmetric) Cryptography \\
                 3. Private-Key Encryption and Pseudorandomness \\
                 4. Message Authentication Codes and Collision-Resistant
                 Hash Functions \\
                 5. Practical Constructions of Pseudorandom Permutations
                 (Block Ciphers) \\
                 6. Theoretical Constructions of Pseudorandom Objects
                 \\
                 III. Public-Key (Asymmetric) Cryptography \\
                 7. Number Theory and Cryptographic Hardness Assumptions
                 \\
                 8. Factoring and Computing Discrete Logarithms \\
                 9. Private-Key Management and the Public-Key Revolution
                 \\
                 10. Public-Key Encryption \\
                 11. Additional Public-Key Encryption Schemes \\
                 12. Digital Signature Schemes \\
                 13. Public-Key Cryptosystems in the Random Oracle Model
                 \\
                 A. Mathematical Background \\
                 B. Supplementary Algorithmic Number Theory",
}

@Article{Douhou:2009:RUA,
  author =       "Salima Douhou and Jan R. Magnus",
  title =        "The reliability of user authentication through
                 keystroke dynamics",
  journal =      j-STAT-NEERLANDICA,
  volume =       "63",
  number =       "4",
  pages =        "432--449",
  month =        nov,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1111/j.1467-9574.2009.00434.x",
  ISSN =         "0039-0402 (print), 1467-9574 (electronic)",
  ISSN-L =       "0039-0402",
  bibdate =      "Tue Oct 8 09:15:34 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/statneerlandica.bib",
  URL =          "https://onlinelibrary.wiley.com/doi/epdf/10.1111/j.1467-9574.2009.00434.x",
  acknowledgement = ack-nhfb,
  ajournal =     "Stat. Neerl.",
  fjournal =     "Statistica Neerlandica",
  journal-URL =  "http://onlinelibrary.wiley.com/journal/10.1111/(ISSN)1467-9574",
  onlinedate =   "23 November 2009",
}

@Book{Elbirt:2009:UAC,
  author =       "Adam J. Elbirt",
  title =        "Understanding and Applying Cryptography and Data
                 Security",
  publisher =    pub-CRC,
  address =      pub-CRC:adr,
  pages =        "xxvii + 637",
  year =         "2009",
  ISBN =         "1-4200-6160-7",
  ISBN-13 =      "978-1-4200-6160-4",
  LCCN =         "QA76.9.A25 E43 2009",
  bibdate =      "Thu Mar 22 13:10:01 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://www.loc.gov/catdir/toc/ecip0821/2008028154.html",
  acknowledgement = ack-nhfb,
  subject =      "Computer security; Cryptography",
}

@Article{Xiong:2009:PSI,
  author =       "H. Xiong and F. Li and Z. Qin",
  title =        "Provably Secure Identity Based Threshold Signature
                 Without Random Oracles",
  journal =      j-INT-J-COMPUT-APPL,
  volume =       "31",
  number =       "4",
  pages =        "290--295",
  year =         "2009",
  DOI =          "https://doi.org/10.1080/1206212X.2009.11441953",
  ISSN =         "1206-212X (print), 1925-7074 (electronic)",
  ISSN-L =       "1206-212X",
  bibdate =      "Sat Apr 21 17:26:02 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijca.bib",
  URL =          "https://www.tandfonline.com/doi/full/10.1080/1206212X.2009.11441953",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Computer Applications",
  journal-URL =  "https://www.tandfonline.com/loi/tjca20",
  online-date =  "11 Jul 2015",
}

@Article{Agarwal:2010:BRW,
  author =       "Parag Agarwal and Balakrishnan Prabhakaran",
  title =        "Blind robust watermarking of {$3$D} motion data",
  journal =      j-TOMCCAP,
  volume =       "6",
  number =       "1",
  pages =        "2:1--2:??",
  month =        feb,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1671954.1671956",
  ISSN =         "1551-6857 (print), 1551-6865 (electronic)",
  ISSN-L =       "1551-6857",
  bibdate =      "Tue Mar 16 18:53:23 MDT 2010",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tomccap/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "The article addresses the problem of copyright
                 protection for 3D motion-captured data by designing a
                 robust blind watermarking mechanism. The mechanism
                 segments motion capture data and identifies clusters of
                 3D points per segment. A watermark can be embedded and
                 extracted within these clusters by using a proposed
                 extension of 3D quantization index modulation. The
                 watermarking scheme is blind in nature and the encoded
                 watermarks are shown to be imperceptible, and secure.
                 The resulting hiding capacity has bounds based on
                 cluster size. The watermarks are shown to be robust
                 against attacks such as uniform affine transformations
                 (scaling, rotation, and translation), cropping,
                 reordering, and noise addition. The time complexity for
                 watermark embedding and extraction is estimated as
                 O({\em n\/} log {\em n\/}) and O({\em n\/}$^2$ log {\em
                 n\/}), respectively.",
  acknowledgement = ack-nhfb,
  articleno =    "2",
  fjournal =     "ACM Transactions on Multimedia Computing,
                 Communications, and Applications",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J961",
  keywords =     "blind; decoding; encoding; spatial; Watermarking",
}

@Article{Ahmadian:2010:PDS,
  author =       "Zahra Ahmadian and Javad Mohajeri and Mahmoud
                 Salmasizadeh and Risto M. Hakala and Kaisa Nyberg",
  title =        "A practical distinguisher for the {Shannon} cipher",
  journal =      j-J-SYST-SOFTW,
  volume =       "83",
  number =       "4",
  pages =        "543--547",
  month =        apr,
  year =         "2010",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212",
  ISSN-L =       "0164-1212",
  bibdate =      "Tue Sep 7 07:27:05 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Altman:2010:AAP,
  author =       "Alon Altman and Moshe Tennenholtz",
  title =        "An axiomatic approach to personalized ranking
                 systems",
  journal =      j-J-ACM,
  volume =       "57",
  number =       "4",
  pages =        "26:1--26:35",
  month =        apr,
  year =         "2010",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1734213.1734220",
  ISSN =         "0004-5411",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Apr 29 13:26:36 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/pagerank.bib",
  abstract =     "Personalized ranking systems and trust systems are an
                 essential tool for collaboration in a multi-agent
                 environment. In these systems, trust relations between
                 many agents are aggregated to produce a personalized
                 trust rating of the agents. In this article, we
                 introduce the first extensive axiomatic study of this
                 setting, and explore a wide array of well-known and new
                 personalized ranking systems. We adapt several axioms
                 (basic criteria) from the literature on global ranking
                 systems to the context of personalized ranking systems,
                 and fully classify the set of systems that satisfy all
                 of these axioms. We further show that all these axioms
                 are necessary for this result.",
  acknowledgement = ack-nhfb,
  articleno =    "26",
  fjournal =     "Journal of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J401",
  keywords =     "Advogato; Axiomatic approach; e-Bay reputation system;
                 epinions.com; manipulation; MoleTrust; OpenPGP;
                 PageRank; ranking systems; social networks",
}

@Article{Anonymous:2010:MML,
  author =       "Anonymous",
  title =        "Mirror, mirror \ldots{}",
  journal =      j-IEEE-SPECTRUM,
  volume =       "47",
  number =       "2",
  pages =        "11--11",
  month =        feb,
  year =         "2010",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.2010.5397764",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Fri Jan 17 18:54:05 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Cryogenics; Cryptography; Europe; Magnetic cores;
                 Magnetic fields; Mirrors; Telescopes; Testing",
}

@TechReport{Anyanwu:2010:DCS,
  author =       "Matthew N. Anyanwu and Lih-Yuan Deng and Dipankar
                 Dasgupta",
  title =        "Design of Cryptographically Strong Generator By
                 Linearly Generated Sequences",
  type =         "Report",
  number =       "??",
  institution =  "The University of Memphis",
  address =      "Memphis, TN 38152, USA",
  day =          "12",
  month =        jan,
  year =         "2010",
  bibdate =      "Fri Mar 09 15:16:06 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://ais.cs.memphis.edu/files/papers/Mathew-security-paper.pdf",
  acknowledgement = ack-nhfb,
}

@InProceedings{Applebaum:2010:PKC,
  author =       "Benny Applebaum and Boaz Barak and Avi Wigderson",
  title =        "Public-key cryptography from different assumptions",
  crossref =     "ACM:2010:PAI",
  pages =        "171--180",
  year =         "2010",
  bibdate =      "Wed Sep 1 10:42:57 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
}

@Article{Ardagna:2010:ECP,
  author =       "Claudio A. Ardagna and Jan Camenisch and Markulf
                 Kohlweiss and Ronald Leenes and Gregory Neven and Bart
                 Priem and Pierangela Samarati and Dieter Sommer and
                 Mario Verdicchio",
  title =        "Exploiting cryptography for privacy-enhanced access
                 control: A result of the {PRIME Project}",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "1",
  pages =        "123--160",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0367",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:34 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Argyropoulos:2010:BTP,
  author =       "Savvas Argyropoulos and Dimitrios Tzovaras and
                 Dimosthenis Ioannidis and Yannis Damousis and Michael
                 G. Strintzis and Martin Braun and Serge Boverie",
  title =        "Biometric template protection in multimodal
                 authentication systems based on error correcting
                 codes",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "1",
  pages =        "161--185",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0369",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:34 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Arnedo-Moreno:2010:JRA,
  author =       "Joan Arnedo-Moreno and Jordi
                 Herrera-Joancomart{\'\i}",
  title =        "{JXTA} resource access control by means of
                 advertisement encryption",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "26",
  number =       "1",
  pages =        "21--28",
  month =        jan,
  year =         "2010",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Sat Sep 11 13:08:16 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/0167739X",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Badrignans:2010:SSA,
  author =       "Beno{\^\i}t Badrignans and David Champagne and Reouven
                 Elbaz and Catherine Gebotys and Lionel Torres",
  title =        "{SARFUM}: Security Architecture for Remote {FPGA}
                 Update and Monitoring",
  journal =      j-TRETS,
  volume =       "3",
  number =       "2",
  pages =        "8:1--8:??",
  month =        may,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1754386.1754389",
  ISSN =         "1936-7406 (print), 1936-7414 (electronic)",
  ISSN-L =       "1936-7406",
  bibdate =      "Tue Jun 22 16:00:33 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "Remote update of hardware platforms or embedded
                 systems is a convenient service enabled by Field
                 Programmable Gate Array (FPGA)-based systems. This
                 service is often essential in applications like
                 space-based FPGA systems or set-top boxes. However,
                 having the source of the update be remote from the FPGA
                 system opens the door to a set of attacks that may
                 challenge the confidentiality and integrity of the FPGA
                 configuration, the bitstream. Existing schemes propose
                 to encrypt and authenticate the bitstream to thwart
                 these attacks. However, we show that they do not
                 prevent the replay of old bitstream versions, and thus
                 give adversaries an opportunity for downgrading the
                 system. In this article, we propose a new architecture
                 called\par

                 sarfum that, in addition to ensuring bitstream
                 confidentiality and integrity, precludes the replay of
                 old bitstreams. sarfum also includes a protocol for the
                 system designer to remotely monitor the running
                 configuration of the FPGA. Following our presentation
                 and analysis of the security protocols, we propose an
                 example of implementation with the CCM (Counter with
                 CBC-MAC) authenticated encryption standard. We also
                 evaluate the impact of our architecture on the
                 configuration time for different FPGA devices.",
  acknowledgement = ack-nhfb,
  articleno =    "8",
  fjournal =     "ACM Transactions on Reconfigurable Technology and
                 Systems (TRETS)",
  journal-URL =  "http://portal.acm.org/toc.cfm?id=J1151",
  keywords =     "authenticated encryption; bitstream security; FPGA;
                 replay attack; security protocol; system downgrade",
}

@Article{Bai:2010:RKI,
  author =       "L. Bai",
  title =        "A Reliable {$ (K, N) $} Image Secret Sharing Scheme
                 with Low Information Overhead",
  journal =      j-INT-J-COMPUT-APPL,
  volume =       "32",
  number =       "1",
  pages =        "9--14",
  year =         "2010",
  DOI =          "https://doi.org/10.1080/1206212X.2010.11441955",
  ISSN =         "1206-212X (print), 1925-7074 (electronic)",
  ISSN-L =       "1206-212X",
  bibdate =      "Sat Apr 21 17:26:12 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijca.bib",
  URL =          "https://www.tandfonline.com/doi/full/10.1080/1206212X.2010.11441955",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Computer Applications",
  journal-URL =  "https://www.tandfonline.com/loi/tjca20",
  online-date =  "11 Jul 2015",
}

@Article{Baldwin:2010:AFI,
  author =       "Adrian Baldwin and Marco Casassa Mont and Yolanta
                 Beres and Simon Shiu",
  title =        "Assurance for federated identity management",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "541--572",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0380",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:47 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@TechReport{Barak:2010:IPO,
  author =       "Boaz Barak and Oded Goldreich and Russell Impagliazzo
                 and Steven Rudich and Amit Sahai and Salil Vadhan and
                 Ke Yang",
  title =        "On the (Im)possibility of Obfuscating Programs",
  type =         "Report",
  institution =  "Weizmann Institute",
  address =      "Rehovot 7610001, Israel",
  pages =        "54",
  day =          "29",
  month =        jul,
  year =         "2010",
  bibdate =      "Sat Sep 20 12:41:14 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.wisdom.weizmann.ac.il/~oded/PS/obf4.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "cryptography; encryption; obfuscation",
  remark =       "Revision of CRYPTO'01 paper \cite{Barak:2001:IPO}.",
}

@Book{Batey:2010:DMW,
  author =       "Mavis Batey",
  title =        "{Dilly}: the man who broke {Enigmas}",
  publisher =    "Biteback",
  address =      "London, UK",
  pages =        "256 (est.)",
  year =         "2010",
  ISBN =         "1-906447-15-2 (paperback)",
  ISBN-13 =      "978-1-906447-15-1 (paperback)",
  LCCN =         "????",
  bibdate =      "Thu May 12 11:03:33 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 library.ox.ac.uk:210/ADVANCE",
  price =        "US\$9.99",
  acknowledgement = ack-nhfb,
  subject =      "Knox, A. D; (Alfred Dillwyn); cryptographers; Great
                 Britain; Biography; World War II, 1939--1945;
                 cryptography",
  subject-dates = "1884--1943",
}

@Article{Bauer:2010:RVC,
  author =       "Andreas Bauer and Jan J{\"u}rjens",
  title =        "Runtime verification of cryptographic protocols",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "3",
  pages =        "315--330",
  month =        may,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:20 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809001047",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Baylis:2010:CC,
  author =       "John Baylis",
  title =        "Codes, not ciphers",
  journal =      j-MATH-GAZ,
  volume =       "94",
  number =       "531",
  pages =        "412--425",
  month =        nov,
  year =         "2010",
  CODEN =        "MAGAAS",
  DOI =          "https://doi.org/10.2307/3621549",
  ISSN =         "0025-5572",
  ISSN-L =       "0025-5572",
  bibdate =      "Tue May 5 12:04:12 MDT 2015",
  bibsource =    "http://journals.cambridge.org/action/displayIssue?jid=MAG&volumeId=94&issueId=531;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/mathgaz2010.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "Math. Gaz.",
  fjournal =     "The Mathematical Gazette",
  journal-URL =  "http://journals.cambridge.org/action/displayBackIssues?jid=MAG",
}

@Article{Benedetto:2010:DQE,
  author =       "Francesco Benedetto and Alberto Curcio and Gaetano
                 Giunta",
  title =        "Dynamic {QoS} Evaluation of Multimedia Contents in
                 Wireless Networks by ``Double-Boomerang''
                 Watermarking",
  journal =      j-FUTURE-INTERNET,
  volume =       "2",
  number =       "1",
  pages =        "60--73",
  day =          "08",
  month =        mar,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi2010060",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:44 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/2/1/60",
  abstract =     "This work presents a cooperative network-aware
                 processing of multimedia content for dynamic quality of
                 service management in wireless IP networks. Our
                 technique can be also used for quality control in UMTS
                 environments, exploiting the tracing watermarking
                 recently introduced in literature. In this work, we use
                 the transmitted video-sequences to monitor the QoS in a
                 videoconference call. The video-sequence of every
                 active user travels on the communication link, one time
                 as video (transparent mode), one time as watermark
                 (hidden mode) describing a boomerang trajectory. The
                 results obtained through our simulation trials confirm
                 the validity of such approach. In fact, the advantages
                 of distributing the management process are (i) an
                 easier and more precise localization of the cause of
                 QoS problems, (ii) a better knowledge of local
                 situations, (iii) a lower complexity for a single QoS
                 agent and (iv) an increase in possible actions.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue QoS in Wired and Wireless IP Networks.",
}

@Article{Berbecaru:2010:FSM,
  author =       "Diana Berbecaru and Luca Albertalli and Antonio Lioy",
  title =        "The {ForwardDiffsig} scheme for multicast
                 authentication",
  journal =      j-IEEE-TRANS-NETWORKING,
  volume =       "18",
  number =       "6",
  pages =        "1855--1868",
  month =        dec,
  year =         "2010",
  CODEN =        "IEANEP",
  DOI =          "https://doi.org/10.1109/TNET.2010.2052927",
  ISSN =         "1063-6692 (print), 1558-2566 (electronic)",
  ISSN-L =       "1063-6692",
  bibdate =      "Mon Mar 14 09:25:17 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE\slash ACM Transactions on Networking",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J771",
}

@Article{Bobba:2010:ABM,
  author =       "Rakesh Bobba and Omid Fatemieh and Fariba Khan and
                 Arindam Khan and Carl A. Gunter and Himanshu Khurana
                 and Manoj Prabhakaran",
  title =        "Attribute-Based Messaging: Access Control and
                 Confidentiality",
  journal =      j-TISSEC,
  volume =       "13",
  number =       "4",
  pages =        "31:1--31:??",
  month =        dec,
  year =         "2010",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/1880022.1880025",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Wed Jan 12 17:10:07 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "Attribute-Based Messaging (ABM) enables messages to be
                 addressed using attributes of recipients rather than an
                 explicit list of recipients. Such messaging offers
                 benefits of efficiency, exclusiveness, and
                 intensionality, but faces challenges in access control
                 and confidentiality. In this article we explore an
                 approach to intraenterprise ABM based on providing
                 access control and confidentiality using information
                 from the same attribute database exploited by the
                 addressing scheme. We show how to address three key
                 challenges. First, we demonstrate a manageable access
                 control system based on attributes. Second, we
                 demonstrate use of attribute-based encryption to
                 provide end-to-end confidentiality. Third, we show that
                 such a system can be efficient enough to support ABM
                 for mid-size enterprises.",
  acknowledgement = ack-nhfb,
  articleno =    "31",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@Book{Bohme:2010:ASS,
  author =       "Rainer B{\"o}hme",
  title =        "Advanced Statistical Steganalysis",
  volume =       "0",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xv + 285",
  year =         "2010",
  DOI =          "https://doi.org/10.1007/978-3-642-14313-7",
  ISBN =         "3-642-14312-1, 3-642-14313-X (e-book)",
  ISBN-13 =      "978-3-642-14312-0, 978-3-642-14313-7 (e-book)",
  ISSN =         "1619-7100 (print), 2197-845X (electronic)",
  ISSN-L =       "1619-7100",
  LCCN =         "QA76.9.A25 B64 2010; TA1637-1638; Z104 .B68 2010",
  bibdate =      "Sat Jun 10 08:35:01 MDT 2017",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Information Security and Cryptography",
  URL =          "http://www.springerlink.com/content/978-3-642-14313-7",
  abstract =     "Steganography is the art and science of hiding
                 information in inconspicuous cover data so that even
                 the existence of a secret message is kept confidential,
                 and steganalysis is the task of detecting secret
                 messages in covers. This research monograph focuses on
                 the role of cover signals, the distinguishing feature
                 that requires us to treat steganography and
                 steganalysis differently from other secrecy techniques.
                 The main theoretical contribution of this book is a
                 proposal to structure approaches to provably secure
                 steganography according to their implied assumptions on
                 the limits of the adversary and on the nature of
                 covers. A further contribution is the emphasis on
                 dealing with heterogeneity in cover distributions,
                 crucial for security analyses. The author's work
                 complements earlier approaches based on information,
                 complexity, probability and signal processing theory,
                 and he presents numerous practical implications. The
                 scientific advances are supported by a survey of the
                 classical steganography literature; a new proposal for
                 a unified terminology and notation that is maintained
                 throughout this book; a critical discussion of the
                 results achieved and their limitations; and an
                 assessment of the possibility of transferring elements
                 of this research's empirical perspective to other
                 domains in information security. This book is suitable
                 for researchers working in cryptography and information
                 security, practitioners in the corporate and national
                 security domains, and graduate students specializing in
                 multimedia security and data hiding.",
  acknowledgement = ack-nhfb,
  author-dates = "1978--",
  shorttableofcontents = "Background and Advances in Theory \\
                 Principles of Modern Steganography and Steganalysis \\
                 Towards a Theory of Cover Models \\
                 Specific Advances in Steganalysis \\
                 Detection of Model-Based Steganography with First-Order
                 Statistics \\
                 Models of Heterogeneous Covers for Quantitative
                 Steganalysis \\
                 Improved Weighted Stego Image Steganalysis \\
                 Using Encoder Artefacts for Steganalysis of Compressed
                 Audio Streams \\
                 Synthesis \\
                 General Discussion",
  subject =      "Cryptography; Data encryption (Computer science);
                 Cryptographie; Chiffrement (Informatique);
                 Cryptography; Data encryption (Computer science)",
  tableofcontents = "1 Introduction / 1 \\
                 1.1 Steganography and Steganalysis as Empirical
                 Sciences / 1 \\
                 1.2 Objective and Approach / 2 \\
                 1.3 Outline / 4 \\
                 Part I Background and Advances in Theory \\
                 2 Principles of Modern Steganography and Steganalysis /
                 11 \\
                 2.1 Digital Steganography and Steganalysis / 11 \\
                 2.1.1 Steganographic System / 12 \\
                 2.1.2 Steganalysis / 13 \\
                 2.1.3 Relevance in Social and Academic Contexts / 13
                 \\
                 2.2 Conventions / 14 \\
                 2.3 Design Goals and Metrics / 17 \\
                 2.3.1 Capacity / 17 \\
                 2.3.2 Steganographic Security / 18 \\
                 2.3.3 Robustness / 21 \\
                 2.3.4 Further Metrics / 22 \\
                 2.4 Paradigms for the Design of Steganographic Systems
                 / 22 \\
                 2.4.1 Paradigm I: Modify with Caution / 22 \\
                 2.4.2 Paradigm II: Cover Generation / 23 \\
                 2.4.3 Dominant Paradigm / 25 \\
                 2.5 Adversary Models / 26 \\
                 2.5.1 Passive Warden / 26 \\
                 2.5.2 Active Warden / 28 \\
                 2.6 Embedding Domains / 30 \\
                 2.6.1 Artificial Channels / 30 \\
                 2.6.2 Spatial and Time Domains / 31 \\
                 2.6.3 Transformed Domain / 31 \\
                 2.6.4 Selected Cover Formats: JPEG and MP3 / 35 \\
                 2.6.5 Exotic Covers / 38 \\
                 2.7 Embedding Operations / 39 \\
                 2.7.1 LSB Replacement / 40 \\
                 2.7.2 LSB Matching ($\pm 1$) / 41 \\
                 2.7.3 Mod-k Replacement, Mod-A; Matching, and
                 Generalisations / 45 \\
                 2.7.4 Multi-Sample Rules / 47 \\
                 2.7.5 Adaptive Embedding / 48 \\
                 2.8 Protocols and Message Coding / 49 \\
                 2.8.1 Public-Key Steganography / 50 \\
                 2.8.2 Maximising Embedding Efficiency / 53 \\
                 2.9 Specific Detection Techniques / 57 \\
                 2.9.1 Calibration of JPEG Histograms / 57 \\
                 2.9.2 Universal Detectors / 60 \\
                 2.9.3 Quantitative Steganalysis / 63 \\
                 2.10 Selected Estimators for LSB Replacement in Spatial
                 Domain Images / 64 \\
                 2.10.1 RS Analysis / 64 \\
                 2.10.2 Sample Pair Analysis / 67 \\
                 2.10.3 Higher-Order Structural Steganalysis / 69 \\
                 2.10.4 Weighted Stego Image Steganalysis / 73 \\
                 2.11 Summary and Further Steps / 76 \\
                 Towards a Theory of Cover Models / 79 \\
                 3.1 Steganalyst 's Problem Formalised / 79 \\
                 3.1.1 The Plausibility Heuristic / 79 \\
                 3.1.2 Application to Digital Steganography / 81 \\
                 3.1.3 Incognisability of the Cover Distribution / 83
                 \\
                 3.2 Cover Models / 84 \\
                 3.2.1 Defining Cover Models / 84 \\
                 3.2.2 Options for Formulating Cover Models / 86 \\
                 3.2.3 Cover Models and Detection Performance / 88 \\
                 3.2.4 Summary and Motivations for Studying Cover Models
                 / 92 \\
                 3.3 Dealing with Heterogeneous Cover Sources / 93 \\
                 3.3.1 Mixture Distributions / 95 \\
                 3.3.2 The Mixture Cover Model / 95 \\
                 3.4 Relation to Prior Information-Theoretic Work / 97
                 \\
                 3.4.1 Theoretical Limits / 98 \\
                 3.4.2 Observability Bounds / 99 \\
                 3.4.3 Computational Bounds / 101 \\
                 3.4.4 Applicability of the Theory of Cover Models / 102
                 \\
                 3.4.5 Indeterminacy in the Cover / 104 \\
                 3.5 Instances of Cover Models for Heterogeneous Sources
                 / 106 \\
                 3.6 Summary / 107 \\
                 Part II Specific Advances in Steganalysis \\
                 4 Detection of Model-Based Steganography with
                 First-Order Statistics Ill 4.1 Fundamentals of
                 Model-Based Steganography Ill 4.2 MB1: An Embedding
                 Function for JPEG Covers / 114 \\
                 4.3 Detection Method / 117 \\
                 4.4 Experimental Validation / 120 \\
                 4.5 Summary and Outlook / 123 \\
                 4.5.1 Limitations and Future Directions / 124 \\
                 4.5.2 Possible (Short-Term) Countermeasures / 125 \\
                 4.5.3 Implications for More Secure Steganography / 126
                 \\
                 5 Models of Heterogeneous Covers for Quantitative
                 Steganalysis / 127 \\
                 5.1 Metrics for Quantitative Steganalysis / 128 \\
                 5.1.1 Conventional Metrics / 128 \\
                 5.1.2 Improved Metrics Based on a Distribution Model /
                 130 \\
                 5.1.3 Decomposition of Estimation Errors / 135 \\
                 5.2 Measurement of Sensitivity to Cover Properties /
                 141 \\
                 5.2.1 Method / 142 \\
                 5.2.2 Modelling the Shape of the Between-Image
                 Distribution / 144 \\
                 5.2.3 Modelling the Shape of the Within-Image
                 Distribution / 148 \\
                 5.3 Summary and Conclusion / 151 \\
                 6 Improved Weighted Stego Image Steganalysis / 155 \\
                 6.1 Enhanced WS for Never-Compressed Covers / 155 \\
                 6.1.1 Enhanced Predictor / 156 \\
                 6.1.2 Enhanced Calculation of Weights / 161 \\
                 6.1.3 Enhanced Bias Correction / 166 \\
                 6.1.4 Experimental Results / 166 \\
                 6.2 Adaptation of WS to JPEG Pre-Compressed Covers /
                 172 \\
                 6.2.1 Improved Predictor / 173 \\
                 6.2.2 Estimation of the Cover's JPEG Compression
                 Quality / 176 \\
                 6.2.3 Experimental Results / 177 \\
                 6.3 Summary and Outlook / 182 \\
                 7 Using Encoder Artefacts for Steganalysis of
                 Compressed Audio Streams / 183 \\
                 7.1 MP3 Steganography and Steganalysis / 183 \\
                 7.1.1 Problem Statement in the Mixture Cover Model
                 Framework / 185 \\
                 7.1.2 Level of Analysis and Related Work / 185 \\
                 7.1.3 Method / 187 \\
                 7.2 Description of Features / 189 \\
                 7.2.1 Features Based on the Compression Size Control
                 Mechanism / 190 \\
                 7.2.2 Features Based on Model Decisions / 192 \\
                 7.2.3 Features Based on Capability Usage / 194 \\
                 7.2.4 Feature Based on Stream Formatting / 195 \\
                 7.3 Experimental Results for Encoder Detection / 196
                 \\
                 7.3.1 Single-Compressed Audio Files / 196 \\
                 7.3.2 Importance of Individual Features / 199 \\
                 7.3.3 Influence of Double-Compression / 199 \\
                 7.4 Experimental Results for Improved Steganalysis /
                 201 \\
                 7.5 Explorative Analysis of Encoder Similarities / 202
                 \\
                 7.6 Summary and Discussion / 204 \\
                 7.6.1 Limitations and Future Directions / 204 \\
                 7.6.2 Transferability to Other Formats / 205 \\
                 7.6.3 Related Applications / 206 \\
                 Part III Synthesis \\
                 8 General Discussion / 209 \\
                 8.1 Summary of Results / 209 \\
                 8.1.1 Results Based on Informal Arguments / 209 \\
                 8.1.2 Results Based on Mathematical Proofs / 210 \\
                 8.1.3 Results Based on Empirical Evidence / 211 \\
                 8.2 Limitations / 212 \\
                 8.3 Directions for Future Research / 213 \\
                 8.3.1 Theoretical Challenges / 214 \\
                 8.3.2 Empirical Challenges / 214 \\
                 8.3.3 Practical Challenges / 215 \\
                 8.4 Conclusion and Outlook / 215 \\
                 A Description of Covers Used in the Experiments / 219
                 \\
                 B Spurious Steganalysis Results Using the 'van Hateren'
                 Image Database / 223 \\
                 C Proof of Weighted Stego Image (WS) Estimator / 227
                 \\
                 D Derivation of Linear Predictor for Enhanced WS / 229
                 \\
                 E Game for Formal Security Analysis / 231 \\
                 F Derivation of ROC Curves and AUC Metric for Example
                 Cover Models / 233 \\
                 G Supplementary Figures and Tables / 235 \\
                 References / 245 \\
                 List of Tables / 263 \\
                 List of Figures / 266 \\
                 List of Acronyms / 269 \\
                 List of Symbols / 272 \\
                 List of Functions / 278 \\
                 Index / 280",
  xxpages =      "xvi + 288",
  xxpages =      "xii + 285",
}

@PhdThesis{Borghoff:2010:CLC,
  author =       "Julia Borghoff",
  title =        "Cryptanalysis of lightweight ciphers",
  type =         "{Ph.D.} thesis",
  school =       "Department of Mathematics, Technical University of
                 Denmark",
  address =      "Lyngby, Denmark",
  pages =        "x + 198",
  year =         "2010",
  bibdate =      "Fri May 13 07:36:47 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{Brakerski:2010:OHB,
  author =       "Z. Brakerski and Y. T. Kalai and J. Katz and V.
                 Vaikuntanathan",
  title =        "Overcoming the Hole in the Bucket: Public-Key
                 Cryptography Resilient to Continual Memory Leakage",
  crossref =     "IEEE:2010:PIA",
  pages =        "501--510",
  year =         "2010",
  DOI =          "https://doi.org/10.1109/FOCS.2010.55",
  bibdate =      "Thu Apr 12 09:34:12 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/focs2010.bib",
  acknowledgement = ack-nhfb,
  book-URL =     "http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5669376",
}

@Article{Brooke:2010:DCX,
  author =       "Phillip J. Brooke and Richard F. Paige and Christopher
                 Power",
  title =        "Document-centric {XML} workflows with fragment digital
                 signatures",
  journal =      j-SPE,
  volume =       "40",
  number =       "8",
  pages =        "655--672",
  month =        jul,
  year =         "2010",
  CODEN =        "SPEXBL",
  DOI =          "https://doi.org/10.1002/spe.974",
  ISSN =         "0038-0644 (print), 1097-024X (electronic)",
  ISSN-L =       "0038-0644",
  bibdate =      "Tue Jun 21 17:09:48 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Software---Practice and Experience",
  journal-URL =  "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1097-024X",
  onlinedate =   "7 May 2010",
}

@Article{Brumley:2010:CAI,
  author =       "B. B. Brumley and K. U. Jarvinen",
  title =        "Conversion Algorithms and Implementations for
                 {Koblitz} Curve Cryptography",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "59",
  number =       "1",
  pages =        "81--92",
  month =        jan,
  year =         "2010",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2009.132",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Sun Jul 3 11:52:25 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5255226",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Book{Buchmann:2010:EKG,
  author =       "Johannes Buchmann",
  title =        "Einf{\"u}hrung in die Kryptographie. ({German})
                 [{Introduction} to Cryptography]",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xxiv + 280",
  year =         "2010",
  ISBN =         "3-642-11186-6",
  ISBN-13 =      "978-3-642-11186-0",
  LCCN =         "????",
  bibdate =      "Thu Apr 21 17:40:25 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 z3950.gbv.de:20011/gvk",
  series =       "Springer-Lehrbuch",
  URL =          "http://www.springer.com/mathematics/numbers/book/978-3-642-11185-3;
                 http://www.springerlink.com/content/j5g004",
  acknowledgement = ack-nhfb,
  language =     "German",
  subject =      "Mathematics; Data structures (Computer science); Data
                 encryption (Computer science); Combinatorics; Number
                 theory",
}

@Article{Bulygin:2010:AOP,
  author =       "Stanislav Bulygin",
  title =        "Abstract only: {Polynomial} system solving for
                 decoding linear codes and algebraic cryptanalysis
                 parametric polynomial system discussion: canonical
                 comprehensive",
  journal =      j-ACM-COMM-COMP-ALGEBRA,
  volume =       "44",
  number =       "2",
  pages =        "72--72",
  month =        jun,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1838599.1838626",
  ISSN =         "1932-2232 (print), 1932-2240 (electronic)",
  ISSN-L =       "1932-2232",
  bibdate =      "Mon Aug 2 13:47:24 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "This book that represents the author's Ph. D. thesis
                 is devoted to applying symbolic methods to the problems
                 of decoding linear codes and of algebraic
                 cryptanalysis. The paradigm we employ here is as
                 follows. We reformulate the initial problem in terms of
                 systems of polynomial equations over a finite field.
                 The solution(s) of such systems should yield a way to
                 solve the initial problem. Our main tools for handling
                 polynomials and polynomial systems in such a paradigm
                 is the technique of Gr{\"o}bner bases and normal form
                 reductions.\par

                 The first part of the book is devoted to formulating
                 and solving specific polynomial systems that reduce the
                 problem of decoding linear codes to the problem of
                 polynomial system solving. We analyze the existing
                 methods (mainly for the cyclic codes) and propose an
                 original method for arbitrary linear codes that in some
                 sense generalizes the Newton identities method widely
                 known for cyclic codes. We investigate the structure of
                 the underlying ideals and show how one can solve the
                 decoding problem -- both the so-called bounded decoding
                 and more general nearest codeword decoding -- by
                 finding reduced Gr{\"o}bner bases of these ideals. The
                 main feature of the method is that unlike usual methods
                 based on Gr{\"o}bner bases for 'finite field'
                 situations, we do not add the so-called field
                 equations. This tremendously simplifies the underlying
                 ideals, thus making feasible working with quite large
                 parameters of codes. Further we address complexity
                 issues, by giving some insight to the Macaulay matrix
                 of the underlying systems. By making a series of
                 assumptions we are able to provide an upper bound for
                 the complexity coefficient of our method. We address
                 also finding the minimum distance and the weight
                 distribution. We provide solid experimental material
                 and comparisons with some of the existing methods in
                 this area.\par

                 In the second part we deal with the algebraic
                 cryptanalysis of block iterative ciphers. Namely, we
                 analyze the small-scale variants of the Advanced
                 Encryption Standard (AES), which is a widely used
                 modern block cipher. Here a cryptanalyst composes the
                 polynomial systems which solutions should yield a
                 secret key used by communicating parties in a symmetric
                 cryptosystem. We analyze the systems formulated by
                 researchers for the algebraic cryptanalysis, and
                 identify the problem that conventional systems have
                 many auxiliary variables that are not actually needed
                 for the key recovery. Moreover, having many such
                 auxiliary variables, specific to a given
                 plaintext/ciphertext pair, complicates the use of
                 several pairs which is common in cryptanalysis. We thus
                 provide a new system where the auxiliary variables are
                 eliminated via normal form reductions. The resulting
                 system in key-variables only is then solved. We present
                 experimental evidence that such an approach is quite
                 good for small scaled ciphers. We investigate further
                 our approach and employ the so-called
                 meet-in-the-middle principle to see how far one can go
                 in analyzing just 2--3 rounds of scaled ciphers.
                 Additional 'tuning techniques' are discussed together
                 with experimental material. Overall, we believe that
                 the material of this part of the thesis makes a step
                 further in algebraic cryptanalysis of block
                 ciphers.\par

                 A short description of the thesis is on the KLUDO
                 webpage:
                 http://kluedo.ub.uni-kl.de/volltexte/2009/2350/.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Communications in Computer Algebra",
  issue =        "172",
}

@Book{Bulygin:2010:CAC,
  author =       "Stanislav Bulygin",
  title =        "Computer algebra in coding theory and cryptanalysis",
  publisher =    "S{\"u}dwestdeutscher Verlag f{\"u}r
                 Hochschulschriften",
  address =      "Saarbr{\"u}cken, Germany",
  pages =        "????",
  year =         "2010",
  ISBN =         "3-8381-0948-1",
  ISBN-13 =      "978-3-8381-0948-0",
  LCCN =         "????",
  bibdate =      "Fri May 13 06:47:50 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
}

@Article{Bulygin:2010:OSS,
  author =       "Stanislav Bulygin and Michael Brickenstein",
  title =        "Obtaining and Solving Systems of Equations in Key
                 Variables Only for the Small Variants of {AES}",
  journal =      j-MATH-COMPUT-SCI,
  volume =       "3",
  number =       "2",
  pages =        "185--200",
  month =        apr,
  year =         "2010",
  CODEN =        "????",
  ISSN =         "1661-8270 (print), 1661-8289 (electronic)",
  ISSN-L =       "1661-8270",
  bibdate =      "Sun Aug 22 09:02:18 MDT 2010",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=1661-8270&volume=3&issue=2;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=1661-8270&volume=3&issue=2&spage=185",
  abstract =     "This work is devoted to attacking the small scale
                 variants of the Advanced Encryption Standard (AES) via
                 systems that contain only the initial key variables. To
                 this end, we investigate a system of equations that
                 naturally arises in the AES, and then introduce an
                 elimination of all the intermediate variables via
                 normal form reductions. The resulting system in key
                 variables only is solved then. We also consider a
                 possibility to apply our method in the
                 meet-in-the-middle scenario especially with several
                 plaintext\slash ciphertext pairs. We elaborate on the
                 method further by looking for subsystems which contain
                 fewer variables and are overdetermined, thus
                 facilitating solving the large system.",
  acknowledgement = ack-nhfb,
  fjournal =     "Mathematics in Computer Science",
  journal-URL =  "http://www.springerlink.com/content/1661-8270/",
}

@Article{Burns:2010:SCR,
  author =       "Randal Burns and Zachary Peterson",
  title =        "Security constructs for regulatory-compliant storage",
  journal =      j-CACM,
  volume =       "53",
  number =       "1",
  pages =        "126--130",
  month =        jan,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1629175.1629206",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 4 17:12:32 MST 2010",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "In response to a growing body of electronic records
                 legislation, the storage community has enhanced data
                 stores to include privacy, auditability, and a
                 'chain-of-custody' for data. There are currently over
                 4,000 federal, state, and local regulations that govern
                 the storage, management, and retrieval of electronic
                 records. Most notably, the Sarbanes--Oxley Act of 2002,
                 which regulates corporate financial records. Storage
                 vendors provide 'compliance' platforms that store and
                 manage data in accordance with regulations, which aids
                 customers in meeting compliance guidelines. Examples
                 include: EMC Centera Compliance Edition,\TM{} NetApp
                 SnapLock,\TM{} and IBM Tivoli Security Compliance
                 Manage.\TM{}\par

                 Many of these platforms add storage management policy
                 to existing systems. Vendors start with systems that
                 manage versions of files or volumes. They add
                 immutability to past versions by preventing writes by
                 policy. They also enforce data retention guidelines by
                 not allowing the deletion of protected files. Enhanced
                 metadata allows users and auditors to examine the store
                 at any point-in-time and investigate the manner in
                 which data have changed throughout their
                 history.\par

                 While these features aid organizations in complying
                 with regulations, they do not provide strong evidence
                 of compliance. By following storage management
                 policies, data are versioned and retained for mandated
                 periods. However, there are many opportunities and
                 motivations to subvert such storage policies. In fact,
                 the file system owner represents the most likely
                 attacker. For example, a corporation might alter or
                 destroy data after the corporation comes under
                 suspicion of malfeasance. The shredding of Enron audit
                 documents at Arthur Anderson in 2001 provides a notable
                 paper analog. Similarly, a hospital or private medical
                 practice might attempt to amend or delete a patient's
                 medical records to hide evidence of malpractice. In
                 policy-based storage systems, past data may be altered
                 or destroyed by reverse engineering file system formats
                 and editing the file data on disk--a common and well
                 understood data forensics task.\par

                 We assert that these features need to be
                 cryptographically strong, providing irrefutable
                 evidence of compliance with regulations. This can be
                 achieved for data retention and chain of custody. A
                 storage system commits to a version history so that, at
                 a later time, an auditor may access past data and gain
                 conclusive evidence that the data have been retained
                 and are unmodified. Further, all data should be bound
                 to the users that modify, create, or delete that data.
                 Such constructs improve the evidentiary value of
                 electronic records within the courts, increase an
                 auditor's confidence in the veracity of the information
                 on which they report (and for which they are
                 responsible), and enhance an organization's quality of
                 data management.\par

                 To these ends, we review three security constructs for
                 versioning file systems. {\em Digital audit trails\/}
                 allow a file system to prove to an independent auditor
                 that it stored data in conformance with regulated
                 retention guidelines. {\em Fine-grained, secure
                 deletion\/} allows a system to efficiently delete
                 individual versions of files to meet confidentiality
                 requirements, limit liability, and allow data to be
                 redacted. {\em Per-block authenticated encryption\/}
                 adds authenticity guarantees to the confidentiality
                 provided by encryption. We also include a distillation
                 of requirements based on a review of relevant
                 legislation and a brief characterization of the
                 performance impact of these techniques based on their
                 implementation within the ext3cow file system.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Cachin:2010:EKS,
  author =       "Christian Cachin and Jan Camenisch",
  title =        "Encrypting Keys Securely",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "4",
  pages =        "66--69",
  month =        jul # "\slash " # aug,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.124",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 27 16:38:19 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
}

@Article{Caranay:2010:ESP,
  author =       "Perlas C. Caranay and Renate Scheidler",
  title =        "An Efficient Seventh Power Residue Symbol Algorithm",
  journal =      j-INT-J-NUMBER-THEORY,
  volume =       "6",
  number =       "8",
  pages =        "1831--1853",
  month =        dec,
  year =         "2010",
  DOI =          "https://doi.org/10.1142/S1793042110003770",
  ISSN =         "1793-0421 (print), 1793-7310 (electronic)",
  ISSN-L =       "1793-0421",
  bibdate =      "Tue Jul 21 10:01:24 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijnt.bib",
  URL =          "https://www.worldscientific.com/doi/10.1142/S1793042110003770",
  abstract =     "Power residue symbols and their reciprocity laws have
                 applications not only in number theory, but also in
                 other fields like cryptography. A crucial ingredient in
                 certain public key cryptosystems is a fast algorithm
                 for computing power residue symbols. Such algorithms
                 have only been devised for the Jacobi symbol as well as
                 for cubic and quintic power residue symbols, but for no
                 higher powers. In this paper, we provide an efficient
                 procedure for computing 7th power residue symbols. The
                 method employs arithmetic in the field {$ \mathbb {Q}
                 $}(\zeta), with \zeta a primitive 7th root of unity,
                 and its ring of integers {\mathbb{Z}}[\zeta ]. We give
                 an explicit characterization for an element in
                 {\mathbb{Z}}[\zeta ] to be primary, and provide an
                 algorithm for finding primary associates of integers in
                 {\mathbb{Z}}[\zeta ]. Moreover, we formulate explicit
                 forms of the complementary laws to Kummer's 7th degree
                 reciprocity law, and use Lenstra's norm-Euclidean
                 algorithm in the cyclotomic field.",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Number Theory (IJNT)",
  journal-URL =  "https://www.worldscientific.com/worldscinet/ijnt",
}

@Article{Carter:2010:TB,
  author =       "Frank Carter",
  title =        "The {Turing Bombe}",
  journal =      j-RUTHERFORD-J,
  volume =       "3",
  number =       "??",
  pages =        "??--??",
  month =        "????",
  year =         "2010",
  CODEN =        "????",
  ISSN =         "1177-1380",
  ISSN-L =       "1177-1380",
  bibdate =      "Mon Jan 4 09:52:24 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/bibnet/authors/t/turing-alan-mathison.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/rutherfordj.bib",
  URL =          "http://rutherfordjournal.org/article030108.html",
  acknowledgement = ack-nhfb,
  fjournal =     "Rutherford Journal",
  journal-URL =  "http://rutherfordjournal.org/",
}

@Article{Casselman:2010:VC,
  author =       "Bill Casselman",
  title =        "Visible Cryptography",
  journal =      j-NAMS,
  volume =       "57",
  number =       "3",
  pages =        "378--379",
  month =        mar,
  year =         "2010",
  CODEN =        "AMNOAN",
  ISSN =         "0002-9920 (print), 1088-9477 (electronic)",
  ISSN-L =       "0002-9920",
  bibdate =      "Mon Feb 22 15:35:29 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.ams.org/notices/201003/",
  acknowledgement = ack-nhfb,
  fjournal =     "Notices of the American Mathematical Society",
  journal-URL =  "http://www.ams.org/notices/",
  keywords =     "2-D barcodes",
}

@InProceedings{Chang:2010:PRN,
  author =       "Weiling Chang and Binxing Fang and Xiaochun Yun and
                 Shupeng Wang and Xiangzhan Yu",
  booktitle =    "{2010 Data Compression Conference (DCC)}",
  title =        "A pseudo-random number generator based on {LZSS}",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "524",
  year =         "2010",
  DOI =          "https://doi.org/10.1109/DCC.2010.77",
  bibdate =      "Fri Jan 6 07:45:38 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5453503",
  acknowledgement = ack-nhfb,
  book-URL =     "http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5453382",
  keywords =     "L12RC4; LZSS compression algorithm; RC4 stream
                 cipher",
}

@InProceedings{Chari:2010:DSC,
  author =       "Suresh Chari and Vincenzo V. Diluoffo and Paul A.
                 Karger and Elaine R. Palmer and Tal Rabin and Josyula
                 R. Rao and Pankaj Rohatgi and Helmut Scherzer and
                 Michael Steiner and David C. Toll",
  title =        "Designing a Side Channel Resistant Random Number
                 Generator",
  crossref =     "Gollmann:2010:SCR",
  pages =        "49--64",
  year =         "2010",
  DOI =          "https://doi.org/10.1007/978-3-642-12510-2_5",
  bibdate =      "Thu Feb 10 12:53:16 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.informatik.uni-trier.de/~ley/db/conf/cardis/cardis2010.html#ChariDKPRRRSST10",
  abstract =     "This paper describes the design of the random number
                 generator (RNG) in the Caernarvon high assurance smart
                 card operating system. Since it is used in the
                 generation of cryptographic keys and other sensitive
                 materials, the RNG has a number of stringent security
                 requirements that the random bits must be of good
                 quality, i.e., the bits must not be predictable or
                 biased. To this end, a number of standards such as the
                 German AIS 31 mandate that true random bits be
                 continuously tested before use in sensitive
                 applications such as key generation. A key issue in
                 implementing this standard is that such testing before
                 use in key generation greatly increases the attack
                 surface for side-channel attacks. For example, template
                 attacks which can extract information about the random
                 bits from even a single run provided we use the same
                 bits at many different points in the computation.
                 Because of these potential risks, the Caernarvon
                 operating system uses pseudo random number generators
                 which are initially seeded by externally generated high
                 quality random bits, and then perturbed by bits from
                 the true random number generator. We describe a PRNG
                 design which yields high quality random bits while also
                 ensuring that it is not susceptible to side-channel
                 attacks and provide an informal argument about its
                 effectiveness.",
  acknowledgement = ack-nhfb,
}

@Article{Chen:2010:ALD,
  author =       "Songqing Chen and Shiping Chen and Xinyuan Wang and
                 Zhao Zhang and Sushil Jajodia",
  title =        "An Application-Level Data Transparent Authentication
                 Scheme without Communication Overhead",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "59",
  number =       "7",
  pages =        "943--954",
  month =        jul,
  year =         "2010",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2010.80",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Sun Jul 3 11:52:30 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5453339",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Chen:2010:IFA,
  author =       "Lanxiang Chen and Dan Feng and Yu Zhang and Lingfang
                 Zeng and Zhongying Niu",
  title =        "Integrating {FPGA\slash ASIC} into cryptographic
                 storage systems to avoid re-encryption",
  journal =      j-INT-J-PAR-EMER-DIST-SYS,
  volume =       "25",
  number =       "2",
  pages =        "105--122",
  year =         "2010",
  CODEN =        "????",
  ISSN =         "1744-5760 (print), 1744-5779 (electronic)",
  ISSN-L =       "1744-5760",
  bibdate =      "Thu Sep 2 08:12:38 MDT 2010",
  bibsource =    "http://www.informaworld.com/smpp/title~content=t713729127~link=cover;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://www.tandfonline.com/loi/gpaa20",
}

@Article{Chen:2010:NUP,
  author =       "Tzung-Her Chen and Jyun-Ci Huang",
  title =        "A novel user-participating authentication scheme",
  journal =      j-J-SYST-SOFTW,
  volume =       "83",
  number =       "5",
  pages =        "861--867",
  month =        may,
  year =         "2010",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212",
  ISSN-L =       "0164-1212",
  bibdate =      "Tue Sep 7 07:27:05 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Cheneau:2010:SIP,
  author =       "Tony Cheneau and Aymen Boudguiga and Maryline
                 Laurent",
  title =        "Significantly improved performances of the
                 cryptographically generated addresses thanks to {ECC}
                 and {GPGPU}",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "4",
  pages =        "419--431",
  month =        jun,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:20 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809001461",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Chevalier:2010:CSC,
  author =       "Yannick Chevalier and Micha{\"e}l Rusinowitch",
  title =        "Compiling and securing cryptographic protocols",
  journal =      j-INFO-PROC-LETT,
  volume =       "110",
  number =       "3",
  pages =        "116--122",
  day =          "1",
  month =        jan,
  year =         "2010",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Thu Mar 31 12:46:29 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Chmielowiec:2010:FPR,
  author =       "Andrzej Chmielowiec",
  title =        "Fixed points of the {RSA} encryption algorithm",
  journal =      j-THEOR-COMP-SCI,
  volume =       "411",
  number =       "1",
  pages =        "288--292",
  day =          "1",
  month =        jan,
  year =         "2010",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Mon Mar 28 17:10:22 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/03043975",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{Chou:2010:PSO,
  author =       "Cheng-Fu Chou and William C. Cheng and Leana
                 Golubchik",
  title =        "Performance study of online batch-based digital
                 signature schemes",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "33",
  number =       "2",
  pages =        "98--114",
  month =        mar,
  year =         "2010",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Wed Jan 28 15:43:40 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804509001374",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Netw. Comput. Appl.",
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@MastersThesis{Choudary:2010:SCD,
  author =       "Omar S. Choudary",
  title =        "The {Smart Card} Detective: a hand-held {EMV}
                 interceptor",
  type =         "{M. Phil. dissertation in Advance Computer Science}",
  school =       "Computer Laboratory, Darwin College, University of
                 Cambridge",
  address =      "Cambridge, UK",
  pages =        "57",
  month =        jun,
  year =         "2010",
  bibdate =      "Thu Nov 04 15:01:34 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.cl.cam.ac.uk/~osc22/docs/mphil_acs_osc22.pdf;
                 http://www.cl.cam.ac.uk/~osc22/scd/;
                 http://www.lightbluetouchpaper.org/2010/10/19/the-smart-card-detective-a-hand-held-emv-interceptor/",
  abstract =     "Several vulnerabilities have been found in the EMV
                 system (also known as Chip and PIN). Saar Drimer and
                 Steven Murdoch have successfully implemented a relay
                 attack against EMV using a fake terminal. Recently the
                 same authors have found a method to successfully
                 complete PIN transactions without actually entering the
                 correct PIN. The press has published this vulnerability
                 but they reported such scenario as being hard to
                 execute in practice because it requires specialized and
                 complex hardware.\par

                 As proposed by Ross Anderson and Mike Bond in 2006, I
                 decided to create a miniature man-in-the-middle device
                 to defend smartcard users against relay attacks.\par

                 As a result of my MPhil project work I created a
                 hand-held device, called Smart Card Defender (SCD),
                 which intercepts the communication between smartcard
                 and terminal. The device has been built using a low
                 cost ATMEL AT90USB1287 microcontroller and other
                 readily available electronic components. The total cost
                 of the SCD has been around \$100, but an industrial
                 version could be produced for less than\$20.\par

                 I implemented several applications using the SCD,
                 including the defense against the relay attack as well
                 as the recently discovered vulnerability to complete a
                 transaction without using the correct PIN.\par

                 All the applications have been successfully tested on
                 CAP readers and live terminals. Even more, I have
                 performed real tests using the SCD at several shops in
                 town.\par

                 From the experiments using the SCD, I have noticed some
                 particularities of the CAP protocol compared to the EMV
                 standard. I have also discovered that the smartcard
                 does not follow the physical transport protocol
                 exactly. Such ndings are presented in detail, along
                 with a discussion of the results.",
  acknowledgement = ack-nhfb,
}

@Article{Ciriani:2010:CFE,
  author =       "Valentina Ciriani and Sabrina {De Capitani Di
                 Vimercati} and Sara Foresti and Sushil Jajodia and
                 Stefano Paraboschi and Pierangela Samarati",
  title =        "Combining fragmentation and encryption to protect
                 privacy in data storage",
  journal =      j-TISSEC,
  volume =       "13",
  number =       "3",
  pages =        "22:1--22:??",
  month =        jul,
  year =         "2010",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/1805974.1805978",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Wed Jul 28 14:57:15 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "The impact of privacy requirements in the development
                 of modern applications is increasing very quickly. Many
                 commercial and legal regulations are driving the need
                 to develop reliable solutions for protecting sensitive
                 information whenever it is stored, processed, or
                 communicated to external parties. To this purpose,
                 encryption techniques are currently used in many
                 scenarios where data protection is required since they
                 provide a layer of protection against the disclosure of
                 personal information, which safeguards companies from
                 the costs that may arise from exposing their data to
                 privacy breaches. However, dealing with encrypted data
                 may make query processing more expensive.\par

                 In this article, we address these issues by proposing a
                 solution to enforce the privacy of data collections
                 that combines data fragmentation with encryption. We
                 model privacy requirements as confidentiality
                 constraints expressing the sensitivity of attributes
                 and their associations. We then use encryption as an
                 underlying (conveniently available) measure for making
                 data unintelligible while exploiting fragmentation as a
                 way to break sensitive associations among attributes.
                 We formalize the problem of minimizing the impact of
                 fragmentation in terms of number of fragments and their
                 affinity and present two heuristic algorithms for
                 solving such problems. We also discuss experimental
                 results, comparing the solutions returned by our
                 heuristics with respect to optimal solutions, which
                 show that the heuristics, while guaranteeing a
                 polynomial-time computation cost are able to retrieve
                 solutions close to optimum.",
  acknowledgement = ack-nhfb,
  articleno =    "22",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
  keywords =     "encryption; fragmentation; Privacy",
}

@InBook{Ciriani:2010:TPA,
  author =       "Valentina Ciriani and Sabrina {De Capitani di
                 Vimercati} and Sara Foresti and Pierangela Samarati",
  title =        "Theory of Privacy and Anonymity",
  crossref =     "Atallah:2010:ATC",
  chapter =      "18",
  pages =        "1--35",
  year =         "2010",
  DOI =          "https://doi.org/10.1201/9781584888215-c18",
  bibdate =      "Sat May 14 09:37:55 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.crcnetbase.com/doi/abs/10.1201/9781584888215-c18",
  acknowledgement = ack-nhfb,
}

@Article{Comon-Lundh:2010:DSP,
  author =       "Hubert Comon-Lundh and V{\'e}ronique Cortier and Eugen
                 Z{\~a}linescu",
  title =        "Deciding security properties for cryptographic
                 protocols. Application to key cycles",
  journal =      j-TOCL,
  volume =       "11",
  number =       "2",
  pages =        "9:1--9:??",
  month =        jan,
  year =         "2010",
  CODEN =        "????",
  ISSN =         "1529-3785",
  ISSN-L =       "1529-3785",
  bibdate =      "Tue Mar 16 08:57:57 MDT 2010",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tocl/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  articleno =    "9",
  fjournal =     "ACM Transactions on Computational Logic",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J773",
}

@InBook{Conitzer:2010:AP,
  author =       "Vincent Conitzer",
  title =        "Auction Protocols",
  crossref =     "Atallah:2010:ATC",
  chapter =      "16",
  pages =        "1--19",
  year =         "2010",
  DOI =          "https://doi.org/10.1201/9781584888215-c16",
  bibdate =      "Sat May 14 09:37:55 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.crcnetbase.com/doi/abs/10.1201/9781584888215-c16",
  acknowledgement = ack-nhfb,
}

@Article{Copeland:2010:CBG,
  author =       "B. Jack Copeland",
  title =        "{Colossus}: Breaking the {German} `{Tunny}' Code at
                 {Bletchley Park}. {An} Illustrated History",
  journal =      j-RUTHERFORD-J,
  volume =       "3",
  number =       "??",
  pages =        "??--??",
  month =        "????",
  year =         "2010",
  CODEN =        "????",
  ISSN =         "1177-1380",
  ISSN-L =       "1177-1380",
  bibdate =      "Mon Jan 4 09:52:24 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/rutherfordj.bib",
  URL =          "http://rutherfordjournal.org/article030109.html",
  acknowledgement = ack-nhfb,
  fjournal =     "Rutherford Journal",
  journal-URL =  "http://rutherfordjournal.org/",
}

@Article{Daemen:2010:FYA,
  author =       "Joan Daemen and Vincent Rijmen",
  title =        "The First 10 Years of Advanced Encryption",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "6",
  pages =        "72--74",
  month =        nov # "\slash " # dec,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.193",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Dec 15 15:02:36 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{DeCapitaniDiVimercati:2010:EPR,
  author =       "Sabrina {De Capitani Di Vimercati} and Sara Foresti
                 and Sushil Jajodia and Stefano Paraboschi and
                 Pierangela Samarati",
  title =        "Encryption policies for regulating access to
                 outsourced data",
  journal =      j-TODS,
  volume =       "35",
  number =       "2",
  pages =        "12:1--12:??",
  month =        apr,
  year =         "2010",
  CODEN =        "ATDSD3",
  DOI =          "https://doi.org/10.1145/1735886.1735891",
  ISSN =         "0362-5915 (print), 1557-4644 (electronic)",
  ISSN-L =       "0362-5915",
  bibdate =      "Wed Apr 28 13:44:08 MDT 2010",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tods/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "Current access control models typically assume that
                 resources are under the strict custody of a trusted
                 party which monitors each access request to verify if
                 it is compliant with the specified access control
                 policy. There are many scenarios where this approach is
                 becoming no longer adequate. Many clear trends in Web
                 technology are creating a need for owners of sensitive
                 information to manage access to it by legitimate users
                 using the services of {\em honest but curious\/} third
                 parties, that is, parties trusted with providing the
                 required service but not authorized to read the actual
                 data content. In this scenario, the data owner encrypts
                 the data before outsourcing and stores them at the
                 server. Only the data owner and users with knowledge of
                 the key will be able to decrypt the data. Possible
                 access authorizations are to be enforced by the owner.
                 In this article, we address the problem of enforcing
                 selective access on outsourced data without need of
                 involving the owner in the access control process. The
                 solution puts forward a novel approach that combines
                 cryptography with authorizations, thus enforcing access
                 control via {\em selective encryption}. The article
                 presents a formal model for access control management
                 and illustrates how an authorization policy can be
                 translated into an equivalent encryption policy while
                 minimizing the amount of keys and cryptographic tokens
                 to be managed. The article also introduces a two-layer
                 encryption approach that allows the data owner to
                 outsource, besides the data, the complete management of
                 the authorization policy itself, thus providing
                 efficiency and scalability in dealing with policy
                 updates. We also discuss experimental results showing
                 that our approach is able to efficiently manage complex
                 scenarios.",
  acknowledgement = ack-nhfb,
  articleno =    "12",
  fjournal =     "ACM Transactions on Database Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J777",
  keywords =     "Data outsourcing; encryption policy; privacy",
}

@Article{derhans:2010:USC,
  author =       "der.hans",
  title =        "Use {SSH} to cross a suspect host securely",
  journal =      j-LINUX-J,
  volume =       "2010",
  number =       "191",
  pages =        "3:1--3:??",
  month =        mar,
  year =         "2010",
  CODEN =        "LIJOFX",
  ISSN =         "1075-3583 (print), 1938-3827 (electronic)",
  ISSN-L =       "1075-3583",
  bibdate =      "Tue Nov 23 11:41:53 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  articleno =    "3",
  fjournal =     "Linux Journal",
  journal-URL =  "http://portal.acm.org/citation.cfm?id=J508",
}

@InBook{Desmedt:2010:CF,
  author =       "Yvo Desmedt",
  title =        "Cryptographic Foundations",
  crossref =     "Atallah:2010:ATC",
  chapter =      "9",
  pages =        "1--15",
  year =         "2010",
  DOI =          "https://doi.org/10.1201/9781584888215-c9",
  bibdate =      "Sat May 14 09:37:55 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.crcnetbase.com/doi/abs/10.1201/9781584888215-c9",
  acknowledgement = ack-nhfb,
}

@InBook{Desmedt:2010:ES,
  author =       "Yvo Desmedt",
  title =        "Encryption Schemes",
  crossref =     "Atallah:2010:ATC",
  chapter =      "10",
  pages =        "1--30",
  year =         "2010",
  DOI =          "https://doi.org/10.1201/9781584888215-c10",
  bibdate =      "Sat May 14 09:37:55 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.crcnetbase.com/doi/abs/10.1201/9781584888215-c10",
  acknowledgement = ack-nhfb,
}

@Article{Dharwadkar:2010:SSG,
  author =       "Nagaraj V. Dharwadkar and B. B. Amberker",
  title =        "Steganographic Scheme for Gray-Level Image Using Pixel
                 Neighborhood and {LSB} Substitution",
  journal =      j-INT-J-IMAGE-GRAPHICS,
  volume =       "10",
  number =       "4",
  pages =        "589--607",
  month =        oct,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1142/S0219467810003901",
  ISSN =         "0219-4678",
  bibdate =      "Thu Dec 9 21:06:32 MST 2010",
  bibsource =    "http://ejournals.wspc.com.sg/ijig/ijig.shtml;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Image and Graphics (IJIG)",
  journal-URL =  "http://www.worldscientific.com/worldscinet/ijig",
}

@Article{Dinoor:2010:PIM,
  author =       "Shlomi Dinoor",
  title =        "Privileged identity management: securing the
                 enterprise",
  journal =      j-NETWORK-SECURITY,
  volume =       "2010",
  number =       "12",
  pages =        "4--6",
  month =        dec,
  year =         "2010",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(10)70144-6",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 17:00:24 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485810701446",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{DiPietro:2010:HKS,
  author =       "Roberto {Di Pietro} and Luigi V. Mancini and
                 Alessandro Mei",
  title =        "Hierarchies of keys in secure multicast
                 communications",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "5",
  pages =        "839--860",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0384",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:50 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@InProceedings{Dodis:2010:CAC,
  author =       "Y. Dodis and K. Haralambiev and A. Lopez-Alt and D.
                 Wichs",
  title =        "Cryptography against Continuous Memory Attacks",
  crossref =     "IEEE:2010:PIA",
  pages =        "511--520",
  year =         "2010",
  DOI =          "https://doi.org/10.1109/FOCS.2010.56",
  bibdate =      "Thu Apr 12 09:34:12 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/focs2010.bib",
  acknowledgement = ack-nhfb,
  book-URL =     "http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5669376",
}

@Article{Drimer:2010:DBP,
  author =       "Saar Drimer and Tim G{\"u}neysu and Christof Paar",
  title =        "{DSPs}, {BRAMs}, and a Pinch of Logic: Extended
                 Recipes for {AES} on {FPGAs}",
  journal =      j-TRETS,
  volume =       "3",
  number =       "1",
  pages =        "3:1--3:??",
  month =        jan,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1661438.1661441",
  ISSN =         "1936-7406 (print), 1936-7414 (electronic)",
  ISSN-L =       "1936-7406",
  bibdate =      "Tue Mar 16 09:47:03 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  articleno =    "3",
  fjournal =     "ACM Transactions on Reconfigurable Technology and
                 Systems (TRETS)",
  journal-URL =  "http://portal.acm.org/toc.cfm?id=J1151",
}

@Article{Eibach:2010:OGB,
  author =       "Tobias Eibach and Gunnar V{\"o}lkel and Enrico Pilz",
  title =        "Optimising {Gr{\"o}bner} Bases on {Bivium}",
  journal =      j-MATH-COMPUT-SCI,
  volume =       "3",
  number =       "2",
  pages =        "159--172",
  month =        apr,
  year =         "2010",
  CODEN =        "????",
  ISSN =         "1661-8270 (print), 1661-8289 (electronic)",
  ISSN-L =       "1661-8270",
  bibdate =      "Sun Aug 22 09:02:18 MDT 2010",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=1661-8270&volume=3&issue=2;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=1661-8270&volume=3&issue=2&spage=159",
  abstract =     "Bivium is a reduced version of the stream cipher
                 Trivium. In this paper we investigate how fast a key
                 recovery attack on Bivium using Gr{\"o}bner bases is.
                 First we explain the attack scenario and the
                 cryptographic background. Then we identify the factors
                 that have impact on the computation time and show how
                 to optimise them. As a side effect these experiments
                 benchmark several Gr{\"o}bner basis implementations.
                 The optimised version of the Gr{\"o}bner attack has an
                 expected running time of $ 2^{39.12} $ s, beating the
                 attack time of our previous SAT solver attack by a
                 factor of more than 330. Furthermore this approach is
                 faster than an attack based on BDDs, an exhaustive key
                 search, a generic time-memory trade-off attack and a
                 guess-and-determine strategy.",
  acknowledgement = ack-nhfb,
  fjournal =     "Mathematics in Computer Science",
  journal-URL =  "http://www.springerlink.com/content/1661-8270/",
}

@Book{Eisenbarth:2010:CCE,
  author =       "Thomas Eisenbarth",
  title =        "Cryptography and cryptanalysis for embedded systems",
  volume =       "11",
  publisher =    "Europ{\"a}ischer Universit{\"a}tsverlag",
  address =      "Berlin, Germany",
  pages =        "xiv + 193",
  year =         "2010",
  ISBN =         "3-89966-344-6",
  ISBN-13 =      "978-3-89966-344-0",
  LCCN =         "????",
  bibdate =      "Fri May 13 07:29:02 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  series =       "IT-Security",
  acknowledgement = ack-nhfb,
  remark =       "Bochum University Dissertation.",
}

@Article{Fadlullah:2010:DCA,
  author =       "Zubair M. Fadlullah and Tarik Taleb and Athanasios V.
                 Vasilakos and Mohsen Guizani and Nei Kato",
  title =        "{DTRAB}: combating against attacks on encrypted
                 protocols through traffic-feature analysis",
  journal =      j-IEEE-TRANS-NETWORKING,
  volume =       "18",
  number =       "4",
  pages =        "1234--1247",
  month =        aug,
  year =         "2010",
  CODEN =        "IEANEP",
  DOI =          "https://doi.org/10.1109/TNET.2009.2039492",
  ISSN =         "1063-6692 (print), 1558-2566 (electronic)",
  ISSN-L =       "1063-6692",
  bibdate =      "Mon Mar 14 09:25:11 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE\slash ACM Transactions on Networking",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J771",
}

@Article{Fan:2010:AMI,
  author =       "Chun-I Fan and Ling-Ying Huang and Pei-Hsiu Ho",
  title =        "Anonymous Multireceiver Identity-Based Encryption",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "59",
  number =       "9",
  pages =        "1239--1249",
  month =        sep,
  year =         "2010",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2010.23",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Sun Jul 3 11:52:32 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5396332",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Fan:2010:PSN,
  author =       "Chun-I Fan and Pei-Hsiu Ho and Ruei-Hau Hsu",
  title =        "Provably secure nested one-time secret mechanisms for
                 fast mutual authentication and key exchange in mobile
                 communications",
  journal =      j-IEEE-TRANS-NETWORKING,
  volume =       "18",
  number =       "3",
  pages =        "996--1009",
  month =        jun,
  year =         "2010",
  CODEN =        "IEANEP",
  DOI =          "https://doi.org/10.1109/TNET.2009.2036366",
  ISSN =         "1063-6692 (print), 1558-2566 (electronic)",
  ISSN-L =       "1063-6692",
  bibdate =      "Mon Mar 14 09:25:09 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE\slash ACM Transactions on Networking",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J771",
}

@InProceedings{Faugere:2010:CLR,
  author =       "Jean-Charles Faug{\`e}re and Mohab Safey {El Din} and
                 Pierre-Jean Spaenlehauer",
  title =        "Computing loci of rank defects of linear matrices
                 using {Gr{\"o}bner} bases and applications to
                 cryptology",
  crossref =     "Watt:2010:IPI",
  pages =        "257--264",
  year =         "2010",
  DOI =          "https://doi.org/10.1145/1837934.1837984",
  bibdate =      "Fri Jun 17 08:06:37 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
}

@Article{Fehr:2010:QC,
  author =       "Serge Fehr",
  title =        "Quantum Cryptography",
  journal =      j-FOUND-PHYS,
  volume =       "40",
  number =       "5",
  pages =        "494--531",
  month =        may,
  year =         "2010",
  CODEN =        "FNDPA4",
  DOI =          "https://doi.org/10.1007/s10701-010-9408-4",
  ISSN =         "0015-9018 (print), 1572-9516 (electronic)",
  ISSN-L =       "0015-9018",
  bibdate =      "Tue Jun 11 20:39:34 MDT 2013",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0015-9018&volume=40&issue=5;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/foundphys.bib",
  URL =          "http://link.springer.com/article/10.1007/s10701-010-9408-4",
  acknowledgement = ack-nhfb,
  fjournal =     "Foundations of Physics",
  journal-URL =  "http://link.springer.com/journal/10701",
}

@InProceedings{Feng:2010:CTS,
  author =       "Tao Feng and Yongguo Gao and Jianfeng Ma",
  editor =       "{IEEE}",
  booktitle =    "{Proceedings of the 2010 International Conference on
                 E-Business and E-Government (ICEE), Guangzhou, China,
                 7--9 May 2010}",
  title =        "Changeable Threshold Signature Scheme Based on Lattice
                 Theory",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  year =         "2010",
  ISBN =         "0-7695-3997-1",
  ISBN-13 =      "978-0-7695-3997-3",
  LCCN =         "????",
  bibdate =      "Thu Apr 21 11:13:59 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://ieeexplore.ieee.org/servlet/opac?punumber=5589107",
  abstract =     "The current changeable threshold signature schemes are
                 generally based on RSA or ECC algorithm. They often
                 have shortcomings of the large amount of calculation,
                 need the dealer to participate in when adjusting the
                 threshold etc. This paper introduced the related
                 concepts and theories of lattice, proposed a novel
                 changeable threshold signature scheme and analyzed the
                 essential security, it based on the changeable
                 threshold Shamir secret sharing scheme and NTRUSign
                 signature algorithm. The scheme has the following
                 properties: It is mainly based on polynomial
                 multiplication and integer coefficient modular
                 arithmetic and needn't introduce exponential operation;
                 It needn't redistribute the subsecret and modify the
                 group public key when changing threshold; The scheme
                 guarantees threshold security, robustness and
                 unforgeability.",
  acknowledgement = ack-nhfb,
  keywords =     "ANSI X9.98-2010; NTRUSign",
}

@Book{Ferguson:2010:CED,
  author =       "Niels Ferguson and Bruce Schneier and Tadayoshi
                 Kohno",
  title =        "Cryptography Engineering: Design Principles and
                 Practical Applications",
  publisher =    pub-WILEY,
  address =      pub-WILEY:adr,
  pages =        "xxix + 353",
  year =         "2010",
  ISBN =         "0-470-47424-6 (paperback)",
  ISBN-13 =      "978-0-470-47424-2 (paperback)",
  LCCN =         "QA76.9.A25 F466 2010",
  bibdate =      "Sun Mar 28 14:55:52 MDT 2010",
  bibsource =    "aubrey.tamu.edu:7090/voyager;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  remark =       "A fully updated version of the first two authors' {\em
                 Practical cryptography} (2003).",
}

@TechReport{Ferguson:2010:SHF,
  author =       "Niels Ferguson and Stefan Lucks and Bruce Schneier and
                 Doug Whiting and Mihir Bellare and Tadayoshi Kohno and
                 Jon Callas and Jesse Walker",
  title =        "The {Skein} Hash Function Family",
  type =         "Report",
  institution =  "(various)",
  pages =        "ii + vi + 92",
  day =          "1",
  month =        oct,
  year =         "2010",
  bibdate =      "Sat Dec 10 14:55:54 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://en.wikipedia.org/wiki/Skein_(hash_function);
                 http://www.skein-hash.info/sites/default/files/skein1.3.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "hash function; Skein; Threefish",
  remark =       "The Skein family is a contestant in the NIST
                 competition for a new hash-function algorithm to become
                 SHA-3, the next member of the Secure Hash Algorithm
                 (SHA-1 and SHA-2) family. From the executive summary in
                 the paper: ``Skein is fast \ldots{} secure \ldots{}
                 simple \ldots{} flexible \ldots{} efficient. Skein is
                 defined for three different internal state sizes ---
                 256 bits, 512 bits, and 1024 bits ---and any output
                 size. This allows Skein to be a drop-in replacement for
                 the entire SHA family of hash functions. A completely
                 optional and extendable argument system makes Skein an
                 efficient tool to use for a very large number of
                 functions: PRNG, stream cipher, key derivation
                 function, authentication without the overhead of HMAC,
                 and personalization capability. All these features can
                 be implemented with very low overhead. Together with
                 the Threefish large-block cipher at Skein's core, this
                 design provides a full set of symmetric cryptographic
                 primitives suitable for most modern applications.''",
}

@Article{Forne:2010:PAA,
  author =       "Jordi Forn{\'e} and Francisca Hinarejos and Andr{\'e}s
                 Mar{\'{\i}}n and Florina Almen{\'a}rez and Javier Lopez
                 and Jose A. Montenegro and Marc Lacoste and Daniel
                 D{\'{\i}}az",
  title =        "Pervasive authentication and authorization
                 infrastructures for mobile users",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "4",
  pages =        "501--514",
  month =        jun,
  year =         "2010",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2009.09.001",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:20 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000911",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Frey:2010:ABC,
  author =       "Gerhard Frey",
  title =        "The Arithmetic Behind Cryptography",
  journal =      j-NAMS,
  volume =       "57",
  number =       "3",
  pages =        "366--374",
  month =        mar,
  year =         "2010",
  CODEN =        "AMNOAN",
  ISSN =         "0002-9920 (print), 1088-9477 (electronic)",
  ISSN-L =       "0002-9920",
  bibdate =      "Mon Feb 22 15:35:29 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.ams.org/notices/201003/",
  acknowledgement = ack-nhfb,
  fjournal =     "Notices of the American Mathematical Society",
  journal-URL =  "http://www.ams.org/notices/",
}

@Book{Fridrich:2010:SDM,
  author =       "Jessica Fridrich",
  title =        "Steganography in digital media: principles,
                 algorithms, and applications",
  publisher =    pub-CAMBRIDGE,
  address =      pub-CAMBRIDGE:adr,
  pages =        "xxii + 437 + 4",
  year =         "2010",
  ISBN =         "0-521-19019-3 (hardcover)",
  ISBN-13 =      "978-0-521-19019-0 (hardcover)",
  LCCN =         "QA76.9.A25 F75 2010",
  bibdate =      "Fri Aug 15 13:52:51 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 z3950.loc.gov:7090/Voyager",
  abstract =     "Steganography, the art of hiding of information in
                 apparently innocuous objects or images, is a field with
                 a rich heritage, and an area of rapid current
                 development. This clear, self-contained guide shows you
                 how to understand the building blocks of covert
                 communication in digital media files and how to apply
                 the techniques in practice, including those of
                 steganalysis, the detection of steganography. Assuming
                 only a basic knowledge in calculus and statistics, the
                 book blends the various strands of steganography,
                 including information theory, coding, signal estimation
                 and detection, and statistical signal processing.
                 Experiments on real media files demonstrate the
                 performance of the techniques in real life, and most
                 techniques are supplied with pseudo-code, making it
                 easy to implement the algorithms. The book is ideal for
                 students taking courses on steganography and
                 information hiding, and is also a useful reference for
                 engineers and practitioners working in media security
                 and information assurance. Real media files are
                 provided so that readers can see how the techniques
                 work in practice. Includes pseudo-code to help with the
                 implementation of practical algorithms. Each chapter
                 ends with carefully chosen exercises supplied with
                 hints to jump-start the problem solving process.",
  acknowledgement = ack-nhfb,
  subject =      "Data encryption (Computer science); Data protection;
                 Digital media; Data encryption (Computer science); Data
                 protection; Digital media",
  tableofcontents = "Preface \\
                 Acknowledgments \\
                 1. Introduction \\
                 2. Digital image formats \\
                 3. Digital image acquisition \\
                 4. Steganographic channel \\
                 5. Naive steganography \\
                 6. Steganographic security \\
                 7. Practical steganographic methods \\
                 8. Matrix embedding \\
                 9. Non-shared selection channel \\
                 10. Steganalysis \\
                 11. Selected targeted attacks \\
                 12. Blind steganalysis \\
                 13. Steganography \\
                 A. Statistics \\
                 B. Information theory \\
                 C. Linear codes \\
                 D. Signal detection and estimation \\
                 E. Support vector machines \\
                 Notation \\
                 Glossary \\
                 References \\
                 Index",
}

@InBook{Frikken:2010:SMC,
  author =       "Keith B. Frikken",
  title =        "Secure Multiparty Computation",
  crossref =     "Atallah:2010:ATC",
  chapter =      "14",
  pages =        "1--16",
  year =         "2010",
  DOI =          "https://doi.org/10.1201/9781584888215-c14",
  bibdate =      "Sat May 14 09:37:55 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.crcnetbase.com/doi/abs/10.1201/9781584888215-c14",
  acknowledgement = ack-nhfb,
}

@Article{Fulton:2010:BRB,
  author =       "Ben Fulton",
  title =        "Book Review: {{\booktitle{Introduction to Modern
                 Cryptography}}, by Jonathan Katz and Yehuda Lindell,
                 Publisher: Chapman \& Hall-CRC 2008 1-58488-551-3}",
  journal =      j-SIGACT,
  volume =       "41",
  number =       "4",
  pages =        "44--47",
  month =        dec,
  year =         "2010",
  CODEN =        "SIGNDM",
  DOI =          "https://doi.org/10.1145/1907450.1907525",
  ISSN =         "0163-5700 (print), 1943-5827 (electronic)",
  ISSN-L =       "0163-5700",
  bibdate =      "Tue Mar 20 14:39:00 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib",
  note =         "See \cite{Katz:2008:IMC}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGACT News",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J697",
}

@Article{Gentry:2010:CAF,
  author =       "Craig Gentry",
  title =        "Computing arbitrary functions of encrypted data",
  journal =      j-CACM,
  volume =       "53",
  number =       "3",
  pages =        "97--105",
  month =        mar,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1666420.1666444",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:13:19 MDT 2010",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cacm2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "Suppose that you want to delegate the ability to {\em
                 process\/} your data, without giving away {\em
                 access\/} to it. We show that this separation is
                 possible: we describe a `fully homomorphic' encryption
                 scheme that keeps data private, but that allows a
                 worker that {\em does not have the secret decryption
                 key\/} to compute any (still encrypted) result of the
                 data, even when the function of the data is very
                 complex. In short, a third party can perform
                 complicated processing of data without being able to
                 see it. Among other things, this helps make cloud
                 computing compatible with privacy.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@PhdThesis{Gorski:2010:CDS,
  author =       "Michael Gorski",
  title =        "Cryptanalysis and design of symmetric primitives",
  type =         "{Ph.D.} thesis (??)",
  school =       "Bauhausuniversit{\"a}t",
  address =      "Weimar, Germany",
  pages =        "vi + 146",
  year =         "2010",
  bibdate =      "Fri May 13 06:45:57 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
}

@InProceedings{Gradwohl:2010:SRC,
  author =       "R. Gradwohl and N. Livne and A. Rosen",
  title =        "Sequential Rationality in Cryptographic Protocols",
  crossref =     "IEEE:2010:PIA",
  pages =        "623--632",
  year =         "2010",
  DOI =          "https://doi.org/10.1109/FOCS.2010.65",
  bibdate =      "Thu Apr 12 09:34:12 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/focs2010.bib",
  acknowledgement = ack-nhfb,
  book-URL =     "http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5669376",
}

@Article{Guo:2010:HMW,
  author =       "Jing-Ming Guo and Yun-Fu Liu",
  title =        "Hiding Multitone Watermarks in Halftone Images",
  journal =      j-IEEE-MULTIMEDIA,
  volume =       "17",
  number =       "1",
  pages =        "65--65",
  month =        jan,
  year =         "2010",
  CODEN =        "IEMUE4",
  DOI =          "https://doi.org/10.1109/MMUL.2010.14",
  ISSN =         "1070-986X (print), 1941-0166 (electronic)",
  ISSN-L =       "1070-986X",
  bibdate =      "Thu May 13 11:33:52 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE MultiMedia",
}

@InProceedings{Haitner:2010:EIC,
  author =       "Iftach Haitner and Omer Reingold and Salil Vadhan",
  title =        "Efficiency improvements in constructing pseudorandom
                 generators from one-way functions",
  crossref =     "ACM:2010:PAI",
  pages =        "437--446",
  year =         "2010",
  bibdate =      "Wed Sep 1 10:42:57 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
}

@Article{Halder:2010:WTR,
  author =       "R. Halder and S. Pal and A. Cortesi",
  title =        "Watermarking Techniques for Relational Databases:
                 Survey, Classification and Comparison",
  journal =      j-J-UCS,
  volume =       "16",
  number =       "21",
  pages =        "3164--??",
  month =        "????",
  year =         "2010",
  CODEN =        "????",
  ISSN =         "0948-695X (print), 0948-6968 (electronic)",
  ISSN-L =       "0948-6968",
  bibdate =      "Fri Apr 6 05:52:28 MDT 2012",
  bibsource =    "http://www.jucs.org/jucs;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.jucs.org/jucs_16_21/watermarking_techniques_for_relational",
  acknowledgement = ack-nhfb,
  fjournal =     "J.UCS: Journal of Universal Computer Science",
  journal-URL =  "http://www.jucs.org/jucs",
}

@Article{Harn:2010:AGK,
  author =       "L. Harn and Changlu Lin",
  title =        "Authenticated Group Key Transfer Protocol Based on
                 Secret Sharing",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "59",
  number =       "6",
  pages =        "842--846",
  month =        jun,
  year =         "2010",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2010.40",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Sun Jul 3 11:52:29 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5416683",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Harnik:2010:CIC,
  author =       "Danny Harnik and Moni Naor",
  title =        "On the Compressibility of $ \mathcal {NP} $ Instances
                 and Cryptographic Applications",
  journal =      j-SIAM-J-COMPUT,
  volume =       "39",
  number =       "5",
  pages =        "1667--1713",
  month =        "????",
  year =         "2010",
  CODEN =        "SMJCAT",
  ISSN =         "0097-5397 (print), 1095-7111 (electronic)",
  ISSN-L =       "0097-5397",
  bibdate =      "Tue May 18 08:22:16 MDT 2010",
  bibsource =    "http://epubs.siam.org/sam-bin/dbq/toclist/SICOMP/39/5;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "SIAM Journal on Computing",
  journal-URL =  "http://epubs.siam.org/sicomp",
}

@Book{Hazay:2010:EST,
  author =       "Carmit Hazay and Yehuda Lindell",
  title =        "Efficient Secure Two-Party Protocols: Techniques and
                 Constructions",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xiii + 263 + 1",
  year =         "2010",
  DOI =          "https://doi.org/10.1007/978-3-642-14303-8",
  ISBN =         "3-642-14302-4 (hardcover), 3-642-14303-2 (e-book)",
  ISBN-13 =      "978-3-642-14302-1 (hardcover), 978-3-642-14303-8
                 (e-book)",
  ISSN =         "1619-7100 (print), 2197-845X (electronic)",
  ISSN-L =       "1619-7100",
  LCCN =         "Z103 .H39 2010",
  bibdate =      "Sat Jun 10 08:35:00 MDT 2017",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib;
                 jenson.stanford.edu:2210/unicorn",
  series =       "Information Security and Cryptography",
  URL =          "http://www.springerlink.com/content/978-3-642-14303-8",
  abstract =     "The authors present a comprehensive study of efficient
                 protocols and techniques for secure two-party
                 computation - both general constructions that can be
                 used to securely compute any functionality, and
                 protocols for specific problems of interest. The book
                 focuses on techniques for constructing efficient
                 protocols and proving them secure. In addition, the
                 authors study different definitional paradigms and
                 compare the efficiency of protocols achieved under
                 these different definitions. The book opens with a
                 general introduction to secure computation and then
                 presents definitions of security for a number of
                 different adversary models and definitional paradigms.
                 In the second part, the book shows how any
                 functionality can be securely computed in an efficient
                 way in the presence of semi-honest, malicious and
                 covert adversaries. These general constructions provide
                 a basis for understanding the feasibility of secure
                 computation, and they are a good introduction to design
                 paradigms and proof techniques for efficient protocols.
                 In the final part, the book presents specific
                 constructions of importance. The authors begin with an
                 in-depth study of sigma protocols and zero knowledge,
                 focusing on secure computation, and they then provide a
                 comprehensive study of the fundamental oblivious
                 transfer function. Starting from protocols that achieve
                 privacy only, they show highly efficient constructions
                 that achieve security in the presence of malicious
                 adversaries for both a single and multiple batch
                 executions. Oblivious pseudorandom function evaluation
                 is then presented as an immediate application of
                 oblivious transfer. Finally, the book concludes with
                 two examples of high-level protocol problems that
                 demonstrate how specific properties of a problem can be
                 exploited to gain high efficiency: securely computing
                 the kth-ranked element, and secure database and text
                 search. This book is essential for practitioners and
                 researchers in the field of secure protocols,
                 particularly those with a focus on efficiency, and for
                 researchers in the area of privacy-preserving data
                 mining. This book can also be used as a textbook for an
                 advanced course on secure protocols.",
  acknowledgement = ack-nhfb,
  subject =      "Computer science; Computer Communication Networks;
                 Data structures (Computer science); Data mining;
                 Informatique; Structures de donn{\'e}es (Informatique);
                 Exploration de donn{\'e}es (Informatique)",
  tableofcontents = "Front Matter / i--xiii \\
                 Introduction and Definitions \\
                 Front Matter / 1--2 \\
                 Introduction / 3--18 \\
                 Definitions / 19--49 \\
                 General Constructions \\
                 Front Matter / 51--52 \\
                 Semi-honest Adversaries / 53--80 \\
                 Malicious Adversaries / 81--108 \\
                 Covert Adversaries / 109--143 \\
                 Specific Constructions \\
                 Front Matter / 145--146 \\
                 Sigma Protocols and Efficient Zero--Knowledge /
                 147--175 \\
                 Oblivious Transfer and Applications / 177--212 \\
                 The $k$th-Ranked Element / 213--226 \\
                 Search Problems / 227--254 \\
                 Back Matter / 255--263",
  xxpages =      "viii + 265",
}

@Article{Hefeeda:2010:ASM,
  author =       "Mohamed Hefeeda and Kianoosh Mokhtarian",
  title =        "Authentication schemes for multimedia streams:
                 {Quantitative} analysis and comparison",
  journal =      j-TOMCCAP,
  volume =       "6",
  number =       "1",
  pages =        "6:1--6:??",
  month =        feb,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1671954.1671960",
  ISSN =         "1551-6857 (print), 1551-6865 (electronic)",
  ISSN-L =       "1551-6857",
  bibdate =      "Tue Mar 16 18:53:23 MDT 2010",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tomccap/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "With the rapid increase in the demand for multimedia
                 services, securing the delivery of multimedia content
                 has become an important issue. Accordingly, the problem
                 of multimedia stream authentication has received
                 considerable attention by previous research and various
                 solutions have been proposed. However, these solutions
                 have not been rigorously analyzed and contrasted to
                 each other, and thus their relative suitability for
                 different streaming environments is not clear. This
                 article presents comprehensive analysis and comparison
                 among different schemes proposed in the literature to
                 authenticate multimedia streams. Authentication schemes
                 for nonscalable and scalable multimedia streams are
                 analyzed. To conduct this analysis, we define five
                 important performance metrics, which are computation
                 cost, communication overhead, receiver buffer size,
                 delay, and tolerance to packet losses. We derive
                 analytic formulas for these metrics for all considered
                 authentication schemes to numerically analyze their
                 performance. In addition, we implement all schemes in a
                 simulator to study and compare their performance in
                 different environments. The parameters for the
                 simulator are carefully chosen to mimic realistic
                 settings. We draw several conclusions on the advantages
                 and disadvantages of each scheme. We extend our
                 analysis to authentication techniques for scalable
                 streams. We pay careful attention to the flexibility of
                 scalable streams and analyze its impacts on the
                 authentication schemes. Our analysis and comparison
                 reveal the merits and shortcomings of each scheme,
                 provide guidelines on choosing the most appropriate
                 scheme for a given multimedia streaming application,
                 and could stimulate designing new authentication
                 schemes or improving existing ones. For example, our
                 detailed analysis has led us to design a new
                 authentication scheme that combines the best features
                 of two previous schemes.",
  acknowledgement = ack-nhfb,
  articleno =    "6",
  fjournal =     "ACM Transactions on Multimedia Computing,
                 Communications, and Applications",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J961",
  keywords =     "authentication schemes; Multimedia authentication;
                 multimedia security; multimedia streaming; scalable
                 coding; secure streaming",
}

@PhdThesis{Hermelin:2010:MLC,
  author =       "Miia Hermelin",
  title =        "Multidimensional linear cryptanalysis",
  volume =       "16",
  type =         "{Ph.D.} thesis",
  school =       "Aalto-yliopiston teknillinen korkeakoulu",
  address =      "Espoo, Finland",
  pages =        "97",
  year =         "2010",
  ISBN =         "952-60-3189-X",
  ISBN-13 =      "978-952-60-3189-7",
  ISSN =         "1797-5050",
  bibdate =      "Thu May 12 06:49:36 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  series =       "Dissertations in information and computer science",
  acknowledgement = ack-nhfb,
  keywords =     "block cipher stream cipher; linear cryptanalysis;
                 Matsui's algorithm; multidimensional cryptanalysis",
}

@Book{Hinek:2010:CRV,
  author =       "M. Jason Hinek",
  title =        "Cryptanalysis of {RSA} and its variants",
  publisher =    pub-CRC,
  address =      pub-CRC:adr,
  pages =        "xviii + 268",
  year =         "2010",
  ISBN =         "1-4200-7518-7 (hardcover)",
  ISBN-13 =      "978-1-4200-7518-2 (hardcover)",
  LCCN =         "TK5102.94 .H56 2010",
  bibdate =      "Sat May 15 09:16:45 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Chapman and Hall/CRC cryptography and network
                 security",
  acknowledgement = ack-nhfb,
  subject =      "telecommunication; security measures; mathematics;
                 public key cryptography; computer security",
  tableofcontents = "I. Preliminaries \\
                 1. The RSA Cryptosystem \\
                 2. Some Notation, Mathematics and Techniques \\
                 II. Cryptanalysis of RSA \\
                 3. Some Early Attacks \\
                 4. Small Public Exponent Attacks \\
                 5. Small Private Exponent Attacks \\
                 6. Partial Key Exposure Attacks \\
                 7. More Small Private Exponent Attacks \\
                 III. Cryptanalysis of Variants of RSA \\
                 8. Crt-Rsa \\
                 9. Multi-Prime RSA \\
                 10. Multi-Power RSA \\
                 11. Common Prime RSA \\
                 12. Dual RSA \\
                 A. Distribution of 9 = gcd(p - 1, q - 1) \\
                 B. Geometrically Progressive Matrices \\
                 C. Some Algorithms",
}

@Article{Holbl:2010:TPI,
  author =       "Marko H{\"o}lbl and Tatjana Welzer and Bostjan
                 Brumen",
  title =        "Two proposed identity-based three-party authenticated
                 key agreement protocols from pairings",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "2",
  pages =        "244--252",
  month =        mar,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:19 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480900090X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Book{Howard:2010:DSS,
  author =       "Michael Howard and David LeBlanc and John Viega",
  title =        "24 deadly sins of software security: programming flaws
                 and how to fix them",
  publisher =    pub-MCGRAW-HILL,
  address =      pub-MCGRAW-HILL:adr,
  pages =        "xxxvii + 393",
  year =         "2010",
  ISBN =         "0-07-162675-1",
  ISBN-13 =      "978-0-07-162675-0",
  LCCN =         "QA76.9.A25 H6977 2010",
  bibdate =      "Wed Jan 12 11:17:59 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  subject =      "Computer security; Computer networks; Security
                 measures",
}

@Article{Hu:2010:TTW,
  author =       "Wen Hu and Hailun Tan and Peter Corke and Wen Chan
                 Shih and Sanjay Jha",
  title =        "Toward trusted wireless sensor networks",
  journal =      j-TOSN,
  volume =       "7",
  number =       "1",
  pages =        "5:1--5:??",
  month =        aug,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1806895.1806900",
  ISSN =         "1550-4859 (print), 1550-4867 (electronic)",
  ISSN-L =       "1550-4859",
  bibdate =      "Fri Oct 8 18:33:47 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "This article presents the design and implementation of
                 a trusted sensor node that provides Internet-grade
                 security at low system cost. We describe trustedFleck,
                 which uses a commodity Trusted Platform Module (TPM)
                 chip to extend the capabilities of a standard wireless
                 sensor node to provide security services such as {\em
                 message integrity, confidentiality, authenticity}, and
                 {\em system integrity\/} based on RSA public-key and
                 XTEA-based symmetric-key cryptography. In addition
                 trustedFleck provides secure storage of private keys
                 and provides platform configuration registers (PCRs) to
                 store system configurations and detect code tampering.
                 We analyze system performance using metrics that are
                 important for WSN applications such as computation
                 time, memory size, energy consumption and cost. Our
                 results show that trustedFleck significantly
                 outperforms previous approaches (e.g., TinyECC) in
                 terms of these metrics while providing stronger
                 security levels. Finally, we describe a number of
                 examples, built on trustedFleck, of symmetric key
                 management, secure RPC, secure software update, and
                 {\em remote attestation}.",
  acknowledgement = ack-nhfb,
  articleno =    "5",
  fjournal =     "ACM Transactions on Sensor Networks (TOSN)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J981",
  keywords =     "public key (PK); remote attestation; RSA; TPM; trusted
                 computing; Wireless sensor networks",
}

@Article{Huffmire:2010:SPR,
  author =       "Ted Huffmire and Timothy Levin and Thuy Nguyen and
                 Cynthia Irvine and Brett Brotherton and Gang Wang and
                 Timothy Sherwood and Ryan Kastner",
  title =        "Security Primitives for Reconfigurable Hardware-Based
                 Systems",
  journal =      j-TRETS,
  volume =       "3",
  number =       "2",
  pages =        "10:1--10:??",
  month =        may,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1754386.1754391",
  ISSN =         "1936-7406 (print), 1936-7414 (electronic)",
  ISSN-L =       "1936-7406",
  bibdate =      "Tue Jun 22 16:00:33 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "Computing systems designed using reconfigurable
                 hardware are increasingly composed using a number of
                 different Intellectual Property (IP) cores, which are
                 often provided by third-party vendors that may have
                 different levels of trust. Unlike traditional software
                 where hardware resources are mediated using an
                 operating system, IP cores have fine-grain control over
                 the underlying reconfigurable hardware. To address this
                 problem, the embedded systems community requires novel
                 security primitives that address the realities of
                 modern reconfigurable hardware. In this work, we
                 propose security primitives using ideas centered around
                 the notion of ``moats and drawbridges.'' The primitives
                 encompass four design properties: logical isolation,
                 interconnect traceability, secure reconfigurable
                 broadcast, and configuration scrubbing. Each of these
                 is a fundamental operation with easily understood
                 formal properties, yet they map cleanly and efficiently
                 to a wide variety of reconfigurable devices. We
                 carefully quantify the required overheads of the
                 security techniques on modern FPGA architectures across
                 a number of different applications.",
  acknowledgement = ack-nhfb,
  articleno =    "10",
  fjournal =     "ACM Transactions on Reconfigurable Technology and
                 Systems (TRETS)",
  journal-URL =  "http://portal.acm.org/toc.cfm?id=J1151",
  keywords =     "Advanced Encryption Standard (AES); controlled
                 sharing; enforcement mechanisms; execution monitors;
                 Field Programmable Gate Arrays (FPGAs); hardware
                 security; isolation; memory protection; reference
                 monitors; security policies; security primitives;
                 separation; static analysis; Systems-on-a-Chip (SoCs)",
}

@Article{Hur:2010:CCS,
  author =       "Junbeom Hur and Chanil Park and Hyunsoo Yoon",
  title =        "Chosen ciphertext secure authenticated group
                 communication using identity-based signcryption",
  journal =      j-COMPUT-MATH-APPL,
  volume =       "60",
  number =       "2",
  pages =        "362--375",
  month =        jul,
  year =         "2010",
  CODEN =        "CMAPDK",
  ISSN =         "0898-1221 (print), 1873-7668 (electronic)",
  ISSN-L =       "0898-1221",
  bibdate =      "Wed Mar 1 21:50:41 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computmathappl2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0898122110000167",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers and Mathematics with Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/08981221",
}

@Article{Hwang:2010:RIB,
  author =       "Min-Shiang Hwang and Song-Kong Chong and Te-Yu Chen",
  title =        "{DoS}-resistant {ID}-based password authentication
                 scheme using smart cards",
  journal =      j-J-SYST-SOFTW,
  volume =       "83",
  number =       "1",
  pages =        "163--172",
  month =        jan,
  year =         "2010",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212",
  ISSN-L =       "0164-1212",
  bibdate =      "Tue Sep 7 07:27:05 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Ismail:2010:EAE,
  author =       "I. A. Ismail and M. Amin and H. Diab",
  title =        "An Efficient Adaptive Ergodic Matrix and Chaotic
                 System for Image Encryption",
  journal =      j-INT-J-COMPUT-APPL,
  volume =       "32",
  number =       "3",
  pages =        "381--388",
  year =         "2010",
  DOI =          "https://doi.org/10.2316/Journal.202.2010.3.202-2330",
  ISSN =         "1206-212X (print), 1925-7074 (electronic)",
  ISSN-L =       "1206-212X",
  bibdate =      "Sat Apr 21 17:26:37 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijca.bib",
  URL =          "https://www.tandfonline.com/doi/full/10.2316/Journal.202.2010.3.202-2330",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Computer Applications",
  journal-URL =  "https://www.tandfonline.com/loi/tjca20",
  online-date =  "11 Jul 2015",
}

@Article{Jain:2010:QP,
  author =       "Rahul Jain and Zhengfeng Ji and Sarvagya Upadhyay and
                 John Watrous",
  title =        "{QIP $=$ PSPACE}",
  journal =      j-CACM,
  volume =       "53",
  number =       "12",
  pages =        "102--109",
  month =        dec,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1859204.1859231",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Nov 24 17:07:53 MST 2010",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "The interactive proof system model of computation has
                 been studied extensively in computational complexity
                 theory and theoretical cryptography for more than 25
                 years, and has driven the development of interesting
                 new techniques and insights in those fields. This work
                 considers the quantum interactive proof system model,
                 which is the classical model's natural quantum
                 computational analog. An exact characterization of the
                 expressive power of quantum interactive proof systems
                 is obtained: the collection of computational problems
                 having quantum interactive proof systems consists
                 precisely of those problems solvable with an ordinary
                 classical computer using at most a polynomial amount of
                 memory (or QIP $=$ PSPACE in complexity-theoretic
                 terminology). One striking implication of this
                 characterization is that it implies quantum computing
                 provides no increase in computational power whatsoever
                 over classical computing in the context of interactive
                 proof systems.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  remark =       "An earlier version of this work won Best Paper Award
                 at STOC'2010 (Symposium on the Theory of Computing):
                 see \url{https://doi.org/10.1145/1806689.1806768}",
}

@Article{Jiang:2010:EDI,
  author =       "Yixin Jiang and Haojin Zhu and Minghui Shi and Xuemin
                 (Sherman) Shen and Chuang Lin",
  title =        "An efficient dynamic-identity based signature scheme
                 for secure network coding",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "54",
  number =       "1",
  pages =        "28--40",
  day =          "15",
  month =        jan,
  year =         "2010",
  CODEN =        "????",
  ISSN =         "1389-1286",
  ISSN-L =       "1389-1286",
  bibdate =      "Sat Apr 2 08:42:35 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/13891286",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286",
}

@Article{Jie:2010:AAI,
  author =       "Wei Jie and Junaid Arshad and Pascal Ekin",
  title =        "Authentication and authorization infrastructure for
                 {Grids} --- issues, technologies, trends and
                 experiences",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "52",
  number =       "1",
  pages =        "82--96",
  month =        apr,
  year =         "2010",
  CODEN =        "JOSUED",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Wed Aug 25 08:38:57 MDT 2010",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0920-8542&volume=52&issue=1;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0920-8542&volume=52&issue=1&spage=82",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Article{Jin:2010:ADW,
  author =       "C. Jin",
  title =        "Adaptive Digital Watermark System Using Soft
                 Computation",
  journal =      j-INT-J-COMPUT-APPL,
  volume =       "32",
  number =       "3",
  pages =        "341--346",
  year =         "2010",
  DOI =          "https://doi.org/10.2316/Journal.202.2010.3.202-2846",
  ISSN =         "1206-212X (print), 1925-7074 (electronic)",
  ISSN-L =       "1206-212X",
  bibdate =      "Sat Apr 21 17:26:37 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijca.bib",
  URL =          "https://www.tandfonline.com/doi/full/10.2316/Journal.202.2010.3.202-2846",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Computer Applications",
  journal-URL =  "https://www.tandfonline.com/loi/tjca20",
  online-date =  "11 Jul 2015",
}

@Article{Johnson:2010:BRF,
  author =       "Neil F. Johnson",
  title =        "Book Review: {Frank Y. Shih, {\em Digital Watermarking
                 and Steganography: Fundamentals and Techniques}.
                 CRC\slash Taylor \& Francis (2008). ISBN-13
                 978-1-4200-4757-8. \pounds 46.99. 180 pp. Hardcover}",
  journal =      j-COMP-J,
  volume =       "53",
  number =       "5",
  pages =        "616--617",
  month =        jun,
  year =         "2010",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxp057",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Wed Jul 7 08:36:58 MDT 2010",
  bibsource =    "http://comjnl.oxfordjournals.org/content/vol53/issue5/index.dtl;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/cgi/reprint/53/5/616",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@InProceedings{Kamal:2010:EIN,
  author =       "A. A. Kamal and A. M. Youssef",
  title =        "Enhanced implementation of the {NTRUEncrypt} algorithm
                 using graphics cards",
  crossref =     "Chaudhuri:2010:PIC",
  pages =        "168--174",
  year =         "2010",
  DOI =          "https://doi.org/10.1109/PDGC.2010.5679887",
  bibdate =      "Thu Apr 21 10:40:48 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "The NTRU encryption algorithm, also known as
                 NTRUEncrypt, is a parameterized family of lattice-based
                 public key cryptosystems that has been accepted to the
                 IEEE P1363 standards under the specifications for
                 lattice-based public-key cryptography (IEEE P1363.1).
                 The operations of the NTRU encryption algorithm show
                 good characteristics for data parallel processing which
                 makes the NTRU a good candidate to benefit from the
                 high degree of parallelism available in modern graphics
                 processing units (GPUs). In this paper, we investigate
                 different GPU implementation options for the NTRU
                 encryption algorithm. Our implementation, on the NVIDIA
                 GTX275 GPU, using the CUDA framework, achieves about 77
                 MB/s for NTRU with the parameter set $ (N, q, p) =
                 (1171, 2048, 3) $.",
  acknowledgement = ack-nhfb,
  keywords =     "ANSI X9.98-2010; NTRUEncrypt",
}

@Article{Karopoulos:2010:FIP,
  author =       "Giorgos Karopoulos and Georgios Kambourakis and
                 Stefanos Gritzalis and Elisavet Konstantinou",
  title =        "A framework for identity privacy in {SIP}",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "33",
  number =       "1",
  pages =        "16--28",
  month =        jan,
  year =         "2010",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Wed Jan 28 15:43:38 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804509001052",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Netw. Comput. Appl.",
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Karthigaikumar:2010:PPV,
  author =       "P. Karthigaikumar and K. Baskaran",
  title =        "Partially Pipelined {VLSI} Implementation of
                 {Blowfish} Encryption\slash Decryption Algorithm",
  journal =      j-INT-J-IMAGE-GRAPHICS,
  volume =       "10",
  number =       "3",
  pages =        "327--341",
  month =        jul,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1142/S0219467810003809",
  ISSN =         "0219-4678",
  bibdate =      "Tue Aug 31 08:38:02 MDT 2010",
  bibsource =    "http://ejournals.wspc.com.sg/ijig/ijig.shtml;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Image and Graphics",
  journal-URL =  "http://www.worldscientific.com/worldscinet/ijig",
}

@Book{Kastner:2010:AOT,
  author =       "Ryan Kastner and Anup Hosangadi and Farzan Fallah",
  title =        "Arithmetic optimization techniques for hardware and
                 software design",
  publisher =    pub-CAMBRIDGE,
  address =      pub-CAMBRIDGE:adr,
  pages =        "vii + 187",
  year =         "2010",
  ISBN =         "0-521-88099-8",
  ISBN-13 =      "978-0-521-88099-2",
  LCCN =         "QA76.9.C62 K37 2010; QA76.9.C62 KAS 2010",
  bibdate =      "Mon Jul 12 14:32:42 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 library.ox.ac.uk:210/ADVANCE",
  URL =          "http://assets.cambridge.org/97805218/80992/cover/9780521880992.jpg",
  abstract =     "Obtain better system performance, lower energy
                 consumption, and avoid hand-coding arithmetic functions
                 with this concise guide to automated optimization
                 techniques for hardware and software design. High-level
                 compiler optimizations and high-speed architectures for
                 implementing FIR filters are covered, which can improve
                 performance in communications, signal processing,
                 computer graphics, and cryptography. Clearly explained
                 algorithms and illustrative examples throughout make it
                 easy to understand the techniques and write software
                 for their implementation. Background information on the
                 synthesis of arithmetic expressions and computer
                 arithmetic is also included, making the book ideal for
                 newcomers to the subject. This is an invaluable
                 resource for researchers, professionals, and graduate
                 students working in system level design and automation,
                 compilers, and VLSI CAD.",
  acknowledgement = ack-nhfb,
  subject =      "computer arithmetic; electronic digital computers;
                 design and construction; computer software;
                 development; mathematical optimization",
  tableofcontents = "1. Introduction; \\
                 2. Use of arithmetic expressions\\
                 3. Software compilation\\
                 4. Hardware synthesis\\
                 5. Fundamentals of digital arithmetic\\
                 6. Polynomial expressions\\
                 7. Linear systems",
}

@Article{Kate:2010:PBO,
  author =       "Aniket Kate and Greg M. Zaverucha and Ian Goldberg",
  title =        "Pairing-Based Onion Routing with Improved Forward
                 Secrecy",
  journal =      j-TISSEC,
  volume =       "13",
  number =       "4",
  pages =        "29:1--29:??",
  month =        dec,
  year =         "2010",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/1880022.1880023",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Wed Jan 12 17:10:07 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "This article presents new protocols for onion routing
                 anonymity networks. We define a provably secure
                 privacy-preserving key agreement scheme in an
                 identity-based infrastructure setting, and use it to
                 design new onion routing circuit constructions. These
                 constructions, based on a user's selection, offer
                 immediate or eventual forward secrecy at each node in a
                 circuit and require significantly less computation and
                 communication than the telescoping mechanism used by
                 the Tor project. Further, the use of an identity-based
                 infrastructure also leads to a reduction in the
                 required amount of authenticated directory
                 information.",
  acknowledgement = ack-nhfb,
  articleno =    "29",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@Article{Keller:2010:DAS,
  author =       "Nathan Keller and Stephen D. Miller",
  title =        "Distinguishing attacks on stream ciphers based on
                 arrays of pseudo-random words",
  journal =      j-INFO-PROC-LETT,
  volume =       "110",
  number =       "4",
  pages =        "129--132",
  day =          "16",
  month =        jan,
  year =         "2010",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Thu Mar 31 12:46:30 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Keskinarkaus:2010:IWD,
  author =       "A. Keskinarkaus and A. Pramila and T. Sepp{\"a}nen",
  title =        "Image watermarking with a directed periodic pattern to
                 embed multibit messages resilient to print-scan and
                 compound attacks",
  journal =      j-J-SYST-SOFTW,
  volume =       "83",
  number =       "10",
  pages =        "1715--1725",
  month =        oct,
  year =         "2010",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212",
  ISSN-L =       "0164-1212",
  bibdate =      "Tue Sep 7 07:27:06 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Khan:2010:RCB,
  author =       "Zeeshan Shafi Khan and Khalid Rashid and Fahad Bin
                 Muhaya and Qutbuddin and Aneel Rahim",
  title =        "Realization of Call-Back Authentication {(CBA)} for
                 secure web to cellular phone {SMS} communication",
  journal =      j-COMPUT-MATH-APPL,
  volume =       "60",
  number =       "2",
  pages =        "198--208",
  month =        jul,
  year =         "2010",
  CODEN =        "CMAPDK",
  ISSN =         "0898-1221 (print), 1873-7668 (electronic)",
  ISSN-L =       "0898-1221",
  bibdate =      "Wed Mar 1 21:50:41 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computmathappl2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0898122110000118",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers and Mathematics with Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/08981221",
}

@PhdThesis{Khazaei:2010:NBS,
  author =       "Shahram Khazaei",
  title =        "Neutrality-Based Symmetric Cryptanalysis",
  type =         "Th{\`e}se",
  school =       "{\'E}cole polytechnique f{\'e}d{\'e}rale de Lausanne
                 (EPFL)",
  address =      "Lausanne, Switzerland",
  pages =        "138",
  year =         "2010",
  DOI =          "https://doi.org/10.5075/epfl-thesis-4755",
  bibdate =      "Fri May 13 06:33:43 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  advisor =      "Arjen K. Lenstra and Willi Meier",
}

@InProceedings{Khomejani:2010:PCT,
  author =       "S. Khomejani and A. Movaghar",
  editor =       "{IEEE}",
  booktitle =    "{Proceedings of the 2010 International Conference On
                 Electronics and Information Engineering (ICEIE), 1--3,
                 August, 2010, Kyoto, Japan}",
  title =        "Privacy consideration for trustworthy vehicular ad hoc
                 networks",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "437--??",
  year =         "2010",
  DOI =          "https://doi.org/10.1109/ICEIE.2010.5559670",
  ISBN =         "1-4244-7679-8",
  ISBN-13 =      "978-1-4244-7679-4",
  LCCN =         "????",
  bibdate =      "Thu Apr 21 11:18:00 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 z3950.bibsys.no:2100/BIBSYS",
  abstract =     "For increasing safety of driving, intelligent vehicles
                 in vehicular ad hoc networks (VANETs) communicate with
                 each other by sending announcements. The existence of a
                 system that guarantees the trustworthiness of these
                 announcements seems necessary. The proposed approach
                 generating announcements should be preserved from
                 internal and external attackers that attempt to send
                 fake messages. In this paper, we use a group-based
                 endorsement mechanism based on threshold signatures
                 against internal attackers. We choose NTRUSign as a
                 public key cryptosystem for decreasing signature
                 generation and verification times. This approach
                 optimizes the network overhead and consequently its
                 performance. In this scheme, also the privacy of
                 signers and endorsers that generate or endorse
                 trustworthy announcements is preserved.",
  acknowledgement = ack-nhfb,
  keywords =     "ANSI X9.98-2010; NTRUSign",
}

@TechReport{Khovratovich:2010:RCA,
  author =       "Dmitry Khovratovich and Ivica Nikoli{\'c}",
  title =        "Rotational Cryptanalysis of {ARX}",
  type =         "Report",
  institution =  "University of Luxembourg",
  address =      "Luxembourg",
  pages =        "24",
  month =        jan,
  year =         "2010",
  bibdate =      "Mon Nov 28 14:40:24 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.skein-hash.info/sites/default/files/axr.pdf",
  abstract =     "In this paper we analyze the security of systems based
                 on modular additions, rotations, and XORs (ARX
                 systems). We provide both theoretical support for their
                 security and practical cryptanalysis of real ARX
                 primitives. We use a technique called rotational
                 cryptanalysis, that is universal for the ARX systems
                 and is quite efficient. We illustrate the method with
                 the best known attack on reduced versions of the block
                 cipher Threefish (the core of Skein). Additionally, we
                 prove that ARX with constants are functionally
                 complete, i.e., any function can be realized with these
                 operations.",
  acknowledgement = ack-nhfb,
  date =         "24",
  keywords =     "ARX; cryptanalysis; rotational cryptanalysis",
}

@TechReport{Khovratovich:2010:RRA,
  author =       "Dmitry Khovratovich and Ivica Nikoli{\'c} and
                 Christian Rechberger",
  title =        "Rotational Rebound Attacks on Reduced {Skein}",
  type =         "Report",
  institution =  "University of Luxembourg",
  address =      "Luxembourg",
  pages =        "20",
  day =          "20",
  month =        oct,
  year =         "2010",
  bibdate =      "Sat Dec 10 16:07:50 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://eprint.iacr.org/2010/538",
  acknowledgement = ack-nhfb,
  keywords =     "cipher; compression function; distinguisher; hash
                 function; rebound attack; rotational cryptanalysis;
                 secret-key cryptography; SHA-3; Skein; Skein hash
                 algorithm; Threefish encryption",
}

@InBook{Klapper:2010:PSS,
  author =       "Andrew Klapper",
  title =        "Pseudorandom Sequences and Stream Ciphers",
  crossref =     "Atallah:2010:ATC",
  chapter =      "17",
  pages =        "1--23",
  year =         "2010",
  DOI =          "https://doi.org/10.1201/9781584888215-c17",
  bibdate =      "Sat May 14 09:37:55 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.crcnetbase.com/doi/abs/10.1201/9781584888215-c17",
  acknowledgement = ack-nhfb,
}

@TechReport{Kleinjung:2010:FBR,
  author =       "Thorsten Kleinjung and Kazumaro Jens Franke and Arjen
                 K. Lenstra and Emmanuel Thom{\'e} and Joppe W. Bos and
                 Pierrick Gaudry and Alexander Kruppa and Peter L.
                 Montgomery and Dag Arne Osvik and Herman te Riele and
                 Andrey Timofeev and Paul Zimmermann",
  title =        "Factorization of a 768-bit {RSA} modulus",
  type =         "Report",
  number =       "1.4",
  institution =  "EPFL IC LACAL [and others]",
  address =      "Station 14, CH-1015 Lausanne, Switzerland [and
                 others]",
  day =          "18",
  month =        feb,
  year =         "2010",
  bibdate =      "Tue Jan 02 07:55:25 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://eprint.iacr.org/2010/006.pdf",
  abstract =     "This paper reports on the factorization of the 768-bit
                 number RSA-768 by the number field sieve factoring
                 method and discusses some implications for RSA.",
  acknowledgement = ack-nhfb,
}

@Article{Ko:2010:MME,
  author =       "Jeonggil Ko and Jong Hyun Lim and Yin Chen and
                 Rv{\~a}zvan Musvaloiu-E and Andreas Terzis and Gerald
                 M. Masson and Tia Gao and Walt Destler and Leo Selavo
                 and Richard P. Dutton",
  title =        "{MEDiSN}: {Medical} emergency detection in sensor
                 networks",
  journal =      j-TECS,
  volume =       "10",
  number =       "1",
  pages =        "11:1--11:??",
  month =        aug,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1814539.1814550",
  ISSN =         "1539-9087",
  ISSN-L =       "1539-9087",
  bibdate =      "Mon Aug 30 15:29:45 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "Staff shortages and an increasingly aging population
                 are straining the ability of emergency departments to
                 provide high quality care. At the same time, there is a
                 growing concern about hospitals' ability to provide
                 effective care during disaster events. For these
                 reasons, tools that automate patient monitoring have
                 the potential to greatly improve efficiency and quality
                 of health care. Towards this goal, we have developed
                 {\em MEDiSN}, a wireless sensor network for monitoring
                 patients' physiological data in hospitals and during
                 disaster events. MEDiSN comprises {\em Physiological
                 Monitors\/} (PMs), which are custom-built, patient-worn
                 motes that sample, encrypt, and sign physiological data
                 and {\em Relay Points\/} (RPs) that self-organize into
                 a multi-hop wireless backbone for carrying
                 physiological data. Moreover, MEDiSN includes a
                 back-end server that persistently stores medical data
                 and presents them to authenticated GUI clients. The
                 combination of MEDiSN's two-tier architecture and
                 optimized rate control protocols allows it to address
                 the compound challenge of reliably delivering large
                 volumes of data while meeting the application's QoS
                 requirements. Results from extensive simulations,
                 testbed experiments, and multiple pilot hospital
                 deployments show that MEDiSN can scale from tens to at
                 least five hundred PMs, effectively protect application
                 packets from congestive and corruptive losses, and
                 deliver medically actionable data.",
  acknowledgement = ack-nhfb,
  articleno =    "11",
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?&idx=J840",
  keywords =     "Medical sensor networks; wireless physiological
                 monitoring",
}

@Article{Koblitz:2010:BNW,
  author =       "Neal Koblitz and Alfred Menezes",
  title =        "The Brave New World of Bodacious Assumptions in
                 Cryptography",
  journal =      j-NAMS,
  volume =       "57",
  number =       "3",
  pages =        "357--365",
  month =        mar,
  year =         "2010",
  CODEN =        "AMNOAN",
  ISSN =         "0002-9920 (print), 1088-9477 (electronic)",
  ISSN-L =       "0002-9920",
  bibdate =      "Mon Feb 22 15:35:29 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.ams.org/notices/201003/",
  acknowledgement = ack-nhfb,
  fjournal =     "Notices of the American Mathematical Society",
  journal-URL =  "http://www.ams.org/notices/",
}

@Article{Koblitz:2010:BRB,
  author =       "Neal Koblitz",
  title =        "Book Review: {{\booktitle{Decrypted Secrets: Methods
                 and Maxims of Cryptology}}. Fourth Edition}",
  journal =      j-SIAM-REVIEW,
  volume =       "52",
  number =       "4",
  pages =        "777--779",
  month =        "????",
  year =         "2010",
  CODEN =        "SIREAD",
  ISSN =         "0036-1445 (print), 1095-7200 (electronic)",
  ISSN-L =       "0036-1445",
  bibdate =      "Fri Jun 21 11:25:02 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/siamreview.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "SIAM Review",
  journal-URL =  "http://epubs.siam.org/sirev",
}

@Article{Konstantinou:2010:RCI,
  author =       "Elisavet Konstantinou and Aristides Kontogeorgis",
  title =        "{Ramanujan}'s class invariants and their use in
                 elliptic curve cryptography",
  journal =      j-COMPUT-MATH-APPL,
  volume =       "59",
  number =       "8",
  pages =        "2901--2917",
  month =        apr,
  year =         "2010",
  CODEN =        "CMAPDK",
  ISSN =         "0898-1221 (print), 1873-7668 (electronic)",
  ISSN-L =       "0898-1221",
  bibdate =      "Wed Mar 1 21:50:38 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computmathappl2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0898122110001173",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers and Mathematics with Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/08981221",
}

@Article{Kramer:2010:FDC,
  author =       "Simon Kramer and Rajeev Gor{\'e} and Eiji Okamoto",
  title =        "Formal definitions and complexity results for trust
                 relations and trust domains fit for {TTPs}, the web of
                 trust, {PKIs}, and {ID}-based cryptography",
  journal =      j-SIGACT,
  volume =       "41",
  number =       "1",
  pages =        "75--98",
  month =        mar,
  year =         "2010",
  CODEN =        "SIGNDM",
  DOI =          "https://doi.org/10.1145/1753171.1753193",
  ISSN =         "0163-5700 (print), 1943-5827 (electronic)",
  ISSN-L =       "0163-5700",
  bibdate =      "Tue Mar 20 14:39:00 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib",
  abstract =     "We propose computational, declarative definitions of
                 the concepts of weak and strong trust relations between
                 interacting agents, and trust domains of trust-related
                 agents in distributed systems. Our definitions yield
                 computational complexity results for deciding potential
                 and actual trust relationships and membership in trust
                 domains. We instantiate our trust concepts in four
                 major applications of trust, namely: Trusted Third
                 Parties (TTPs), the Web of Trust, Public-Key
                 Infrastructures (PKIs), and Identity-Based
                 Cryptography. Finally, we point out computational means
                 for building trust, and by that, building up trust
                 relations and trust domains. Our defining principle for
                 weak and strong trust is (common) belief in and
                 knowledge of agent correctness, respectively",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGACT News",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J697",
}

@Article{Kumagai:2010:UGS,
  author =       "J. Kumagai",
  title =        "{UK} gets a space agency of its very own",
  journal =      j-IEEE-SPECTRUM,
  volume =       "47",
  number =       "2",
  pages =        "11--11",
  month =        feb,
  year =         "2010",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.2010.5397763",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Fri Jan 17 18:54:05 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Cryogenics; Cryptography; Europe; Magnetic cores;
                 Magnetic fields; Mirrors; Telescopes; Testing",
}

@Article{Kwon:2010:SEB,
  author =       "Taekyoung Kwon and Jin Hong",
  title =        "Secure and Efficient Broadcast Authentication in
                 Wireless Sensor Networks",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "59",
  number =       "8",
  pages =        "1120--1133",
  month =        aug,
  year =         "2010",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2009.171",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Sun Jul 3 11:52:31 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5313804",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@InProceedings{Lan:2010:RNG,
  author =       "Jingjing Lan and Wang Ling Goh and Zhi Hui Kong and
                 Kiat Seng Yeo",
  booktitle =    "{2010 International SoC Design Conference (ISOCC)}",
  title =        "A random number generator for low power cryptographic
                 application",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "328--331",
  year =         "2010",
  DOI =          "https://doi.org/10.1109/SOCDC.2010.5682906",
  bibdate =      "Fri Jan 6 07:45:38 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5682906",
  acknowledgement = ack-nhfb,
  book-URL =     "http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5678854",
}

@Book{Landau:2010:SSR,
  author =       "Susan Eva Landau",
  title =        "Surveillance or security?: {The} risks posed by new
                 wiretapping technologies",
  publisher =    pub-MIT,
  address =      pub-MIT:adr,
  pages =        "xvi + 383",
  year =         "2010",
  ISBN =         "0-262-01530-7 (hardcover),0-262-29558-X (e-book)",
  ISBN-13 =      "978-0-262-01530-1 (hardcover), 978-0-262-29558-1
                 (e-book)",
  LCCN =         "TK5102.85 .L36 2010",
  bibdate =      "Tue May 7 10:51:07 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  subject =      "Telecommunication; Security measures; United States;
                 Wiretapping; Data encryption (Computer science);
                 Government policy; Electronic surveillance; Political
                 aspects; Computer crimes; Risk assessment",
  tableofcontents = "Introduction \\
                 Communication networks and their architectures \\
                 Securing the Internet is difficult \\
                 Wiretaps and the law \\
                 The effectiveness of wiretapping \\
                 Evolving communications technologies \\
                 Who are the intruders? what are they targeting? \\
                 Security risks arising from wiretapping technology \\
                 Policy risks arising from wiretapping \\
                 Communication during crisis \\
                 Getting communications security right \\
                 Epilogue",
}

@Article{Lee:2010:CGC,
  author =       "Moon Sung Lee and Sang Geun Hahn",
  title =        "Cryptanalysis of the {GGH} Cryptosystem",
  journal =      j-MATH-COMPUT-SCI,
  volume =       "3",
  number =       "2",
  pages =        "201--208",
  month =        apr,
  year =         "2010",
  CODEN =        "????",
  ISSN =         "1661-8270 (print), 1661-8289 (electronic)",
  ISSN-L =       "1661-8270",
  bibdate =      "Sun Aug 22 09:02:18 MDT 2010",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=1661-8270&volume=3&issue=2;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=1661-8270&volume=3&issue=2&spage=201",
  abstract =     "In this correspondence, we show that partial
                 information of plaintext can be used to simplify the
                 decryption problem in the case of the GGH cryptosystem.
                 Combined with Nguyen's previous attack, we solve the
                 numerical GGH challenge of the highest dimension 400,
                 proposed on the Internet by the authors of the
                 cryptosystem. We also discuss how to avoid this
                 attack.",
  acknowledgement = ack-nhfb,
  fjournal =     "Mathematics in Computer Science",
  journal-URL =  "http://www.springerlink.com/content/1661-8270/",
}

@Article{Lee:2010:PMB,
  author =       "Hui-Lung Lee and Chia-Feng Lee and Ling-Hwei Chen",
  title =        "A perfect maze based steganographic method",
  journal =      j-J-SYST-SOFTW,
  volume =       "83",
  number =       "12",
  pages =        "2528--2535",
  month =        dec,
  year =         "2010",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212",
  ISSN-L =       "0164-1212",
  bibdate =      "Mon Nov 1 11:40:41 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Lekkas:2010:PMT,
  author =       "Dimitrios Lekkas and Dimitris Gritzalis",
  title =        "{e-Passports} as a means towards a {Globally
                 Interoperable Public Key Infrastructure}",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "3",
  pages =        "379--396",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2008-0370",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:43 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Lewand:2010:PC,
  author =       "Robert Edward Lewand",
  title =        "The perfect cipher",
  journal =      j-MATH-GAZ,
  volume =       "94",
  number =       "531",
  pages =        "401--411",
  month =        nov,
  year =         "2010",
  CODEN =        "MAGAAS",
  DOI =          "https://doi.org/10.1017/S0025557200001698",
  ISSN =         "0025-5572",
  ISSN-L =       "0025-5572",
  bibdate =      "Tue May 5 12:04:12 MDT 2015",
  bibsource =    "http://journals.cambridge.org/action/displayIssue?jid=MAG&volumeId=94&issueId=531;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/mathgaz2010.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "Math. Gaz.",
  fjournal =     "The Mathematical Gazette",
  journal-URL =  "http://journals.cambridge.org/action/displayBackIssues?jid=MAG",
}

@Article{Li:2010:AFF,
  author =       "Peng Li and Xin Yang and Kai Cao and Xunqiang Tao and
                 Ruifang Wang and Jie Tian",
  title =        "An alignment-free fingerprint cryptosystem based on
                 fuzzy vault scheme",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "33",
  number =       "3",
  pages =        "207--220",
  month =        may,
  year =         "2010",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Wed Jan 28 15:43:42 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804509001398",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Netw. Comput. Appl.",
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Li:2010:AIS,
  author =       "Feifei Li and Marios Hadjieleftheriou and George
                 Kollios and Leonid Reyzin",
  title =        "Authenticated Index Structures for Aggregation
                 Queries",
  journal =      j-TISSEC,
  volume =       "13",
  number =       "4",
  pages =        "32:1--32:??",
  month =        dec,
  year =         "2010",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/1880022.1880026",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Wed Jan 12 17:10:07 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "Query authentication is an essential component in
                 Outsourced DataBase (ODB) systems. This article
                 introduces efficient index structures for
                 authenticating aggregation queries over large datasets.
                 First, we design an index that features good
                 performance characteristics for static environments.
                 Then, we propose more involved structures for the
                 dynamic case. Our structures feature excellent
                 performance for authenticating queries with multiple
                 aggregate attributes and multiple selection predicates.
                 Furthermore, our techniques cover a large number of
                 aggregate types, including distributive aggregates
                 (such as SUM, COUNT, MIN, and MAX), algebraic
                 aggregates (such as the AVG), and holistic aggregates
                 (such as MEDIAN and QUANTILE). We have also addressed
                 the issue of authenticating aggregation queries
                 efficiently when the database is encrypted to protect
                 data confidentiality.",
  acknowledgement = ack-nhfb,
  articleno =    "32",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@Article{Li:2010:CCB,
  author =       "Jiguo Li and Xinyi Huang and Yi Mu and Willy Susilo
                 and Qianhong Wu",
  title =        "Constructions of certificate-based signature secure
                 against key replacement attacks",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "3",
  pages =        "421--449",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0366",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:43 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Li:2010:DCY,
  author =       "Chengqing Li and Shujun Li and Kwok-Tung Lo and
                 Kyandoghere Kyamakya",
  title =        "A differential cryptanalysis of {Yen--Chen--Wu}
                 multimedia cryptography system",
  journal =      j-J-SYST-SOFTW,
  volume =       "83",
  number =       "8",
  pages =        "1443--1452",
  month =        aug,
  year =         "2010",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212",
  ISSN-L =       "0164-1212",
  bibdate =      "Tue Sep 7 07:27:06 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Li:2010:EBB,
  author =       "Chun-Ta Li and Min-Shiang Hwang",
  title =        "An efficient biometrics-based remote user
                 authentication scheme using smart cards",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "33",
  number =       "1",
  pages =        "1--5",
  month =        jan,
  year =         "2010",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Wed Jan 28 15:43:38 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804509001192",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Netw. Comput. Appl.",
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Li:2010:ESS,
  author =       "Chung Ki Li and Guomin Yang and Duncan S. Wong and
                 Xiaotie Deng and Sherman S. M. Chow",
  title =        "An efficient signcryption scheme with key privacy and
                 its extension to ring signcryption",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "3",
  pages =        "451--473",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2009-0374",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:43 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Li:2010:GCP,
  author =       "Hui Li and Chuan-Kun Wu and Jun Sun",
  title =        "A general compiler for password-authenticated group
                 key exchange protocol",
  journal =      j-INFO-PROC-LETT,
  volume =       "110",
  number =       "4",
  pages =        "160--167",
  day =          "16",
  month =        jan,
  year =         "2010",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Thu Mar 31 12:46:30 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@InProceedings{Li:2010:PAP,
  author =       "Mengdong Li",
  title =        "Preimage awareness proofs of two compression
                 functions",
  crossref =     "Yang:2010:PII",
  pages =        "660--664",
  month =        dec,
  year =         "2010",
  DOI =          "https://doi.org/10.1109/ICITIS.2010.5689483",
  ISBN =         "1-4244-6942-2",
  ISBN-13 =      "978-1-4244-6942-0",
  bibdate =      "Fri Mar 13 10:55:22 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/datacompression.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  acknowledgement = ack-nhfb,
  keywords =     "collision resistance; Compression Function;
                 Cryptography; cryptography; data compression; Domain
                 extension; Games; hash function; Hash Function;
                 Merkle-Damgard paradigm; Message authentication;
                 Polynomials; PrA property; Preimage aware; preimage
                 awareness proof; PRO compression function; random
                 oracle; Resistance; security property; Transforms",
}

@Article{Li:2010:PES,
  author =       "C. H. Li and X. F. Zhang and H. Jin and W. Xiang",
  title =        "{E}-passport {EAC} scheme based on {Identity-Based
                 Cryptography}",
  journal =      j-INFO-PROC-LETT,
  volume =       "111",
  number =       "1",
  pages =        "26--30",
  day =          "15",
  month =        dec,
  year =         "2010",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Thu Mar 31 12:46:51 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Liao:2010:MPC,
  author =       "Xin Liao and Qiao-yan Wen and Ying Sun and Jie Zhang",
  title =        "Multi-party covert communication with steganography
                 and quantum secret sharing",
  journal =      j-J-SYST-SOFTW,
  volume =       "83",
  number =       "10",
  pages =        "1801--1804",
  month =        oct,
  year =         "2010",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212",
  ISSN-L =       "0164-1212",
  bibdate =      "Tue Sep 7 07:27:06 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Libert:2010:KES,
  author =       "Beno{\^\i}t Libert and Jean-Jacques Quisquater and
                 Moti Yung",
  title =        "Key Evolution Systems in Untrusted Update
                 Environments",
  journal =      j-TISSEC,
  volume =       "13",
  number =       "4",
  pages =        "37:1--37:??",
  month =        dec,
  year =         "2010",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/1880022.1880031",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Wed Jan 12 17:10:07 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "Forward-Secure Signatures (FSS) prevent forgeries for
                 past time periods when an attacker obtains full access
                 to the signer's storage by evolving the private key in
                 a one-way fashion. To simplify the integration of these
                 primitives into standard security architectures, Boyen
                 et al. [2006] recently introduced the concept of
                 forward-secure signatures with untrusted updates where
                 private keys are additionally protected by a second
                 factor (derived from a password). Key updates can be
                 made on encrypted version of signing keys so that
                 passwords only come into play for signing messages and
                 not at update time (since update is not user-driven).
                 The scheme put forth by Boyen et al.",
  acknowledgement = ack-nhfb,
  articleno =    "37",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@Article{Lima:2010:PKE,
  author =       "J. B. Lima and D. Panario and R. M. Campello de
                 Souza",
  title =        "Public-key encryption based on {Chebyshev} polynomials
                 over {$ \mathrm {GF}(q) $}",
  journal =      j-INFO-PROC-LETT,
  volume =       "111",
  number =       "2",
  pages =        "51--56",
  day =          "31",
  month =        dec,
  year =         "2010",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Thu Mar 31 12:46:52 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Lin:2010:DSM,
  author =       "Dai-Rui Lin and Chih-I Wang and Zhi-Kai Zhang and D.
                 J. Guan",
  title =        "A digital signature with multiple subliminal channels
                 and its applications",
  journal =      j-COMPUT-MATH-APPL,
  volume =       "60",
  number =       "2",
  pages =        "276--284",
  month =        jul,
  year =         "2010",
  CODEN =        "CMAPDK",
  ISSN =         "0898-1221 (print), 1873-7668 (electronic)",
  ISSN-L =       "0898-1221",
  bibdate =      "Wed Mar 1 21:50:41 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computmathappl2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S089812211000012X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers and Mathematics with Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/08981221",
}

@Article{Liu:2010:CIE,
  author =       "Hongjun Liu and Xingyuan Wang",
  title =        "Color image encryption based on one-time keys and
                 robust chaotic maps",
  journal =      j-COMPUT-MATH-APPL,
  volume =       "59",
  number =       "10",
  pages =        "3320--3327",
  month =        may,
  year =         "2010",
  CODEN =        "CMAPDK",
  ISSN =         "0898-1221 (print), 1873-7668 (electronic)",
  ISSN-L =       "0898-1221",
  bibdate =      "Wed Mar 1 21:50:33 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computmathappl2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0898122110001938",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers and Mathematics with Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/08981221",
}

@Article{Liu:2010:NDC,
  author =       "Feng Liu and ChuanKun Wu and XiJun Lin",
  title =        "A new definition of the contrast of visual
                 cryptography scheme",
  journal =      j-INFO-PROC-LETT,
  volume =       "110",
  number =       "7",
  pages =        "241--246",
  day =          "1",
  month =        mar,
  year =         "2010",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Thu Mar 31 12:46:33 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Liu:2010:SET,
  author =       "Feng Liu and ChuanKun Wu and XiJun Lin",
  title =        "Some Extensions on Threshold Visual Cryptography
                 Schemes",
  journal =      j-COMP-J,
  volume =       "53",
  number =       "1",
  pages =        "107--119",
  month =        jan,
  year =         "2010",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxn072",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Wed Apr 28 14:33:36 MDT 2010",
  bibsource =    "http://comjnl.oxfordjournals.org/content/vol53/issue1/index.dtl;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/cgi/content/abstract/53/1/107;
                 http://comjnl.oxfordjournals.org/cgi/reprint/53/1/107",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Liu:2010:SVE,
  author =       "Fuwen Liu and Hartmut Koenig",
  title =        "A survey of video encryption algorithms",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "1",
  pages =        "3--15",
  month =        feb,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:19 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000698",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lou:2010:NAS,
  author =       "Der-Chyuan Lou and Nan-I Wu and Chung-Ming Wang and
                 Zong-Han Lin and Chwei-Shyong Tsai",
  title =        "A novel adaptive steganography based on local
                 complexity and human vision sensitivity",
  journal =      j-J-SYST-SOFTW,
  volume =       "83",
  number =       "7",
  pages =        "1236--1248",
  month =        jul,
  year =         "2010",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212",
  ISSN-L =       "0164-1212",
  bibdate =      "Tue Sep 7 07:27:06 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Lu:2010:MSC,
  author =       "H. Karen Lu and Asad M. Ali",
  title =        "Making Smart Cards Truly Portable",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "2",
  pages =        "28--34",
  month =        mar # "\slash " # apr,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.56",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu May 13 09:49:48 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Lubacz:2010:VI,
  author =       "J. Lubacz and W. Mazurczyk and K. Szczypiorski",
  title =        "Vice over {IP}",
  journal =      j-IEEE-SPECTRUM,
  volume =       "47",
  number =       "2",
  pages =        "42--47",
  month =        feb,
  year =         "2010",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.2010.5397787",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Fri Jan 17 18:54:05 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Android VoIP-enabled mobile phones; Communication
                 networks; contemporary communication networks; Counting
                 circuits; Internet telephony; Law; Legal factors;
                 Mobile handsets; Portable computers; Privacy;
                 Protection; steganography; Steganography",
}

@Article{Lucchese:2010:RPT,
  author =       "Claudio Lucchese and Michail Vlachos and Deepak Rajan
                 and Philip S. Yu",
  title =        "Rights protection of trajectory datasets with
                 nearest-neighbor preservation",
  journal =      j-VLDB-J,
  volume =       "19",
  number =       "4",
  pages =        "531--556",
  month =        aug,
  year =         "2010",
  CODEN =        "VLDBFR",
  DOI =          "https://doi.org/10.1007/s00778-010-0178-6",
  ISSN =         "1066-8888 (print), 0949-877X (electronic)",
  ISSN-L =       "1066-8888",
  bibdate =      "Wed Aug 18 12:06:22 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "Companies frequently outsource datasets to mining
                 firms, and academic institutions create repositories or
                 share datasets in the interest of promoting research
                 collaboration. Still, many practitioners have
                 reservations about sharing or outsourcing datasets,
                 primarily because of fear of losing the principal
                 rights over the dataset. This work presents a way of
                 convincingly claiming ownership rights over a
                 trajectory dataset, without, at the same time,
                 destroying the salient dataset characteristics, which
                 are important for accurate search operations and
                 data-mining tasks. The digital watermarking methodology
                 that we present distorts imperceptibly a collection of
                 sequences, effectively embedding a secret key, while
                 retaining as well as possible the neighborhood of each
                 object, which is vital for operations such as
                 similarity search, classification, or clustering. A key
                 contribution in this methodology is a technique for
                 discovering the maximum distortion that still maintains
                 such desirable properties. We demonstrate both
                 analytically and empirically that the proposed dataset
                 marking techniques can withstand a number of attacks
                 (such a translation, rotation, noise addition, etc) and
                 therefore can provide a robust framework for
                 facilitating the secure dissemination of trajectory
                 datasets.",
  acknowledgement = ack-nhfb,
  fjournal =     "VLDB Journal: Very Large Data Bases",
  journal-URL =  "http://portal.acm.org/toc.cfm?id=J869",
  keywords =     "Nearest neighbors; Rights protection; Time-series;
                 Trajectories; Watermarking",
}

@Article{Lysyanskaya:2010:AEC,
  author =       "Anna Lysyanskaya and Roberto Tamassia and Nikos
                 Triandopoulos",
  title =        "Authenticated error-correcting codes with applications
                 to multicast authentication",
  journal =      j-TISSEC,
  volume =       "13",
  number =       "2",
  pages =        "17:1--17:??",
  month =        feb,
  year =         "2010",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/1698750.1698757",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Tue Mar 16 10:18:15 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  articleno =    "17",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@Article{Mancillas-Lopez:2010:RHI,
  author =       "C. Mancillas-Lopez and D. Chakraborty and F. Rodriguez
                 Henriquez",
  title =        "Reconfigurable Hardware Implementations of Tweakable
                 Enciphering Schemes",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "59",
  number =       "11",
  pages =        "1547--1561",
  month =        nov,
  year =         "2010",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2010.64",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Sun Jul 3 11:52:33 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5432161",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Marmol:2010:TPA,
  author =       "F{\'e}lix G{\'o}mez M{\'a}rmol and Joao Girao and
                 Gregorio Mart{\'\i}nez P{\'e}rez",
  title =        "{TRIMS}, a privacy-aware trust and reputation model
                 for identity management systems",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "54",
  number =       "16",
  pages =        "2899--2912",
  day =          "15",
  month =        nov,
  year =         "2010",
  CODEN =        "????",
  ISSN =         "1389-1286",
  ISSN-L =       "1389-1286",
  bibdate =      "Sat Apr 2 08:42:41 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/13891286",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286",
}

@Article{Martin:2010:FWL,
  author =       "Douglas Martin",
  title =        "{Frank W. Lewis}, Master of the Cryptic Crossword,
                 Dies at 98",
  journal =      j-NY-TIMES,
  volume =       "??",
  number =       "??",
  pages =        "??",
  day =          "3",
  month =        dec,
  year =         "2010",
  CODEN =        "NYTIAO",
  ISSN =         "0362-4331 (print), 1542-667X, 1553-8095",
  ISSN-L =       "0362-4331",
  bibdate =      "Sun Dec 31 07:36:16 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "New York Times",
  journal-URL =  "http://www.nytimes.com/",
}

@Article{Martin:2010:PCC,
  author =       "Luther Martin",
  title =        "Protecting credit card information: encryption vs
                 tokenisation",
  journal =      j-NETWORK-SECURITY,
  volume =       "2010",
  number =       "6",
  pages =        "17--19",
  month =        jun,
  year =         "2010",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(10)70084-2",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 17:00:18 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485810700842",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Martin:2010:XMA,
  author =       "Luther Martin",
  title =        "{XTS}: a Mode of {AES} for Encrypting Hard Disks",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "3",
  pages =        "68--69",
  month =        may # "\slash " # jun,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.111",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 26 15:44:06 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
}

@Article{Marton:2010:RDC,
  author =       "Kinga Marton and Alin Suciu and Iosif Ignat",
  title =        "Randomness in Digital Cryptography: a Survey",
  journal =      "Romanian Journal of Information Science and
                 Technology",
  volume =       "13",
  number =       "3",
  pages =        "219--240",
  month =        "????",
  year =         "2010",
  CODEN =        "????",
  ISSN =         "1453-8245",
  ISSN-L =       "1453-8245",
  bibdate =      "Tue Jan 31 15:21:48 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http:www.imt.ro/romjist/Volum13/Number13_3/pdf/KMarton.pdf",
  acknowledgement = ack-nhfb,
  ajournal =     "Rom. J. Inf. Sci. Technol.",
}

@Book{McKay:2010:SLB,
  author =       "Sinclair McKay",
  title =        "The secret life of {Bletchley Park}: the history of
                 the wartime codebreaking centre by the men and women
                 who were there",
  publisher =    "Aurum",
  address =      "London, UK",
  pages =        "vi + 336 + 8",
  year =         "2010",
  ISBN =         "1-84513-539-3 (hardcover)",
  ISBN-13 =      "978-1-84513-539-3 (hardcover)",
  LCCN =         "D810.C88 M35 2010x",
  bibdate =      "Thu May 12 11:15:08 MDT 2011",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "Bletchley Park was where one of the war's most famous
                 and crucial achievements was made: the cracking of
                 Germany's ``Enigma'' code in which its most important
                 military communications were couched. This country
                 house in the Buckinghamshire countryside was home to
                 Britain's most brilliant mathematical brains, like Alan
                 Turing, and the scene of immense advances in technology
                 --- indeed, the birth of modern computing. The military
                 codes deciphered there were instrumental in turning
                 both the Battle of the Atlantic and the war in North
                 Africa. But, though plenty has been written about the
                 boffins, and the codebreaking, fictional and
                 non-fiction --- from Robert Harris and Ian McEwan to
                 Andrew Hodges' biography of Turing --- what of the
                 thousands of men and women who lived and worked there
                 during the war? What was life like for them --- an odd,
                 secret territory between the civilian and the military?
                 Sinclair McKay's book is the first history for the
                 general reader of life at Bletchley Park, and an
                 amazing compendium of memories from people now in their
                 eighties --- of skating on the frozen lake in the
                 grounds (a depressed Angus Wilson, the novelist, once
                 threw himself in) --- of a youthful Roy Jenkins,
                 useless at codebreaking, of the high jinks at nearby
                 accommodation hostels --- and of the implacable secrecy
                 that meant girlfriend and boyfriend working in adjacent
                 huts knew nothing about each other's work.",
  acknowledgement = ack-nhfb,
  subject =      "World War, 1939-1945; cryptography; electronic
                 intelligence; Great Britain; Bletchley Park (Milton
                 Keynes, England); History",
  tableofcontents = "Reporting for duty \\
                 1938--39: the school of codes \\
                 1939: rounding up the brightest and the best \\
                 The house and the surrounding country \\
                 1939: how do you break the unbreakable? \\
                 1939--40: the Enigma initiation \\
                 Freezing billets and outdoor loos \\
                 1940: the first glimmers of light \\
                 1940: inspiration and intensity \\
                 1940: the coming of the bombes \\
                 1940: Enigma and the Blitz \\
                 Bletchley and the class question \\
                 1941: the battle of the Atlantic \\
                 Food, booze and too much tea \\
                 1941: the wrens and their larks \\
                 1941: Bletchley and Churchill \\
                 Military or civilian? \\
                 1942: grave setbacks and internal strife \\
                 The rules of attraction \\
                 1943: a very special relationship \\
                 1943: the hazards of careless talk \\
                 Bletchley and the Russians \\
                 The cultural life of Bletchley Park \\
                 1943--44: the rise of the Colossus \\
                 1944--45: D-Day and the end of the war \\
                 1945 and after: the immediate aftermath \\
                 Bletchley's intellectual legacy \\
                 After Bletchley: the silence descends \\
                 The rescue of the Park",
}

@Article{Meiklejohn:2010:BRB,
  author =       "Sarah Meiklejohn",
  title =        "Book Review: {{\booktitle{An Introduction to
                 Mathematical Cryptography}}, by Jeffrey Hoffstein, Jill
                 Pipher, and Joseph Silverman Springer-Verlag, 2008}",
  journal =      j-SIGACT,
  volume =       "41",
  number =       "4",
  pages =        "47--50",
  month =        dec,
  year =         "2010",
  CODEN =        "SIGNDM",
  DOI =          "https://doi.org/10.1145/1907450.1907527",
  ISSN =         "0163-5700 (print), 1943-5827 (electronic)",
  ISSN-L =       "0163-5700",
  bibdate =      "Tue Mar 20 14:39:00 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib",
  note =         "See \cite{Hoffstein:2008:IMC}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGACT News",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J697",
}

@Article{Micciancio:2010:FGC,
  author =       "Daniele Micciancio",
  title =        "A first glimpse of cryptography's {Holy Grail}",
  journal =      j-CACM,
  volume =       "53",
  number =       "3",
  pages =        "96--96",
  month =        mar,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1666420.1666445",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 12 15:13:19 MDT 2010",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cacm2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Michiels:2010:OWB,
  author =       "Wil Michiels",
  title =        "Opportunities in White-Box Cryptography",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "1",
  pages =        "64--67",
  month =        jan # "\slash " # feb,
  year =         "2010",
  DOI =          "https://doi.org/10.1109/MSP.2010.44",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu May 13 09:49:48 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Midgley:2010:SEE,
  author =       "Stephen Midgley",
  title =        "The state of encryption in {Europe}: some cultural
                 comparisons",
  journal =      j-NETWORK-SECURITY,
  volume =       "2010",
  number =       "8",
  pages =        "18--19",
  month =        aug,
  year =         "2010",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(10)70107-0",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 17:00:20 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485810701070",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@InProceedings{Moghadam:2010:DRN,
  author =       "I. Zarei Moghadam and A. S. Rostami and M. R.
                 Tanhatalab",
  booktitle =    "{2010 International Conference on Computer Design and
                 Applications (ICCDA)}",
  title =        "Designing a random number generator with novel
                 parallel {LFSR} substructure for key stream ciphers",
  volume =       "5",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "V5--598--V5--601",
  year =         "2010",
  DOI =          "https://doi.org/10.1109/ICCDA.2010.5541188",
  bibdate =      "Fri Jan 6 07:45:38 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5541188",
  acknowledgement = ack-nhfb,
  book-URL =     "http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5520349",
}

@Article{Moran:2010:BCP,
  author =       "Tal Moran and Moni Naor",
  title =        "Basing cryptographic protocols on tamper-evident
                 seals",
  journal =      j-THEOR-COMP-SCI,
  volume =       "411",
  number =       "10",
  pages =        "1283--1310",
  day =          "4",
  month =        mar,
  year =         "2010",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Mon Mar 28 17:10:24 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/03043975",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{Moskowitz:2010:ITE,
  author =       "I. S. Moskowitz and F. Ahmed and P. A. Lafferty",
  title =        "Information Theoretic Effects of {JPEG} Compression on
                 Image Steganography",
  journal =      j-INT-J-COMPUT-APPL,
  volume =       "32",
  number =       "3",
  pages =        "318--327",
  year =         "2010",
  DOI =          "https://doi.org/10.2316/Journal.202.2010.3.202-2736",
  ISSN =         "1206-212X (print), 1925-7074 (electronic)",
  ISSN-L =       "1206-212X",
  bibdate =      "Sat Apr 21 17:26:37 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijca.bib",
  URL =          "https://www.tandfonline.com/doi/full/10.2316/Journal.202.2010.3.202-2736",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Computer Applications",
  journal-URL =  "https://www.tandfonline.com/loi/tjca20",
  online-date =  "11 Jul 2015",
}

@Article{Mozaffari-Kermani:2010:CSI,
  author =       "M. Mozaffari-Kermani and A. Reyhani-Masoleh",
  title =        "Concurrent Structure-Independent Fault Detection
                 Schemes for the {Advanced Encryption Standard}",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "59",
  number =       "5",
  pages =        "608--622",
  month =        may,
  year =         "2010",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2010.33",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Sun Jul 3 11:52:28 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5406504",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Mukhamedov:2010:IEP,
  author =       "Aybek Mukhamedov and Mark D. Ryan",
  title =        "Identity Escrow Protocol and Anonymity Analysis in the
                 Applied Pi-Calculus",
  journal =      j-TISSEC,
  volume =       "13",
  number =       "4",
  pages =        "41:1--41:??",
  month =        dec,
  year =         "2010",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/1880022.1880035",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Wed Jan 12 17:10:07 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "Anonymity with identity escrow attempts to allow users
                 of an online service to remain anonymous, while
                 providing the possibility that the service owner can
                 break the anonymity in exceptional circumstances, such
                 as to assist in a criminal investigation. In the
                 article, we propose an identity escrow protocol that
                 distributes user identity among several escrow agents.
                 The main feature of our scheme is it is based on
                 standard encryption algorithms and it provides user
                 anonymity even if all but one escrow holders are
                 dishonest acting in a coalition. We also present
                 analysis of the anonymity property of our protocol in
                 the applied pi-calculus.",
  acknowledgement = ack-nhfb,
  articleno =    "41",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@InProceedings{Murdoch:2010:CPB,
  author =       "Steven J. Murdoch and Saar Drimer and Ross Anderson
                 and Mike Bond",
  editor =       "{IEEE}",
  booktitle =    "{2010 IEEE Symposium on Security and Privacy, 16--19
                 May 2010, Oakland, CA, USA}",
  title =        "Chip and {PIN} is Broken",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "433--446",
  year =         "2010",
  DOI =          "https://doi.org/10.1109/SP.2010.33",
  ISBN =         "1-4244-6894-9",
  ISBN-13 =      "978-1-4244-6894-2",
  ISSN =         "1081-6011",
  LCCN =         "????",
  bibdate =      "Thu Nov 04 17:55:03 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.cl.cam.ac.uk/~sjm217/papers/oakland10chipbroken.pdf",
  abstract =     "EMV is the dominant protocol used for smart card
                 payments worldwide, with over 730 million cards in
                 circulation. Known to bank customers as ``Chip and
                 PIN'', it is used in Europe; it is being introduced in
                 Canada; and there is pressure from banks to introduce
                 it in the USA too. EMV secures credit and debit card
                 transactions by authenticating both the card and the
                 customer presenting it through a combination of
                 cryptographic authentication codes, digital signatures,
                 and the entry of a PIN. In this paper we describe and
                 demonstrate a protocol flaw which allows criminals to
                 use a genuine card to make a payment without knowing
                 the card's PIN, and to remain undetected even when the
                 merchant has an online connection to the banking
                 network. The fraudster performs a man-in-the-middle
                 attack to trick the terminal into believing the PIN
                 verified correctly, while telling the card that no PIN
                 was entered at all. The paper considers how the flaws
                 arose, why they remained unknown despite EMV's wide
                 deployment for the best part of a decade, and how they
                 might be fixed. Because we have found and validated a
                 practical attack against the core functionality of EMV,
                 we conclude that the protocol is broken. This failure
                 is significant in the field of protocol design, and
                 also has important public policy implications, in light
                 of growing reports of fraud on stolen EMV cards.
                 Frequently, banks deny such fraud victims a refund,
                 asserting that a card cannot be used without the
                 correct PIN, and concluding that the customer must be
                 grossly negligent or lying. Our attack can explain a
                 number of these cases, and exposes the need for further
                 research to bridge the gap between the theoretical and
                 practical security of bank payment systems. It also
                 demonstrates the need for the next version of EMV to be
                 engineered properly.",
  acknowledgement = ack-nhfb,
  keywords =     "authentication; bank security; card fraud; Chip and
                 PIN; EMV; protocol failure; security economics",
}

@Article{Murphy:2010:BRB,
  author =       "Cillian Murphy",
  title =        "Book Review: {{\booktitle{Introduction to
                 Cryptography}}, by Hans Delfs and Helmut Knebl,
                 Publisher: Springer, 2007, ISBN 978-3-540-49243-6}",
  journal =      j-SIGACT,
  volume =       "41",
  number =       "4",
  pages =        "42--44",
  month =        dec,
  year =         "2010",
  CODEN =        "SIGNDM",
  DOI =          "https://doi.org/10.1145/1907450.1907523",
  ISSN =         "0163-5700 (print), 1943-5827 (electronic)",
  ISSN-L =       "0163-5700",
  bibdate =      "Tue Mar 20 14:39:00 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib",
  note =         "See \cite{Delfs:2002:ICP,Delfs:2007:ICP}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGACT News",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J697",
}

@Book{Naccache:2010:THI,
  author =       "David Naccache and Ahmad-Reza Sadeghi",
  title =        "Towards hardware-intrinsic security: foundations and
                 practice",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xvi + 407",
  year =         "2010",
  ISBN =         "3-642-14451-9, 3-642-14452-7",
  ISBN-13 =      "978-3-642-14451-6, 978-3-642-14452-3",
  LCCN =         "????",
  bibdate =      "Sat Jun 10 08:35:11 MDT 2017",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  series =       "Information Security and Cryptography",
  acknowledgement = ack-nhfb,
  tableofcontents = "Physically Unclonable Functions (PUFs) Physically
                 Unclonable Functions: A Study on the State of the Art
                 and Future Research Directions / 3 \\
                 Hardware Intrinsic Security from Physically Unclonable
                 Functions / 39 \\
                 From Statistics to Circuits: Foundations for Future
                 Physical Unclonable Functions / 55 \\
                 Strong PUFs: Models, Constructions, and Security Proofs
                 / 79 \\
                 Hardware-Based Cryptography Leakage Resilient
                 Cryptography in Practice / 99 \\
                 Memory Leakage-Resilient Encryption Based on Physically
                 Unclonable Functions / 135 \\
                 Hardware Attacks Hardware Trojan Horses / 167 \\
                 Extracting Unknown Keys from Unknown Algorithms
                 Encrypting Unknown Fixed Messages and Returning No
                 Results / 189 \\
                 Hardware-Based Policy Enforcement License Distribution
                 Protocols from Optical Media Fingerprints / 201 \\
                 And-counterfeiting: Mixing the Physical and the Digital
                 World / 223 \\
                 Hardware Security in Contactless Tokens
                 Anti-counterfeiting, Untraceability and Other Security
                 Challenges for RFID Systems: Public-Key-Based Protocols
                 and Hardware / 237 \\
                 Contactless Security Token Enhanced Security by Using
                 New Hardware Features in Cryptographic-Based Security
                 Mechanisms / 259 \\
                 Enhancing RFID Security and Privacy by Physically
                 Unclonable Functions / 281 \\
                 Hardware-Based Security Architectures and Applications
                 Authentication of Processor Hardware Leveraging
                 Performance Limits in Detailed Simulations and
                 Emulations / 309 \\
                 Signal Authentication in Trusted Satellite Navigation
                 Receivers / 331 \\
                 On the Limits of Hypervisor- and Virtual Machine
                 Monitor-Based Isolation / 349 \\
                 Efficient Secure Two-Party Computation with Untrusted
                 Hardware Tokens / 367 \\
                 Towards Reliable Remote Healthcare Applications Using
                 Combined Fuzzy Extraction / 387",
}

@Article{Nagy:2010:KDV,
  author =       "Naya Nagy and Marius Nagy and Selim G. Akl",
  title =        "Key Distribution Versus Key Enhancement in Quantum
                 Cryptography",
  journal =      j-PARALLEL-PROCESS-LETT,
  volume =       "20",
  number =       "3",
  pages =        "239--250",
  month =        sep,
  year =         "2010",
  CODEN =        "PPLTEE",
  DOI =          "https://doi.org/10.1142/S0129626410000193",
  ISSN =         "0129-6264",
  bibdate =      "Tue Feb 28 11:32:04 MST 2012",
  bibsource =    "http://ejournals.wspc.com.sg/ppl/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/parallelprocesslett.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Parallel Processing Letters",
  journal-URL =  "http://www.worldscientific.com/loi/ppl",
}

@Article{Nagy:2010:OTP,
  author =       "Naya Nagy and Selim G. Akl",
  title =        "One-Time Pads Without Prior Encounter",
  journal =      j-PARALLEL-PROCESS-LETT,
  volume =       "20",
  number =       "3",
  pages =        "263--273",
  month =        sep,
  year =         "2010",
  CODEN =        "PPLTEE",
  DOI =          "https://doi.org/10.1142/S0129626410000211",
  ISSN =         "0129-6264",
  bibdate =      "Tue Feb 28 11:32:04 MST 2012",
  bibsource =    "http://ejournals.wspc.com.sg/ppl/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/parallelprocesslett.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Parallel Processing Letters",
  journal-URL =  "http://www.worldscientific.com/loi/ppl",
}

@Article{Nagy:2010:QCS,
  author =       "Naya Nagy and Selim G. Akl",
  title =        "A Quantum Cryptographic Solution to the Problem of
                 Access Control in a Hierarchy",
  journal =      j-PARALLEL-PROCESS-LETT,
  volume =       "20",
  number =       "3",
  pages =        "251--261",
  month =        sep,
  year =         "2010",
  CODEN =        "PPLTEE",
  DOI =          "https://doi.org/10.1142/S012962641000020X",
  ISSN =         "0129-6264",
  bibdate =      "Tue Feb 28 11:32:04 MST 2012",
  bibsource =    "http://ejournals.wspc.com.sg/ppl/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/parallelprocesslett.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Parallel Processing Letters",
  journal-URL =  "http://www.worldscientific.com/loi/ppl",
}

@InProceedings{Navin:2010:ETU,
  author =       "A. H. Navin and Z. Navadad and B. Aasadi and M.
                 Mirnia",
  booktitle =    "{2010 International Conference on Computational
                 Intelligence and Communication Networks (CICN)}",
  title =        "Encrypted Tag by Using Data-Oriented Random Number
                 Generator to Increase Security in Wireless Sensor
                 Network",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "335--338",
  year =         "2010",
  DOI =          "https://doi.org/10.1109/CICN.2010.75",
  bibdate =      "Fri Jan 6 07:45:38 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5701989",
  acknowledgement = ack-nhfb,
  book-URL =     "http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5701810",
}

@Article{Nikooghadam:2010:EUE,
  author =       "Morteza Nikooghadam and Ali Zakerolhosseini and Mohsen
                 Ebrahimi Moghaddam",
  title =        "Efficient utilization of elliptic curve cryptosystem
                 for hierarchical access control",
  journal =      j-J-SYST-SOFTW,
  volume =       "83",
  number =       "10",
  pages =        "1917--1929",
  month =        oct,
  year =         "2010",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212",
  ISSN-L =       "0164-1212",
  bibdate =      "Tue Sep 7 07:27:06 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Book{Novotny:2010:TAE,
  author =       "Martin Novotny",
  title =        "Time-area efficient hardware architectures for
                 cryptography and cryptanalysis",
  volume =       "12",
  publisher =    "Europ{\"a}ischer Universit{\"a}tsverlag",
  address =      "Bochum, Germany",
  pages =        "xxvi + 194",
  year =         "2010",
  ISBN =         "3-89966-351-9",
  ISBN-13 =      "978-3-89966-351-8",
  LCCN =         "????",
  bibdate =      "Fri May 13 07:27:27 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  series =       "IT-Security",
  acknowledgement = ack-nhfb,
}

@Article{Ntantogian:2010:GME,
  author =       "Christoforos Ntantogian and Christos Xenakis and
                 Ioannis Stavrakakis",
  title =        "A generic mechanism for efficient authentication in
                 B3G networks",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "4",
  pages =        "460--475",
  month =        jun,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:20 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809001242",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ogiela:2010:UML,
  author =       "Marek R. Ogiela and Urszula Ogiela",
  title =        "The use of mathematical linguistic methods in creating
                 secret sharing threshold algorithms",
  journal =      j-COMPUT-MATH-APPL,
  volume =       "60",
  number =       "2",
  pages =        "267--271",
  month =        jul,
  year =         "2010",
  CODEN =        "CMAPDK",
  ISSN =         "0898-1221 (print), 1873-7668 (electronic)",
  ISSN-L =       "0898-1221",
  bibdate =      "Wed Mar 1 21:50:41 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computmathappl2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0898122110001379",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers and Mathematics with Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/08981221",
}

@Article{Otmani:2010:CTM,
  author =       "Ayoub Otmani and Jean-Pierre Tillich and L{\'e}onard
                 Dallot",
  title =        "Cryptanalysis of Two {McEliece} Cryptosystems Based on
                 Quasi-Cyclic Codes",
  journal =      j-MATH-COMPUT-SCI,
  volume =       "3",
  number =       "2",
  pages =        "129--140",
  month =        apr,
  year =         "2010",
  CODEN =        "????",
  ISSN =         "1661-8270 (print), 1661-8289 (electronic)",
  ISSN-L =       "1661-8270",
  bibdate =      "Sun Aug 22 09:02:18 MDT 2010",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=1661-8270&volume=3&issue=2;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=1661-8270&volume=3&issue=2&spage=129",
  abstract =     "We cryptanalyse here two variants of the McEliece
                 cryptosystem based on quasi-cyclic codes. Both aim at
                 reducing the key size by restricting the public and
                 secret generator matrices to be in quasi-cyclic form.
                 The first variant considers subcodes of a primitive BCH
                 code. The aforementioned constraint on the public and
                 secret keys implies to choose very structured
                 permutations. We prove that this variant is not secure
                 by producing many linear equations that the entries of
                 the secret permutation matrix have to satisfy by using
                 the fact that the secret code is a subcode of a known
                 BCH code. This attack has been implemented and in all
                 experiments we have performed the solution space of the
                 linear system was of dimension one and revealed the
                 permutation matrix. The other variant uses quasi-cyclic
                 low density parity-check (LDPC) codes. This scheme was
                 devised to be immune against general attacks working
                 for McEliece type cryptosystems based on LDPC codes by
                 choosing in the McEliece scheme more general one-to-one
                 mappings than permutation matrices. We suggest here a
                 structural attack exploiting the quasi-cyclic structure
                 of the code and a certain weakness in the choice of the
                 linear transformations that hide the generator matrix
                 of the code. This cryptanalysis adopts a
                 polynomial-oriented approach and basically consists in
                 searching for two polynomials of low weight such that
                 their product is a public polynomial. Our analysis
                 shows that with high probability a parity-check matrix
                 of a punctured version of the secret code can be
                 recovered with time complexity O(n 3) where n is the
                 length of the considered code. The complete
                 reconstruction of the secret parity-check matrix of the
                 quasi-cyclic LDPC codes requires the search of
                 codewords of low weight which can be done with about $
                 2^{37} $ operations for the specific parameters
                 proposed.",
  acknowledgement = ack-nhfb,
  fjournal =     "Mathematics in Computer Science",
  journal-URL =  "http://www.springerlink.com/content/1661-8270/",
}

@Article{Ou:2010:CPA,
  author =       "Hsia-Hung Ou and Min-Shiang Hwang and Jinn-Ke Jan",
  title =        "A cocktail protocol with the {Authentication} and {Key
                 Agreement} on the {UMTS}",
  journal =      j-J-SYST-SOFTW,
  volume =       "83",
  number =       "2",
  pages =        "316--325",
  month =        feb,
  year =         "2010",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212",
  ISSN-L =       "0164-1212",
  bibdate =      "Tue Sep 7 07:27:05 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Book{Paar:2010:UCT,
  author =       "Christof Paar and Jan Pelzl",
  title =        "Understanding Cryptography: a Textbook for Students
                 and Practitioners",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xviii + 372",
  year =         "2010",
  ISBN =         "3-642-04100-0 (hardcover), 3-642-04101-9 (ebk.)",
  ISBN-13 =      "978-3-642-04100-6 (hardcover), 978-3-642-04101-3
                 (ebk.)",
  LCCN =         "Z104 .P33 2010",
  bibdate =      "Wed Dec 26 10:04:43 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  remark =       "Forward by Bart Preneel.",
  subject =      "cryptography; mathematics; data encryption (computer
                 science)",
}

@Article{Papadopoulos:2010:CAR,
  author =       "Stavros Papadopoulos and Yin Yang and Dimitris
                 Papadias",
  title =        "Continuous authentication on relational streams",
  journal =      j-VLDB-J,
  volume =       "19",
  number =       "2",
  pages =        "161--180",
  month =        apr,
  year =         "2010",
  CODEN =        "VLDBFR",
  DOI =          "https://doi.org/10.1007/s00778-009-0145-2",
  ISSN =         "1066-8888 (print), 0949-877X (electronic)",
  ISSN-L =       "1066-8888",
  bibdate =      "Wed Apr 21 16:41:50 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "According to the database outsourcing model, a data
                 owner delegates database functionality to a third-party
                 service provider, which answers queries received from
                 clients. Authenticated query processing enables the
                 clients to verify the correctness of query results.
                 Despite the abundance of methods for authenticated
                 processing in conventional databases, there is limited
                 work on outsourced data streams. Stream environments
                 pose new challenges such as the need for fast structure
                 updating, support for continuous query processing and
                 authentication, and provision for temporal
                 completeness. Specifically, in addition to the
                 correctness of individual results, the client must be
                 able to verify that there are no missing results in
                 between data updates. This paper presents a
                 comprehensive set of methods covering relational
                 streams. We first describe REF, a technique that
                 achieves correctness and temporal completeness but
                 incurs false transmissions, i.e., the provider has to
                 inform the clients whenever there is a data update,
                 even if their results are not affected. Then, we
                 propose CADS, which minimizes the processing and
                 transmission overhead through an elaborate indexing
                 scheme and a virtual caching mechanism. In addition, we
                 present an analytical study to determine the optimal
                 indexing granularity, and extend CADS for the case that
                 the data distribution changes over time. Finally, we
                 evaluate the effectiveness of our techniques through
                 extensive experiments.",
  acknowledgement = ack-nhfb,
  fjournal =     "VLDB Journal: Very Large Data Bases",
  journal-URL =  "http://portal.acm.org/toc.cfm?id=J869",
  keywords =     "Authentication; Continuous monitoring; Data streams;
                 Database outsourcing",
}

@Article{Papadopoulos:2010:TRM,
  author =       "Konstantinos Papadopoulos and Ioannis Papaefstathiou",
  title =        "{Titan-R}: a Multigigabit Reconfigurable Combined
                 Compression\slash Decompression Unit",
  journal =      j-TRETS,
  volume =       "3",
  number =       "2",
  pages =        "7:1--7:??",
  month =        may,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1754386.1754388",
  ISSN =         "1936-7406 (print), 1936-7414 (electronic)",
  ISSN-L =       "1936-7406",
  bibdate =      "Tue Jun 22 16:00:33 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "Data compression techniques can alleviate bandwidth
                 problems in even multigigabit networks and are
                 especially useful when combined with encryption. This
                 article demonstrates a reconfigurable hardware
                 compressor/decompressor core, the Titan-R, which can
                 compress/decompress data streams at 8.5 Gb/sec, making
                 it the fastest reconfigurable such device ever
                 proposed; the presented full-duplex implementation
                 allows for fully symmetric compression and
                 decompression rates at 8.5 Gbps each. Its compression
                 algorithm is a variation of the most widely used and
                 efficient such scheme, the Lempel--Ziv (LZ) algorithm
                 that uses part of the previous input stream as the
                 dictionary. In order to support this high network
                 throughput, the Titan-R utilizes a very fine-grained
                 pipeline and takes advantage of the high bandwidth
                 provided by the distributed on-chip RAMs of
                 state-of-the-art FPGAs.",
  acknowledgement = ack-nhfb,
  articleno =    "7",
  fjournal =     "ACM Transactions on Reconfigurable Technology and
                 Systems (TRETS)",
  journal-URL =  "http://portal.acm.org/toc.cfm?id=J1151",
  keywords =     "data compression; FPGA; hardware algorithms;
                 networking; parallel processing; reconfigurable
                 computing; Stream processing",
}

@Article{Park:2010:SIC,
  author =       "Jong Hyuk Park and Sajid Hussain and Guilin Wang and
                 Yi Mu",
  title =        "Special issue of computers and mathematics with
                 applications on {``Advances in cryptography, security
                 and applications for future computer science''}",
  journal =      j-COMPUT-MATH-APPL,
  volume =       "60",
  number =       "2",
  pages =        "175--175",
  month =        jul,
  year =         "2010",
  CODEN =        "CMAPDK",
  ISSN =         "0898-1221 (print), 1873-7668 (electronic)",
  ISSN-L =       "0898-1221",
  bibdate =      "Wed Mar 1 21:50:41 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computmathappl2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0898122110002695",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers and Mathematics with Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/08981221",
}

@Article{Paulson:2010:SDO,
  author =       "Linda Dailey Paulson",
  title =        "Steganography Development Offers Promise",
  journal =      j-COMPUTER,
  volume =       "43",
  number =       "6",
  pages =        "18--21",
  month =        jun,
  year =         "2010",
  CODEN =        "CPTRB4",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Wed Jun 23 19:08:58 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
}

@Article{Peng:2010:IWM,
  author =       "Hong Peng and Jun Wang and Weixing Wang",
  title =        "Image watermarking method in multiwavelet domain based
                 on support vector machines",
  journal =      j-J-SYST-SOFTW,
  volume =       "83",
  number =       "8",
  pages =        "1470--1477",
  month =        aug,
  year =         "2010",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212",
  ISSN-L =       "0164-1212",
  bibdate =      "Tue Sep 7 07:27:06 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Peng:2010:SFW,
  author =       "Fei Peng and Re-Si Guo and Chang-Tsun Li and Min
                 Long",
  title =        "A semi-fragile watermarking algorithm for
                 authenticating {$2$D} {CAD} engineering graphics based
                 on log-polar transformation",
  journal =      j-COMPUT-AIDED-DES,
  volume =       "42",
  number =       "12",
  pages =        "1207--1216",
  year =         "2010",
  CODEN =        "CAIDA5",
  DOI =          "https://doi.org/10.1016/j.cad.2010.08.004",
  ISSN =         "0010-4485 (print), 1879-2685 (electronic)",
  ISSN-L =       "0010-4485",
  bibdate =      "Wed Jan 28 10:08:12 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/benfords-law.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0010448510001491",
  abstract =     "Copyright violation and illegal manipulation of
                 digital data have been acute challenges for many
                 sectors since the very same set of enabling techniques
                 for generating and processing digital data started to
                 emerge. Although traditional protective methods, such
                 as encryption and digital signatures, have been in use
                 for decades, their inability to provide protection
                 after decryption and locating tampering has prompted
                 the development of digital watermarking. In this paper,
                 a semi-fragile watermarking algorithm for
                 authenticating 2D {CAD} engineering graphics based on
                 log-polar coordinate mapping is proposed. Firstly, the
                 vertices are divided into groups, and for each group,
                 the vertices for carrying a watermark are mapped to the
                 log-polar coordinate system. Then the watermark is
                 embedded in the mantissa of the real-valued log-polar
                 coordinates via bit substitution. Theoretical analysis
                 and experimental results show that the proposed
                 algorithm is not only robust against incidental global
                 operations such as rotation, translation and scaling,
                 but can also detect and locate malicious attacks such
                 as entity modification and entity addition/deletion.",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer-Aided Design",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00104485",
  keywords =     "Benford's Law; Content authentication; Data hiding;
                 Engineering graphics; Integrity verification;
                 Semi-fragile watermarking",
}

@InProceedings{Peris-Lopez:2010:CSP,
  author =       "Pedro Peris-Lopez and Enrique {San Mill{\'a}n} and Jan
                 C. A. van der Lubbe and Luis A. Entrena",
  booktitle =    "{2010 International Conference for Internet Technology
                 and Secured Transactions (ICITST)}",
  title =        "Cryptographically secure pseudo-random bit generator
                 for {RFID} tags",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "1--6",
  year =         "2010",
  bibdate =      "Fri Jan 6 07:45:38 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5678035",
  acknowledgement = ack-nhfb,
  book-URL =     "http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5672505",
}

@Article{Pfleeger:2010:CJD,
  author =       "Charles P. Pfleeger",
  title =        "Crypto: Not Just for the Defensive Team",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "2",
  pages =        "63--66",
  month =        mar # "\slash " # apr,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.65",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu May 13 09:49:48 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Poursakidis:2010:TPC,
  author =       "V. Poursakidis and C. Nikolaou",
  title =        "Towards a person-centric {Identity Management
                 Infrastructure (IMI)}",
  journal =      j-INT-J-COMPUT-SYST-SCI-ENG,
  volume =       "25",
  number =       "1",
  pages =        "??--??",
  month =        jan,
  year =         "2010",
  CODEN =        "CSSEEI",
  ISSN =         "0267-6192",
  ISSN-L =       "0267-6192",
  bibdate =      "Tue Dec 3 12:04:33 MST 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsystscieng.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Computer Systems Science and
                 Engineering",
}

@Article{Praba:2010:MAC,
  author =       "V. Lakshmi Praba and G. Arumugam",
  title =        "Message authentication code algorithm for {IP-SEC}",
  journal =      j-INT-J-COMPUT-SYST-SCI-ENG,
  volume =       "25",
  number =       "5",
  pages =        "??--??",
  month =        sep,
  year =         "2010",
  CODEN =        "CSSEEI",
  ISSN =         "0267-6192",
  ISSN-L =       "0267-6192",
  bibdate =      "Tue Dec 3 12:04:33 MST 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsystscieng.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Computer Systems Science and
                 Engineering",
}

@Article{Rahaman:2010:STB,
  author =       "H. Rahaman and J. Mathew and D. K. Pradhan",
  title =        "Secure Testable {S}-box Architecture for Cryptographic
                 Hardware Implementation",
  journal =      j-COMP-J,
  volume =       "53",
  number =       "5",
  pages =        "581--591",
  month =        jun,
  year =         "2010",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxp048",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Fri May 28 17:07:25 MDT 2010",
  bibsource =    "http://comjnl.oxfordjournals.org/content/vol53/issue5/index.dtl;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/cgi/content/abstract/53/5/581;
                 http://comjnl.oxfordjournals.org/cgi/reprint/53/5/581",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Rankin:2010:HLH,
  author =       "Kyle Rankin",
  title =        "Hack and \slash: lightning hacks---{SSH} strikes
                 back",
  journal =      j-LINUX-J,
  volume =       "2010",
  number =       "195",
  pages =        "10:1--10:??",
  month =        jul,
  year =         "2010",
  CODEN =        "LIJOFX",
  ISSN =         "1075-3583 (print), 1938-3827 (electronic)",
  ISSN-L =       "1075-3583",
  bibdate =      "Tue Nov 23 11:41:55 MST 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  articleno =    "10",
  fjournal =     "Linux Journal",
  journal-URL =  "http://portal.acm.org/citation.cfm?id=J508",
}

@Article{Rao:2010:PAA,
  author =       "Rajesh P. N. Rao",
  title =        "Probabilistic Analysis of an Ancient Undeciphered
                 Script",
  journal =      j-COMPUTER,
  volume =       "43",
  number =       "4",
  pages =        "76--80",
  month =        apr,
  year =         "2010",
  CODEN =        "CPTRB4",
  DOI =          "https://doi.org/10.1109/MC.2010.112",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Wed May 12 22:57:42 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
}

@Article{Ren:2010:CSH,
  author =       "Yanli Ren and Dawu Gu",
  title =        "{CCA2} secure (hierarchical) identity-based parallel
                 key-insulated encryption without random oracles",
  journal =      j-J-SYST-SOFTW,
  volume =       "83",
  number =       "1",
  pages =        "153--162",
  month =        jan,
  year =         "2010",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212",
  ISSN-L =       "0164-1212",
  bibdate =      "Tue Sep 7 07:27:05 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Rhee:2010:TSS,
  author =       "Hyun Sook Rhee and Jong Hwan Park and Willy Susilo and
                 Dong Hoon Lee",
  title =        "Trapdoor security in a searchable public-key
                 encryption scheme with a designated tester",
  journal =      j-J-SYST-SOFTW,
  volume =       "83",
  number =       "5",
  pages =        "763--771",
  month =        may,
  year =         "2010",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212",
  ISSN-L =       "0164-1212",
  bibdate =      "Tue Sep 7 07:27:05 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@InProceedings{Ristenpart:2010:WGR,
  author =       "Thomas Ristenpart and Scott Yilek",
  title =        "When good randomness goes bad: Virtual machine reset
                 vulnerabilities and hedging deployed cryptography",
  crossref =     "Anonymous:2010:NDS",
  pages =        "??--??",
  year =         "2010",
  bibdate =      "Mon Mar 09 16:01:46 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://www.isoc.org/isoc/conferences/ndss/10/pdf/15.pdf;
                 http://www.isoc.org/isoc/conferences/ndss/10/proceedings.shtml",
  abstract =     "Random number generators (RNGs) are consistently a
                 weak link in the secure use of cryptography. Routine
                 cryptographic operations such as encryption and signing
                 can fail spectacularly given predictable or repeated
                 randomness, even when using good long-lived key
                 material. This has proved problematic in prior settings
                 when RNG implementation bugs, poor design, or
                 low-entropy sources have resulted in predictable
                 randomness. We investigate a new way in which RNGs fail
                 due to reuse of virtual machine (VM) snapshots. We
                 exhibit such VM reset vulnerabilities in widely-used
                 TLS clients and servers: the attacker takes advantage
                 of (or forces) snapshot replay to compromise sessions
                 or even expose a server's DSA signing key. Our next
                 contribution is a backwards-compatible framework for
                 hedging routine cryptographic operations against bad
                 randomness, thereby mitigating the damage due to
                 randomness failures. We apply our framework to the
                 OpenSSL library and experimentally confirm that it has
                 little overhead.",
  acknowledgement = ack-nhfb,
  pagecount =    "18",
  remark =       "Cite in \cite[reference 65]{Schneier:2015:SWC}.",
}

@Article{Roh:2010:BSW,
  author =       "Dongyoung Roh and Sang Geun Hahn",
  title =        "On the bit security of the weak {Diffie--Hellman}
                 problem",
  journal =      j-INFO-PROC-LETT,
  volume =       "110",
  number =       "18--19",
  pages =        "799--802",
  day =          "15",
  month =        sep,
  year =         "2010",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Thu Mar 31 12:46:44 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Rosen:2010:CCS,
  author =       "Alon Rosen and Gil Segev",
  title =        "Chosen-Ciphertext Security via Correlated Products",
  journal =      j-SIAM-J-COMPUT,
  volume =       "39",
  number =       "7",
  pages =        "3058--3088",
  month =        "????",
  year =         "2010",
  CODEN =        "SMJCAT",
  ISSN =         "0097-5397 (print), 1095-7111 (electronic)",
  ISSN-L =       "0097-5397",
  bibdate =      "Mon Nov 29 11:59:44 MST 2010",
  bibsource =    "http://epubs.siam.org/sam-bin/dbq/toclist/SICOMP/39/7;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "SIAM Journal on Computing",
  journal-URL =  "http://epubs.siam.org/sicomp",
}

@Book{Sadeghi:2010:THI,
  editor =       "Ahmad-Reza. Sadeghi and David Naccache",
  title =        "Towards Hardware-Intrinsic Security: Foundations and
                 Practice",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xvi + 407",
  year =         "2010",
  DOI =          "https://doi.org/10.1007/978-3-642-14452-3",
  ISBN =         "3-642-14451-9 (hardcover), 3-642-14452-7 (e-book)",
  ISBN-13 =      "978-3-642-14451-6 (hardcover), 978-3-642-14452-3
                 (e-book)",
  ISSN =         "1619-7100 (print), 2197-845X (electronic)",
  ISSN-L =       "1619-7100",
  LCCN =         "TK7887.5 .T69 2010eb",
  bibdate =      "Sat Jun 10 08:35:11 MDT 2017",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 z3950.loc.gov:7090/Voyager",
  note =         "Foreword by Pim Tuyls.",
  series =       "Information Security and Cryptography",
  URL =          "http://www.springerlink.com/content/978-3-642-14452-3",
  abstract =     "Hardware-intrinsic security is a young field dealing
                 with secure secret key storage. By generating the
                 secret keys from the intrinsic properties of the
                 silicon, e.g., from intrinsic Physical Unclonable
                 Functions (PUFs), no permanent secret key storage is
                 required anymore, and the key is only present in the
                 device for a minimal amount of time. The field is
                 extending to hardware-based security primitives and
                 protocols such as block ciphers and stream ciphers
                 entangled with the hardware, thus improving IC
                 security. While at the application level there is a
                 growing interest in hardware security for RFID systems
                 and the necessary accompanying system architectures.
                 This book brings together contributions from
                 researchers and practitioners in academia and industry,
                 an interdisciplinary group with backgrounds in physics,
                 mathematics, cryptography, coding theory and processor
                 theory. It will serve as important background material
                 for students and practitioners, and will stimulate much
                 further research and development.",
  acknowledgement = ack-nhfb,
  shorttableofcontents = "pt. 1. Physically unclonable functions (PUFs)
                 \\
                 pt. 2. Hardware-based cryptography \\
                 pt. 3. Hardware attacks \\
                 pt. 4. Hardware-based policy enforcement \\
                 pt. 5. Hardware security in contactless tokens \\
                 pt. 6. Hardware-based security architectures and
                 applications",
  subject =      "Computer science; Computer hardware; Data structures
                 (Computer science); Computer engineering; Data
                 Structures, Cryptology and Information Theory;
                 Electrical Engineering; Computer engineering; Computer
                 input-output equipment; Computer science; Data
                 structures (Computer science)",
  tableofcontents = "Part I Physically Unclonable Functions (PUFs) \\
                 Physically Unclonable Functions: A Study on the State
                 of the Art and Future Research Directions / 3 \\
                 Roel Maes and Ingrid Verbauwhede Hardware Intrinsic
                 Security from Physically Unclonable Functions / 39 \\
                 Helena Handschuh, Geert-Jan Schrijen, and Pirn Tuyls
                 From Statistics to Circuits: Foundations for Future
                 Physical Unclonable Functions / 55 \\
                 Inyoung Kim, Abhranil Maiti, Leyla Nazhandali, Patrick
                 Schaumont, Vignesh Vivekraja, and Huaiye Zhang Strong
                 PUFs: Models, Constructions, and Security Proofs / 79
                 \\
                 Ulrich R{\"u}hrmair, Heike Busch, and Stefan
                 Katzenbeisser Part II Hardware-Based Cryptography \\
                 Leakage Resilient Cryptography in Practice / 99 \\
                 Fran{\c{c}}ois-Xavier Standaert, Olivier Pereira, Yu
                 Yu, Jean-Jacques Quisquater, Moti Yung, and Elisabeth
                 Oswald Memory Leakage-Resilient Encryption Based on
                 Physically Unclonable Functions / 135 \\
                 Frederik Armknecht, Roel Maes, Ahmad-Reza Sadeghi, Berk
                 Sunar, and Pirn Tuyls Part III Hardware Attacks \\
                 Hardware Trojan Horses / 167 \\
                 Mohammad Tehranipoor and Berk Sunar Extracting Unknown
                 Keys from Unknown Algorithms Encrypting Unknown Fixed
                 Messages and Returning No Results / 189 \\
                 Yoo-Jin Baek, Vanessa Gratzer, Sung-Hyun Kim, and David
                 Naccache Part IV Hardware-Based Policy Enforcement \\
                 License Distribution Protocols from Optical Media
                 Fingerprints / 201 \\
                 Ghaith Hammouri, Aykutlu Dana, and Berk Sunar
                 Anti-counterfeiting: Mixing the Physical and the
                 Digital World / 223 \\
                 Darko Kirovski Part V Hardware Security in Contactless
                 Tokens \\
                 Anti-counterfeiting, Untraceability and Other Security
                 Challenges for RFID Systems: Public-Key-Based Protocols
                 and Hardware / 237 \\
                 Yong Ki Lee, Lejla Batina, Dave Singelee, Bart Preneel,
                 and Ingrid Verbauwhede Contactless Security Token
                 Enhanced Security by Using New Hardware Features in
                 Cryptographic-Based Security Mechanisms / 259 \\
                 Markus Ullmann and Matthias V{\"o}geler Enhancing RFID
                 Security and Privacy by Physically Unclonable Functions
                 / 281 \\
                 Ahmad-Reza Sadeghi, Ivan Visconti, and Christian
                 Wachsmann Part VI Hardware-Based Security Architectures
                 and Applications \\
                 Authentication of Processor Hardware Leveraging
                 Performance Limits in Detailed Simulations and
                 Emulations / 309 \\
                 Daniel Y. Deng, Andrew H. Chan, and G. Edward Suh
                 Signal Authentication in Trusted Satellite Navigation
                 Receivers / 331 \\
                 Markus G. Kuhn On the Limits of Hypervisor- and Virtual
                 Machine Monitor-Based Isolation / 349 \\
                 Loic Duflot, Olivier Grumelard, Olivier Levillain, and
                 Benjamin Morin Efficient Secure Two-Party Computation
                 with Untrusted Hardware Tokens / 367 \\
                 Kimmo J{\"a}rvinen, Vladimir Kolesnikov, Ahmad-Reza
                 Sadeghi, and Thomas Schneider Towards Reliable Remote
                 Healthcare Applications Using Combined Fuzzy Extraction
                 / 387 \\
                 Jorge Guajardo, Muhammad Asim, and Milan Petkovi{\'c}",
}

@Article{Saklikar:2010:IFV,
  author =       "Samir Saklikar and Subir Saha",
  title =        "Identity Federation for {VoIP} systems",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "4",
  pages =        "499--540",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2008-0349",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:47 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Saleh:2010:GTF,
  author =       "Mohamed Saleh and Mourad Debbabi",
  title =        "A game-theoretic framework for specification and
                 verification of cryptographic protocols",
  journal =      j-FORM-ASP-COMPUT,
  volume =       "22",
  number =       "5",
  pages =        "585--609",
  month =        sep,
  year =         "2010",
  CODEN =        "FACME5",
  DOI =          "https://doi.org/10.1007/s00165-009-0129-4",
  ISSN =         "0934-5043 (print), 1433-299X (electronic)",
  ISSN-L =       "0934-5043",
  bibdate =      "Tue Mar 17 20:58:37 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/formaspcomput.bib",
  URL =          "http://link.springer.com/article/10.1007/s00165-009-0129-4",
  acknowledgement = ack-nhfb,
  fjournal =     "Formal Aspects of Computing",
  journal-URL =  "http://link.springer.com/journal/165",
}

@Article{Salvail:2010:STR,
  author =       "Louis Salvail and Momtchil Peev and Eleni Diamanti and
                 Romain All{\'e}aume and Norbert L{\"u}tkenhaus and
                 Thomas L{\"a}nger",
  title =        "Security of trusted repeater quantum key distribution
                 networks",
  journal =      j-J-COMP-SECUR,
  volume =       "18",
  number =       "1",
  pages =        "61--87",
  month =        "????",
  year =         "2010",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0373",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:34 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Sarier:2010:IAS,
  author =       "Neyire Deniz Sarier",
  title =        "Improving the accuracy and storage cost in biometric
                 remote authentication schemes",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "33",
  number =       "3",
  pages =        "268--274",
  month =        may,
  year =         "2010",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Wed Jan 28 15:43:42 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804510000068",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Netw. Comput. Appl.",
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Sarkar:2010:CRM,
  author =       "Santanu Sarkar and Subhamoy Maitra",
  title =        "Cryptanalysis of {RSA} with more than one decryption
                 exponent",
  journal =      j-INFO-PROC-LETT,
  volume =       "110",
  number =       "8--9",
  pages =        "336--340",
  day =          "1",
  month =        apr,
  year =         "2010",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Thu Mar 31 12:46:34 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Sarkar:2010:CRT,
  author =       "Santanu Sarkar and Subhamoy Maitra",
  title =        "Cryptanalysis of {RSA} with two decryption exponents",
  journal =      j-INFO-PROC-LETT,
  volume =       "110",
  number =       "5",
  pages =        "178--181",
  day =          "1",
  month =        feb,
  year =         "2010",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Thu Mar 31 12:46:31 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Sarkar:2010:SGC,
  author =       "Palash Sarkar",
  title =        "A Simple and Generic Construction of Authenticated
                 Encryption with Associated Data",
  journal =      j-TISSEC,
  volume =       "13",
  number =       "4",
  pages =        "33:1--33:??",
  month =        dec,
  year =         "2010",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/1880022.1880027",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Wed Jan 12 17:10:07 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "We revisit the problem of constructing a protocol for
                 performing Authenticated Encryption with Associated
                 Data (AEAD). A technique is described which combines a
                 collision-resistant hash function with a protocol for
                 Authenticated Encryption (AE). The technique is both
                 simple and generic and does not require any additional
                 key material beyond that of the AE protocol. Concrete
                 instantiations are shown where a 256-bit hash function
                 is combined with some known single-pass AE protocols
                 employing either 128-bit or 256-bit block ciphers. This
                 results in possible efficiency improvement in the
                 processing of the header.",
  acknowledgement = ack-nhfb,
  articleno =    "33",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@InProceedings{Saxena:2010:SGC,
  author =       "N. Saxena and C. Seshadhri",
  title =        "From {Sylvester--Gallai} Configurations to Rank
                 Bounds: Improved Black-Box Identity Test for Depth-$3$
                 Circuits",
  crossref =     "IEEE:2010:PIA",
  pages =        "21--29",
  year =         "2010",
  DOI =          "https://doi.org/10.1109/FOCS.2010.9",
  bibdate =      "Thu Apr 12 09:34:12 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/focs2010.bib",
  acknowledgement = ack-nhfb,
  book-URL =     "http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5669376",
}

@InBook{Schoenmakers:2010:VS,
  author =       "Berry Schoenmakers",
  title =        "Voting Schemes",
  crossref =     "Atallah:2010:ATC",
  chapter =      "15",
  pages =        "1--21",
  year =         "2010",
  DOI =          "https://doi.org/10.1201/9781584888215-c15",
  bibdate =      "Sat May 14 09:37:55 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.crcnetbase.com/doi/abs/10.1201/9781584888215-c15",
  acknowledgement = ack-nhfb,
}

@Article{Schultz:2010:MMP,
  author =       "David Schultz and Barbara Liskov and Moses Liskov",
  title =        "{MPSS}: {Mobile Proactive Secret Sharing}",
  journal =      j-TISSEC,
  volume =       "13",
  number =       "4",
  pages =        "34:1--34:??",
  month =        dec,
  year =         "2010",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/1880022.1880028",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Wed Jan 12 17:10:07 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "This article describes MPSS, a new way to do proactive
                 secret sharing. MPSS provides mobility: The group of
                 nodes holding the shares of the secret can change at
                 each resharing, which is essential in a long-lived
                 system. MPSS additionally allows the number of
                 tolerated faulty shareholders to change when the secret
                 is moved so that the system can tolerate more (or
                 fewer) corruptions; this allows reconfiguration
                 on-the-fly to accommodate changes in the environment.
                 MPSS includes an efficient protocol that is intended to
                 be used in practice. The protocol is optimized for the
                 common case of no or few failures, but degradation when
                 there are more failures is modest.",
  acknowledgement = ack-nhfb,
  articleno =    "34",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@Article{Schutz:2010:DIN,
  author =       "Simon Sch{\"u}tz and Henrik Abrahamsson and Bengt
                 Ahlgren and Marcus Brunner",
  title =        "Design and implementation of the {Node Identity
                 Internetworking Architecture}",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "54",
  number =       "7",
  pages =        "1142--1154",
  day =          "17",
  month =        may,
  year =         "2010",
  CODEN =        "????",
  ISSN =         "1389-1286",
  ISSN-L =       "1389-1286",
  bibdate =      "Sat Apr 2 08:42:38 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/13891286",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286",
}

@InBook{Seberry:2010:CTAa,
  author =       "Jennifer Seberry and Chris Charnes and Josef Pieprzyk
                 and Rei Safavi-Naini",
  title =        "Crypto Topics and Applications {I}",
  crossref =     "Atallah:2010:ATC",
  chapter =      "12",
  pages =        "1--31",
  year =         "2010",
  DOI =          "https://doi.org/10.1201/9781584888215-c12",
  bibdate =      "Sat May 14 09:37:55 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.crcnetbase.com/doi/abs/10.1201/9781584888215-c12",
  acknowledgement = ack-nhfb,
}

@InBook{Seberry:2010:CTAb,
  author =       "Jennifer Seberry and Chris Charnes and Josef Pieprzyk
                 and Rei Safavi-Naini",
  title =        "Crypto Topics and Applications {II}",
  crossref =     "Atallah:2010:ATC",
  chapter =      "13",
  pages =        "1--32",
  year =         "2010",
  DOI =          "https://doi.org/10.1201/9781584888215-c13",
  bibdate =      "Sat May 14 09:37:55 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.crcnetbase.com/doi/abs/10.1201/9781584888215-c13",
  acknowledgement = ack-nhfb,
}

@Article{Shabtai:2010:SAP,
  author =       "Asaf Shabtai and Yuval Fledel and Yuval Elovici",
  title =        "Securing {Android}-Powered Mobile Devices Using
                 {SELinux}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "3",
  pages =        "36--44",
  month =        may # "\slash " # jun,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.144",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 26 15:44:06 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
}

@Article{Shaikh:2010:CTO,
  author =       "Siraj A. Shaikh and Joseph R. Rabaiotti",
  title =        "Characteristic trade-offs in designing large-scale
                 biometric-based identity management systems",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "33",
  number =       "3",
  pages =        "342--351",
  month =        may,
  year =         "2010",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Wed Jan 28 15:43:42 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804510000032",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Netw. Comput. Appl.",
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Shakiba:2010:IID,
  author =       "Mohsen Shakiba and Mohammad Dakhilalian and Hamid
                 Mala",
  title =        "An improved impossible differential cryptanalysis of
                 {Zodiac}",
  journal =      j-J-SYST-SOFTW,
  volume =       "83",
  number =       "4",
  pages =        "702--709",
  month =        apr,
  year =         "2010",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212",
  ISSN-L =       "0164-1212",
  bibdate =      "Tue Sep 7 07:27:05 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Shallit:2010:BRB,
  author =       "Jeffrey Shallit",
  title =        "Book Review: {{\booktitle{Cryptographic Applications
                 of Analytic Number Theory: Lower Bounds and
                 Pseudorandomness}}, by Igor Shparlinski, Birk{\"a}user,
                 2003}",
  journal =      j-SIGACT,
  volume =       "41",
  number =       "3",
  pages =        "44--45",
  month =        sep,
  year =         "2010",
  CODEN =        "SIGNDM",
  DOI =          "https://doi.org/10.1145/1855118.1855128",
  ISSN =         "0163-5700 (print), 1943-5827 (electronic)",
  ISSN-L =       "0163-5700",
  bibdate =      "Tue Mar 20 14:39:00 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib",
  note =         "See \cite{Shparlinski:2003:CAA}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGACT News",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J697",
}

@Article{Shoufan:2010:NCA,
  author =       "A. Shoufan and T. Wink and H. G. Molter and S. A. Huss
                 and E. Kohnert",
  title =        "A Novel Cryptoprocessor Architecture for the
                 {McEliece} Public-Key Cryptosystem",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "59",
  number =       "11",
  pages =        "1533--1546",
  month =        nov,
  year =         "2010",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2010.115",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Sun Jul 3 11:52:33 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5477413",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Shparlinski:2010:NWP,
  author =       "Igor E. Shparlinski",
  title =        "Numbers at Work and Play",
  journal =      j-NAMS,
  volume =       "57",
  number =       "3",
  pages =        "334--342",
  month =        mar,
  year =         "2010",
  CODEN =        "AMNOAN",
  ISSN =         "0002-9920 (print), 1088-9477 (electronic)",
  ISSN-L =       "0002-9920",
  bibdate =      "Mon Feb 22 15:35:29 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.ams.org/notices/201003/",
  acknowledgement = ack-nhfb,
  fjournal =     "Notices of the American Mathematical Society",
  journal-URL =  "http://www.ams.org/notices/",
  keywords =     "algebraic number theory; lattice-based cryptography;
                 pairing-based cryptography; Pell equations",
}

@Article{Shrestha:2010:KBA,
  author =       "Anish Prasad Shrestha and Dong-You Choi and Goo Rak
                 Kwon and Seung-Jo Han",
  title =        "{Kerberos} based authentication for inter-domain
                 roaming in wireless heterogeneous network",
  journal =      j-COMPUT-MATH-APPL,
  volume =       "60",
  number =       "2",
  pages =        "245--255",
  month =        jul,
  year =         "2010",
  CODEN =        "CMAPDK",
  ISSN =         "0898-1221 (print), 1873-7668 (electronic)",
  ISSN-L =       "0898-1221",
  bibdate =      "Wed Mar 1 21:50:41 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computmathappl2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0898122110000416",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers and Mathematics with Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/08981221",
}

@Article{Shyu:2010:VMS,
  author =       "Shyong Jian Shyu and Kun Chen",
  title =        "Visual Multiple-Secret Sharing by Circle Random
                 Grids",
  journal =      j-SIAM-J-IMAGING-SCI,
  volume =       "3",
  number =       "4",
  pages =        "926--953",
  month =        "????",
  year =         "2010",
  CODEN =        "SJISBI",
  DOI =          "https://doi.org/10.1137/080722023",
  ISSN =         "1936-4954",
  bibdate =      "Fri Mar 4 10:43:16 MST 2011",
  bibsource =    "http://epubs.siam.org/SIIMS/siims_toc.html/3/4;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://epubs.siam.org/siims/resource/1/sjisbi/v3/i4/p926_s1",
  acknowledgement = ack-nhfb,
  fjournal =     "SIAM Journal on Imaging Sciences",
  journal-URL =  "http://epubs.siam.org/siims",
  onlinedate =   "November 30, 2010",
}

@Article{Simpson:2010:ESB,
  author =       "Edward Simpson",
  title =        "{Edward Simpson}: {Bayes} at {Bletchley Park}",
  journal =      j-SIGNIF,
  volume =       "7",
  number =       "2",
  pages =        "76--80",
  month =        jun,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1111/j.1740-9713.2010.00424.x",
  ISSN =         "1740-9705 (print), 1740-9713 (electronic)",
  ISSN-L =       "1740-9705",
  bibdate =      "Thu Aug 13 12:03:49 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/significance.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "Signif.",
  fjournal =     "Significance",
  journal-URL =  "https://rss.onlinelibrary.wiley.com/journal/17409713",
  onlinedate =   "18 May 2010",
  remark =       "From the abstract: ``Here Edward Simpson tells the
                 hitherto unpublished story of the part that Bayesian
                 statistics played in breaking two of the enemy
                 ciphers.''",
}

@InProceedings{Somani:2010:IDS,
  author =       "U. Somani and K. Lakhani and M. Mundra",
  title =        "Implementing digital signature with {RSA} encryption
                 algorithm to enhance the Data Security of cloud in
                 Cloud Computing",
  crossref =     "Chaudhuri:2010:PIC",
  pages =        "211--216",
  year =         "2010",
  DOI =          "https://doi.org/10.1109/PDGC.2010.5679895",
  bibdate =      "Thu Apr 21 10:52:19 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
}

@Article{Sopka:2010:BTS,
  author =       "Katherine R. Sopka and Elisabeth M. Sopka",
  title =        "The {Bonebrake Theological Seminary}: Top-Secret
                 {Manhattan Project} Site",
  journal =      j-PHYS-PERSPECT,
  volume =       "12",
  number =       "3",
  pages =        "338--349",
  month =        sep,
  year =         "2010",
  CODEN =        "PHPEF2",
  DOI =          "https://doi.org/10.1007/s00016-010-0019-4",
  ISSN =         "1422-6944 (print), 1422-6960 (electronic)",
  ISSN-L =       "1422-6944",
  bibdate =      "Thu Jun 27 20:50:40 MDT 2013",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=1422-6944&volume=12&issue=3;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/physperspect.bib",
  URL =          "http://link.springer.com/article/10.1007/s00016-010-0019-4",
  acknowledgement = ack-nhfb,
  fjournal =     "Physics in Perspective (PIP)",
  journal-URL =  "http://link.springer.com/journal/16",
}

@Article{Sorniotti:2010:PSS,
  author =       "Alessandro Sorniotti and Refik Molva",
  title =        "A provably secure secret handshake with dynamic
                 controlled matching",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "5",
  pages =        "619--627",
  month =        jul,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:21 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809001370",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Stanton:2010:FAD,
  author =       "Paul T. Stanton and Benjamin McKeown and Randal Burns
                 and Giuseppe Ateniese",
  title =        "{FastAD}: an authenticated directory for billions of
                 objects",
  journal =      j-OPER-SYS-REV,
  volume =       "44",
  number =       "1",
  pages =        "45--49",
  month =        jan,
  year =         "2010",
  CODEN =        "OSRED8",
  DOI =          "https://doi.org/10.1145/1740390.1740401",
  ISSN =         "0163-5980",
  ISSN-L =       "0163-5980",
  bibdate =      "Wed Mar 17 14:10:48 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "We develop techniques that make authenticated
                 directories efficient and scalable toward the goal of
                 managing tens of billions of objects in a single
                 directory. Internet storage services have already
                 realized this scale: Amazon's S3 contained more than 52
                 billion objects as of April 2009 [1]. Our contributions
                 include defining on-disk, block-oriented data
                 structures and algorithms for authenticated directories
                 that exceed memory capacity and optimizations that
                 reduce the I/O required to insert and access entries in
                 the directory.",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
}

@TechReport{Svaba:2010:PKC,
  author =       "Pavol Svaba and Tran van Trung",
  title =        "Public key cryptosystem {MST\_1tn3}: cryptanalysis and
                 realization",
  type =         "Technical report",
  number =       "2010,2",
  institution =  "Institut f{\"u}r Experimentelle Mathematik,
                 Universit{\"a}t Duisburg-Essen",
  address =      "Duisburg, Germany",
  pages =        "37",
  year =         "2010",
  bibdate =      "Fri May 13 06:50:43 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
}

@Article{Szalachowski:2010:CCG,
  author =       "P. Szalachowski and B. Ksiezopolski and Z. Kotulski",
  title =        "{CMAC}, {CCM} and {GCM/GMAC}: {Advanced} modes of
                 operation of symmetric block ciphers in wireless sensor
                 networks",
  journal =      j-INFO-PROC-LETT,
  volume =       "110",
  number =       "7",
  pages =        "247--251",
  day =          "1",
  month =        mar,
  year =         "2010",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Thu Mar 31 12:46:33 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Misc{Tarnovsky:2010:DSP,
  author =       "Christopher Tarnovsky",
  title =        "Deconstructing a secure processor",
  howpublished = "BlackHat Briefings",
  year =         "2010",
  bibdate =      "Mon Mar 09 16:07:19 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  remark =       "Cite in \cite[reference 74]{Schneier:2015:SWC}.",
}

@Article{Tsai:2010:RLI,
  author =       "H.-H. Tsai and H.-C. Tseng and Y.-S. Lai",
  title =        "Robust lossless image watermarking based on $ \alpha
                 $-trimmed mean algorithm and support vector machine",
  journal =      j-J-SYST-SOFTW,
  volume =       "83",
  number =       "6",
  pages =        "1015--1028",
  month =        jun,
  year =         "2010",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212",
  ISSN-L =       "0164-1212",
  bibdate =      "Tue Sep 7 07:27:05 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Tsang:2010:BRR,
  author =       "Patrick P. Tsang and Man Ho Au and Apu Kapadia and
                 Sean W. Smith",
  title =        "{BLAC}: Revoking Repeatedly Misbehaving Anonymous
                 Users without Relying on {TTPs}",
  journal =      j-TISSEC,
  volume =       "13",
  number =       "4",
  pages =        "39:1--39:??",
  month =        dec,
  year =         "2010",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/1880022.1880033",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Wed Jan 12 17:10:07 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "Several credential systems have been proposed in which
                 users can authenticate to service providers
                 anonymously. Since anonymity can give users the license
                 to misbehave, some variants allow the selective
                 deanonymization (or linking) of misbehaving users upon
                 a complaint to a Trusted Third Party (TTP). The ability
                 of the TTP to revoke a user's privacy at any time,
                 however, is too strong a punishment for misbehavior. To
                 limit the scope of deanonymization, some systems have
                 been proposed in which users can be deanonymized only
                 if they authenticate ``too many times,'' such as
                 ``double spending'' with electronic cash. While useful
                 in some applications, such techniques cannot be
                 generalized to more subjective definitions of
                 misbehavior, for example, using such schemes it is not
                 possible to block anonymous users who ``deface too many
                 Web pages'' on a Web site.",
  acknowledgement = ack-nhfb,
  articleno =    "39",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@Article{Tuan:2010:AWB,
  author =       "Do Van Tuan and Ui-Pil Chong",
  title =        "Audio Watermarking Based on Advanced {Wigner}
                 Distribution and Important Frequency Peaks",
  journal =      j-IJHPCA,
  volume =       "24",
  number =       "2",
  pages =        "154--163",
  month =        may,
  year =         "2010",
  CODEN =        "IHPCFL",
  DOI =          "https://doi.org/10.1177/1094342009106597",
  ISSN =         "1094-3420 (print), 1741-2846 (electronic)",
  ISSN-L =       "1094-3420",
  bibdate =      "Tue Aug 31 09:59:46 MDT 2010",
  bibsource =    "http://hpc.sagepub.com/content/24/2.toc;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://hpc.sagepub.com/content/24/2/154.full.pdf+html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://hpc.sagepub.com/content/by/year",
}

@Article{Vetter:2010:ABV,
  author =       "Ron Vetter",
  title =        "Authentication by Biometric Verification",
  journal =      j-COMPUTER,
  volume =       "43",
  number =       "2",
  pages =        "28--29",
  month =        feb,
  year =         "2010",
  CODEN =        "CPTRB4",
  DOI =          "https://doi.org/10.1109/MC.2010.31",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Wed May 12 22:57:42 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
}

@PhdThesis{Vuagnoux:2010:CAC,
  author =       "Martin Vuagnoux",
  title =        "Computer Aided Cryptanalysis from Ciphers to Side
                 Channels",
  type =         "Th{\`e}se",
  school =       "{\'E}cole polytechnique f{\'e}d{\'e}rale de Lausanne
                 (EPFL)",
  address =      "Lausanne",
  pages =        "191",
  year =         "2010",
  DOI =          "https://doi.org/10.5075/epfl-thesis-4769",
  bibdate =      "Fri May 13 06:36:07 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  advisor =      "Serge Vaudenay",
}

@InBook{Wagstaff:2010:C,
  author =       "Samuel S. {Wagstaff, Jr.}",
  title =        "Cryptanalysis",
  crossref =     "Atallah:2010:ATC",
  chapter =      "11",
  pages =        "1--16",
  year =         "2010",
  DOI =          "https://doi.org/10.1201/9781584888215-c11",
  bibdate =      "Sat May 14 09:37:55 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.crcnetbase.com/doi/abs/10.1201/9781584888215-c11",
  acknowledgement = ack-nhfb,
}

@Article{Wang:2010:DVT,
  author =       "Xiaofeng Wang and Philippe Golle and Markus Jakobsson
                 and Alex Tsow",
  title =        "Deterring voluntary trace disclosure in re-encryption
                 mix-networks",
  journal =      j-TISSEC,
  volume =       "13",
  number =       "2",
  pages =        "18:1--18:??",
  month =        feb,
  year =         "2010",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/1698750.1698758",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Tue Mar 16 10:18:15 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  articleno =    "18",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@Article{Wang:2010:IIB,
  author =       "Xu An Wang and Xiaoyuan Yang",
  title =        "On the Insecurity of an Identity Based Proxy
                 Re-encryption Scheme",
  journal =      j-FUND-INFO,
  volume =       "98",
  number =       "2--3",
  pages =        "277--281",
  month =        apr,
  year =         "2010",
  CODEN =        "FUMAAJ",
  DOI =          "https://doi.org/10.3233/FI-2010-227",
  ISSN =         "0169-2968 (print), 1875-8681 (electronic)",
  ISSN-L =       "0169-2968",
  bibdate =      "Sat Mar 5 17:09:55 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/fundinfo2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Fundamenta Informaticae",
  journal-URL =  "http://content.iospress.com/journals/fundamenta-informaticae",
}

@InProceedings{Wang:2010:NSB,
  author =       "Xiang Wang",
  editor =       "Cheng-Xiang Wang",
  booktitle =    "{Proceedings of the 2010 International Conference on
                 Communications and Mobile Computing (CMC). 12--14 April
                 2010, Shenzhen, China}",
  title =        "A New {SDVS} Based on {NTRUSign}",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "205--??",
  year =         "2010",
  DOI =          "https://doi.org/10.1109/CMC.2010.258",
  ISBN =         "1-4244-6327-0",
  ISBN-13 =      "978-1-4244-6327-5",
  LCCN =         "????",
  bibdate =      "Thu Apr 21 11:09:21 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 z3950.gbv.de:20011/gvk",
  URL =          "http://ieeexplore.ieee.org/servlet/opac?punumber=5471195",
  abstract =     "In this paper, we propose a new strong designated
                 verifier signature scheme. It is constructed by the
                 NTRUSign signature algorithm whose security is based on
                 the hardness of closest vector problem (CVP). We
                 analyze the security of this scheme in great details
                 and conclude that it has the characters of strong
                 designated verifier signature schemes. Therefore, it is
                 believed that the new scheme will have a bright
                 future.",
  acknowledgement = ack-nhfb,
  keywords =     "ANSI X9.98-2010; NTRUSign",
}

@Article{Wright:2010:USP,
  author =       "Charles V. Wright and Lucas Ballard and Scott E. Coull
                 and Fabian Monrose and Gerald M. Masson",
  title =        "Uncovering Spoken Phrases in Encrypted Voice over {IP}
                 Conversations",
  journal =      j-TISSEC,
  volume =       "13",
  number =       "4",
  pages =        "35:1--35:??",
  month =        dec,
  year =         "2010",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/1880022.1880029",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Wed Jan 12 17:10:07 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "Although Voice over IP (VoIP) is rapidly being
                 adopted, its security implications are not yet fully
                 understood. Since VoIP calls may traverse untrusted
                 networks, packets should be encrypted to ensure
                 confidentiality. However, we show that it is possible
                 to identify the phrases spoken within encrypted VoIP
                 calls when the audio is encoded using variable bit rate
                 codecs. To do so, we train a hidden Markov model using
                 only knowledge of the phonetic pronunciations of words,
                 such as those provided by a dictionary, and search
                 packet sequences for instances of specified phrases.
                 Our approach does not require examples of the speaker's
                 voice, or even example recordings of the words that
                 make up the target phrase. We evaluate our techniques
                 on a standard speech recognition corpus containing over
                 2,000 phonetically rich phrases spoken by 630 distinct
                 speakers from across the continental United States. Our
                 results indicate that we can identify phrases within
                 encrypted calls with an average accuracy of 50\%, and
                 with accuracy greater than 90\% for some phrases.
                 Clearly, such an attack calls into question the
                 efficacy of current VoIP encryption standards. In
                 addition, we examine the impact of various features of
                 the underlying audio on our performance and discuss
                 methods for mitigation.",
  acknowledgement = ack-nhfb,
  articleno =    "35",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@Article{Wu:2010:EUA,
  author =       "Tsu-Yang Wu and Yuh-Min Tseng",
  title =        "An efficient user authentication and key exchange
                 protocol for mobile client--server environment",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "54",
  number =       "9",
  pages =        "1520--1530",
  day =          "17",
  month =        jun,
  year =         "2010",
  CODEN =        "????",
  ISSN =         "1389-1286",
  ISSN-L =       "1389-1286",
  bibdate =      "Sat Apr 2 08:42:38 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/13891286",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286",
}

@Article{Wu:2010:IBM,
  author =       "Tsu-Yang Wu and Yuh-Min Tseng",
  title =        "An {ID}-Based Mutual Authentication and Key Exchange
                 Protocol for Low-Power Mobile Devices",
  journal =      j-COMP-J,
  volume =       "53",
  number =       "7",
  pages =        "1062--1070",
  month =        sep,
  year =         "2010",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxp083",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Aug 3 15:48:45 MDT 2010",
  bibsource =    "http://comjnl.oxfordjournals.org/content/vol53/issue7/index.dtl;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/cgi/content/abstract/53/7/1062;
                 http://comjnl.oxfordjournals.org/cgi/reprint/53/7/1062",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Xiao:2010:TAT,
  author =       "Xiaokui Xiao and Yufei Tao and Nick Koudas",
  title =        "Transparent anonymization: {Thwarting} adversaries who
                 know the algorithm",
  journal =      j-TODS,
  volume =       "35",
  number =       "2",
  pages =        "8:1--8:??",
  month =        apr,
  year =         "2010",
  CODEN =        "ATDSD3",
  DOI =          "https://doi.org/10.1145/1735886.1735887",
  ISSN =         "0362-5915 (print), 1557-4644 (electronic)",
  ISSN-L =       "0362-5915",
  bibdate =      "Wed Apr 28 13:44:08 MDT 2010",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tods/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "Numerous generalization techniques have been proposed
                 for privacy-preserving data publishing. Most existing
                 techniques, however, implicitly assume that the
                 adversary knows little about the anonymization
                 algorithm adopted by the data publisher. Consequently,
                 they cannot guard against privacy attacks that exploit
                 various characteristics of the anonymization mechanism.
                 This article provides a practical solution to this
                 problem. First, we propose an analytical model for
                 evaluating disclosure risks, when an adversary knows
                 {\em everything\/} in the anonymization process, except
                 the sensitive values. Based on this model, we develop a
                 privacy principle, {\em transparent l-diversity}, which
                 ensures privacy protection against such powerful
                 adversaries. We identify three algorithms that achieve
                 transparent $l$-diversity, and verify their
                 effectiveness and efficiency through extensive
                 experiments with real data.",
  acknowledgement = ack-nhfb,
  articleno =    "8",
  fjournal =     "ACM Transactions on Database Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J777",
  keywords =     "generalization; l-diversity; Privacy-preserving data
                 publishing",
}

@InProceedings{Xin:2010:IEB,
  author =       "Hong Xin and Zhu Shujing and Chen Weibin and Jian
                 Chongjun",
  booktitle =    "{2010 International Conference on Computer Application
                 and System Modeling (ICCASM)}",
  title =        "An image encryption base on non-linear pseudo-random
                 number generator",
  volume =       "9",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "V9--238--V9--241",
  year =         "2010",
  DOI =          "https://doi.org/10.1109/ICCASM.2010.5623043",
  bibdate =      "Fri Jan 6 07:45:38 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5623043",
  acknowledgement = ack-nhfb,
  book-URL =     "http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5602791",
}

@Article{Yang:2010:CRS,
  author =       "Cheng-Hsing Yang and Shiuh-Jeng Wang and Chi-Yao
                 Weng",
  title =        "Capacity-Raising Steganography Using Multi-Pixel
                 Differencing and Pixel-Value Shifting Operations",
  journal =      j-FUND-INFO,
  volume =       "98",
  number =       "2--3",
  pages =        "321--336",
  month =        apr,
  year =         "2010",
  CODEN =        "FUMAAJ",
  DOI =          "https://doi.org/10.3233/FI-2010-229",
  ISSN =         "0169-2968 (print), 1875-8681 (electronic)",
  ISSN-L =       "0169-2968",
  bibdate =      "Sat Mar 5 17:09:55 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/fundinfo2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Fundamenta Informaticae",
  journal-URL =  "http://content.iospress.com/journals/fundamenta-informaticae",
}

@Article{Yao:2010:ASP,
  author =       "Yurong Yao and Edward Watson and Beverly K. Kahn",
  title =        "Application service providers: market and adoption
                 decisions",
  journal =      j-CACM,
  volume =       "53",
  number =       "7",
  pages =        "113--117",
  month =        jul,
  year =         "2010",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1785414.1785447",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Jul 15 17:10:30 MDT 2010",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "Introduction\par

                 IT outsourcing has been a viable business strategy
                 since the late 1950s when companies began to invest
                 significant resources in outside computing services. As
                 IT managers increasingly used time sharing, contract
                 programming, and facilities management, the next few
                 decades saw accompanying increases in efficiency in
                 software applications and services, not to mention
                 decreased operations costs. In 1989, when Kodak
                 outsourced its entire IT department to IBM and EDS, the
                 business world had to scramble to get over its initial
                 shock. Seemingly overnight, 'software' and 'service'
                 had become strange bedfellows. The rules of the game
                 had radically changed.\par

                 Since the mid-1990s, the explosion in Internet
                 connectivity, increased bandwidth, and the ubiquitous
                 nature of computing have made the delivery of software
                 applications from remote data centers both
                 technologically feasible and economically attractive. A
                 relatively new form of IS outsourcing, Application
                 Services Provision (ASP), provides applications to
                 multiple entities from its data center across a wide
                 area network. Similar to the telephone services model,
                 clients pay a monthly fee to access online applications
                 from an ASP. Advances in encryption and firewall
                 technology remove a client's security concerns for
                 using remotely hosted services. Active research on ASP
                 outsourcing (also called NetSourcing) has attracted
                 academic scholars and business practitioners alike, but
                 few have investigated the specifics of the market and
                 the decision process to adopt the ASP model.\par

                 ASPs today are quite different from what they were five
                 years ago, in large part because this dynamic industry
                 has experienced significant merger and acquisition
                 activity. Forty percent of ASPs active in 2001 were no
                 longer in business in 2004. Traditional software
                 companies also have jumped on the ASP bandwagon,
                 developing new technologies to deliver on-demand
                 services. The scope of hosted applications for ASPs has
                 also shifted significantly as certain applications were
                 scrapped for lack of profitability, for example,
                 overall enterprise system hosting with no specific
                 industrial solutions. However, a Forrester report
                 predicted that as eCommerce continued to grow 30\% -
                 40\% in 2005, the demand for licensed software products
                 would decrease while demand for hosted services
                 increases. This prediction seems to be reality, as ASP
                 hosting solutions are increasingly viable and
                 attractive business models.\par

                 Thus, to update our knowledge of the rapidly changing
                 ASP market and to help practitioners make
                 better-informed ASP adoption decisions, this article
                 addresses two central questions: What is the structure
                 of the current market? And what factors should clients
                 consider in their ASP adoption decisions?",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Yao:2010:IDA,
  author =       "Lin Yao and Lei Wang and Xiangwei Kong and Guowei Wu
                 and Feng Xia",
  title =        "An inter-domain authentication scheme for pervasive
                 computing environment",
  journal =      j-COMPUT-MATH-APPL,
  volume =       "60",
  number =       "2",
  pages =        "234--244",
  month =        jul,
  year =         "2010",
  CODEN =        "CMAPDK",
  ISSN =         "0898-1221 (print), 1873-7668 (electronic)",
  ISSN-L =       "0898-1221",
  bibdate =      "Wed Mar 1 21:50:41 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computmathappl2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0898122110000210",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers and Mathematics with Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/08981221",
}

@Article{Ye:2010:ACC,
  author =       "Guodong Ye",
  title =        "Another Constructed Chaotic Image Encryption Scheme
                 Based on {Toeplitz} Matrix and {Hankel} Matrix",
  journal =      j-FUND-INFO,
  volume =       "101",
  number =       "4",
  pages =        "321--333",
  month =        dec,
  year =         "2010",
  CODEN =        "FUMAAJ",
  DOI =          "https://doi.org/10.3233/FI-2010-291",
  ISSN =         "0169-2968 (print), 1875-8681 (electronic)",
  ISSN-L =       "0169-2968",
  bibdate =      "Sat Mar 5 17:10:40 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/fundinfo2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Fundamenta Informaticae",
  journal-URL =  "http://content.iospress.com/journals/fundamenta-informaticae",
}

@Article{Yeh:2010:TRR,
  author =       "Kuo-Hui Yeh and Chunhua Su and N. W. Lo and Yingjiu Li
                 and Yi-Xiang Hung",
  title =        "Two robust remote user authentication protocols using
                 smart cards",
  journal =      j-J-SYST-SOFTW,
  volume =       "83",
  number =       "12",
  pages =        "2556--2565",
  month =        dec,
  year =         "2010",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212",
  ISSN-L =       "0164-1212",
  bibdate =      "Mon Nov 1 11:40:41 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Book{Yekhanin:2010:LDC,
  author =       "Sergey Yekhanin",
  title =        "Locally Decodable Codes and Private Information
                 Retrieval Schemes",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xii + 82",
  year =         "2010",
  DOI =          "https://doi.org/10.1007/978-3-642-14358-8",
  ISBN =         "3-642-14357-1 (hardcover), 3-642-14358-X (e-book)",
  ISBN-13 =      "978-3-642-14357-1 (hardcover), 978-3-642-14358-8
                 (e-book)",
  ISSN =         "1619-7100 (print), 2197-845X (electronic)",
  ISSN-L =       "1619-7100",
  LCCN =         "QA76.9.A25 Y45 2010eb",
  bibdate =      "Sat Jun 10 08:35:07 MDT 2017",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  series =       "Information Security and Cryptography",
  URL =          "http://www.springerlink.com/content/978-3-642-14358-8",
  abstract =     "Locally decodable codes (LDCs) are codes that
                 simultaneously provide efficient random access
                 retrieval and high noise resilience by allowing
                 reliable reconstruction of an arbitrary bit of a
                 message by looking at only a small number of randomly
                 chosen codeword bits. Local decodability comes with a
                 certain loss in terms of efficiency - specifically,
                 locally decodable codes require longer codeword lengths
                 than their classical counterparts. Private information
                 retrieval (PIR) schemes are cryptographic protocols
                 designed to safeguard the privacy of database users.
                 They allow clients to retrieve records from public
                 databases while completely hiding the identity of the
                 retrieved records from database owners. In this book
                 the author provides a fresh algebraic look at the
                 theory of locally decodable codes and private
                 information retrieval schemes, obtaining new families
                 of each which have much better parameters than those of
                 previously known constructions, and he also proves
                 limitations of two server PIRs in a restricted setting
                 that covers all currently known schemes. The author's
                 related thesis won the ACM Dissertation Award in 2007,
                 and this book includes some expanded sections and
                 proofs, and notes on recent developments.",
  acknowledgement = ack-nhfb,
  shorttableofcontents = "Introduction \\
                 Locally Decodable Codes via the the Point Removal
                 Method \\
                 Limitations of the Point Removal Method \\
                 Private Information Retrieval \\
                 References \\
                 Index",
  subject =      "Computer science; Data structures (Computer science);
                 Fehlerkorrekturcode; swd; Information Retrieval;
                 Kryptologie; Privatsph{\"a}re; Sicherheitsprotokoll;
                 Computer science; Data structures (Computer science);
                 Fehlerkorrekturcode; Information Retrieval;
                 Kryptologie; Privatsph{\"a}re; Sicherheitsprotokoll;
                 Sicherheitsprotokoll; Information Retrieval;
                 Privatsph{\"a}re; Kryptologie; Fehlerkorrekturcode.",
  tableofcontents = "Introduction / 1 \\
                 1.1 Locally decodable codes / 1 \\
                 1.1.1 Hadamard code / 2 \\
                 1.1.2 A code based on polynomial interpolation / 3 \\
                 1.2 Private information retrieval schemes / 4 \\
                 1.2.1 A PIR scheme based on polynomial interpolation /
                 5 \\
                 1.3 The history of LDCs and PIR schemes / 6 \\
                 1.3.1 The first generation: interpolation / 7 \\
                 1.3.2 The second generation: recursion / 8 \\
                 1.3.3 The third generation: point removal / 9 \\
                 1.3.4 Lower bounds / 12 \\
                 1.4 Applications of LDCs and PIR schemes / 13 \\
                 1.4.1 Secure multiparty computation / 13 \\
                 1.4.2 Other models of private information retrieval /
                 14 \\
                 1.4.3 Average-case complexity / 16 \\
                 1.5 Organization of the book / 16 \\
                 1.6 Addendum / 17 \\
                 2 Locally decodable codes via the point removal method
                 / 19 \\
                 2.1 Notation / 19 \\
                 2.2 Locally decodable codes / 20 \\
                 2.3 Binary LDCs via point removal / 20 \\
                 2.3.1 Regular intersecting families of sets / 21 \\
                 2.3.2 Basic construction / 22 \\
                 2.3.3 The main construction: point removal / 24 \\
                 2.4 General LDCs via point removal / 26 \\
                 2.5 Combinatorially nice subsets of $\mathbb{F}_p$ / 30
                 \\
                 2.6 Algebraically nice subsets of $\mathbb{F}^*_p$ / 32
                 \\
                 2.6.1 3-dependences between p-th roots: sufficient
                 conditions / 34 \\
                 2.6.2 $k$-dependences between p-th roots: a sufficient
                 condition / 35 \\
                 2.6.3 Summary / 39 \\
                 2.7 Results / 39 \\
                 2.7.1 Results for three-query binary codes / 40 \\
                 2.7.2 Results for general codes / 41 \\
                 2.8 Addendum / 42 \\
                 2.8.1 The code / 44 \\
                 3 Limitations of the point removal method / 47 \\
                 3.1 Attaining subexponential length requires a nice
                 sequence / 47 \\
                 3.1.1 Point removal method / 47 \\
                 3.1.2 Point removal and bounds for $P(r^t 1)$ / 48 \\
                 3.1.3 Our results / 48 \\
                 3.2 A nice sequence yields short dependences between
                 p-th roots / 49 \\
                 3.2.1 Algebraically nice subsets of $\mathbb{F}^*_q$ /
                 50 \\
                 3.2.2 Combinatorially nice subsets of $\mathbb{F}^*_q$
                 / 53 \\
                 3.2.3 Summary / 55 \\
                 3.3 $k$-dependences between p-ih roots: a necessary
                 condition / 56 \\
                 3.4 3-dependences between p-th roots: a necessary
                 condition / 57 \\
                 3.5 Summary / 58 \\
                 3.6 Conclusions / 59 \\
                 3.7 Addendum / 59 \\
                 4 Private information retrieval / 61 \\
                 4.1 Preliminaries / 61 \\
                 4.2 From LDCs to PIR schemes / 62 \\
                 4.2.1 Upper bounds for three-server binary PIR schemes
                 / 64 \\
                 4.2.2 Upper bounds for general PIR schemes / 65 \\
                 4.3 A combinatorial view of two-server PIR / 66 \\
                 4.3.1 Bilinear PIR / 69 \\
                 4.3.2 Group-based PIR / 69 \\
                 4.4 Complexity of bilinear group-based PIR / 70 \\
                 4.4.1 Algebraic preliminaries / 70 \\
                 4.4.2 Algebraic formulation / 71 \\
                 4.4.3 Low-dimensional principal ideals in group
                 algebras / 72 \\
                 4.5 Summary of lower bounds for two-server PIR / 73 \\
                 4.6 Addendum / 74 \\
                 References / 75 \\
                 Index / 81",
}

@Article{Yoo:2010:IRR,
  author =       "Sang-Kyung Yoo and Deniz Karakoyunlu and Berk Birand
                 and Berk Sunar",
  title =        "Improving the Robustness of Ring Oscillator {TRNGs}",
  journal =      j-TRETS,
  volume =       "3",
  number =       "2",
  pages =        "9:1--9:??",
  month =        may,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1754386.1754390",
  ISSN =         "1936-7406 (print), 1936-7414 (electronic)",
  ISSN-L =       "1936-7406",
  bibdate =      "Tue Jun 22 16:00:33 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "A ring oscillator-based true-random number generator
                 design (Rings design) was introduced in Sunar et al.
                 [2007]. The design was rigorously analyzed under a
                 simple mathematical model and its performance
                 characteristics were established. In this article we
                 focus on the practical aspects of the Rings design on a
                 reconfigurable logic platform and determine their
                 implications on the earlier analysis framework. We make
                 recommendations for avoiding pitfalls in real-life
                 implementations by considering ring interaction,
                 transistor-level effects, narrow signal rejection,
                 transmission line attenuation, and sampler bias.
                 Furthermore, we present experimental results showing
                 that changing operating conditions such as the power
                 supply voltage or the operating temperature may affect
                 the output quality when the signal is subsampled.
                 Hence, an attacker may shift the operating point via a
                 simple noninvasive influence and easily bias the TRNG
                 output. Finally, we propose modifications to the design
                 which significantly improve its robustness against
                 attacks, alleviate implementation-related problems, and
                 simultaneously improve its area, throughput, and power
                 performance.",
  acknowledgement = ack-nhfb,
  articleno =    "9",
  fjournal =     "ACM Transactions on Reconfigurable Technology and
                 Systems (TRETS)",
  journal-URL =  "http://portal.acm.org/toc.cfm?id=J1151",
  keywords =     "cryptography; Oscillator rings; true random number
                 generators",
}

@Article{Yu:2010:IBF,
  author =       "Jia Yu and Rong Hao and Fanyu Kong and Xiangguo Cheng
                 and Huawei Zhao and Chen Yangkui",
  title =        "Identity-Based Forward Secure Threshold Signature
                 Scheme Based on Mediated {RSA}",
  journal =      j-INT-J-COMPUT-APPL,
  volume =       "32",
  number =       "4",
  pages =        "469--475",
  year =         "2010",
  DOI =          "https://doi.org/10.2316/Journal.202.2010.4.202-2927",
  ISSN =         "1206-212X (print), 1925-7074 (electronic)",
  ISSN-L =       "1206-212X",
  bibdate =      "Sat Apr 21 17:26:51 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijca.bib",
  URL =          "https://www.tandfonline.com/doi/full/10.2316/Journal.202.2010.4.202-2927",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Computer Applications",
  journal-URL =  "https://www.tandfonline.com/loi/tjca20",
  online-date =  "11 Jul 2015",
}

@Article{Yu:2010:PSI,
  author =       "Gang Yu and Xiaoxiao Ma and Yong Shen and Wenbao Han",
  title =        "Provable secure identity based generalized
                 signcryption scheme",
  journal =      j-THEOR-COMP-SCI,
  volume =       "411",
  number =       "40--42",
  pages =        "3614--3624",
  day =          "6",
  month =        sep,
  year =         "2010",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Wed Aug 31 09:12:46 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/03043975",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@InProceedings{Zafar:2010:GRN,
  author =       "Fahad Zafar and Marc Olano and Aaron Curtis",
  editor =       "????",
  booktitle =    "HPG '10 Proceedings of the Conference on High
                 Performance Graphics, Saarbrucken, Germany, June
                 25--27, 2010",
  title =        "{GPU} random numbers via the {Tiny Encryption
                 Algorithm}",
  publisher =    "Eurographics Association",
  address =      "Aire-la-Ville, Switzerland",
  pages =        "133--141",
  year =         "2010",
  ISBN =         "????",
  ISBN-13 =      "????",
  LCCN =         "????",
  bibdate =      "Sun Dec 18 09:52:12 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://www.cs.umbc.edu/~olano/papers/GPUTEA.pdf",
  acknowledgement = ack-nhfb,
}

@Article{Zhang:2010:ASL,
  author =       "Youtao Zhang and Jun Yang and Weijia Li and Linzhang
                 Wang and Lingling Jin",
  title =        "An authentication scheme for locating compromised
                 sensor nodes in {WSNs}",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "33",
  number =       "1",
  pages =        "50--62",
  month =        jan,
  year =         "2010",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Wed Jan 28 15:43:38 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804509000976",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Netw. Comput. Appl.",
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Zhang:2010:EMO,
  author =       "Lei Zhang and Bo Qin and Qianhong Wu and Futai Zhang",
  title =        "Efficient many-to-one authentication with
                 certificateless aggregate signatures",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "54",
  number =       "14",
  pages =        "2482--2491",
  day =          "6",
  month =        oct,
  year =         "2010",
  CODEN =        "????",
  ISSN =         "1389-1286",
  ISSN-L =       "1389-1286",
  bibdate =      "Sat Apr 2 08:42:40 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/13891286",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286",
}

@Article{Zhang:2010:ESP,
  author =       "Jianhong Zhang and Chenglian Liu and Yixian Yang",
  title =        "An efficient secure proxy verifiably encrypted
                 signature scheme",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "33",
  number =       "1",
  pages =        "29--34",
  month =        jan,
  year =         "2010",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Wed Jan 28 15:43:38 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804509001039",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Netw. Comput. Appl.",
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Zhang:2010:NSS,
  author =       "Qing Zhang and John McCullough and Justin Ma and Nabil
                 Schear and Michael Vrable and Amin Vahdat and Alex C.
                 Snoeren and Geoffrey M. Voelker and Stefan Savage",
  title =        "{Neon}: system support for derived data management",
  journal =      j-SIGPLAN,
  volume =       "45",
  number =       "7",
  pages =        "63--74",
  month =        jul,
  year =         "2010",
  CODEN =        "SINODQ",
  DOI =          "https://doi.org/10.1145/1735997.1736008",
  ISSN =         "0362-1340 (print), 1523-2867 (print), 1558-1160
                 (electronic)",
  ISSN-L =       "0362-1340",
  bibdate =      "Fri Oct 8 17:55:01 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "Modern organizations face increasingly complex
                 information management requirements. A combination of
                 commercial needs, legal liability and regulatory
                 imperatives has created a patchwork of mandated
                 policies. Among these, personally identifying customer
                 records must be carefully access-controlled, sensitive
                 files must be encrypted on mobile computers to guard
                 against physical theft, and intellectual property must
                 be protected from both exposure and 'poisoning.'
                 However, enforcing such policies can be quite difficult
                 in practice since users routinely share data over
                 networks and derive new files from these
                 inputs--incidentally laundering any policy
                 restrictions. In this paper, we describe a virtual
                 machine monitor system called Neon that transparently
                 labels derived data using byte-level 'tints' and tracks
                 these labels end to end across commodity applications,
                 operating systems and networks. Our goal with Neon is
                 to explore the viability and utility of transparent
                 information flow tracking within conventional networked
                 systems when used in the manner in which they were
                 intended. We demonstrate that this mechanism allows the
                 enforcement of a variety of data management policies,
                 including data-dependent confinement, mandatory I/O
                 encryption, and intellectual property management.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGPLAN Notices",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J706",
  keywords =     "difc; memory tainting; qemu; virtualization; xen",
}

@Article{Zhao:2010:IFU,
  author =       "Xi Zhao and Anthony Tung Shuen Ho and Yun Q. Shi",
  title =        "Image Forensics Using Generalised {Benford's Law} for
                 Improving Image Authentication Detection Rates in
                 Semi-Fragile Watermarking",
  journal =      "International Journal of Digital Crime and Forensics",
  volume =       "2",
  number =       "2",
  pages =        "1--20",
  month =        "????",
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.4018/jdcf.2010040101",
  ISSN =         "1941-6210 (print), 1941-6229 (electronic)",
  ISSN-L =       "1941-6210",
  bibdate =      "Wed Mar 29 09:27:49 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/benfords-law.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://dblp.org/db/journals/ijdcf/ijdcf2.html#ZhaoHS10",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Digit. Crime Forensics",
  dblp-key =     "journals/ijdcf/ZhaoHS10",
  dblp-mdate =   "2020-08-12",
  fjournal =     "International Journal of Digital Crime and Forensics",
  journal-URL =  "https://www.igi-global.com/gateway/journal/1112",
}

@Article{Zhao:2010:PSA,
  author =       "Jianjie Zhao and Dawu Gu",
  title =        "Provably secure authenticated key exchange protocol
                 under the {CDH} assumption",
  journal =      j-J-SYST-SOFTW,
  volume =       "83",
  number =       "11",
  pages =        "2297--2304",
  month =        nov,
  year =         "2010",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212",
  ISSN-L =       "0164-1212",
  bibdate =      "Mon Nov 1 11:40:40 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of systems and software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Book{Zheng:2010:PS,
  editor =       "Yuliang Zheng and Moti Yung and Alexander W. Dent",
  title =        "Practical Signcryption",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xviii + 274",
  year =         "2010",
  DOI =          "https://doi.org/10.1007/978-3-540-89411-7",
  ISBN =         "3-540-89409-8, 3-540-89411-X (e-book)",
  ISBN-13 =      "978-3-540-89409-4, 978-3-540-89411-7 (e-book)",
  LCCN =         "QA76. 9. A25 P73 2010",
  bibdate =      "Sat Jun 10 08:34:52 MDT 2017",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  series =       "Information Security and Cryptography",
  acknowledgement = ack-nhfb,
  subject =      "Cryptography; Elektronische Unterschrift;
                 Public-Key-Kryptosystem; COMPUTERS; Internet; Security;
                 Networking; Security; General; Aufsatzsammlung; Data
                 encryption (Computer science)",
  tableofcontents = "Front Matter / i--xviii \\
                 Introduction / Yuliang Zheng / 1--18 \\
                 Security Models for Signcryption \\
                 Front Matter / 19--19 \\
                 Security for Signcryption: The Two-User Model / Jee Hea
                 An, Tal Rabin / 21--42 \\
                 Security for Signcryption: The Multi--User Model /
                 Joonsang Baek, Ron Steinfeld / 43--53 \\
                 Signcryption Schemes \\
                 Front Matter / 55--55 \\
                 Signcryption Schemes Based on the Diffie Hellman
                 Problem / Paulo S. L. M. Barreto, Beno{\^\i}t Libert,
                 Noel McCullagh, Jean-Jacques Quisquater / 57--69 \\
                 Signcryption Schemes Based on Bilinear Maps / Paulo S.
                 L. M. Barreto, Beno{\^\i}t Libert, Noel McCullagh,
                 Jean-Jacques Quisquater / 71--97 \\
                 Signcryption Schemes Based on the RSA Problem /
                 Alexander W. Dent, John Malone-Lee / 99--117 \\
                 Construction Techniques \\
                 Front Matter / 119--119 \\
                 Hybrid Signcryption / Tor E. Bj{\o}rstad / 121--147 \\
                 Concealment and Its Applications to Authenticated
                 Encryption / Yevgeniy Dodis / 149--173 \\
                 Parallel Signcryption / Josef Pieprzyk, David
                 Pointcheval / 175--192 \\
                 Extensions of Signcryption \\
                 Front Matter / 193--193 \\
                 Identity-Based Signcryption / Xavier Boyen / 195--216
                 \\
                 Key Establishment Using Signcryption Techniques /
                 Alexander W. Dent / 217--240 \\
                 Applications of Signcryption / Yang Cui, Goichiro
                 Hanaoka / 241--256 \\
                 Back Matter / 257--274",
}

@Article{Zimand:2010:SEC,
  author =       "Marius Zimand",
  title =        "Simple extractors via constructions of cryptographic
                 pseudo-random generators",
  journal =      j-THEOR-COMP-SCI,
  volume =       "411",
  number =       "10",
  pages =        "1236--1250",
  day =          "4",
  month =        mar,
  year =         "2010",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Mon Mar 28 17:10:24 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/03043975",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Book{Aczel:2011:SWL,
  author =       "Amir D. Aczel",
  title =        "A Strange Wilderness: the Lives of the Great
                 Mathematicians",
  publisher =    "Sterling",
  address =      "New York, NY, USA",
  pages =        "xix + 284",
  year =         "2011",
  ISBN =         "1-4027-8584-4 (hardback), 1-4027-9085-6 (e-book)",
  ISBN-13 =      "978-1-4027-8584-9 (hardback), 978-1-4027-9085-0
                 (e-book)",
  LCCN =         "QA21 .A29 2011",
  bibdate =      "Thu Jun 7 16:36:39 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/fibquart.bib;
                 https://www.math.utah.edu/pub/tex/bib/master.bib;
                 z3950.loc.gov:7090/Voyager",
  abstract =     "Bestselling popular science author Amir Aczel selects
                 the most fascinating individuals and stories in the
                 history of mathematics, presenting a colorful narrative
                 that explores the quirky personalities behind some of
                 the most profound, enduring theorems. Through such
                 mathematical geniuses as Archimedes, Leonardo of Pisa
                 (a.k.a. Fibonacci), Tartaglia (`the stutterer'),
                 Descartes, Gottfried Leibniz, Carl Gauss, Joseph
                 Fourier (Napoleon's mathematician), Evariste Galois,
                 Georg Cantor, Ramanujan, and `Nicholas Bourbaki,' we
                 gather little known details about the alliances and
                 rivalries that profoundly impacted the development of
                 what the scheming doctor-turned-mathematician Geronimo
                 Girolamo called `The Great Art'. This story of
                 mathematics is not your dry `college textbook' account;
                 tales of duels, battlefield heroism, flamboyant
                 arrogance, pranks, secret societies, imprisonment,
                 feuds, theft, and even some fatal errors of judgment
                 fill these pages (clearly, genius doesn't guarantee
                 street smarts). Ultimately, readers will come away from
                 this book entertained, with a newfound appreciation of
                 the tenacity, complexity, eccentricity, and brilliance
                 of the mathematical genius",
  acknowledgement = ack-nhfb,
  subject =      "Mathematics; History; Mathematicians",
  tableofcontents = "Hellenic foundations \\
                 God is number \\
                 Plato's Academy \\
                 Alexandria \\
                 The East \\
                 The House of Wisdom \\
                 Medieval China \\
                 Renaissance mathematics \\
                 Italian shenanigans \\
                 Heresy \\
                 To calculus and beyond \\
                 The gentleman soldier \\
                 The greatest rivalry \\
                 Geniuses of the Enlightenment \\
                 Upheaval in France \\
                 Napoleon's mathematicians \\
                 Duel at dawn \\
                 Toward a new mathematics \\
                 Infinity and mental illness \\
                 Unlikely heroes \\
                 The strangest wilderness",
}

@Article{Adikari:2011:HBT,
  author =       "Jithra Adikari and Vassil S. Dimitrov and Laurent
                 Imbert",
  title =        "Hybrid Binary-Ternary Number System for Elliptic Curve
                 Cryptosystems",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "60",
  number =       "2",
  pages =        "254--265",
  month =        feb,
  year =         "2011",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2010.138",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Sun Feb 20 19:15:33 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Afanasyev:2011:PPN,
  author =       "Mikhail Afanasyev and Tadayoshi Kohno and Justin Ma
                 and Nick Murphy and Stefan Savage and Alex C. Snoeren
                 and Geoffrey M. Voelker",
  title =        "Privacy-preserving network forensics",
  journal =      j-CACM,
  volume =       "54",
  number =       "5",
  pages =        "78--87",
  month =        may,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1941487.1941508",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Apr 25 18:29:06 MDT 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "Privacy-preserving attribution of IP packets can help
                 balance forensics with an individual's right to
                 privacy.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  keywords =     "cryptography; digital signatures; fingerprints; Intel
                 Processor Serial Number (PSN) (1999); privacy",
}

@Article{Ahmadi:2011:SKC,
  author =       "Hadi Ahmadi and Reihaneh Safavi-Naini",
  title =        "Secret Keys from Channel Noise",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6632",
  pages =        "266--283",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-20465-4_16",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Dec 15 17:44:03 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_16",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Book{Aldrich:2011:GUS,
  author =       "Richard J. (Richard James) Aldrich",
  title =        "{GCHQ}: the uncensored story of {Britain}'s most
                 secret intelligence agency",
  publisher =    "HarperPress",
  address =      "London, UK",
  pages =        "666 + 16",
  year =         "2011",
  ISBN =         "0-00-727847-0 (hardcover), 0-00-731265-2 (paperback),
                 0-00-731266-0 (paperback)",
  ISBN-13 =      "978-0-00-727847-3 (hardcover), 978-0-00-731265-8
                 (paperback), 978-0-00-731266-5 (paperback)",
  LCCN =         "JN329.I6 A43 2011; UB251.G7 A54 2010",
  bibdate =      "Tue Aug 28 17:14:08 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 z3950.loc.gov:7090/Voyager",
  abstract =     "GCHQ is the successor to the famous Bletchley Park
                 wartime code-breaking organisation and is the largest
                 and most secretive intelligence organisation in the
                 country. During the war, it commanded more staff than
                 MI5 and MI6 combined and has produced a number of
                 intelligence triumphs as well as some notable failures.
                 Since the end of the Cold War, it has played a pivotal
                 role in shaping Britain's secret state. Still, we know
                 almost nothing about it. In this fascinating new book,
                 Richard J. Aldrich traces GCHQ's evolvement from a
                 wartime code breaking operation based in the
                 Bedfordshire countryside to one of the world's leading
                 espionage organisations. Focusing in part on GCHQ's
                 remarkably intimate relationship with its American
                 partner, the National Security Agency (NSA), Aldrich
                 also examines both the impact of the Second World War
                 on GCHQ and the breakthroughs made after the war was
                 over. Today's GCHQ struggles with some of the most
                 difficult issues of our time. A leading force of the
                 state's security efforts against militant terrorist
                 organisations like Al-Qaeda, they are also involved in
                 fundamental issues that will mould the future of
                 British society. Compelling and revealing, this is
                 historical writing of the utmost importance.",
  acknowledgement = ack-nhfb,
  author-dates = "1961--",
  subject =      "Intelligence service; Great Britain; History; 20th
                 century; cryptography",
  tableofcontents = "1: Schooldays \\
                 2: Friends and Allies \\
                 3: Every War Must Have an End \\
                 4: KGB and the Venona Project \\
                 5: UKUSA \\
                 Creating the Global Sigint Alliance \\
                 6: `Elint' and the Soviet Nuclear Target \\
                 7: Voyages of HMS Tiopin \\
                 8: Sigint in the Sun \\
                 GCHQ's Overseas Empire \\
                 9: Blake, Bugs and the Berlin Tunnel \\
                 10: Embassy Wars \\
                 11: Harold Macmillan \\
                 Shootdowns, Cyphers and Spending \\
                 12: Harold Wilson \\
                 Security Scandals and Spy Revelations \\
                 13: Intelligence for Doomsday \\
                 14: Staying Ahead \\
                 Sigint Ships and Spy Planes \\
                 15: Trouble with Henry \\
                 16: Disaster at Kizildere \\
                 17: Turmoil on Cyprus \\
                 18: Unmasking GCHQ: The ABC Trial \\
                 19: Geoffrey Prime \\
                 The GCHQ Mole \\
                 20: Surprise Attack \\
                 The Falklands War \\
                 21: Thatcher and the GCHQ Trade Union Ban \\
                 22: NSA and the Zircon Project \\
                 23: From Cold War to Hot Peace \\
                 The Gulf War and Bosnia \\
                 24: New Age of Ubiquitous Computing \\
                 25: 9/11 Attacks and the Iraq War \\
                 26: From Bletchley Park to a Brave New World?",
}

@Article{Alshammari:2011:CET,
  author =       "Riyad Alshammari and A. Nur Zincir-Heywood",
  title =        "Can encrypted traffic be identified without port
                 numbers, {IP} addresses and payload inspection?",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "55",
  number =       "6",
  pages =        "1326--1350",
  day =          "25",
  month =        apr,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1016/j.comnet.2010.12.002",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Sat Feb 4 10:22:35 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/13891286",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1389128610003695",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286",
}

@Manual{Anonymous:2011:AXL,
  author =       "Anonymous",
  title =        "{ANSI X9.98-2010}: Lattice-Based Polynomial Public Key
                 Establishment Algorithm for the Financial Services
                 Industry",
  organization = pub-ANSI,
  address =      pub-ANSI:adr,
  month =        apr,
  year =         "2011",
  bibdate =      "Thu Apr 21 09:46:45 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  price =        "US\$100",
  URL =          "http://webstore.ansi.org/RecordDetail.aspx?sku=ANSI+X9.98-2010",
  abstract =     "Specifies the cryptographic functions for establishing
                 symmetric keys using a lattice-based polynomial public
                 key encryption algorithm and the associated parameters
                 for key generation. The mechanism supported is key
                 transport, where one party selects keying material and
                 conveys it to the other party with cryptographic
                 protection. The keying material may consist of one or
                 more individual keys used to provide other
                 cryptographic services outside the scope of this
                 Standard, e.g., data confidentiality, data integrity,
                 or symmetric-key-based key establishment. The standard
                 also specifies key pair generators and corresponding
                 key pair validation methods supporting the key
                 transport schemes.",
  acknowledgement = ack-nhfb,
  keywords =     "ANSI X9.98-2010; NTRUEncrypt",
  remark =       "News stories in April 2011 claim speedups of 1000 to
                 100,000 over RSA and ECC (elliptic curve cryptography)
                 for NTRUEncrypt.",
}

@Article{Anonymous:2011:MCB,
  author =       "Anonymous",
  title =        "Memorial for codebreakers at {Bletchley Park}",
  journal =      "BBC News",
  day =          "27",
  month =        apr,
  year =         "2011",
  bibdate =      "Fri May 27 12:30:05 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.bbc.co.uk/news/uk-england-beds-bucks-herts-13208090",
  abstract =     "A memorial is to commemorate the work of codebreakers
                 at Bletchley Park in Milton Keynes during World War
                 II.",
  acknowledgement = ack-nhfb,
}

@Article{Au:2011:PPT,
  author =       "M. Ho Au and P. P. Tsang and A. Kapadia",
  title =        "{PEREA}: Practical {TTP}-free revocation of repeatedly
                 misbehaving anonymous users",
  journal =      j-TISSEC,
  volume =       "14",
  number =       "4",
  pages =        "29:1--29:??",
  month =        dec,
  year =         "2011",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/2043628.2043630",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Thu Dec 22 18:15:07 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tissec.bib",
  abstract =     "Several anonymous authentication schemes allow servers
                 to revoke a misbehaving user's ability to make future
                 accesses. Traditionally, these schemes have relied on
                 powerful Trusted Third Parties (TTPs) capable of
                 deanonymizing (or linking) users' connections. Such
                 TTPs are undesirable because users' anonymity is not
                 guaranteed, and users must trust them to judge
                 misbehaviors fairly. Recent schemes such as
                 Blacklistable Anonymous Credentials (BLAC) and Enhanced
                 Privacy ID (EPID) support ``privacy-enhanced
                 revocation''--- servers can revoke misbehaving users
                 without a TTP's involvement, and without learning the
                 revoked users' identities. In BLAC and EPID, however,
                 the computation required for authentication at the
                 server is linear in the size (L) of the revocation
                 list, which is impractical as the size approaches
                 thousands of entries.",
  acknowledgement = ack-nhfb,
  articleno =    "29",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@Article{Aumasson:2011:CHF,
  author =       "Jean-Philippe Aumasson and Raphael C.-W. Phan",
  title =        "On the cryptanalysis of the hash function {Fugue}:
                 {Partitioning} and inside-out distinguishers",
  journal =      j-INFO-PROC-LETT,
  volume =       "111",
  number =       "11",
  pages =        "512--515",
  day =          "15",
  month =        may,
  year =         "2011",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Thu Mar 31 12:47:01 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Bachrach:2011:ISS,
  author =       "Mayra Bachrach and Frank Y. Shih",
  title =        "Image steganography and steganalysis",
  journal =      j-WIRES,
  volume =       "3",
  number =       "5",
  pages =        "251--259",
  month =        may # "\slash " # jun,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1002/wics.152",
  ISSN =         "1939-0068 (print), 1939-5108 (electronic)",
  ISSN-L =       "1939-0068",
  bibdate =      "Fri Jun 19 13:52:59 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/wires.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "WIREs",
  fjournal =     "WIREs Computational Statistics",
  journal-URL =  "https://onlinelibrary.wiley.com/journal/19390068",
  onlinedate =   "10 March 2011",
}

@Article{Backstrom:2011:WAT,
  author =       "Lars Backstrom and Cynthia Dwork and Jon Kleinberg",
  title =        "Wherefore art thou {R3579X}?: anonymized social
                 networks, hidden patterns, and structural
                 steganography",
  journal =      j-CACM,
  volume =       "54",
  number =       "12",
  pages =        "133--141",
  month =        dec,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2043174.2043199",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Nov 29 11:53:53 MST 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cacm2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Bahi:2011:ECS,
  author =       "Jacques M. Bahi and Rapha{\"e}l Couturier and
                 Christophe Guyeux and Pierre-Cyrille H{\'e}am",
  title =        "Efficient and Cryptographically Secure Generation of
                 Chaotic Pseudorandom Numbers on {GPU}",
  journal =      "arxiv.org",
  volume =       "??",
  number =       "??",
  pages =        "??--??",
  day =          "22",
  month =        dec,
  year =         "2011",
  bibdate =      "Thu Jan 19 17:58:12 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://arxiv.org/abs/1112.5239",
  abstract =     "In this paper we present a new pseudorandom number
                 generator (PRNG) on graphics processing units (GPU).
                 This PRNG is based on the so-called chaotic iterations.
                 It is firstly proven to be chaotic according to the
                 Devaney's formulation. We thus propose an efficient
                 implementation for GPU that successfully passes the
                 BigCrush tests, deemed to be the hardest battery of
                 tests in TestU01. Experiments show that this PRNG can
                 generate about 20 billion of random numbers per second
                 on Tesla C1060 and NVidia GTX280 cards. It is then
                 established that, under reasonable assumptions, the
                 proposed PRNG can be cryptographically secure. A
                 chaotic version of the Blum--Goldwasser asymmetric key
                 encryption scheme is finally proposed.",
  acknowledgement = ack-nhfb,
}

@Book{Basin:2011:AIS,
  author =       "David Basin and Patrick Schaller and Michael
                 Schl{\"a}pfer",
  title =        "Applied information security: a hands-on approach",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xiv + 202",
  year =         "2011",
  ISBN =         "3-642-24473-4 (hardcover)",
  ISBN-13 =      "978-3-642-24473-5 (hardcover)",
  LCCN =         "QA76.9.A25 B37 2011",
  bibdate =      "Tue May 7 09:12:31 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
}

@Article{Basso:2011:BWC,
  author =       "Alessandro Basso and Davide Cavagnino and Victor
                 Pomponiu and Annamaria Vernone",
  title =        "Blind Watermarking of Color Images Using
                 {Karhunen--Lo{\`e}ve} Transform Keying",
  journal =      j-COMP-J,
  volume =       "54",
  number =       "7",
  pages =        "1076--1090",
  month =        jul,
  year =         "2011",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxq052",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Jun 27 11:03:57 MDT 2011",
  bibsource =    "http://comjnl.oxfordjournals.org/content/54/7.toc;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/54/7/1076.full.pdf+html",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "June 16, 2010",
}

@Article{Bendlin:2011:SHE,
  author =       "Rikke Bendlin and Ivan Damga{\aa}rd and Claudio
                 Orlandi and Sarah Zakarias",
  title =        "Semi-homomorphic Encryption and Multiparty
                 Computation",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6632",
  pages =        "169--188",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-20465-4_11",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Dec 15 17:44:03 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_11",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Bernstein:2011:HSH,
  author =       "D. Bernstein and N. Duif and T. Lange and P. Schwabe
                 and B. Yang",
  title =        "High-speed high-security signatures",
  journal =      "Journal of Cryptographic Engineering",
  volume =       "2",
  number =       "2",
  pages =        "77--89",
  month =        sep,
  year =         "2011",
  DOI =          "",
  bibdate =      "Wed Aug 20 16:59:21 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://ed25519.cr.yp.to/ed25519-20110926.pdf",
  acknowledgement = ack-nhfb,
}

@TechReport{Bertoni:2011:CSF,
  author =       "Guido Bertoni and Joan Daemen and Micha{\"e}l
                 Peeters",
  title =        "Cryptographic sponge functions",
  type =         "Report",
  institution =  "STMicroelectronics",
  address =      "Antwerp, Belgium (??)",
  pages =        "93",
  day =          "14",
  month =        jan,
  year =         "2011",
  bibdate =      "Fri Dec 14 15:25:32 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  URL =          "http://sponge.noekeon.org/CSF-0.1.pdf",
  acknowledgement = ack-nhfb,
  lastaccess =   "14 December 2012",
}

@TechReport{Bogdanov:2011:BCF,
  author =       "Andrey Bogdanov and Dmitry Khovratovich and Christian
                 Rechberger",
  title =        "Biclique cryptanalysis of the full {AES}",
  type =         "Report",
  institution =  "Microsoft Research",
  address =      "Redmon, WA, USA",
  year =         "2011",
  bibdate =      "Wed Aug 24 17:07:16 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  note =         "To appear at ASIACRYPT 2011.",
  URL =          "http://research.microsoft.com/en-us/projects/cryptanalysis/aes.aspx;
                 http://research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf;
                 http://rump2011.cr.yp.to/d41bd80f6680cfd2323e53fbb9a62a81.pdf",
  abstract =     "Since Rijndael was chosen as the Advanced Encryption
                 Standard, improving upon 7-round attacks on the 128-bit
                 key variant or upon 8-round attacks on the 192/256-bit
                 key variants has been one of the most difficult
                 challenges in the cryptanalysis of block ciphers for
                 more than a decade. In this paper we present a novel
                 technique of block cipher cryptanalysis with bicliques,
                 which leads to the following results:\par

                 -- The first key recovery attack on the full AES-128
                 with computational complexity $ 2^{126.1} $.\par

                 -- The first key recovery attack on the full AES-192
                 with computational complexity $ 2^{189.7} $.\par

                 -- The first key recovery attack on the full AES-256
                 with computational complexity $ 2^{254.4} $.\par

                 -- Attacks with lower complexity on the reduced-round
                 versions of AES not considered before, including an
                 attack on 8-round AES-128 with complexity $ 2^{124.9}
                 $.\par

                 Preimage attacks on compression functions based on the
                 full AES versions.\par

                 In contrast to most shortcut attacks on AES variants,
                 we do not need to assume related-keys. Most of our
                 attacks only need a very small part of the codebook and
                 have small memory requirements, and are practically
                 verified to a large extent. As our attacks are of high
                 computational complexity, they do not threaten the
                 practical use of AES in any way.",
  acknowledgement = ack-nhfb,
  keywords =     "AES; bicliques; block ciphers; key recovery;
                 preimage",
  remark =       "This paper may be the first demonstration of an attack
                 on an arbitrary AES key that reduces the attack
                 complexity to that for a key two bits shorter than the
                 original.",
}

@Article{Bohli:2011:RAP,
  author =       "Jens-Matthias Bohli and Andreas Pashalidis",
  title =        "Relations among privacy notions",
  journal =      j-TISSEC,
  volume =       "14",
  number =       "1",
  pages =        "4:1--4:??",
  month =        may,
  year =         "2011",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/1952982.1952986",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Thu Jun 2 07:27:23 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "This article presents a hierarchy of privacy notions
                 that covers multiple anonymity and unlinkability
                 variants. The underlying definitions, which are based
                 on the idea of indistinguishability between two worlds,
                 provide new insights into the relation between, and the
                 fundamental structure of, different privacy notions. We
                 furthermore place previous privacy definitions
                 concerning group signature, anonymous communication,
                 and secret voting systems in the context of our
                 hierarchy; this renders these traditionally
                 disconnected notions comparable.",
  acknowledgement = ack-nhfb,
  articleno =    "4",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@Article{Bouman:2011:SAW,
  author =       "Niek J. Bouman and Serge Fehr",
  title =        "Secure Authentication from a Weak Key, without Leaking
                 Information",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6632",
  pages =        "246--265",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-20465-4_15",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Dec 15 17:44:03 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_15",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Bowyer:2011:WSD,
  author =       "Kevin W. Bowyer",
  title =        "What Surprises Do Identical Twins Have for Identity
                 Science?",
  journal =      j-COMPUTER,
  volume =       "44",
  number =       "7",
  pages =        "100--102",
  month =        jul,
  year =         "2011",
  CODEN =        "CPTRB4",
  DOI =          "https://doi.org/10.1109/MC.2011.221",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Tue Jul 19 16:44:44 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
}

@InProceedings{Brakerski:2011:EFH,
  author =       "Z. Brakerski and V. Vaikuntanathan",
  title =        "Efficient Fully Homomorphic Encryption from (Standard)
                 {LWE}",
  crossref =     "IEEE:2011:PIA",
  pages =        "97--106",
  year =         "2011",
  DOI =          "https://doi.org/10.1109/FOCS.2011.12",
  bibdate =      "Thu Apr 12 09:34:22 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/focs2010.bib",
  acknowledgement = ack-nhfb,
  book-URL =     "http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6108120",
}

@Book{Briggs:2011:SDC,
  author =       "Asa Briggs",
  title =        "Secret days: code-breaking in {Bletchley Park}",
  publisher =    "Frontline Books",
  address =      "London, UK",
  pages =        "xix + 202 + 26",
  year =         "2011",
  ISBN =         "1-84832-615-7",
  ISBN-13 =      "978-1-84832-615-6",
  LCCN =         "D810.C88 B75 2011",
  bibdate =      "Mon Sep 3 17:58:14 MDT 2012",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/contempphys.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  acknowledgement = ack-nhfb,
  subject =      "Briggs, Asa; Lorenz cipher system; World War,
                 1939--1945; Cryptography; Secret service; Great
                 Britain; Electronic intelligence; Personal narratives,
                 British; Dechiffrierung; Weltkrieg (1939--1945);
                 Bletchley Park (Milton Keynes, England); History;
                 Bletchley Park; Gro{\ss}britannien",
  subject-dates = "1921--",
}

@Article{Broemeling:2011:AES,
  author =       "Lyle D. Broemeling",
  title =        "An Account of Early Statistical Inference in {Arab}
                 Cryptology",
  journal =      j-AMER-STAT,
  volume =       "65",
  number =       "4",
  pages =        "255--257",
  month =        nov,
  year =         "2011",
  CODEN =        "ASTAAJ",
  DOI =          "https://doi.org/10.1198/tas.2011.10191",
  ISSN =         "0003-1305 (print), 1537-2731 (electronic)",
  ISSN-L =       "0003-1305",
  bibdate =      "Fri Jan 27 07:07:40 MST 2012",
  bibsource =    "http://www.amstat.org/publications/tas/;
                 https://www.math.utah.edu/pub/tex/bib/amstat.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "The American Statistician",
  journal-URL =  "http://www.tandfonline.com/loi/utas20",
}

@Article{Buchmann:2011:XPF,
  author =       "Johannes Buchmann and Eeik Dahmen and Andreas
                 H{\"u}lsing",
  title =        "{XMSS} --- A Practical Forward Secure Signature Scheme
                 Based on Minimal Security Assumptions",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7071",
  pages =        "117--129",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-25405-5_8",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 31 16:07:32 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://link.springer.com/chapter/10.1007/978-3-642-25405-5_8",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
  journal-URL =  "http://link.springer.com/bookseries/558",
  remark =       "Proceedings of the 4th International Workshop on
                 Post-Quantum Cryptography (PQCrypto 11)",
}

@TechReport{Burke:2011:AMD,
  author =       "Colin Burke",
  title =        "{Agnes Meyer Driscoll} vs. the {Enigma} and the
                 {Bombe}",
  type =         "Report",
  institution =  "University of Maryland, Baltimore County",
  address =      "1000 Hilltop Circle Baltimore, MD 21250, USA",
  pages =        "132",
  day =          "7",
  month =        jan,
  year =         "2011",
  bibdate =      "Fri Dec 29 08:56:21 2017",
  bibsource =    "https://www.math.utah.edu/pub/bibnet/authors/t/turing-alan-mathison.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://userpages.umbc.edu/~burke/driscoll1-2011.pdf",
  abstract =     "Documents in Britain's National Archives\slash Public
                 Record Office and in the U.S. National Archive's Record
                 Groups RG457 and RG38 indicate that in mid-1941 the
                 United States Navy's codebreaking organization, OP-20-G
                 ignored an opportunity to gain full knowledge of
                 Britain's anti-Enigma methods and machines. Spending a
                 year and one-half working on what it felt was a unique
                 and much more effective method --- but one that failed
                 --- OP-20-G's staff, at a critical time in
                 U.S.--British relations, did not inform America's
                 decision makers of Britain's willingness to share its
                 crypto-secrets . As a result, American leaders believed
                 that England's GC\&CS had deliberately withheld vital
                 information that would have allowed the development of
                 an independent American attack on Naval Enigma. That
                 belief lasted throughout the war and caused friction
                 between the two nations. Other consequences of
                 OP-20-G's mid-1941 decision were to delay the adoption
                 of the British Bombe and its allied methods and to
                 waste perhaps six months of the vital time of the new
                 team of cryptanalysts and engineers assigned, in early
                 1942, to develop an American Bombe.",
  acknowledgement = ack-nhfb,
  keywords =     "Banburismus; Bombe; catalog; cold-point; Currier;
                 Denniston; Driscoll; Engstrom; Enigma; GC&CS;
                 hot-point; OP-20-G; Safford; Tiltman; Weeks; Wenger",
}

@Article{Burmester:2011:LRA,
  author =       "Mike Burmester and Jorge Munilla",
  title =        "Lightweight {RFID} authentication with forward and
                 backward security",
  journal =      j-TISSEC,
  volume =       "14",
  number =       "1",
  pages =        "11:1--11:??",
  month =        may,
  year =         "2011",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/1952982.1952993",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Thu Jun 2 07:27:23 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "We propose a lightweight RFID authentication protocol
                 that supports forward and backward security. The only
                 cryptographic mechanism that this protocol uses is a
                 pseudorandom number generator (PRNG) that is shared
                 with the backend Server. Authentication is achieved by
                 exchanging a few numbers (3 or 5) drawn from the PRNG.
                 The lookup time is constant, and the protocol can be
                 easily adapted to prevent online man-in-the-middle
                 relay attacks. Security is proven in the UC security
                 framework.",
  acknowledgement = ack-nhfb,
  articleno =    "11",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@Article{Byun:2011:SMC,
  author =       "Jin Wook Byun and Dong Hoon Lee",
  title =        "On a security model of conjunctive keyword search over
                 encrypted relational database",
  journal =      j-J-SYST-SOFTW,
  volume =       "84",
  number =       "8",
  pages =        "1364--1372",
  month =        aug,
  year =         "2011",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212",
  ISSN-L =       "0164-1212",
  bibdate =      "Tue Jun 21 10:22:32 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Book{Carlson:2011:JRW,
  author =       "Elliot Carlson",
  title =        "{Joe Rochefort}'s war: the odyssey of the codebreaker
                 who outwitted {Yamamoto} at {Midway}",
  publisher =    "Naval Institute Press",
  address =      "Annapolis, MD, US",
  pages =        "????",
  year =         "2011",
  ISBN =         "1-61251-060-4 (hardcover)",
  ISBN-13 =      "978-1-61251-060-6 (hardcover)",
  LCCN =         "D774.M5 C28 2011",
  bibdate =      "Mon Sep 3 17:46:27 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  subject =      "Rochefort, Joe; Midway, Battle of, 1942;
                 Cryptographers; United States; Biography; World War,
                 1939-1945; Cryptography; Electronic intelligence;
                 Military intelligence; Naval operations, American;
                 Naval operations, Japanese",
  subject-dates = "1900--1976",
}

@Book{Carstensen:2011:AAA,
  author =       "Celine Carstensen and Benjamin Fine and Gerhard
                 Rosenberger",
  title =        "Abstract algebra: applications to {Galois} theory,
                 algebraic geometry, and cryptography",
  volume =       "11",
  publisher =    pub-GRUYTER,
  address =      pub-GRUYTER:adr,
  pages =        "????",
  year =         "2011",
  ISBN =         "3-11-025008-X",
  ISBN-13 =      "978-3-11-025008-4",
  LCCN =         "QA162 .C375 2011",
  bibdate =      "Mon Jan 10 18:22:47 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Sigma series in pure mathematics",
  acknowledgement = ack-nhfb,
  subject =      "Algebra, Abstract; Galois theory; Geometry, Algebraic;
                 Cryptography",
}

@Article{Chandra:2011:AST,
  author =       "Shalini Chandra and Raees Ahmad Khan",
  title =        "Availability state transition model",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "3",
  pages =        "1--3",
  month =        may,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1968587.1968603",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:02 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Several security mechanisms such as digital signature,
                 timestamp audits and trails, encryption, throttling,
                 filtering, protect secrets etc. are available. These
                 security mechanisms are not completely able to stop
                 malicious attacks. For malicious hackers and attackers
                 it is comparatively easy to exploit security loopholes
                 at the user's end side. Behind such type of problem the
                 main reason is bad software design and its
                 implementation without proper risk analysis and
                 mitigation. So, an idea to model availability states an
                 Availability State Transition Model (ASTM) has been
                 proposed in this article. In ASTM methodology, only
                 design level details is required which can be easily
                 retrieved from the software's design.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Chang:2011:DEQ,
  author =       "Tao-Ku Chang and Gwan-Hwan Hwang",
  title =        "Developing an efficient query system for encrypted
                 {XML} documents",
  journal =      j-J-SYST-SOFTW,
  volume =       "84",
  number =       "8",
  pages =        "1292--1305",
  month =        aug,
  year =         "2011",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212",
  ISSN-L =       "0164-1212",
  bibdate =      "Tue Jun 21 10:22:32 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Chang:2011:RSB,
  author =       "Chin-Chen Chang and Chih-Yang Lin and Yi-Hsuan Fan",
  title =        "Reversible Steganography for {BTC}-compressed Images",
  journal =      j-FUND-INFO,
  volume =       "109",
  number =       "2",
  pages =        "121--134",
  month =        apr,
  year =         "2011",
  CODEN =        "FUMAAJ",
  DOI =          "https://doi.org/10.3233/FI-2011-500",
  ISSN =         "0169-2968 (print), 1875-8681 (electronic)",
  ISSN-L =       "0169-2968",
  bibdate =      "Sat Mar 5 17:13:16 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/fundinfo2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Fundamenta Informaticae",
  journal-URL =  "http://content.iospress.com/journals/fundamenta-informaticae",
}

@Article{Chang:2011:SFW,
  author =       "Chin-Chen Chang and Kuo-Nan Chen and Chin-Feng Lee and
                 Li-Jen Liu",
  title =        "A secure fragile watermarking scheme based on
                 chaos-and-{Hamming} code",
  journal =      j-J-SYST-SOFTW,
  volume =       "84",
  number =       "9",
  pages =        "1462--1470",
  month =        sep,
  year =         "2011",
  CODEN =        "JSSODM",
  DOI =          "https://doi.org/10.1016/j.jss.2011.02.029",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Mon Feb 6 15:39:22 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0164121211000549",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Chen:2011:ARI,
  author =       "Chien-Chang Chen and Yao-Hong Tsai",
  title =        "Adaptive reversible image watermarking scheme",
  journal =      j-J-SYST-SOFTW,
  volume =       "84",
  number =       "3",
  pages =        "428--434",
  month =        mar,
  year =         "2011",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212",
  ISSN-L =       "0164-1212",
  bibdate =      "Tue Jun 21 10:22:26 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Chen:2011:EAA,
  author =       "Tien-Ho Chen and Yen-Chiu Chen and Wei-Kuan Shih and
                 Hsin-Wen Wei",
  title =        "An efficient anonymous authentication protocol for
                 mobile {pay-TV}",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "34",
  number =       "4",
  pages =        "1131--1137",
  month =        jul,
  year =         "2011",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Wed Jan 28 15:43:59 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804510002031",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Netw. Comput. Appl.",
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Chen:2011:IBT,
  author =       "Xiaofeng Chen and Willy Susilo and Fangguo Zhang and
                 Haibo Tian and Jin Li",
  title =        "Identity-based trapdoor mercurial commitments and
                 applications",
  journal =      j-THEOR-COMP-SCI,
  volume =       "412",
  number =       "39",
  pages =        "5498--5512",
  day =          "9",
  month =        sep,
  year =         "2011",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Tue Aug 30 18:51:54 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/03043975",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{Chen:2011:SEI,
  author =       "Tien-Ho Chen and Han-Cheng Hsiang and Wei-Kuan Shih",
  title =        "Security enhancement on an improvement on two remote
                 user authentication schemes using smart cards",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "27",
  number =       "4",
  pages =        "377--380",
  month =        apr,
  year =         "2011",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Tue Aug 30 11:43:29 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/0167739X",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Chen:2011:TVS,
  author =       "Tzung-Her Chen and Kai-Hsiang Tsao",
  title =        "Threshold visual secret sharing by random grids",
  journal =      j-J-SYST-SOFTW,
  volume =       "84",
  number =       "7",
  pages =        "1197--1208",
  month =        jul,
  year =         "2011",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212",
  ISSN-L =       "0164-1212",
  bibdate =      "Tue Jun 21 10:22:31 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Chhabra:2011:NSN,
  author =       "Siddhartha Chhabra and Yan Solihin",
  title =        "{i-NVMM}: a secure non-volatile main memory system
                 with incremental encryption",
  journal =      j-COMP-ARCH-NEWS,
  volume =       "39",
  number =       "3",
  pages =        "177--188",
  month =        jun,
  year =         "2011",
  CODEN =        "CANED2",
  DOI =          "https://doi.org/10.1145/2024723.2000086",
  ISSN =         "0163-5964 (print), 1943-5851 (electronic)",
  ISSN-L =       "0163-5964",
  bibdate =      "Mon Sep 5 17:15:11 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGARCH Computer Architecture News",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J89",
}

@Book{Chin:2011:ACS,
  author =       "Shiu-Kai Chin and Susan Beth Older",
  title =        "Access control, security, and trust: a logical
                 approach",
  publisher =    pub-CHAPMAN-HALL-CRC,
  address =      pub-CHAPMAN-HALL-CRC:adr,
  pages =        "????",
  year =         "2011",
  ISBN =         "1-58488-862-8",
  ISBN-13 =      "978-1-58488-862-8",
  LCCN =         "QA76.9.A25 C446 2011",
  bibdate =      "Mon Jan 10 18:23:10 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Chapman and Hall/CRC cryptography and network
                 security",
  acknowledgement = ack-nhfb,
  subject =      "Computers; Access control; System design",
}

@Article{Chuang:2011:LMA,
  author =       "Ming-Chin Chuang and Jeng-Farn Lee",
  title =        "A lightweight mutual authentication mechanism for
                 network mobility in {IEEE 802.16e} wireless networks",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "55",
  number =       "16",
  pages =        "3796--3809",
  day =          "10",
  month =        nov,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1016/j.comnet.2011.05.027",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Sat Feb 4 10:22:57 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/13891286",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1389128611002052",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286",
}

@Article{Cilardo:2011:EPT,
  author =       "Alessandro Cilardo",
  title =        "Exploring the Potential of Threshold Logic for
                 Cryptography-Related Operations",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "60",
  number =       "4",
  pages =        "452--462",
  month =        apr,
  year =         "2011",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2010.116",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Wed Jun 29 10:26:18 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Coull:2011:ACO,
  author =       "Scott E. Coull and Matthew Green and Susan
                 Hohenberger",
  title =        "Access controls for oblivious and anonymous systems",
  journal =      j-TISSEC,
  volume =       "14",
  number =       "1",
  pages =        "10:1--10:??",
  month =        may,
  year =         "2011",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/1952982.1952992",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Thu Jun 2 07:27:23 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "The use of privacy-enhancing cryptographic protocols,
                 such as anonymous credentials and oblivious transfer,
                 could have a detrimental effect on the ability of
                 providers to effectively implement access controls on
                 their content. In this article, we propose a stateful
                 anonymous credential system that allows the provider to
                 implement nontrivial, real-world access controls on
                 oblivious protocols conducted with anonymous users. Our
                 system models the behavior of users as a state machine
                 and embeds that state within an anonymous credential to
                 restrict access to resources based on the state
                 information. The use of state machine models of user
                 behavior allows the provider to restrict the users'
                 actions according to a wide variety of access control
                 models without learning anything about the users'
                 identities or actions.",
  acknowledgement = ack-nhfb,
  articleno =    "10",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@Article{Crampton:2011:PEC,
  author =       "Jason Crampton",
  title =        "Practical and efficient cryptographic enforcement of
                 interval-based access control policies",
  journal =      j-TISSEC,
  volume =       "14",
  number =       "1",
  pages =        "14:1--14:??",
  month =        may,
  year =         "2011",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/1952982.1952996",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Thu Jun 2 07:27:23 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "The enforcement of access control policies using
                 cryptography has received considerable attention in
                 recent years and the security of such enforcement
                 schemes is increasingly well understood. Recent work in
                 the area has considered the efficient enforcement of
                 temporal and geo-spatial access control policies, and
                 asymptotic results for the time and space complexity of
                 efficient enforcement schemes have been obtained.
                 However, for practical purposes, it is useful to have
                 explicit bounds for the complexity of enforcement
                 schemes. In this article we consider interval-based
                 access control policies, of which temporal and
                 geo-spatial access control policies are special cases.
                 We define enforcement schemes for interval-based access
                 control policies for which it is possible, in almost
                 all cases, to obtain exact values for the schemes'
                 complexity, thereby subsuming a substantial body of
                 work in the literature.",
  acknowledgement = ack-nhfb,
  articleno =    "14",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@Book{Cremers:2011:OSV,
  author =       "Cas Cremers and Sjouke Mauw",
  title =        "Operational Semantics and Verification of Security
                 Protocols",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xiii + 172 + 59",
  year =         "2011",
  DOI =          "https://doi.org/10.1007/978-3-540-78636-8",
  ISBN =         "3-540-78635-X (print), 3-540-78636-8 (e-book),
                 3-642-43053-8",
  ISBN-13 =      "978-3-540-78635-1 (print), 978-3-540-78636-8 (e-book),
                 978-3-642-43053-4",
  ISSN =         "1619-7100 (print), 2197-845X (electronic)",
  ISSN-L =       "1619-7100",
  LCCN =         "QA76.9.A25 C74 2012; QA76.9.D35",
  bibdate =      "Sat Jun 10 08:34:47 MDT 2017",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  series =       "Information Security and Cryptography",
  URL =          "http://www.springerlink.com/content/978-3-540-78636-8",
  abstract =     "Security protocols are widely used to ensure secure
                 communications over insecure networks, such as the
                 internet or airwaves. These protocols use strong
                 cryptography to prevent intruders from reading or
                 modifying the messages. However, using cryptography is
                 not enough to ensure their correctness. Combined with
                 their typical small size, which suggests that one could
                 easily assess their correctness, this often results in
                 incorrectly designed protocols. The authors present a
                 methodology for formally describing security protocols
                 and their environment. This methodology includes a
                 model for describing protocols, their execution model,
                 and the intruder model. The models are extended with a
                 number of well-defined security properties, which
                 capture the notions of correct protocols, and secrecy
                 of data. The methodology can be used to prove that
                 protocols satisfy these properties. Based on the model
                 they have developed a tool set called Scyther that can
                 automatically find attacks on security protocols or
                 prove their correctness. In case studies they show the
                 application of the methodology as well as the
                 effectiveness of the analysis tool. The methodology's
                 strong mathematical basis, the strong separation of
                 concerns in the model, and the accompanying tool set
                 make it ideally suited both for researchers and
                 graduate students of information security or formal
                 methods and for advanced professionals designing
                 critical security protocols.",
  acknowledgement = ack-nhfb,
  shorttableofcontents = "Introduction \\
                 Preliminaries \\
                 Operational Semantics \\
                 Security Properties \\
                 Verification \\
                 Multiprotocol Attacks \\
                 Generalizing NSL for Multiparty Authentication \\
                 Related Work \\
                 Conclusions and Future Work \\
                 Index",
  subject =      "Architektur; Datenstruktur; Rechnernetz; Software
                 Engineering; Computer networks; Security measures;
                 Computer network protocols; Computer security;
                 Methodology",
  tableofcontents = "Operational Semantics and Verification of Security
                 Protocols \\
                 Preface \\
                 Contents \\
                 List of Figures \\
                 List of Tables \\
                 1: Introduction \\
                 1.1 Historical Context \\
                 1.2 Black-Box Security Protocol Analysis \\
                 1.3 Purpose and Approach \\
                 1.4 Overview \\
                 1.4.1 The Protocol Analysis Model \\
                 1.4.2 Applications of the Model \\
                 2: Preliminaries \\
                 2.1 Sets and Relations \\
                 2.2 BNF Grammars \\
                 2.3 Labelled Transition Systems \\
                 3: Operational Semantics \\
                 3.1 Analysis of the Problem Domain \\
                 Cryptographic Primitives \\
                 Protocol Specification \\
                 Agent Model \\
                 Communication and Threat Model \\
                 Security Requirements \\
                 3.2 Security Protocol Specification \\
                 3.2.1 Role Terms \\
                 3.2.2 Protocol Specification \\
                 3.2.3 Event Order \\
                 3.3 Describing Protocol Execution \\
                 3.3.1 Runs \\
                 3.3.2 Matching \\
                 3.3.3 Run Events \\
                 3.3.4 Threat Model \\
                 3.4 Operational Semantics \\
                 3.5 Example Protocol Specification \\
                 3.6 Problems \\
                 4: Security Properties \\
                 4.1 Security Properties as Claim Events \\
                 4.2 Secrecy \\
                 4.3 Authentication \\
                 4.3.1 Aliveness \\
                 4.3.2 Synchronisation \\
                 4.3.3 Non-injective Synchronisation \\
                 4.3.4 Injective Synchronisation \\
                 4.3.5 Message Agreement \\
                 4.4 Authentication Hierarchy \\
                 4.5 Breaking and Fixing the Needham--Schroeder Protocol
                 Proof of claim 7: Secrecy of nr for the responder \\
                 Note Proof of claim 5 \\
                 4.6 Summary \\
                 4.7 Problems \\
                 5: Verification \\
                 5.1 Patterns \\
                 5.2 Verification Algorithm \\
                 5.2.1 Well-Typed Patterns \\
                 5.2.2 Realisable Patterns \\
                 5.2.3 Empty Patterns and Redundant Patterns \\
                 5.2.4 Algorithm Overview \\
                 5.2.5 Pattern Refinement \\
                 5.3 Example of Search Space Traversal \\
                 5.4 Verifying Security Properties Using Pattern
                 Refinement \\
                 Analysis of Secrecy \\
                 Characterisation of Security Protocols \\
                 Analysis of Authentication Properties \\
                 5.5 Heuristics and Parameter Choices \\
                 5.5.1 Heuristics \\
                 5.5.2 Choosing a Bound on the Number of Runs \\
                 5.5.3 Performance \\
                 5.6 Verifying Injectivity \\
                 5.6.1 Injective Synchronisation \\
                 5.6.2 The LOOP Property \\
                 5.6.3 Model Assumptions \\
                 5.7 Further Features of the Scyther Tool \\
                 Data Agreement \\
                 Adversary Models \\
                 Applications \\
                 5.8 Problems \\
                 Problems \\
                 6: Multi-protocol Attacks \\
                 6.1 Multi-protocol Attacks \\
                 6.2 Experiments \\
                 6.3 Results \\
                 6.3.1 Strict Type Matching: No Type Flaws \\
                 6.3.2 Simple Type Matching: Basic Type Flaws Only \\
                 6.3.3 Untyped Matching: All Type Flaws \\
                 6.3.4 Attack Example \\
                 6.4 Attack Scenarios \\
                 6.4.1 Protocol Updates \\
                 6.4.2 Ambiguous Authentication \\
                 6.5 Preventing Multi-protocol Attacks \\
                 Strict Type Detection \\
                 Tagging \\
                 Verification \\
                 6.6 Summary \\
                 6.7 Problems \\
                 Problems \\
                 7: Generalising NSL for Multi-party Authentication \\
                 7.1 A Multi-party Authentication Protocol \\
                 7.2 Analysis \\
                 7.2.1 Initial Observations \\
                 7.2.2 Proof of Correctness \\
                 Proof Outline \\
                 7.2.3 Secrecy of Nonces Created in Role rp0 \\
                 7.2.4 Non-injective Synchronisation of Role r0 \\
                 7.2.5 Secrecy of Nonces Created in Role rpx for x>0 \\
                 7.2.6 Non-injective Synchronisation of Role rpx for
                 x>0",
  xxpages =      "xii + 172",
  xxyear =       "2012",
}

@Article{Curtmola:2011:SSE,
  author =       "Reza Curtmola and Juan Garay and Seny Kamara and
                 Rafail Ostrovsky",
  title =        "Searchable symmetric encryption: Improved definitions
                 and efficient constructions",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "5",
  pages =        "895--934",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2011-0426",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:15 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Book{Davies:2011:IST,
  author =       "Joshua Dennis Davies",
  title =        "Implementing {SSL\slash TLS} using cryptography and
                 {PKI}",
  publisher =    pub-WILEY,
  address =      pub-WILEY:adr,
  pages =        "????",
  year =         "2011",
  ISBN =         "0-470-92041-6 (paperback)",
  ISBN-13 =      "978-0-470-92041-1 (paperback)",
  LCCN =         "????",
  bibdate =      "Mon Jan 10 18:23:31 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
}

@Article{Dew:2011:BRB,
  author =       "Nicholas Dew",
  title =        "Book Review: {{\booktitle{The Information Master:
                 Jean-Baptiste Colbert's Secret State Intelligence
                 System}}}",
  journal =      j-ISIS,
  volume =       "102",
  number =       "4",
  pages =        "765--765",
  month =        dec,
  year =         "2011",
  CODEN =        "ISISA4",
  DOI =          "https://doi.org/10.1086/664857",
  ISSN =         "0021-1753 (print), 1545-6994 (electronic)",
  ISSN-L =       "0021-1753",
  bibdate =      "Tue Jul 30 21:20:41 MDT 2013",
  bibsource =    "http://www.jstor.org/action/showPublication?journalCode=isis;
                 http://www.jstor.org/stable/10.1086/663595;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/isis2010.bib",
  URL =          "http://www.jstor.org/stable/10.1086/664857",
  acknowledgement = ack-nhfb,
  fjournal =     "Isis",
  journal-URL =  "http://www.jstor.org/page/journal/isis/about.html",
  xxtitle =      "Book Review: {{\booktitle{Jacob Soll. The Information
                 Master: Jean-Baptiste Colbert's Secret State
                 Intelligence System.}}}",
}

@Article{Dini:2011:LLA,
  author =       "Gianluca Dini and Ida M. Savino",
  title =        "{LARK}: a Lightweight Authenticated {ReKeying} Scheme
                 for Clustered Wireless Sensor Networks",
  journal =      j-TECS,
  volume =       "10",
  number =       "4",
  pages =        "41:1--41:??",
  month =        nov,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2043662.2043665",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Mon Dec 19 15:49:06 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tecs.bib",
  abstract =     "Group communication has proven a powerful paradigm for
                 designing applications and services in Wireless Sensor
                 Networks (WSNs). Given the tight interaction between
                 WSNs and the physical world, a security infringement
                 may translate into a safety infringement. Therefore, in
                 order to fully exploit the group communication paradigm
                 we need to secure it. Traditionally, this requirement
                 has been formalized in terms of backward and forward
                 security and fulfilled by means of rekeying. In WSNs,
                 group rekeying becomes particularly a complex problem
                 because communication takes place over an easily
                 accessible wireless medium and because sensor nodes
                 have severe limitations in terms of computing, storage,
                 energy, and tamper-resistance capabilities for cost
                 reasons.",
  acknowledgement = ack-nhfb,
  articleno =    "41",
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?&idx=J840",
}

@InProceedings{Dodis:2011:SSC,
  author =       "Y. Dodis and A. Lewko and B. Waters and D. Wichs",
  title =        "Storing Secrets on Continually Leaky Devices",
  crossref =     "IEEE:2011:PIA",
  pages =        "688--697",
  year =         "2011",
  DOI =          "https://doi.org/10.1109/FOCS.2011.35",
  bibdate =      "Thu Apr 12 09:34:29 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/focs2010.bib",
  acknowledgement = ack-nhfb,
  book-URL =     "http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6108120",
}

@Article{Dong:2011:SSE,
  author =       "Changyu Dong and Giovanni Russello and Naranker
                 Dulay",
  title =        "Shared and searchable encrypted data for untrusted
                 servers",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "3",
  pages =        "367--397",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0415",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:07 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Misc{Duong:2011:CWC,
  author =       "Thai Duong and J. Rizzo",
  title =        "Cryptography in the {Web}: The Case of Cryptographic
                 Design Flaws in {ASP.NET}",
  howpublished = "Unknown",
  month =        may,
  year =         "2011",
  bibdate =      "Mon Mar 09 11:54:27 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  remark =       "Cite in \cite[reference 29]{Schneier:2015:SWC}.",
}

@Article{Durmuth:2011:DEN,
  author =       "Markus D{\"u}rmuth and David Mandell Freeman",
  title =        "Deniable Encryption with Negligible Detection
                 Probability: An Interactive Construction",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6632",
  pages =        "610--626",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-20465-4_33",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Dec 15 17:44:03 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_33",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Eslami:2011:SIS,
  author =       "Z. Eslami and J. Zarepour Ahmadabadi",
  title =        "Secret image sharing with authentication-chaining and
                 dynamic embedding",
  journal =      j-J-SYST-SOFTW,
  volume =       "84",
  number =       "5",
  pages =        "803--809",
  month =        may,
  year =         "2011",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212",
  ISSN-L =       "0164-1212",
  bibdate =      "Tue Jun 21 10:22:28 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Fang:2011:ICP,
  author =       "Liming Fang and Willy Susilo and Chunpeng Ge and
                 Jiandong Wang",
  title =        "Interactive conditional proxy re-encryption with fine
                 grain policy",
  journal =      j-J-SYST-SOFTW,
  volume =       "84",
  number =       "12",
  pages =        "2293--2302",
  month =        dec,
  year =         "2011",
  CODEN =        "JSSODM",
  DOI =          "https://doi.org/10.1016/j.jss.2011.06.045",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Mon Feb 6 15:39:27 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0164121211001579",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Feng:2011:GDA,
  author =       "Xiutao Feng and Zhenqing Shi and Chuankun Wu and
                 Dengguo Feng",
  title =        "On Guess and Determine Analysis of {Rabbit}",
  journal =      j-INT-J-FOUND-COMP-SCI,
  volume =       "22",
  number =       "6",
  pages =        "1283--1296",
  month =        sep,
  year =         "2011",
  CODEN =        "IFCSEN",
  DOI =          "https://doi.org/10.1142/S0129054111008714",
  ISSN =         "0129-0541 (print), 1793-6373 (electronic)",
  ISSN-L =       "0129-0541",
  bibdate =      "Thu Sep 22 12:07:39 MDT 2011",
  bibsource =    "http://ejournals.wspc.com.sg/ijfcs/mkt/archive.shtml;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "Rabbit is a stream cipher proposed by M. Boesgaard et
                 al., and has been selected into the final portfolio
                 after three evaluation phases of the ECRYPT Stream
                 Cipher Project (eSTREAM). So far only a few papers
                 studied its security besides a series of white papers
                 by the designers of Rabbit. Recently we presented a new
                 idea to evaluate the security of a word-oriented stream
                 cipher algorithm from a smaller data granularity
                 instead of its original data granularity and applied it
                 successfully to the stream cipher SOSEMANUK. In this
                 work we apply the same idea to the Rabbit algorithm and
                 analyze its security in resistance against the guess
                 and determine attack from the view point of byte units.
                 As a result, we present two new approaches of solving
                 all $ x_{j, t + 1} $'s and $ g_{j, t} $'s from the
                 next-state function and the extraction scheme of
                 Rabbit, whose complexities are $ 2^{166} $ and $
                 2^{140.68} $ respectively, which are dramatically lower
                 than those proposed by Lu et al. ($ 2^{192} $ and $
                 2^{174} $ resp.) at ISC 2008. Finally based on the
                 above new results we propose a byte-based guess and
                 determine attack on Rabbit, which only needs a small
                 segment of known keystream to recover the whole
                 internal state of Rabbit with time complexity $ 2^{242}
                 $. Though the complexity of our attack is far higher
                 than that of a brute force ($ 2^{128}$), we believe
                 that some new techniques adopted in this paper are of
                 interest for future work on Rabbit.",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Foundations of Computer
                 Science (IJFCS)",
  journal-URL =  "http://www.worldscientific.com/loi/ijfcs",
}

@Article{Feng:2011:VBF,
  author =       "Keqin Feng and Jing Yang",
  title =        "Vectorial {Boolean} Functions with Good Cryptographic
                 Properties",
  journal =      j-INT-J-FOUND-COMP-SCI,
  volume =       "22",
  number =       "6",
  pages =        "1271--1282",
  month =        sep,
  year =         "2011",
  CODEN =        "IFCSEN",
  DOI =          "https://doi.org/10.1142/S0129054111008702",
  ISSN =         "0129-0541 (print), 1793-6373 (electronic)",
  ISSN-L =       "0129-0541",
  bibdate =      "Thu Sep 22 12:07:39 MDT 2011",
  bibsource =    "http://ejournals.wspc.com.sg/ijfcs/mkt/archive.shtml;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Foundations of Computer
                 Science (IJFCS)",
  journal-URL =  "http://www.worldscientific.com/loi/ijfcs",
}

@Article{Fuchsbauer:2011:CSV,
  author =       "Georg Fuchsbauer",
  title =        "Commuting Signatures and Verifiable Encryption",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6632",
  pages =        "224--245",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-20465-4_14",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Dec 15 17:44:03 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_14",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Fuglerud:2011:SIA,
  author =       "Kristin Fuglerud and {\O}ystein Dale",
  title =        "Secure and Inclusive Authentication with a Talking
                 Mobile One-Time-Password Client",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "2",
  pages =        "27--34",
  month =        mar # "\slash " # apr,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.204",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Apr 1 22:34:08 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Geetha:2011:VRN,
  author =       "S. Geetha and V. Kabilan and S. P. Chockalingam and N.
                 Kamaraj",
  title =        "Varying radix numeral system based adaptive image
                 steganography",
  journal =      j-INFO-PROC-LETT,
  volume =       "111",
  number =       "16",
  pages =        "792--797",
  day =          "30",
  month =        aug,
  year =         "2011",
  CODEN =        "IFPLAT",
  DOI =          "https://doi.org/10.1016/j.ipl.2011.05.013",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Sat Feb 4 08:08:39 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019011001414",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@InProceedings{Gentry:2011:FHE,
  author =       "C. Gentry and S. Halevi",
  title =        "Fully Homomorphic Encryption without Squashing Using
                 Depth-$3$ Arithmetic Circuits",
  crossref =     "IEEE:2011:PIA",
  pages =        "107--109",
  year =         "2011",
  DOI =          "https://doi.org/10.1109/FOCS.2011.94",
  bibdate =      "Thu Apr 12 09:34:22 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/focs2010.bib",
  acknowledgement = ack-nhfb,
  book-URL =     "http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6108120",
}

@Article{Gentry:2011:IGF,
  author =       "Craig Gentry and Shai Halevi",
  title =        "Implementing {Gentry}'s Fully-Homomorphic Encryption
                 Scheme",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6632",
  pages =        "129--148",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-20465-4_9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Dec 15 17:44:03 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_9",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Giot:2011:UKD,
  author =       "Romain Giot and Mohamad El-Abed and Baptiste Hemery
                 and Christophe Rosenberger",
  title =        "Unconstrained keystroke dynamics authentication with
                 shared secret",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "6--7",
  pages =        "427--445",
  month =        sep # "\slash " # oct,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:26 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811000502",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Glassey:2011:MIM,
  author =       "Olivier Glassey",
  title =        "Metadata For Identity Management of Population
                 Registers",
  journal =      j-FUTURE-INTERNET,
  volume =       "3",
  number =       "2",
  pages =        "130--143",
  day =          "18",
  month =        apr,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi3020130",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:46 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/3/2/130",
  abstract =     "A population register is an inventory of residents
                 within a country, with their characteristics (date of
                 birth, sex, marital status, etc.) and other
                 socio-economic data, such as occupation or education.
                 However, data on population are also stored in numerous
                 other public registers such as tax, land, building and
                 housing, military, foreigners, vehicles, etc.
                 Altogether they contain vast amounts of personal and
                 sensitive information. Access to public information is
                 granted by law in many countries, but this transparency
                 is generally subject to tensions with data protection
                 laws. This paper proposes a framework to analyze data
                 access (or protection) requirements, as well as a model
                 of metadata for data exchange.",
  acknowledgement = ack-nhfb,
}

@Article{Goodrich:2011:EAD,
  author =       "Michael T. Goodrich and Roberto Tamassia and Nikos
                 Triandopoulos",
  title =        "Efficient Authenticated Data Structures for Graph
                 Connectivity and Geometric Search Problems",
  journal =      j-ALGORITHMICA,
  volume =       "60",
  number =       "3",
  pages =        "505--552",
  month =        jul,
  year =         "2011",
  CODEN =        "ALGOEJ",
  ISSN =         "0178-4617 (print), 1432-0541 (electronic)",
  ISSN-L =       "0178-4617",
  bibdate =      "Fri Jun 17 18:57:02 MDT 2011",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0178-4617&volume=60&issue=3;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0178-4617&volume=60&issue=3&spage=505",
  acknowledgement = ack-nhfb,
  fjournal =     "Algorithmica",
  journal-URL =  "http://link.springer.com/journal/453",
}

@Article{Gorantla:2011:MKC,
  author =       "M. C. Gorantla and Colin Boyd and Juan Manuel
                 Gonz{\'a}lez Nieto and Mark Manulis",
  title =        "Modeling key compromise impersonation attacks on group
                 key exchange protocols",
  journal =      j-TISSEC,
  volume =       "14",
  number =       "4",
  pages =        "28:1--28:??",
  month =        dec,
  year =         "2011",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/2043628.2043629",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Thu Dec 22 18:15:07 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tissec.bib",
  abstract =     "Two-party key exchange (2PKE) protocols have been
                 rigorously analyzed under various models considering
                 different adversarial actions. However, the analysis of
                 group key exchange (GKE) protocols has not been as
                 extensive as that of 2PKE protocols. Particularly, an
                 important security attribute called key compromise
                 impersonation (KCI) resilience has been completely
                 ignored for the case of GKE protocols. Informally, a
                 protocol is said to provide KCI resilience if the
                 compromise of the long-term secret key of a protocol
                 participant A does not allow the adversary to
                 impersonate an honest participant B to A. In this
                 paper, we argue that KCI resilience for GKE protocols
                 is at least as important as it is for 2PKE protocols.",
  acknowledgement = ack-nhfb,
  articleno =    "28",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@Article{Gordon:2011:CFS,
  author =       "S. Dov Gordon and Carmit Hazay and Jonathan Katz and
                 Yehuda Lindell",
  title =        "Complete Fairness in Secure {Two-Party} Computation",
  journal =      j-J-ACM,
  volume =       "58",
  number =       "6",
  pages =        "24:1--24:??",
  month =        dec,
  year =         "2011",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/2049697.2049698",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Dec 15 09:33:01 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "In the setting of secure two-party computation, two
                 mutually distrusting parties wish to compute some
                 function of their inputs while preserving, to the
                 extent possible, various security properties such as
                 privacy, correctness, and more. One desirable property
                 is fairness which guarantees, informally, that if one
                 party receives its output, then the other party does
                 too. Cleve [1986] showed that complete fairness cannot
                 be achieved in general without an honest majority.
                 Since then, the accepted folklore has been that nothing
                 non-trivial can be computed with complete fairness in
                 the two-party setting. We demonstrate that this
                 folklore belief is false by showing completely fair
                 protocols for various nontrivial functions in the
                 two-party setting based on standard cryptographic
                 assumptions.",
  acknowledgement = ack-nhfb,
  articleno =    "24",
  fjournal =     "Journal of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J401",
}

@InProceedings{Goyal:2011:SCP,
  author =       "V. Goyal and H. K. Maji",
  title =        "Stateless Cryptographic Protocols",
  crossref =     "IEEE:2011:PIA",
  pages =        "678--687",
  year =         "2011",
  DOI =          "https://doi.org/10.1109/FOCS.2011.74",
  bibdate =      "Thu Apr 12 09:34:29 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/focs2010.bib",
  acknowledgement = ack-nhfb,
  book-URL =     "http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6108120",
}

@Article{Greengard:2011:MRM,
  author =       "Samuel Greengard",
  title =        "In Memoriam: {Robert Morris, 1932--2011}",
  journal =      j-CACM,
  volume =       "54",
  number =       "9",
  pages =        "17--17",
  month =        sep,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1995376.1995383",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Aug 25 17:24:35 MDT 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cacm2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "Cryptographer and Unix operating system co-creator
                 Robert Morris died June 26 in Lebanon, NH, at the age
                 of 78 from complications of dementia. Morris was a
                 pioneer in developing operating systems and computer
                 security. He also purportedly played a role in one of
                 the world's first cyberattacks during the 1991 Persian
                 Gulf War.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Grigg:2011:CCN,
  author =       "Ian Grigg and Peter Gutmann",
  title =        "The Curse of Cryptographic Numerology",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "3",
  pages =        "70--72",
  month =        may # "\slash " # jun,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.69",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 25 15:29:11 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Gross-Amblard:2011:QPW,
  author =       "David Gross-Amblard",
  title =        "Query-preserving watermarking of relational databases
                 and {XML} documents",
  journal =      j-TODS,
  volume =       "36",
  number =       "1",
  pages =        "3:1--3:??",
  month =        mar,
  year =         "2011",
  CODEN =        "ATDSD3",
  DOI =          "https://doi.org/10.1145/1929934.1929937",
  ISSN =         "0362-5915 (print), 1557-4644 (electronic)",
  ISSN-L =       "0362-5915",
  bibdate =      "Wed Mar 16 09:42:23 MDT 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tods/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "Watermarking allows robust and unobtrusive insertion
                 of information in a digital document. During the last
                 few years, techniques have been proposed for
                 watermarking relational databases or Xml documents,
                 where information insertion must preserve a specific
                 measure on data (for example the mean and variance of
                 numerical attributes). In this article we investigate
                 the problem of watermarking databases or Xml while
                 preserving a set of parametric queries in a specified
                 language, up to an acceptable distortion. We first show
                 that unrestricted databases can not be watermarked
                 while preserving trivial parametric queries. We then
                 exhibit query languages and classes of structures that
                 allow guaranteed watermarking capacity, namely (1)
                 local query languages on structures with bounded degree
                 Gaifman graph, and (2) monadic second-order queries on
                 trees or treelike structures.",
  acknowledgement = ack-nhfb,
  articleno =    "3",
  fjournal =     "ACM Transactions on Database Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J777",
}

@Article{Guerra-Casanova:2011:SOT,
  author =       "J. Guerra-Casanova and C. S{\'a}nchez-{\'A}vila and A.
                 {de Santos Sierra} and G. Bailador del Pozo",
  title =        "Score optimization and template updating in a
                 biometric technique for authentication in mobiles based
                 on gestures",
  journal =      j-J-SYST-SOFTW,
  volume =       "84",
  number =       "11",
  pages =        "2013--2021",
  month =        nov,
  year =         "2011",
  CODEN =        "JSSODM",
  DOI =          "https://doi.org/10.1016/j.jss.2011.05.059",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Mon Feb 6 15:39:26 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0164121211001427",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Gunson:2011:UPS,
  author =       "Nancie Gunson and Diarmid Marshall and Hazel Morton
                 and Mervyn Jack",
  title =        "User perceptions of security and usability of
                 single-factor and two-factor authentication in
                 automated telephone banking",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "4",
  pages =        "208--220",
  month =        jun,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:24 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404810001148",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Guo:2011:EDA,
  author =       "Hua Guo and Zhoujun Li and Yi Mu and Fan Zhang and
                 Chuankun Wu and Jikai Teng",
  title =        "An efficient dynamic authenticated key exchange
                 protocol with selectable identities",
  journal =      j-COMPUT-MATH-APPL,
  volume =       "61",
  number =       "9",
  pages =        "2518--2527",
  month =        may,
  year =         "2011",
  CODEN =        "CMAPDK",
  ISSN =         "0898-1221 (print), 1873-7668 (electronic)",
  ISSN-L =       "0898-1221",
  bibdate =      "Wed Mar 1 21:50:54 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computmathappl2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0898122111001404",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers and Mathematics with Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/08981221",
}

@Article{Guo:2011:ISS,
  author =       "Fuchun Guo and Yi Mu and Willy Susilo",
  title =        "Improving security of $q$-{SDH} based digital
                 signatures",
  journal =      j-J-SYST-SOFTW,
  volume =       "84",
  number =       "10",
  pages =        "1783--1790",
  month =        oct,
  year =         "2011",
  CODEN =        "JSSODM",
  DOI =          "https://doi.org/10.1016/j.jss.2011.05.023",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Mon Feb 6 15:39:24 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0164121211001233",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Haitner:2011:PRI,
  author =       "Iftach Haitner and Danny Harnik and Omer Reingold",
  title =        "On the Power of the Randomized Iterate",
  journal =      j-SIAM-J-COMPUT,
  volume =       "40",
  number =       "6",
  pages =        "1486--1528",
  month =        "????",
  year =         "2011",
  CODEN =        "SMJCAT",
  DOI =          "https://doi.org/10.1137/080721820",
  ISSN =         "0097-5397 (print), 1095-7111 (electronic)",
  ISSN-L =       "0097-5397",
  bibdate =      "Thu Feb 9 07:15:10 MST 2012",
  bibsource =    "http://epubs.siam.org/sam-bin/dbq/toclist/SICOMP/40/6;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib;
                 https://www.math.utah.edu/pub/tex/bib/siamjcomput.bib",
  URL =          "http://epubs.siam.org/sicomp/resource/1/smjcat/v40/i6/p1486_s1",
  acknowledgement = ack-nhfb,
  fjournal =     "SIAM Journal on Computing",
  journal-URL =  "http://epubs.siam.org/sicomp",
  keywords =     "cryptography; hardness amplification; one-way
                 functions; pseudorandom generator",
  onlinedate =   "December 06, 2011",
}

@Article{Halevi:2011:TBH,
  author =       "Tzipora Halevi and Nitesh Saxena and Shai Halevi",
  title =        "Tree-based {HB} protocols for privacy-preserving
                 authentication of {RFID} tags",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "2",
  pages =        "343--363",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0404",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:03 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Hamdy:2011:HPB,
  author =       "Omar Hamdy and Issa Traor{\'e}",
  title =        "Homogeneous physio-behavioral visual and mouse-based
                 biometric",
  journal =      j-TOCHI,
  volume =       "18",
  number =       "3",
  pages =        "12:1--12:??",
  month =        jul,
  year =         "2011",
  CODEN =        "ATCIF4",
  DOI =          "https://doi.org/10.1145/1993060.1993062",
  ISSN =         "1073-0516",
  ISSN-L =       "1073-0516",
  bibdate =      "Wed Aug 17 09:31:44 MDT 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tochi/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "In this research, we propose a novel biometric system
                 for static user authentication that homogeneously
                 combines mouse dynamics, visual search capability and
                 short-term memory effect. The proposed system
                 introduces the visual search capability, and short-term
                 memory effect to the biometric-based security world for
                 the first time. The use of a computer mouse for its
                 dynamics, and as an input sensor for the other two
                 biometrics, means no additional hardware is required
                 than the standard mouse. Experimental evaluation showed
                 the system effectiveness using variable or one-time
                 passwords. All of these attributes qualify the proposed
                 system to be effectively deployed as a static
                 authentication mechanism.",
  acknowledgement = ack-nhfb,
  articleno =    "12",
  fjournal =     "ACM Transactions on Computer-Human Interaction",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J756",
}

@Article{Hammerle-Uhl:2011:RWI,
  author =       "Jutta H{\"a}mmerle-Uhl and Karl Raab and Andreas Uhl",
  title =        "Robust watermarking in iris recognition: application
                 scenarios and impact on recognition performance",
  journal =      j-SIGAPP,
  volume =       "11",
  number =       "3",
  pages =        "6--18",
  month =        aug,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2034594.2034595",
  ISSN =         "1559-6915 (print), 1931-0161 (electronic)",
  ISSN-L =       "1559-6915",
  bibdate =      "Thu Jan 23 10:24:54 MST 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigapp.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/2034594.2034595",
  abstract =     "Watermarking has been suggested as a means to improve
                 security of biometric systems. We discuss application
                 scenarios for resolving various security issues in this
                 context. As embedding watermarks changes biometric
                 data, degraded recognition performance \ldots{}",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGAPP Applied Computing Review",
  journal-URL =  "https://dl.acm.org/loi/sigapp",
}

@Article{Han:2011:PEB,
  author =       "Yiliang Han and Xiaolin Gui and Xuguang Wu and
                 Xiaoyuan Yang",
  title =        "Proxy encryption based secure multicast in wireless
                 mesh networks",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "34",
  number =       "2",
  pages =        "469--477",
  month =        mar,
  year =         "2011",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Wed Jan 28 15:43:52 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804510000974",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Netw. Comput. Appl.",
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Hanka:2011:DPK,
  author =       "Oliver Hanka and Michael Eichhorn and Martin
                 Pfannenstein and J{\"o}rg Ebersp{\"a}cher and Eckehard
                 Steinbach",
  title =        "A Distributed Public Key Infrastructure Based on
                 Threshold Cryptography for the {HiiMap} Next Generation
                 {Internet} Architecture",
  journal =      j-FUTURE-INTERNET,
  volume =       "3",
  number =       "1",
  pages =        "14--30",
  day =          "01",
  month =        feb,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi3010014",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:46 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/3/1/14",
  abstract =     "In this article, a security extension for the HiiMap
                 Next Generation Internet Architecture is presented. We
                 regard a public key infrastructure which is integrated
                 into the mapping infrastructure of the
                 locator/identifier-split addressing scheme. The
                 security approach is based on Threshold Cryptography
                 which enables a sharing of keys among the mapping
                 servers. Hence, a more trustworthy and fair approach
                 for a Next Generation Internet Architecture as compared
                 to the state of the art approach is fostered.
                 Additionally, we give an evaluation based on IETF AAA
                 recommendations for security-related systems.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Semantics in the Future Internet.",
}

@Article{Hao:2011:NTV,
  author =       "Rong Hao and Jia Yu and Zhiling Song",
  title =        "A Note On a Threshold Verifiable Multi-Secret Sharing
                 Scheme",
  journal =      j-INT-J-COMPUT-APPL,
  volume =       "33",
  number =       "4",
  pages =        "330--334",
  year =         "2011",
  DOI =          "https://doi.org/10.2316/Journal.202.2011.4.202-3074",
  ISSN =         "1206-212X (print), 1925-7074 (electronic)",
  ISSN-L =       "1206-212X",
  bibdate =      "Sat Apr 21 17:27:36 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijca.bib",
  URL =          "https://www.tandfonline.com/doi/full/10.2316/Journal.202.2011.4.202-3074",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Computer Applications",
  journal-URL =  "https://www.tandfonline.com/loi/tjca20",
  online-date =  "11 Jul 2015",
}

@Article{Harn:2011:FDM,
  author =       "Lein Harn and Chia-Yin Lee and Changlu Lin and
                 Chin-Chen Chang",
  title =        "Fully Deniable Message Authentication Protocols
                 Preserving Confidentiality",
  journal =      j-COMP-J,
  volume =       "54",
  number =       "10",
  pages =        "1688--1699",
  month =        oct,
  year =         "2011",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxr081",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Sat Oct 1 18:10:35 MDT 2011",
  bibsource =    "http://comjnl.oxfordjournals.org/content/54/10.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/54/10/1688.full.pdf+html",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "August 23, 2011",
}

@Article{Herranz:2011:RBS,
  author =       "Javier Herranz and Fabien Laguillaumie and Carla
                 R{\`a}fols",
  title =        "Relations between semantic security and anonymity in
                 identity-based encryption",
  journal =      j-INFO-PROC-LETT,
  volume =       "111",
  number =       "10",
  pages =        "453--460",
  day =          "30",
  month =        apr,
  year =         "2011",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Thu Mar 31 12:47:00 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Heys:2011:PSC,
  author =       "Howard M. Heys and Liang Zhang",
  title =        "Pipelined Statistical Cipher Feedback: a New Mode for
                 High-Speed Self-Synchronizing Stream Encryption",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "60",
  number =       "11",
  pages =        "1581--1595",
  month =        nov,
  year =         "2011",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2010.167",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Tue Sep 27 07:57:50 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5499465",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Hinkelmann:2011:CPA,
  author =       "Markus Hinkelmann and Andreas Jakoby and Nina Moebius
                 and Tiark Rompf and Peer Stechert",
  title =        "A cryptographically $t$-private auction system",
  journal =      j-CCPE,
  volume =       "23",
  number =       "12",
  pages =        "1399--1413",
  day =          "25",
  month =        aug,
  year =         "2011",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.1684",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Mon Dec 5 10:08:57 MST 2011",
  bibsource =    "http://www.interscience.wiley.com/jpages/1532-0626;
                 https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "7 Dec 2010",
}

@Article{Ho:2011:EIB,
  author =       "Chen-Han Ho and Garret Staus and Aaron Ulmer and
                 Karthikeyan Sankaralingam",
  title =        "Exploring the Interaction Between Device Lifetime
                 Reliability and Security Vulnerabilities",
  journal =      j-IEEE-COMPUT-ARCHIT-LETT,
  volume =       "10",
  number =       "2",
  pages =        "37--40",
  month =        jul # "\slash " # dec,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/L-CA.2011.16",
  ISSN =         "1556-6056 (print), 1556-6064 (electronic)",
  ISSN-L =       "1556-6056",
  bibdate =      "Thu Jun 20 17:18:18 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeecomputarchitlett.bib",
  abstract =     "As technology scales, device reliability is becoming a
                 fundamental problem. Even though manufacture test can
                 guarantee product quality, due to various types of
                 wearout and failure modes, permanent faults appearing
                 in the filed is becoming an increasingly important and
                 real problem. Such types of wear-out creates permanent
                 faults in devices after release to the user during
                 their lifetime. In this paper, we perform a formal
                 investigation of the impact of permanent faults on
                 security, examine empirical evidence, and demonstrate a
                 real attack. Our results show that permanent stuck-at
                 faults may leave security holes in microprocessors. We
                 show that an adversary with knowledge of a fault can
                 launch attacks which can obtain critical secrets such
                 as a private key in 30 seconds.",
  acknowledgement = ack-nhfb,
  affiliation =  "Ho, CH (Reprint Author), Univ Wisconsin, Madison, WI
                 53706 USA. Ho, Chen-Han; Staus, Garret; Ulmer, Aaron;
                 Sankaralingam, Karthikeyan, Univ Wisconsin, Madison, WI
                 53706 USA.",
  da =           "2019-06-20",
  doc-delivery-number = "855NW",
  fjournal =     "IEEE Computer Architecture Letters",
  journal-iso =  "IEEE Comput. Archit. Lett.",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=10208",
  keywords =     "Permanent Fault; Reliability; Security",
  number-of-cited-references = "13",
  research-areas = "Computer Science",
  times-cited =  "0",
  unique-id =    "Ho:2011:EIB",
  web-of-science-categories = "Computer Science, Hardware \&
                 Architecture",
}

@InProceedings{Holenstein:2011:ERO,
  author =       "Thomas Holenstein and Robin K{\"u}nzler and Stefano
                 Tessaro",
  title =        "The equivalence of the random oracle model and the
                 ideal cipher model, revisited",
  crossref =     "ACM:2011:PAI",
  pages =        "89--98",
  year =         "2011",
  DOI =          "https://doi.org/10.1145/1993636.1993650",
  bibdate =      "Tue Jun 7 18:53:27 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
}

@Article{Hsu:2011:NIB,
  author =       "Chien-Lung Hsu and Han-Yu Lin",
  title =        "New identity-based key-insulated convertible
                 multi-authenticated encryption scheme",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "34",
  number =       "5",
  pages =        "1724--1731",
  month =        sep,
  year =         "2011",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Wed Jan 28 15:44:03 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804511001172",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Netw. Comput. Appl.",
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Hsu:2011:NLM,
  author =       "Ching-Fang Hsu and Guo-Hua Cui and Qi Cheng and Jing
                 Chen",
  title =        "A novel linear multi-secret sharing scheme for group
                 communication in wireless mesh networks",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "34",
  number =       "2",
  pages =        "464--468",
  month =        mar,
  year =         "2011",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Wed Jan 28 15:43:52 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S108480451000055X",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Netw. Comput. Appl.",
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Hsu:2011:WLC,
  author =       "Francis Hsu and Hao Chen and Sridhar Machiraju",
  title =        "{WebCallerID}: Leveraging cellular networks for {Web}
                 authentication",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "5",
  pages =        "869--893",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2011-0424",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:15 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Huang:2011:GFT,
  author =       "Xinyi Huang and Yang Xiang and Ashley Chonka and
                 Jianying Zhou and Robert H. Deng",
  title =        "A Generic Framework for Three-Factor Authentication:
                 Preserving Security and Privacy in Distributed
                 Systems",
  journal =      j-IEEE-TRANS-PAR-DIST-SYS,
  volume =       "22",
  number =       "8",
  pages =        "1390--1397",
  month =        aug,
  year =         "2011",
  CODEN =        "ITDSEO",
  DOI =          "https://doi.org/10.1109/TPDS.2010.206",
  ISSN =         "1045-9219 (print), 1558-2183 (electronic)",
  ISSN-L =       "1045-9219",
  bibdate =      "Fri Jul 22 07:55:10 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Parallel and Distributed
                 Systems",
  journal-URL =  "http://www.computer.org/tpds/archives.htm",
}

@Article{Huang:2011:IBS,
  author =       "Qiong Huang and Guomin Yang and Duncan S. Wong and
                 Willy Susilo",
  title =        "Identity-based strong designated verifier signature
                 revisited",
  journal =      j-J-SYST-SOFTW,
  volume =       "84",
  number =       "1",
  pages =        "120--129",
  month =        jan,
  year =         "2011",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212",
  ISSN-L =       "0164-1212",
  bibdate =      "Tue Jun 21 10:22:23 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Huang:2011:ISL,
  author =       "Y.-L. Huang and F.-Y. Leu and C.-H. Chiu and I.-L.
                 Lin",
  title =        "Improving Security Levels of {IEEE802.16e}
                 Authentication by Involving {Diffie--Hellman} {PKDS}",
  journal =      j-J-UCS,
  volume =       "17",
  number =       "6",
  pages =        "891--??",
  month =        "????",
  year =         "2011",
  CODEN =        "????",
  ISSN =         "0948-695X (print), 0948-6968 (electronic)",
  ISSN-L =       "0948-6968",
  bibdate =      "Fri Apr 6 05:52:29 MDT 2012",
  bibsource =    "http://www.jucs.org/jucs;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.jucs.org/jucs_17_6/improving_security_levels_of",
  acknowledgement = ack-nhfb,
  fjournal =     "J.UCS: Journal of Universal Computer Science",
  journal-URL =  "http://www.jucs.org/jucs",
}

@Article{Hwang:2011:CDA,
  author =       "Shin-Jia Hwang and Yun-Hao Sung",
  title =        "Confidential deniable authentication using promised
                 signcryption",
  journal =      j-J-SYST-SOFTW,
  volume =       "84",
  number =       "10",
  pages =        "1652--1659",
  month =        oct,
  year =         "2011",
  CODEN =        "JSSODM",
  DOI =          "https://doi.org/10.1016/j.jss.2011.04.024",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Mon Feb 6 15:39:24 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0164121211000999",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Hwang:2011:NIB,
  author =       "Jung Yeon Hwang",
  title =        "A note on an identity-based ring signature scheme with
                 signer verifiability",
  journal =      j-THEOR-COMP-SCI,
  volume =       "412",
  number =       "8--10",
  pages =        "796--804",
  day =          "4",
  month =        mar,
  year =         "2011",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Wed Aug 31 10:15:30 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/03043975",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{Islam:2011:MDA,
  author =       "Salekul Islam and Jean-Charles Gr{\'e}goire",
  title =        "Multi-domain authentication for {IMS} services",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "55",
  number =       "12",
  pages =        "2689--2704",
  day =          "25",
  month =        aug,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1016/j.comnet.2011.04.012",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Sat Feb 4 10:22:46 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/13891286",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1389128611001423",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286",
}

@Article{Islam:2011:MES,
  author =       "Sk. Hafizul Islam and G. P. Biswas",
  title =        "A more efficient and secure {ID}-based remote mutual
                 authentication with key agreement scheme for mobile
                 devices on elliptic curve cryptosystem",
  journal =      j-J-SYST-SOFTW,
  volume =       "84",
  number =       "11",
  pages =        "1892--1898",
  month =        nov,
  year =         "2011",
  CODEN =        "JSSODM",
  DOI =          "https://doi.org/10.1016/j.jss.2011.06.061",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Mon Feb 6 15:39:26 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0164121211001646",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Jie:2011:RGA,
  author =       "Wei Jie and Junaid Arshad and Richard Sinnott and Paul
                 Townend and Zhou Lei",
  title =        "A review of grid authentication and authorization
                 technologies and support for federated access control",
  journal =      j-COMP-SURV,
  volume =       "43",
  number =       "2",
  pages =        "12:1--12:26",
  month =        jan,
  year =         "2011",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/1883612.1883619",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sun Jan 30 14:27:08 MST 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "Grid computing facilitates resource sharing typically
                 to support distributed virtual organizations (VO). The
                 multi-institutional nature of a grid environment
                 introduces challenging security issues, especially with
                 regard to authentication and authorization. This
                 article presents a state-of-the-art review of major
                 grid authentication and authorization technologies. In
                 particular we focus upon the Internet2 Shibboleth
                 technologies and their use to support federated
                 authentication and authorization to support
                 interinstitutional sharing of remote grid resources
                 that are subject to access control. We outline the
                 architecture, features, advantages, limitations,
                 projects, and applications of Shibboleth in a grid
                 environment.",
  acknowledgement = ack-nhfb,
  articleno =    "12",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Kai:2011:CIS,
  author =       "Hiroshi Kai and Shigenobu Inoue",
  title =        "Cheater identification on a secret sharing scheme
                 using {GCD}",
  journal =      j-ACM-COMM-COMP-ALGEBRA,
  volume =       "45",
  number =       "2",
  pages =        "119--120",
  month =        jun,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2016567.2016585",
  ISSN =         "1932-2232 (print), 1932-2240 (electronic)",
  ISSN-L =       "1932-2232",
  bibdate =      "Wed Aug 17 08:55:07 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "A method to identify cheaters on the Shamir's (k, n)
                 threshold secret sharing scheme is proposed using
                 rational interpolation. When a rational interpolant is
                 computed for $l$ shares $ D_i, i = 1, \ldots {}, l$,
                 where $ l = k + 2 s$, then $s$ unattainable points of
                 the rational interpolant may identify $s$ cheaters. The
                 cheaters can be computed by GCD of the numerator
                 polynomial and the denominator polynomial.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Communications in Computer Algebra",
  issue =        "176",
}

@Article{Kallel:2011:SMM,
  author =       "Mohamed Kallel and Mohamed-Salim Bouhlel and
                 Jean-Christophe Lapayre",
  title =        "Security of the Medical Media Using a Hybrid and
                 Multiple Watermark Technique",
  journal =      j-INT-J-IMAGE-GRAPHICS,
  volume =       "11",
  number =       "1",
  pages =        "103--115",
  month =        jan,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1142/S0219467811004019",
  ISSN =         "0219-4678",
  bibdate =      "Tue Mar 8 10:11:09 MST 2011",
  bibsource =    "http://ejournals.wspc.com.sg/ijig/ijig.shtml;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Image and Graphics (IJIG)",
  journal-URL =  "http://www.worldscientific.com/worldscinet/ijig",
}

@Book{Kapera:2011:SPD,
  author =       "Zdzis{\l}aw Jan Kapera",
  title =        "In the Shadow of {Pont du Gard}: the {Polish Enigma}
                 in {Vichy France (June 1940 to November 1942)}",
  volume =       "7",
  publisher =    "The Enigma Press",
  address =      "Krak{\'o}w, Poland",
  pages =        "111 + 1 + 16",
  year =         "2011",
  ISBN =         "83-86110-72-4",
  ISBN-13 =      "978-83-86110-72-8",
  ISSN =         "0867-8693",
  LCCN =         "????",
  bibdate =      "Mon Sep 3 18:03:34 MDT 2012",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  series =       "The Enigma Bulletin",
  acknowledgement = ack-nhfb,
  author-dates = "(1942-- )",
}

@Article{Karger:2011:LLB,
  author =       "Paul Karger and Suzanne McIntosh and Elaine Palmer and
                 David Toll and Samuel Weber",
  title =        "Lessons Learned: Building the {Caernarvon}
                 High-Assurance Operating System",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "1",
  pages =        "22--30",
  month =        jan # "\slash " # feb,
  year =         "2011",
  DOI =          "https://doi.org/10.1109/MSP.2010.169",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 8 15:50:31 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  keywords =     "Evaluation Assurance Level 7 (EAL7); ISO 7816-4:2005
                 (Identification Cards --- Integrated Circuits with
                 Contacts); Smart-card chip O/S",
}

@Article{Kemshall:2011:WMT,
  author =       "Andy Kemshall",
  title =        "Why mobile two-factor authentication makes sense",
  journal =      j-NETWORK-SECURITY,
  volume =       "2011",
  number =       "4",
  pages =        "9--12",
  month =        apr,
  year =         "2011",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(11)70038-1",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 17:00:28 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485811700381",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Kiani:2011:MPD,
  author =       "Soheila Kiani and Mohsen Ebrahimi Moghaddam",
  title =        "A multi-purpose digital image watermarking using
                 fractal block coding",
  journal =      j-J-SYST-SOFTW,
  volume =       "84",
  number =       "9",
  pages =        "1550--1562",
  month =        sep,
  year =         "2011",
  CODEN =        "JSSODM",
  DOI =          "https://doi.org/10.1016/j.jss.2011.03.019",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Mon Feb 6 15:39:22 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0164121211000707",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Kiltz:2011:EAH,
  author =       "Eike Kiltz and Krzysztof Pietrzak and David Cash and
                 Abhishek Jain and Daniele Venturi",
  title =        "Efficient Authentication from Hard Learning Problems",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6632",
  pages =        "7--26",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-20465-4_3",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Dec 15 17:44:03 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_3",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Kim:2011:LBA,
  author =       "Hyun Sung Kim",
  title =        "Location-based authentication protocol for first
                 cognitive radio networking standard",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "34",
  number =       "4",
  pages =        "1160--1167",
  month =        jul,
  year =         "2011",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Wed Jan 28 15:43:59 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804510002286",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Netw. Comput. Appl.",
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Kim:2011:SSE,
  author =       "Changhoon Kim and Matthew Caesar and Jennifer
                 Rexford",
  title =        "{SEATTLE}: a {Scalable Ethernet Architecture for Large
                 Enterprises}",
  journal =      j-TOCS,
  volume =       "29",
  number =       "1",
  pages =        "1:1--1:35",
  month =        feb,
  year =         "2011",
  CODEN =        "ACSYEC",
  DOI =          "https://doi.org/10.1145/1925109.1925110",
  ISSN =         "0734-2071",
  ISSN-L =       "0734-2071",
  bibdate =      "Mon Feb 28 16:17:43 MST 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tocs/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "IP networks today require massive effort to configure
                 and manage. Ethernet is vastly simpler to manage, but
                 does not scale beyond small local area networks. This
                 article describes an alternative network architecture
                 called SEATTLE that achieves the best of both worlds:
                 The scalability of IP combined with the simplicity of
                 Ethernet. SEATTLE provides plug-and-play functionality
                 via flat addressing, while ensuring scalability and
                 efficiency through shortest-path routing and hash-based
                 resolution of host information. In contrast to previous
                 work on identity-based routing, SEATTLE ensures path
                 predictability, controllability, and stability, thus
                 simplifying key network-management operations, such as
                 capacity planning, traffic engineering, and
                 troubleshooting. We performed a simulation study driven
                 by real-world traffic traces and network topologies,
                 and used Emulab to evaluate a prototype of our design
                 based on the Click and XORP open-source routing
                 platforms.",
  acknowledgement = ack-nhfb,
  articleno =    "1",
  fjournal =     "ACM Transactions on Computer Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J774",
}

@Article{King:2011:BBB,
  author =       "Valerie King and Jared Saia",
  title =        "Breaking the {$ O(n^2) $} bit barrier: {Scalable}
                 {Byzantine} agreement with an adaptive adversary",
  journal =      j-J-ACM,
  volume =       "58",
  number =       "4",
  pages =        "18:1--18:24",
  month =        jul,
  year =         "2011",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/1989727.1989732",
  ISSN =         "0004-5411",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Jul 18 12:34:51 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "We describe an algorithm for Byzantine agreement that
                 is scalable in the sense that each processor sends only
                 $ {\~ O}(\sqrt {n}) $ bits, where $n$ is the total
                 number of processors. Our algorithm succeeds with high
                 probability against an adaptive adversary, which can
                 take over processors at any time during the protocol,
                 up to the point of taking over arbitrarily close to a $
                 1 / 3$ fraction. We assume synchronous communication
                 but a rushing adversary. Moreover, our algorithm works
                 in the presence of flooding: processors controlled by
                 the adversary can send out any number of messages. We
                 assume the existence of private channels between all
                 pairs of processors but make no other cryptographic
                 assumptions.",
  acknowledgement = ack-nhfb,
  articleno =    "18",
  fjournal =     "Journal of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J401",
}

@Article{Kinkelin:2011:UTS,
  author =       "Holger Kinkelin and Ralph Holz and Heiko Niedermayer
                 and Simon Mittelberger and Georg Carle",
  title =        "On Using {TPM} for Secure Identities in Future Home
                 Networks",
  journal =      j-FUTURE-INTERNET,
  volume =       "3",
  number =       "1",
  pages =        "1--13",
  day =          "07",
  month =        jan,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi3010001",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:46 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/3/1/1",
  abstract =     "Security should be integrated into future networks
                 from the beginning, not as an extension. Secure
                 identities and authentication schemes are an important
                 step to fulfill this quest. In this article, we argue
                 that home networks are a natural trust anchor for such
                 schemes. We describe our concept of home networks as a
                 universal point of reference for authentication, trust
                 and access control, and show that our scheme can be
                 applied to any next generation network. As home
                 networks are no safe place, we apply Trusted Computing
                 technology to prevent the abuse of identities, i.e.,
                 identity theft.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Semantics in the Future Internet.",
}

@Book{Knudsen:2011:BCC,
  author =       "Lars R. Knudsen and Matthew J. B. Robshaw",
  title =        "The Block Cipher Companion",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xiv + 267",
  year =         "2011",
  DOI =          "https://doi.org/10.1007/978-3-642-17342-4",
  ISBN =         "3-642-17341-1, 3-642-17342-X (e-book)",
  ISBN-13 =      "978-3-642-17341-7, 978-3-642-17342-4 (e-book)",
  ISSN =         "1619-7100 (print), 2197-845X (electronic)",
  ISSN-L =       "1619-7100",
  LCCN =         "QA76.9.A25 K58 2011; QA76.9.D35",
  bibdate =      "Sat Jun 10 08:35:13 MDT 2017",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  series =       "Information Security and Cryptography",
  abstract =     "Block ciphers encrypt blocks of plaintext, messages,
                 into blocks of ciphertext under the action of a secret
                 key, and the process of encryption is reversed by
                 decryption which uses the same user-supplied key. Block
                 ciphers are fundamental to modern cryptography, in fact
                 they are the most widely used cryptographic primitive -
                 useful in their own right, and in the construction of
                 other cryptographic mechanisms. In this book the
                 authors provide a technically detailed, yet readable,
                 account of the state of the art of block cipher
                 analysis, design, and deployment. The authors first
                 describe the most prominent block ciphers and give
                 insights into their design. They then consider the role
                 of the cryptanalyst, the adversary, and provide an
                 overview of some of the most important cryptanalytic
                 methods. The book will be of value to graduate and
                 senior undergraduate students of cryptography and to
                 professionals engaged in cryptographic design. An
                 important feature of the presentation is the authors'
                 exhaustive bibliography of the field, each chapter
                 closing with comprehensive supporting notes.",
  acknowledgement = ack-nhfb,
  author-dates = "1962--",
  shorttableofcontents = "Introduction \\
                 Data Encryption Standard (DES) \\
                 Advanced Encryption Standard (AES) \\
                 Using Block Ciphers \\
                 Brute-Force Attacks \\
                 Differential Cryptanalysis \\
                 Linear Cryptanalysis \\
                 Advanced Topics \\
                 A Short Survey and Five Prominent Ciphers \\
                 Bibliography",
  subject =      "Data encryption (Computer science); Cryptography;
                 Computer Science; Data Structures, Cryptology and
                 Information Theory; Mathematics of Computing;
                 Informatique; Cryptography; Data encryption (Computer
                 science)",
  tableofcontents = "1: Introduction / 1 \\
                 1.1 Cryptographic Algorithms / 3 \\
                 1.2 Block Ciphers / 4 \\
                 1.3 Cryptographer and Cryptanalyst / 5 \\
                 1.4 Security / 10 \\
                 1.5 Summary / 11 \\
                 2: DES / 13 \\
                 2.1 DES Description / 14 \\
                 2.1.1 The Round Function / 17 \\
                 2.2 Design Features / 23 \\
                 2.3 Structural Properties / 27 \\
                 2.3.1 The Complementation Property / 27 \\
                 2.3.2 Weak and Semi-Weak Keys / 28 \\
                 2.4 DES Variants / 29 \\
                 2.4.1 Triple-DES / 30 \\
                 2.4.2 DESX / 32 \\
                 2.5 DES in Context / 33 \\
                 2.6 Getting to the Source / 34 \\
                 3: AES / 35 \\
                 3.1 AES Description / 36 \\
                 3.1.1 Arithmetic in GF($2^n$) / 37 \\
                 3.1.2 Encryption with the AES / 38 \\
                 3.1.3 Decryption with the AES / 42 \\
                 3.1.4 AES Key Schedule / 45 \\
                 3.1.5 AES Design Features / 50 \\
                 3.2 AES State of the Art / 54 \\
                 3.2.1 Differential and Linear Cryptanalysis / 54 \\
                 3.2.2 Structural Attacks / 54 \\
                 3.2.3 Algebraic Analysis / 59 \\
                 3.2.4 Related-Key Cryptanalysis / 62 \\
                 3.2.5 Side-Channel Cryptanalysis / 63 \\
                 3.3 AES in Context / 63 \\
                 3.4 Getting to the Source / 64 \\
                 4: Using Block Ciphers / 65 \\
                 4.1 Block Encryption / 66 \\
                 4.1.1 Electronic Code Book Mode / 66 \\
                 4.1.2 Cipher Block Chaining Mode / 67 \\
                 4.2 Stream Encryption / 69 \\
                 4.2.1 Cipher Feedback Mode / 69 \\
                 4.2.2 Output Feedback Mode / 70 \\
                 4.2.3 Counter Mode / 73 \\
                 4.3 Starting and Finishing / 74 \\
                 4.3.1 Choosing the IV / 74 \\
                 4.3.2 Padding / 75 \\
                 4.3.3 Ciphertext Stealing / 76 \\
                 4.4 Authentication / 77 \\
                 4.4.1 CBC-MAC / 78 \\
                 4.4.2 OMAC / 80 \\
                 4.5 Authenticated Encryption / 82 \\
                 4.5.1 CCMMode / 83 \\
                 4.5.2 EAX Mode / 84 \\
                 4.6 Hashing / 86 \\
                 4.6.1 Three Important Constructions / 86 \\
                 4.6.2 Double Block Length Constructions / 90 \\
                 4.6.3 The SHA-3 Competition / 92 \\
                 4.7 Getting to the Source / 93 \\
                 5: Brute Force Attacks / 95 \\
                 5.1 Time-Memory Trade-offs / 96 \\
                 5.1.1 Hellman's Time-Memory Trade-off / 96 \\
                 5.1.2 More Advanced Considerations / 100 \\
                 5.2 Meet-in-the-Middle Attacks / 103 \\
                 5.2.1 Double Encryption / 103 \\
                 5.2.2 Triple Encryption / 105 \\
                 5.3 Getting to the Source / 108 \\
                 6: Differential Cryptanalysis: The Idea / 109 \\
                 6.1 Getting Started / 110 \\
                 6.1.1 Working with Less Certainty / 113 \\
                 6.2 Introducing Characteristics / 116 \\
                 6.2.1 Joining Characteristics / 117 \\
                 6.2.2 Introducing Differentials / 122 \\
                 6.3 Filtering / 124 \\
                 6.3.1 Recovering Key Information / 125 \\
                 6.4 Getting to the Source / 126 \\
                 7: Linear Cryptanalysis: The Idea / 127 \\
                 7.1 Getting Started / 128 \\
                 7.2 Joining Approximations / 131 \\
                 7.2.1 Deducing More Key / 135 \\
                 7.3 Putting Things Together / 137 \\
                 7.3.1 Introducing Linear Hulls / 141 \\
                 7.3.2 A Unified Measure / 143 \\
                 7.4 Getting to the Source / 144 \\
                 8: Advanced Topics / 145 \\
                 8.1 Differential Cryptanalysis Revisited / 145 \\
                 8.1.1 Joining Components / 146 \\
                 8.1.2 Key Equivalence / 148 \\
                 8.1.3 Key Recovery and Data Complexity / 148 \\
                 8.1.4 Enhancements to the Basic Differential Attack /
                 154 \\
                 8.2 Linear Cryptanalysis Revisited / 165 \\
                 8.2.1 Joining Components / 166 \\
                 8.2.2 Key Equivalence / 168 \\
                 8.2.3 Key Recovery and Data Complexity / 169 \\
                 8.2.4 Enhancements to the Basic Linear Attack / 172 \\
                 8.3 Differential-Linear Cryptanalysis / 174 \\
                 8.4 The Interpolation Attack / 177 \\
                 8.5 The Key Schedule / 178 \\
                 8.6 The Impact of Analysis on Design / 180 \\
                 8.6.1 Block Cipher Topology / 181 \\
                 8.6.2 Resistance to Differential and Linear
                 Cryptanalysis / 184 \\
                 8.6.3 S-Box Properties / 187 \\
                 8.7 Getting to the Source / 192 \\
                 9: A Short Survey and Six Prominent Ciphers / 193 \\
                 9.1 From DES to the AES / 193 \\
                 9.2 The AES Process and Finalists / 196 \\
                 9.3 After the AES / 197 \\
                 9.3.1 Other Competitions and Standardisation Efforts /
                 197 \\
                 9.3.2 Niche Proposals / 199 \\
                 9.3.3 Lightweight Block Ciphers / 199 \\
                 9.4 Six Prominent Block Ciphers / 201 \\
                 9.4.1 FEAL / 202 \\
                 9.4.2 IDEA / 205 \\
                 9.4.3 KASUMI / 207 \\
                 9.4.4 RC5 / 212 \\
                 9.4.5 Skipjack / 214 \\
                 9.4.6 PRESENT / 217 \\
                 9.5 Getting to the Source / 219 \\
                 Index / 221 References / 225",
}

@Article{Koblitz:2011:ECC,
  author =       "Ann Hibner Koblitz and Neal Koblitz and Alfred
                 Menezes",
  title =        "Elliptic curve cryptography: the serpentine course of
                 a paradigm shift",
  journal =      j-J-NUMBER-THEORY,
  volume =       "131",
  number =       "5",
  pages =        "781--814",
  month =        may,
  year =         "2011",
  CODEN =        "JNUTA9",
  DOI =          "https://doi.org/10.1016/j.jnt.2009.01.006",
  ISSN =         "0022-314X (print), 1096-1658 (electronic)",
  ISSN-L =       "0022-314X",
  bibdate =      "Wed Jul 15 08:48:47 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnumbertheory2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0022314X09000481",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Number Theory",
  fjournal =     "Journal of Number Theory",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0022314X",
}

@Article{Kushwah:2011:EIB,
  author =       "Prashant Kushwah and Sunder Lal",
  title =        "An efficient identity based generalized signcryption
                 scheme",
  journal =      j-THEOR-COMP-SCI,
  volume =       "412",
  number =       "45",
  pages =        "6382--6389",
  day =          "21",
  month =        oct,
  year =         "2011",
  CODEN =        "TCSCDI",
  DOI =          "https://doi.org/10.1016/j.tcs.2011.08.009",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Tue Nov 29 19:11:39 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2010.bib;
                 http://www.sciencedirect.com/science/journal/03043975",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0304397511006700",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{Kuznetsov:2011:APP,
  author =       "A. Kuznetsov",
  title =        "Analytic Proof of {Pecherskii--Rogozin} Identity and
                 {Wiener--Hopf} Factorization",
  journal =      j-THEORY-PROBAB-APPL,
  volume =       "55",
  number =       "3",
  pages =        "432--443",
  month =        "????",
  year =         "2011",
  CODEN =        "TPRBAU",
  DOI =          "https://doi.org/10.1137/S0040585X97984929",
  ISSN =         "0040-585X (print), 1095-7219 (electronic)",
  ISSN-L =       "0040-585X",
  bibdate =      "Sat Dec 17 09:29:30 MST 2011",
  bibsource =    "http://epubs.siam.org/sam-bin/dbq/toc/TVP/55/3;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/theoryprobabappl.bib",
  URL =          "http://epubs.siam.org/tvp/resource/1/tprbau/v55/i3/p432_s1",
  acknowledgement = ack-nhfb,
  fjournal =     "Theory of Probability and its Applications",
  journal-URL =  "http://epubs.siam.org/tvp",
}

@Article{Lafitte:2011:CBF,
  author =       "Fr{\'e}d{\'e}ric Lafitte and Dirk {Van Heule} and
                 Julien {Van hamme}",
  title =        "Cryptographic {Boolean} Functions with {R}",
  journal =      j-R-JOURNAL,
  volume =       "3",
  number =       "1",
  pages =        "44--47",
  month =        jun,
  year =         "2011",
  CODEN =        "????",
  ISSN =         "2073-4859",
  bibdate =      "Thu Aug 13 15:54:57 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/rjournal.bib",
  URL =          "http://journal.r-project.org/archive/2011-1/RJournal_2011-1_Lafitte~et~al.pdf",
  acknowledgement = ack-r-project,
  fjournal =     "The R Journal",
  journal-URL =  "http://journal.r-project.org/",
}

@Article{Langsworth:2011:USA,
  author =       "Anthony Langsworth",
  title =        "Using static analysis tools to detect and correct
                 non-compliant cryptography",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "6",
  pages =        "1--7",
  month =        nov,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2047414.2047427",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:07 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Security is an increasing concern for application
                 developers, whether they are targeting internal
                 customers, organizations or the general public.
                 Particularly for the US public sector with requirements
                 like FIPS 140, developers need to identify and remove
                 superseded cryptography in both legacy applications and
                 new development. This paper outlines a mechanism using
                 static analysis tools to find outdated or improper
                 cryptography and suggest corrections or correct code.
                 This prevents the need for manual inspection and
                 correction by developers familiar with cryptography and
                 is more accurate than text searches.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Le:2011:RMA,
  author =       "Duc-Phong Le and Chao-Liang Liu",
  title =        "Refinements of {Miller}'s Algorithm over {Weierstrass}
                 Curves Revisited",
  journal =      j-COMP-J,
  volume =       "54",
  number =       "10",
  pages =        "1582--1591",
  month =        oct,
  year =         "2011",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxr039",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Sat Oct 1 18:10:35 MDT 2011",
  bibsource =    "http://comjnl.oxfordjournals.org/content/54/10.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/54/10/1582.full.pdf+html",
  abstract =     "In 1986, Victor Miller described an algorithm for
                 computing the Weil pairing in his unpublished
                 manuscript. This algorithm has then become the core of
                 all pairing-based cryptosystems. Many improvements of
                 the algorithm have been presented. Most of them involve
                 a choice of elliptic curves of a special form to
                 exploit a possible twist during Tate pairing
                 computation. Other improvements involve a reduction of
                 the number of iterations in the Miller's algorithm. For
                 the generic case, Blake, Murty and Xu proposed three
                 refinements to Miller's algorithm over Weierstrass
                 curves. Though their refinements, which only reduce the
                 total number of vertical lines in Miller's algorithm,
                 did not give an efficient computation as other
                 optimizations, they can be applied for computing both
                 Weil and Tate pairings on all pairing-friendly elliptic
                 curves. In this paper, we extend the Blake--Murty--Xu's
                 method and show how to perform an elimination of all
                 vertical lines in Miller's algorithm during computation
                 of Weil\slash Tate pairings, on general elliptic
                 curves. Experimental results show that our algorithm is
                 faster by $ \approx $25\% in comparison with the
                 original Miller's algorithm.",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "May 6, 2011",
}

@Article{Lee:2011:IMS,
  author =       "Jung-San Lee and Ming-Huang Hsieh",
  title =        "An interactive mobile {SMS} confirmation method using
                 secret sharing technique",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "8",
  pages =        "830--839",
  month =        nov,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:26 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811000836",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lee:2011:PSE,
  author =       "Tian-Fu Lee and Tzonelih Hwang",
  title =        "Provably secure and efficient authentication
                 techniques for the global mobility network",
  journal =      j-J-SYST-SOFTW,
  volume =       "84",
  number =       "10",
  pages =        "1717--1725",
  month =        oct,
  year =         "2011",
  CODEN =        "JSSODM",
  DOI =          "https://doi.org/10.1016/j.jss.2011.05.006",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Mon Feb 6 15:39:24 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0164121211001099",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Lee:2011:TAT,
  author =       "Cheng-Chi Lee and Chun-Ta Li and Shun-Der Chen",
  title =        "Two Attacks on a Two-Factor User Authentication in
                 Wireless Sensor Networks",
  journal =      j-PARALLEL-PROCESS-LETT,
  volume =       "21",
  number =       "1",
  pages =        "21--26",
  month =        mar,
  year =         "2011",
  CODEN =        "PPLTEE",
  DOI =          "https://doi.org/10.1142/S0129626411000047",
  ISSN =         "0129-6264",
  bibdate =      "Tue Feb 28 11:32:06 MST 2012",
  bibsource =    "http://ejournals.wspc.com.sg/ppl/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/parallelprocesslett.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Parallel Processing Letters",
  journal-URL =  "http://www.worldscientific.com/loi/ppl",
}

@Article{Leng:2011:DKB,
  author =       "Lu Leng and Jiashu Zhang",
  title =        "Dual-key-binding cancelable palmprint cryptosystem for
                 palmprint protection and information security",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "34",
  number =       "6",
  pages =        "1979--1989",
  month =        nov,
  year =         "2011",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Wed Jan 28 15:44:06 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804511001287",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Netw. Comput. Appl.",
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Lewko:2011:DAB,
  author =       "Allison Lewko and Brent Waters",
  title =        "Decentralizing Attribute-Based Encryption",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6632",
  pages =        "568--588",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-20465-4_31",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Dec 15 17:44:03 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_31",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Lewko:2011:UHA,
  author =       "Allison Lewko and Brent Waters",
  title =        "Unbounded {HIBE} and Attribute-Based Encryption",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6632",
  pages =        "547--567",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-20465-4_30",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Dec 15 17:44:03 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_30",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Li:2011:CIB,
  author =       "Xiong Li and Jian-Wei Niu and Jian Ma and Wen-Dong
                 Wang and Cheng-Lian Liu",
  title =        "Cryptanalysis and improvement of a biometrics-based
                 remote user authentication scheme using smart cards",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "34",
  number =       "1",
  pages =        "73--79",
  month =        jan,
  year =         "2011",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Wed Jan 28 15:43:49 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804510001657",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Netw. Comput. Appl.",
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Li:2011:NIW,
  author =       "Li Li and He-Huan Xu and Chin-Chen Chang and Ying-Ying
                 Ma",
  title =        "A novel image watermarking in redistributed invariant
                 wavelet domain",
  journal =      j-J-SYST-SOFTW,
  volume =       "84",
  number =       "6",
  pages =        "923--929",
  month =        jun,
  year =         "2011",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212",
  ISSN-L =       "0164-1212",
  bibdate =      "Tue Jun 21 10:22:30 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Li:2011:NRA,
  author =       "Guangsong Li and Jianfeng Ma and Qi Jiang and Xi
                 Chen",
  title =        "A novel re-authentication scheme based on tickets in
                 wireless local area networks",
  journal =      j-J-PAR-DIST-COMP,
  volume =       "71",
  number =       "7",
  pages =        "906--914",
  month =        jul,
  year =         "2011",
  CODEN =        "JPDCER",
  DOI =          "https://doi.org/10.1016/j.jpdc.2011.03.002",
  ISSN =         "0743-7315 (print), 1096-0848 (electronic)",
  ISSN-L =       "0743-7315",
  bibdate =      "Sat Feb 25 09:11:34 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jpardistcomp.bib;
                 http://www.sciencedirect.com/science/journal/07437315",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0743731511000554",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Parallel and Distributed Computing",
  journal-URL =  "http://www.sciencedirect.com/science/journal/07437315",
}

@Article{Lim:2011:NAN,
  author =       "Chae Hoon Lim",
  title =        "A note on the average number of {RSA} fixed points",
  journal =      j-THEOR-COMP-SCI,
  volume =       "412",
  number =       "35",
  pages =        "4729--4737",
  day =          "12",
  month =        aug,
  year =         "2011",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Tue Aug 30 18:51:47 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/03043975",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@InProceedings{Lin:2011:CRN,
  author =       "Huijia Lin and Rafael Pass",
  title =        "Constant-round non-malleable commitments from any
                 one-way function",
  crossref =     "ACM:2011:PAI",
  pages =        "705--714",
  year =         "2011",
  DOI =          "https://doi.org/10.1145/1993636.1993730",
  bibdate =      "Tue Jun 7 18:53:27 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
}

@Article{Lin:2011:ICA,
  author =       "Han-Yu Lin and Chien-Lung Hsu and Shih-Kun Huang",
  title =        "Improved convertible authenticated encryption scheme
                 with provable security",
  journal =      j-INFO-PROC-LETT,
  volume =       "111",
  number =       "13",
  pages =        "661--666",
  day =          "1",
  month =        jul,
  year =         "2011",
  CODEN =        "IFPLAT",
  DOI =          "https://doi.org/10.1016/j.ipl.2011.03.021",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Sat Feb 4 08:08:38 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019011000846",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Lin:2011:NIB,
  author =       "Han-Yu Lin and Chien-Lung Hsu",
  title =        "A Novel Identity-Based Key-Insulated Convertible
                 Authenticated Encryption Scheme",
  journal =      j-INT-J-FOUND-COMP-SCI,
  volume =       "22",
  number =       "3",
  pages =        "739--756",
  month =        apr,
  year =         "2011",
  CODEN =        "IFCSEN",
  DOI =          "https://doi.org/10.1142/S0129054111008325",
  ISSN =         "0129-0541 (print), 1793-6373 (electronic)",
  ISSN-L =       "0129-0541",
  bibdate =      "Tue Apr 19 08:35:20 MDT 2011",
  bibsource =    "http://ejournals.wspc.com.sg/ijfcs/mkt/archive.shtml;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Foundations of Computer
                 Science (IJFCS)",
  journal-URL =  "http://www.worldscientific.com/loi/ijfcs",
}

@Article{Liu:2011:DBA,
  author =       "Qingzhong Liu and Andrew H. Sung and Mengyu Qiao",
  title =        "Derivative-based audio steganalysis",
  journal =      j-TOMCCAP,
  volume =       "7",
  number =       "3",
  pages =        "18:1--18:??",
  month =        aug,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2000486.2000492",
  ISSN =         "1551-6857 (print), 1551-6865 (electronic)",
  ISSN-L =       "1551-6857",
  bibdate =      "Mon Sep 5 17:00:22 MDT 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tomccap/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  articleno =    "18",
  fjournal =     "ACM Transactions on Multimedia Computing,
                 Communications, and Applications",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J961",
}

@Article{Liu:2011:NJD,
  author =       "Qingzhong Liu and Andrew H. Sung and Mengyu Qiao",
  title =        "Neighboring joint density-based {JPEG} steganalysis",
  journal =      j-TIST,
  volume =       "2",
  number =       "2",
  pages =        "16:1--16:??",
  month =        feb,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/1899412.1899420",
  ISSN =         "2157-6904 (print), 2157-6912 (electronic)",
  ISSN-L =       "2157-6904",
  bibdate =      "Thu Oct 1 16:23:55 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tist.bib/",
  abstract =     "The threat posed by hackers, spies, terrorists, and
                 criminals, etc. using steganography for stealthy
                 communications and other illegal purposes is a serious
                 concern of cyber security. Several steganographic
                 systems that have been developed and made readily
                 available utilize JPEG images as carriers. Due to the
                 popularity of JPEG images on the Internet, effective
                 steganalysis techniques are called for to counter the
                 threat of JPEG steganography. In this article, we
                 propose a new approach based on feature mining on the
                 discrete cosine transform (DCT) domain and machine
                 learning for steganalysis of JPEG images. First,
                 neighboring joint density features on both intra-block
                 and inter-block are extracted from the DCT coefficient
                 array and the absolute array, respectively; then a
                 support vector machine (SVM) is applied to the features
                 for detection. An evolving neural-fuzzy inference
                 system is employed to predict the hiding amount in JPEG
                 steganograms. We also adopt a feature selection method
                 of support vector machine recursive feature elimination
                 to reduce the number of features. Experimental results
                 show that, in detecting several JPEG-based
                 steganographic systems, our method prominently
                 outperforms the well-known Markov-process based
                 approach.",
  acknowledgement = ack-nhfb,
  articleno =    "16",
  fjournal =     "ACM Transactions on Intelligent Systems and Technology
                 (TIST)",
  journal-URL =  "http://portal.acm.org/citation.cfm?id=J1318",
}

@Article{Liu:2011:PIA,
  author =       "Guangjie Liu and Junwen Wang and Shiguo Lian and
                 Zhiquan Wang",
  title =        "A passive image authentication scheme for detecting
                 region-duplication forgery with rotation",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "34",
  number =       "5",
  pages =        "1557--1565",
  month =        sep,
  year =         "2011",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Wed Jan 28 15:44:03 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804510001621",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Netw. Comput. Appl.",
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Liu:2011:SBA,
  author =       "Yu Liu and Kaijie Wu and Ramesh Karri",
  title =        "Scan-based attacks on linear feedback shift register
                 based stream ciphers",
  journal =      j-TODAES,
  volume =       "16",
  number =       "2",
  pages =        "20:1--20:??",
  month =        mar,
  year =         "2011",
  CODEN =        "ATASFO",
  DOI =          "https://doi.org/10.1145/1929943.1929952",
  ISSN =         "1084-4309 (print), 1557-7309 (electronic)",
  ISSN-L =       "1084-4309",
  bibdate =      "Fri Apr 1 16:07:45 MDT 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/todaes/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "Stream cipher is an important class of encryption
                 algorithm that encrypts plaintext messages one bit at a
                 time. Various stream ciphers are deployed in wireless
                 telecommunication applications because they have simple
                 hardware circuitry, are generally fast and consume very
                 low power. On the other hand, scan-based
                 Design-for-Test (DFT) is one of the most popular
                 methods to test IC devices. All flip-flops in the
                 Design Under Test are connected to one or more scan
                 chains and the states of the flip-flops can be scanned
                 out through these chains. In this paper, we present an
                 attack on stream cipher implementations by determining
                 the scan chain structure of the Linear Feedback Shift
                 Registers in their implementations.",
  acknowledgement = ack-nhfb,
  articleno =    "20",
  fjournal =     "ACM Transactions on Design Automation of Electronic
                 Systems (TODAES)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J776",
}

@Article{Malkin:2011:ECS,
  author =       "Tal Malkin and Isamu Teranishi and Moti Yung",
  title =        "Efficient Circuit-Size Independent Public Key
                 Encryption with {KDM} Security",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6632",
  pages =        "507--526",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-20465-4_28",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Dec 15 17:44:03 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_28",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Mannan:2011:LPD,
  author =       "Mohammad Mannan and P. C. van Oorschot",
  title =        "Leveraging personal devices for stronger password
                 authentication from untrusted computers",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "4",
  pages =        "703--750",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0412",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:11 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Book{McGrayne:2011:TWH,
  author =       "Sharon Bertsch McGrayne",
  title =        "The theory that would not die: how {Bayes}' rule
                 cracked the {Enigma} code, hunted down {Russian}
                 submarines, and emerged triumphant from two centuries
                 of controversy",
  publisher =    pub-YALE,
  address =      pub-YALE:adr,
  pages =        "xiii + 320",
  year =         "2011",
  ISBN =         "0-300-16969-8",
  ISBN-13 =      "978-0-300-16969-0",
  LCCN =         "QA279.5 2011",
  bibdate =      "Thu May 5 09:40:39 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 z3950.gbv.de:20011/gvk",
  URL =          "http://yalepress.yale.edu/yupbooks/book.asp?isbn=9780300169690",
  abstract =     "Bayes' rule appears to be a straightforward, one-line
                 theorem: by updating our initial beliefs with objective
                 new information, we get a new and improved belief. To
                 its adherents, it is an elegant statement about
                 learning from experience. To its opponents, it is
                 subjectivity run amok.\par

                 In the first-ever account of Bayes' rule for general
                 readers, Sharon Bertsch McGrayne explores this
                 controversial theorem and the human obsessions
                 surrounding it. She traces its discovery by an amateur
                 mathematician in the 1740s through its development into
                 roughly its modern form by French scientist Pierre
                 Simon Laplace. She reveals why respected statisticians
                 rendered it professionally taboo for 150 years---at the
                 same time that practitioners relied on it to solve
                 crises involving great uncertainty and scanty
                 information, even breaking Germany's Enigma code during
                 World War II, and explains how the advent of
                 off-the-shelf computer technology in the 1980s proved
                 to be a game-changer. Today, Bayes' rule is used
                 everywhere from DNA de-coding to Homeland
                 Security.\par

                 Drawing on primary source material and interviews with
                 statisticians and other scientists, {\em The Theory
                 That Would Not Die\/} is the riveting account of how a
                 seemingly simple theorem ignited one of the greatest
                 controversies of all time.",
  acknowledgement = ack-nhfb,
  subject =      "Bayesian statistical decision theory; History; science
                 / History; mathematics / History and Philosophy",
}

@Book{McKay:2011:SLB,
  author =       "Sinclair McKay",
  title =        "The secret life of {Bletchley Park}: the history of
                 the wartime codebreaking centre by the men and women
                 who were there",
  publisher =    "Gardners Books",
  pages =        "????",
  year =         "2011",
  ISBN =         "1-84513-633-0",
  ISBN-13 =      "978-1-84513-633-8",
  LCCN =         "????",
  bibdate =      "Thu May 12 11:15:08 MDT 2011",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
}

@Article{Milo:2011:FGB,
  author =       "Fabrizio Milo and Massimo Bernaschi and Mauro Bisson",
  title =        "A fast, {GPU} based, dictionary attack to {OpenPGP}
                 secret keyrings",
  journal =      j-J-SYST-SOFTW,
  volume =       "84",
  number =       "12",
  pages =        "2088--2096",
  month =        dec,
  year =         "2011",
  CODEN =        "JSSODM",
  DOI =          "https://doi.org/10.1016/j.jss.2011.05.027",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Mon Feb 6 15:39:27 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0164121211001270",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Mizuki:2011:ASN,
  author =       "Takaaki Mizuki and Satoru Nakayama and Hideaki Sone",
  title =        "An Application of {ST}-Numbering to Secret Key
                 Agreement",
  journal =      j-INT-J-FOUND-COMP-SCI,
  volume =       "22",
  number =       "5",
  pages =        "1211--1227",
  month =        aug,
  year =         "2011",
  CODEN =        "IFCSEN",
  DOI =          "https://doi.org/10.1142/S0129054111008659",
  ISSN =         "0129-0541 (print), 1793-6373 (electronic)",
  ISSN-L =       "0129-0541",
  bibdate =      "Wed Aug 24 06:50:49 MDT 2011",
  bibsource =    "http://ejournals.wspc.com.sg/ijfcs/mkt/archive.shtml;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Foundations of Computer
                 Science (IJFCS)",
  journal-URL =  "http://www.worldscientific.com/loi/ijfcs",
}

@Article{Mohanty:2011:RTP,
  author =       "Saraju P. Mohanty and Elias Kougianos",
  title =        "Real-time perceptual watermarking architectures for
                 video broadcasting",
  journal =      j-J-SYST-SOFTW,
  volume =       "84",
  number =       "5",
  pages =        "724--738",
  month =        may,
  year =         "2011",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212",
  ISSN-L =       "0164-1212",
  bibdate =      "Tue Jun 21 10:22:28 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Mukhopadhyay:2011:PEA,
  author =       "Debdeep Mukhopadhyay and Dipanwita Roy Chowdhury",
  title =        "A Parallel Efficient Architecture for Large
                 Cryptographically Robust $ n \times k (k \geq n / 2) $
                 Mappings",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "60",
  number =       "3",
  pages =        "375--385",
  month =        mar,
  year =         "2011",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2010.136",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Wed Jun 29 10:26:18 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Nguyen:2011:APB,
  author =       "L. H. Nguyen and A. W. Roscoe",
  title =        "Authentication protocols based on low-bandwidth
                 unspoofable channels: A comparative survey",
  journal =      j-J-COMP-SECUR,
  volume =       "19",
  number =       "1",
  pages =        "139--201",
  month =        "????",
  year =         "2011",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2010-0403",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:24:58 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Nose:2011:SWA,
  author =       "Peter Nose",
  title =        "Security weaknesses of authenticated key agreement
                 protocols",
  journal =      j-INFO-PROC-LETT,
  volume =       "111",
  number =       "14",
  pages =        "687--696",
  day =          "31",
  month =        jul,
  year =         "2011",
  CODEN =        "IFPLAT",
  DOI =          "https://doi.org/10.1016/j.ipl.2011.04.007",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Sat Feb 4 08:08:39 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019011001074",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Obana:2011:AOC,
  author =       "Satoshi Obana",
  title =        "Almost Optimum $t$-Cheater Identifiable Secret Sharing
                 Schemes",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6632",
  pages =        "284--302",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-20465-4_17",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Dec 15 17:44:03 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2011a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/978-3-642-20465-4_17",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Oggier:2011:ACA,
  author =       "Fr{\'e}d{\'e}rique Oggier and Hanane Fathi",
  title =        "An authentication code against pollution attacks in
                 network coding",
  journal =      j-IEEE-TRANS-NETWORKING,
  volume =       "19",
  number =       "6",
  pages =        "1587--1596",
  month =        dec,
  year =         "2011",
  CODEN =        "IEANEP",
  DOI =          "https://doi.org/10.1109/TNET.2011.2126592",
  ISSN =         "1063-6692 (print), 1558-2566 (electronic)",
  ISSN-L =       "1063-6692",
  bibdate =      "Tue Jan 5 18:42:19 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
  abstract =     "Systems exploiting network coding to increase their
                 throughput suffer greatly from pollution attacks, which
                 consist of injecting malicious packets in the network.
                 The pollution attacks are amplified by the network
                 coding process, resulting in a greater damage than
                 under traditional routing. In this paper, we address
                 this issue by designing an unconditionally secure
                 authentication code (that is, which does not rely on
                 computational assumptions) suitable for multicast
                 network coding, where the keying material is initially
                 computed and distributed by a trusted authority to the
                 destinations and intermediate nodes. The proposed
                 scheme allows not only destinations, but also
                 intermediate nodes, to verify the integrity and origin
                 of the packets received without having to decode, and
                 thus detect and discard the malicious messages in
                 transit that fail the verification. This way, the
                 pollution is canceled out before reaching the
                 destinations. The proposed scheme is robust against
                 pollution attacks from outsiders, as well as coalitions
                 of malicious insider nodes, which have the ability to
                 perform the integrity check, but instead get corrupted
                 and use their knowledge to themselves attack the
                 network. We analyze the performance of the scheme in
                 terms of both throughput and goodput and show that the
                 price to pay for tolerating inside attackers is a high
                 decrease in throughput (it is inversely proportional to
                 the number of insider attackers that can collude). We
                 finally discuss applications to file distribution.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE\slash ACM Transactions on Networking",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J771",
}

@Article{Oligeri:2011:REA,
  author =       "Gabriele Oligeri and Stefano Chessa and Roberto {Di
                 Pietro} and Gaetano Giunta",
  title =        "Robust and efficient authentication of video stream
                 broadcasting",
  journal =      j-TISSEC,
  volume =       "14",
  number =       "1",
  pages =        "5:1--5:??",
  month =        may,
  year =         "2011",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/1952982.1952987",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Thu Jun 2 07:27:23 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "We present a novel video stream authentication scheme
                 which combines signature amortization by means of hash
                 chains and an advanced watermarking technique. We
                 propose a new hash chain construction, the Duplex Hash
                 Chain, which allows us to achieve bit-by-bit
                 authentication that is robust to low bit error rates.
                 This construction is well suited for wireless broadcast
                 communications characterized by low packet losses such
                 as in satellite networks. Moreover, neither hardware
                 upgrades nor specific end-user equipment are needed to
                 enjoy the authentication services. The computation
                 overhead experienced on the receiver only sums to two
                 hashes per block of pictures and one digital signature
                 verification for the whole received stream.",
  acknowledgement = ack-nhfb,
  articleno =    "5",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@Book{Oppliger:2011:CC,
  author =       "Rolf Oppliger",
  title =        "Contemporary cryptography",
  publisher =    pub-ARTECH,
  address =      pub-ARTECH:adr,
  edition =      "Second",
  pages =        "612 (est.)",
  year =         "2011",
  ISBN =         "1-60807-145-6",
  ISBN-13 =      "978-1-60807-145-6",
  LCCN =         "????",
  bibdate =      "Thu May 12 10:18:59 MDT 2011",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.artechhouse.com/Detail.aspx?strIsbn=978-1-60807-145-6",
  acknowledgement = ack-nhfb,
  tableofcontents = "Introduction \\
                 Cryptographic Systems \\
                 Unkeyed Cryptosystems One-Way Functions \\
                 Cryptographic Hash Functions \\
                 Random Bit Generators \\
                 Secret Key Cryptosystems Symmetric Encryption Systems
                 \\
                 Message Authentication Codes \\
                 Pseudo-Random Bit Generators \\
                 Pseudo-Random Functions \\
                 Public Key Cryptosystems Asymmetric Encryption Systems
                 \\
                 Digital Signature Systems \\
                 Key Establishment \\
                 Entity Authentication \\
                 Secure Multiparty Computation \\
                 Epilogue Key Management \\
                 Conclusions \\
                 Outlook \\
                 Appendixes Discrete Mathematics \\
                 Probability Theory \\
                 Information Theory \\
                 Complexity Theory \\
                 Abbreviations and Acronyms \\
                 Mathematical Notation \\
                 About the Author",
}

@Article{Ozen:2011:MIS,
  author =       "Mehmet {\"O}zen and Vedat {\c{S}}iap",
  title =        "The {MacWilliams} identity for $m$-spotty weight
                 enumerators of linear codes over finite fields",
  journal =      j-COMPUT-MATH-APPL,
  volume =       "61",
  number =       "4",
  pages =        "1000--1004",
  month =        feb,
  year =         "2011",
  CODEN =        "CMAPDK",
  DOI =          "https://doi.org/10.1016/j.camwa.2010.12.048",
  ISSN =         "0898-1221 (print), 1873-7668 (electronic)",
  ISSN-L =       "0898-1221",
  MRclass =      "94B05",
  MRnumber =     "2770504",
  bibdate =      "Wed Mar 1 21:50:50 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computmathappl2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0898122110009533",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers and Mathematics with Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/08981221",
}

@Article{Park:2011:ACC,
  author =       "Ki-Woong Park and Kyu Ho Park",
  title =        "{ACCENT}: Cognitive cryptography plugged compression
                 for {SSL\slash TLS-based} cloud computing services",
  journal =      j-TOIT,
  volume =       "11",
  number =       "2",
  pages =        "7:1--7:??",
  month =        dec,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2049656.2049659",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Thu Dec 15 09:10:08 MST 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tois.bib",
  acknowledgement = ack-nhfb,
  articleno =    "7",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Book{Pearson:2011:NWC,
  editor =       "Joss Pearson",
  title =        "{Neil Webster}'s cribs for victory: the untold story
                 of {Bletchley Park}'s secret room",
  publisher =    "Polperro Heritage",
  address =      "Clifton-upon-Teme, UK",
  pages =        "????",
  year =         "2011",
  ISBN =         "0-9559541-8-5 (paperback)",
  ISBN-13 =      "978-0-9559541-8-4 (paperback)",
  LCCN =         "????",
  bibdate =      "Mon Sep 3 18:01:22 MDT 2012",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  acknowledgement = ack-nhfb,
  subject =      "Webster, Neil; World War, 1939-1945; Great Britain;
                 Electronic intelligence; Enigma cipher system; History;
                 Military intelligence; Bletchley Park (Milton Keynes,
                 England); 20th century",
}

@Article{Perez:2011:FDS,
  author =       "Alejandro P{\'e}rez and Gabriel L{\'o}pez and
                 {\'O}scar C{\'a}novas and Antonio F.
                 G{\'o}mez-Skarmeta",
  title =        "Formal description of the {SWIFT} identity management
                 framework",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "27",
  number =       "8",
  pages =        "1113--1123",
  month =        oct,
  year =         "2011",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Tue Aug 30 13:14:22 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/0167739X",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Peterson:2011:SWS,
  author =       "Heather R. Peterson",
  title =        "The shape of the world: the story of {Spanish}
                 expansion and the secret science of cosmography",
  journal =      j-STUD-HIST-PHILOS-SCI,
  volume =       "42",
  number =       "1",
  pages =        "223--226",
  month =        mar,
  year =         "2011",
  CODEN =        "SHPSB5",
  DOI =          "https://doi.org/10.1016/j.shpsa.2010.11.012",
  ISSN =         "0039-3681 (print), 1879-2510 (electronic)",
  ISSN-L =       "0039-3681",
  bibdate =      "Mon Nov 7 12:12:03 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/shps-a.bib;
                 http://www.sciencedirect.com/science/journal/00393681",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0039368110000919",
  acknowledgement = ack-nhfb,
  fjournal =     "Studies in History and Philosophy of Science Part A",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00393681",
}

@Misc{Prins:2011:DCA,
  author =       "{JR Prins} and {Business Unit Cybercrime}",
  title =        "DigiNotar certificate authority breach {``Operation
                 Black Tulip''}",
  howpublished = "Unknown",
  month =        nov,
  year =         "2011",
  bibdate =      "Mon Mar 09 16:00:06 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  note =         "Fox-IT",
  acknowledgement = ack-nhfb,
  remark =       "Cite in \cite[reference 63]{Schneier:2015:SWC}.",
}

@Article{Rawat:2011:CBR,
  author =       "Sanjay Rawat and Balasubramanian Raman",
  title =        "A Chaos-Based Robust Watermarking Algorithm for
                 Rightful Ownership Protection",
  journal =      j-INT-J-IMAGE-GRAPHICS,
  volume =       "11",
  number =       "4",
  pages =        "471--493",
  month =        oct,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1142/S0219467811004263",
  ISSN =         "0219-4678",
  bibdate =      "Wed Feb 8 18:48:57 MST 2012",
  bibsource =    "http://ejournals.wspc.com.sg/ijig/ijig.shtml;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijig.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Image and Graphics (IJIG)",
  journal-URL =  "http://www.worldscientific.com/worldscinet/ijig",
}

@Article{Reeder:2011:WPD,
  author =       "Robert W. Reeder and Stuart Schechter",
  title =        "When the Password Doesn't Work: Secondary
                 Authentication for Websites",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "2",
  pages =        "43--49",
  month =        mar # "\slash " # apr,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.1",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Apr 1 22:34:08 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@InProceedings{Regev:2011:QOW,
  author =       "Oded Regev and Bo'az Klartag",
  title =        "Quantum one-way communication can be exponentially
                 stronger than classical communication",
  crossref =     "ACM:2011:PAI",
  pages =        "31--40",
  year =         "2011",
  DOI =          "https://doi.org/10.1145/1993636.1993642",
  bibdate =      "Tue Jun 7 18:53:27 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
}

@Article{Rifa-Pous:2011:CEC,
  author =       "Helena Rif{\`a}-Pous and Jordi
                 Herrera-Joancomart{\'\i}",
  title =        "Computational and Energy Costs of Cryptographic
                 Algorithms on Handheld Devices",
  journal =      j-FUTURE-INTERNET,
  volume =       "3",
  number =       "1",
  pages =        "31--48",
  day =          "14",
  month =        feb,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi3010031",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:46 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/3/1/31",
  abstract =     "Networks are evolving toward a ubiquitous model in
                 which heterogeneous devices are interconnected.
                 Cryptographic algorithms are required for developing
                 security solutions that protect network activity.
                 However, the computational and energy limitations of
                 network devices jeopardize the actual implementation of
                 such mechanisms. In this paper, we perform a wide
                 analysis on the expenses of launching symmetric and
                 asymmetric cryptographic algorithms, hash chain
                 functions, elliptic curves cryptography and pairing
                 based cryptography on personal agendas, and compare
                 them with the costs of basic operating system
                 functions. Results show that although cryptographic
                 power costs are high and such operations shall be
                 restricted in time, they are not the main limiting
                 factor of the autonomy of a device.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue The Internet of Things.",
}

@Article{Robert-Inacio:2011:SAP,
  author =       "Fr{\'e}d{\'e}rique Robert-Inacio and Alain Tr{\'e}meau
                 and Mike Fournigault and Yannick Teglia and Pierre-Yvan
                 Liardet",
  title =        "Shape analysis for power signal cryptanalysis on
                 secure components",
  journal =      j-J-SYST-SOFTW,
  volume =       "84",
  number =       "5",
  pages =        "753--762",
  month =        may,
  year =         "2011",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212",
  ISSN-L =       "0164-1212",
  bibdate =      "Tue Jun 21 10:22:28 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Romero:2011:FSW,
  author =       "J. J. Romero",
  title =        "Fast start for world's biggest biometrics {ID}
                 project",
  journal =      j-IEEE-SPECTRUM,
  volume =       "48",
  number =       "5",
  pages =        "11--12",
  month =        may,
  year =         "2011",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.2011.5753227",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Fri Jan 17 18:54:05 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Biometrics; biometrics (access control); biometrics ID
                 project; Databases; Government policies; ID cards;
                 Identification of persons; India; legal documents;
                 legal identity; public administration",
}

@TechReport{Rose:2011:KBT,
  author =       "Greg Rose",
  title =        "{KISS}: a Bit Too Simple",
  type =         "Report",
  number =       "??",
  institution =  "Qualcomm Inc.",
  address =      "San Diego, CA, USA",
  day =          "18",
  month =        apr,
  year =         "2011",
  bibdate =      "Wed Jun 22 08:40:22 2011",
  bibsource =    "https://www.math.utah.edu/pub/bibnet/authors/m/marsaglia-george.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://eprint.iacr.org/2011/007.pdf",
  abstract =     "KISS (`Keep it Simple Stupid') is an efficient
                 pseudo-random number generator originally specified by
                 G. Marsaglia and A. Zaman in 1993. G. Marsaglia in 1998
                 posted a C version to various USENET newsgroups,
                 including sci.crypt. Marsaglia himself has never
                 claimed cryptographic security for the KISS generator,
                 but others have made the intellectual leap and claimed
                 that it is of cryptographic quality. In this paper we
                 show a number of reasons why the generator does not
                 meet some of the KISS authors' claims, why it is not
                 suitable for use as a stream cipher, and that it is not
                 cryptographically secure. Our best attack requires
                 about 70 words of generated output and a few hours of
                 computation to recover the initial state. In early
                 2011, G. Marsaglia posted a new version of KISS, which
                 falls to a simple divide-and-conquer attack.",
  acknowledgement = ack-nhfb,
  xxnumber =     "??",
}

@Article{Sabri:2011:AFS,
  author =       "Khair Eddin Sabri and Ridha Khedri",
  title =        "Algebraic Framework for the Specification and Analysis
                 of Cryptographic-Key Distribution",
  journal =      j-FUND-INFO,
  volume =       "112",
  number =       "4",
  pages =        "305--335",
  month =        dec,
  year =         "2011",
  CODEN =        "FUMAAJ",
  DOI =          "https://doi.org/10.3233/FI-2011-592",
  ISSN =         "0169-2968 (print), 1875-8681 (electronic)",
  ISSN-L =       "0169-2968",
  bibdate =      "Sat Mar 5 17:14:15 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/fundinfo2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Fundamenta Informaticae",
  journal-URL =  "http://content.iospress.com/journals/fundamenta-informaticae",
}

@Article{Safavi-Naini:2011:USC,
  author =       "Reihaneh Safavi-Naini and Shaoquan Jiang",
  title =        "Unconditionally Secure Conference Key Distribution:
                 Security Notions, Bounds and Constructions",
  journal =      j-INT-J-FOUND-COMP-SCI,
  volume =       "22",
  number =       "6",
  pages =        "1369--1393",
  month =        sep,
  year =         "2011",
  CODEN =        "IFCSEN",
  DOI =          "https://doi.org/10.1142/S0129054111008763",
  ISSN =         "0129-0541 (print), 1793-6373 (electronic)",
  ISSN-L =       "0129-0541",
  bibdate =      "Thu Sep 22 12:07:39 MDT 2011",
  bibsource =    "http://ejournals.wspc.com.sg/ijfcs/mkt/archive.shtml;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Foundations of Computer
                 Science (IJFCS)",
  journal-URL =  "http://www.worldscientific.com/loi/ijfcs",
}

@InProceedings{Salmon:2011:PRN,
  author =       "John K. Salmon and Mark A. Moraes and Ron O. Dror and
                 David E. Shaw",
  title =        "Parallel random numbers: as easy as $ 1, 2, 3 $",
  crossref =     "Lathrop:2011:SPI",
  pages =        "16:1--16:12",
  year =         "2011",
  DOI =          "https://doi.org/10.1145/2063384.2063405",
  bibdate =      "Fri Dec 16 11:05:47 MST 2011",
  bibsource =    "http://portal.acm.org/;
                 https://www.math.utah.edu/pub/bibnet/authors/m/marsaglia-george.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jstatsoft.bib;
                 https://www.math.utah.edu/pub/tex/bib/mathcw.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib;
                 https://www.math.utah.edu/pub/tex/bib/supercomputing2011.bib;
                 https://www.math.utah.edu/pub/tex/bib/tomacs.bib",
  abstract =     "Most pseudorandom number generators (PRNGs) scale
                 poorly to massively parallel high-performance
                 computation because they are designed as sequentially
                 dependent state transformations. We demonstrate that
                 independent, keyed transformations of counters produce
                 a large alternative class of PRNGs with excellent
                 statistical properties (long period, no discernable
                 structure or correlation). These counter-based PRNGs
                 are ideally suited to modern multicore CPUs, GPUs,
                 clusters, and special-purpose hardware because they
                 vectorize and parallelize well, and require little or
                 no memory for state. We introduce several counter-based
                 PRNGs: some based on cryptographic standards (AES,
                 Threefish) and some completely new (Philox). All our
                 PRNGs pass rigorous statistical tests (including
                 TestU01's BigCrush) and produce at least 264 unique
                 parallel streams of random numbers, each with period
                 2128 or more. In addition to essentially unlimited
                 parallel scalability, our PRNGs offer excellent
                 single-chip performance: Philox is faster than the
                 CURAND library on a single NVIDIA GPU.",
  acknowledgement = ack-nhfb,
  articleno =    "16",
  remark-1 =     "From the article, page 3: ``The period of any useful
                 PRNG must be sufficiently long that the state space of
                 the PRNG will not be exhausted by any application, even
                 if run on large parallel machines for long periods of
                 time. One million cores, generating 10 billion random
                 numbers per second, will take about half an hour to
                 generate $2^{64}$ random numbers, which raises doubts
                 about the long-term viability of a single,
                 unpararameterized PRNG with a periods of `only'
                 $2^{64}$. On the other hand, exhausting the state space
                 of a multistreamable family of $2^{32}$ such
                 generators, or a single generator with a period of
                 $2^{128}$, is far beyond the capability of any
                 technology remotely like that in current computers.''",
  remark-2 =     "From the article, page 5: ``only a few conventional
                 PRNGs pass even one complete battery of Crush tests.
                 The multiple recursive generators, the multiplicative
                 lagged Fibonacci generators, and some combination
                 generators are reported to do so. On the other hand,
                 many of the most widely used PRNGs fail quite
                 dramatically, including all of the linear congruential
                 generators, such as drand48() and the C-language
                 rand(). The linear and general feedback shift register
                 generators, including the Mersenne Twister, always fail
                 the tests of linear dependence, and some fail many
                 more.''",
  remark-3 =     "This article has a good discussion of the issues of
                 parallel random-number generation. The authors note
                 that large internal state (e.g., the Mersenne Twister
                 needs 2496 bytes) is impractical with a million cores,
                 or with GPUs that require awkward memory transfers
                 between GPU and CPU memory. They propose methods that
                 require little state, and are based on cryptographic
                 algorithms. They point out that a generator based on
                 the Advanced Encryption Standard with Intel AES-NI
                 hardware support becomes competitive with other
                 generators. The comparative Table 2 on page 8 shows
                 that the Threefish, Threefry, and Philox generators
                 require only 0.7 to 4.3 cycles per byte.",
}

@Article{Sarkar:2011:TES,
  author =       "Palash Sarkar",
  title =        "Tweakable enciphering schemes using only the
                 encryption function of a block cipher",
  journal =      j-INFO-PROC-LETT,
  volume =       "111",
  number =       "19",
  pages =        "945--955",
  day =          "15",
  month =        oct,
  year =         "2011",
  CODEN =        "IFPLAT",
  DOI =          "https://doi.org/10.1016/j.ipl.2011.06.014",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Sat Feb 4 08:08:40 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019011001852",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Schwartz:2011:IMP,
  author =       "Ari Schwartz",
  title =        "Identity management and privacy: a rare opportunity to
                 get it right",
  journal =      j-CACM,
  volume =       "54",
  number =       "6",
  pages =        "22--24",
  month =        jun,
  year =         "2011",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/1953122.1953134",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Jun 1 18:12:20 MDT 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@InProceedings{Seyedzadeh:2011:IEA,
  author =       "Seyed Mohammad Seyedzadeh and Yasaman Hashemi",
  booktitle =    "{2011 11th International Conference on Intelligent
                 Systems Design and Applications (ISDA)}",
  title =        "Image encryption algorithm based on {Choquet Fuzzy
                 Integral} with self-adaptive pseudo-random number
                 generator",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "642--647",
  year =         "2011",
  DOI =          "https://doi.org/10.1109/ISDA.2011.6121728",
  bibdate =      "Fri Jan 6 07:45:38 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6121728",
  acknowledgement = ack-nhfb,
  book-URL =     "http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6112291",
}

@InProceedings{Seyedzadeh:2011:IES,
  author =       "S. M. Seyedzadeh and S. Mirzakuchaki",
  booktitle =    "{2011 International Symposium on Artificial
                 Intelligence and Signal Processing (AISP)}",
  title =        "Image encryption scheme based on {Choquet} fuzzy
                 integral with pseudo-random keystream generator",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "101--106",
  year =         "2011",
  DOI =          "https://doi.org/10.1109/AISP.2011.5960982",
  bibdate =      "Fri Jan 6 07:45:38 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5960982",
  acknowledgement = ack-nhfb,
  book-URL =     "http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5955054",
}

@InProceedings{Shaolan:2011:EDE,
  author =       "Zhang Shaolan and Xing Guobo and Yang Yixian",
  title =        "An Efficient Domain Extension to Construct a
                 Cryptographic Hash Function",
  crossref =     "IEEE:2011:ICI",
  volume =       "2",
  pages =        "424--427",
  month =        mar,
  year =         "2011",
  DOI =          "https://doi.org/10.1109/ICICTA.2011.390",
  bibdate =      "Fri Mar 13 09:17:57 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  acknowledgement = ack-nhfb,
  keywords =     "collision resistance; collision resistance preserving;
                 Computer science; cryptographic hash function;
                 Cryptography; cryptography; Encoding; encoding; hash
                 functions; Merkle--Damgaard transform; Merkle-Damgaard;
                 prefix free encoding; pseudorandom function;
                 pseudorandom oracle preserving property; Radio
                 frequency; random oracle; Resistance; Transforms",
}

@Article{Shim:2011:SAT,
  author =       "K.-A. Shim",
  title =        "Security Analysis of Three Password Authentication
                 Schemes",
  journal =      j-J-UCS,
  volume =       "17",
  number =       "11",
  pages =        "1623--??",
  month =        "????",
  year =         "2011",
  CODEN =        "????",
  ISSN =         "0948-695X (print), 0948-6968 (electronic)",
  ISSN-L =       "0948-6968",
  bibdate =      "Fri Apr 6 05:52:31 MDT 2012",
  bibsource =    "http://www.jucs.org/jucs;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.jucs.org/jucs_17_11/security_analysis_of_three",
  acknowledgement = ack-nhfb,
  fjournal =     "J.UCS: Journal of Universal Computer Science",
  journal-URL =  "http://www.jucs.org/jucs",
}

@Article{Smith:2011:RBA,
  author =       "Sean W. Smith",
  title =        "Room at the Bottom: Authenticated Encryption on Slow
                 Legacy Networks",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "4",
  pages =        "60--63",
  month =        jul # "\slash " # aug,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.89",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Nov 16 15:22:23 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
}

@Article{Smith:2011:SMC,
  author =       "Matthew Smith and Christian Schridde and Bj{\"o}rn
                 Agel and Bernd Freisleben",
  title =        "Secure mobile communication via identity-based
                 cryptography and server-aided computations",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "55",
  number =       "2",
  pages =        "284--306",
  month =        feb,
  year =         "2011",
  CODEN =        "JOSUED",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Tue Sep 6 21:50:38 MDT 2011",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0920-8542&volume=55&issue=2;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0920-8542&volume=55&issue=2&spage=284",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Book{Smith:2011:SSX,
  author =       "Michael Smith",
  title =        "The secrets of {Station X}: how the {Bletchley Park}
                 codebreakers helped win the war",
  publisher =    "Biteback Pub.",
  address =      "London, UK",
  pages =        "328 + 16",
  year =         "2011",
  ISBN =         "1-84954-095-0 (paperback)",
  ISBN-13 =      "978-1-84954-095-7 (paperback)",
  LCCN =         "D810.C88 S659 2011",
  bibdate =      "Mon Sep 3 17:53:01 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  subject =      "Military intelligence; Great Britain; History; 20th
                 century; World War, 1939-1945; Cryptography; Bletchley
                 (Buckinghamshire, England)",
}

@Article{Sood:2011:SDI,
  author =       "Sandeep K. Sood and Anil K. Sarje and Kuldip Singh",
  title =        "A secure dynamic identity based authentication
                 protocol for multi-server architecture",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "34",
  number =       "2",
  pages =        "609--618",
  month =        mar,
  year =         "2011",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Wed Jan 28 15:43:52 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804510002092",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Netw. Comput. Appl.",
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Srivatsa:2011:ESA,
  author =       "Mudhakar Srivatsa and Ling Liu and Arun Iyengar",
  title =        "{EventGuard}: a System Architecture for Securing
                 Publish--Subscribe Networks",
  journal =      j-TOCS,
  volume =       "29",
  number =       "4",
  pages =        "10:1--10:??",
  month =        dec,
  year =         "2011",
  CODEN =        "ACSYEC",
  DOI =          "https://doi.org/10.1145/2063509.2063510",
  ISSN =         "0734-2071 (print), 1557-7333 (electronic)",
  ISSN-L =       "0734-2071",
  bibdate =      "Fri Dec 30 17:52:02 MST 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tocs/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tocs.bib",
  abstract =     "Publish-subscribe (pub-sub) is an emerging paradigm
                 for building a large number of distributed systems. A
                 wide area pub-sub system is usually implemented on an
                 overlay network infrastructure to enable information
                 dissemination from publishers to subscribers. Using an
                 open overlay network raises several security concerns
                 such as: confidentiality and integrity, authentication,
                 authorization and Denial-of-Service (DoS) attacks. In
                 this article we present EventGuard, a framework for
                 building secure wide-area pub-sub systems. The
                 EventGuard architecture is comprised of three key
                 components: (1) a suite of security guards that can be
                 seamlessly plugged-into a content-based pub-sub system,
                 (2) a scalable key management algorithm to enforce
                 access control on subscribers, and (3) a resilient
                 pub-sub network design that is capable of scalable
                 routing, handling message dropping-based DoS attacks,
                 and node failures.",
  acknowledgement = ack-nhfb,
  articleno =    "10",
  fjournal =     "ACM Transactions on Computer Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J774",
}

@Article{Stallings:2011:C,
  author =       "William Stallings",
  title =        "Ciphers",
  journal =      j-WIRES,
  volume =       "3",
  number =       "5",
  pages =        "239--250",
  month =        may # "\slash " # jun,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1002/wics.156",
  ISSN =         "1939-0068 (print), 1939-5108 (electronic)",
  ISSN-L =       "1939-0068",
  bibdate =      "Fri Jun 19 13:52:59 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/wires.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "WIREs",
  fjournal =     "WIREs Computational Statistics",
  journal-URL =  "https://onlinelibrary.wiley.com/journal/19390068",
  onlinedate =   "08 March 2011",
}

@Book{Stallings:2011:CNS,
  author =       "William Stallings",
  title =        "Cryptography and network security: principles and
                 practice",
  publisher =    pub-PH,
  address =      pub-PH:adr,
  edition =      "Fifth",
  pages =        "xxiii + 719",
  year =         "2011",
  ISBN =         "0-13-609704-9",
  ISBN-13 =      "978-0-13-609704-4",
  LCCN =         "TK5105.59 .S713 2011",
  bibdate =      "Mon Jan 10 17:41:35 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  subject =      "Computer networks; Security measures; Data encryption
                 (Computer science); Coding theory; Computer security",
}

@Book{Stanoyevitch:2011:ICM,
  author =       "Alexander Stanoyevitch",
  title =        "Introduction to cryptography with mathematical
                 foundations and computer implementations",
  publisher =    pub-CHAPMAN-HALL-CRC,
  address =      pub-CHAPMAN-HALL-CRC:adr,
  pages =        "xix + 649",
  year =         "2011",
  ISBN =         "1-4398-1763-4 (hardcover)",
  ISBN-13 =      "978-1-4398-1763-6 (hardcover)",
  LCCN =         "QA268 .S693 2011",
  bibdate =      "Sun Feb 3 11:39:29 MST 2013",
  bibsource =    "cat.libraries.psu.edu:2200/Unicorn;
                 https://www.math.utah.edu/pub/tex/bib/adabooks.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  series =       "Discrete mathematics and its applications",
  acknowledgement = ack-nhfb,
  subject =      "Coding theory; Cryptography; Data processing;
                 Mathematics; Data encryption (Computer science)",
  tableofcontents = "1. An Overview of the Subject \\
                 Basic Concepts \\
                 Functions \\
                 One-to-One and Onto Functions, Bijections \\
                 Inverse Functions \\
                 Substitution Ciphers \\
                 Attacks on Cryptosystems \\
                 The Vigenere Cipher \\
                 The Playfair Cipher \\
                 The One-Time Pad, Perfect Secrecy \\
                 Chapter 1. Exercises \\
                 Chapter 1. Computer Implementations and Exercises \\
                 Vector/String Conversions \\
                 Integer/Text Conversions \\
                 Programming Basic Ciphers with Integer Arithmetic \\
                 Computer-Generated Random Numbers \\
                 2. Divisibility and Modular Arithmetic \\
                 Divisibility \\
                 Primes \\
                 Greatest Common Divisors and Relatively Prime Integers
                 \\
                 The Division Algorithm \\
                 The Euclidean Algorithm \\
                 Modular Arithmetic and Congruences \\
                 Modular Integer Systems \\
                 Modular Inverses \\
                 Extended Euclidean Algorithm \\
                 Solving Linear Congruences \\
                 Summary of Procedure for Solving the Single Linear
                 Congruence (Equation 2.2) \\
                 The Chinese Remainder Theorem \\
                 Chapter 2. Exercises \\
                 Chapter 2. Computer Implementations and Exercises \\
                 3. The Evolution of Codemaking until the Computer Era
                 \\
                 Ancient Codes \\
                 Formal Definition of a Cryptosystem \\
                 Affine Ciphers \\
                 Steganography \\
                 Nulls \\
                 Homophones \\
                 Composition of Functions \\
                 Tabular Form Notation for Permutations \\
                 The Enigma Machines \\
                 Cycles (Cyclic Permutations) \\
                 Dissection of the Enigma Machine into Permutations \\
                 Special Properties of All Enigma Machines \\
                 Chapter 3. Exercises \\
                 Chapter 3. Computer Implementations and Exercises \\
                 Computer Representations of Permutations \\
                 4. Matrices and the Hill Cryptosystem \\
                 The Anatomy of a Matrix \\
                 Matrix Addition, Subtraction, and Scalar Multiplication
                 \\
                 Matrix Multiplication \\
                 Preview of the Fact That Matrix Multiplication is
                 Associative \\
                 Matrix Arithmetic \\
                 Definition of an Invertible (Square) Matrix \\
                 The Determinant of a Square Matrix \\
                 Inverses of 2 and times; 2 Matrices \\
                 The Transpose of a Matrix \\
                 Modular Integer Matrices \\
                 The Classical Adjoint (for Matrix Inversions) \\
                 The Hill Cryptosystem \\
                 Chapter 4. Exercises \\
                 Chapter 4. Computer Implementations and Exercises \\
                 5. The Evolution of Codebreaking until the Computer Era
                 \\
                 Frequency Analysis Attacks \\
                 The Demise of the Vigenere Cipher \\
                 The Babbage/Kasiski Attack \\
                 The Fridman Attack \\
                 The Index of Coincidence \\
                 Expected Values of the Index of Coincidence \\
                 How Enigmas Were Attacked \\
                 German Usage Protocols for Enigmas \\
                 The Polish Codebreakers \\
                 Rejewski's Attack \\
                 Invariance of Cycle Decomposition Form \\
                 Alan Turing and Bletchley Park \\
                 Chapter 5. Exercises \\
                 Chapter 5. Computer Implementations and Exercises \\
                 Programs to Aid in Frequency Analysis \\
                 Programs to Aid in the Babbage/Kasiski Attack \\
                 Programs Related to the Friedman Attack \\
                 6. Representation and Arithmetic of Integers in
                 Different Bases \\
                 Representation of Integers in Different Bases \\
                 Hex(adecimal) and Binary Expansions \\
                 Addition Algorithm with Base b Expansions \\
                 Subtraction Algorithm in Base b Expansions \\
                 Multiplication Algorithm in Base b Expansions \\
                 Arithmetic with Large Integers \\
                 Fast Modular Exponentiation \\
                 Chapter 6. Exercises \\
                 Chapter 6. Computer Implementations and Exercises \\
                 7. Block Cryptosystems and the Data Encryption Standard
                 (DES) \\
                 The Evolution of Computers into Cryptosystems \\
                 DES is Adopted to Fulfill an Important Need \\
                 The XOR Operation \\
                 Feistel Cryptosystems \\
                 A Scaled-Down Version of DES \\
                 DES \\
                 The Fall of DES \\
                 Triple DES \\
                 Modes of Operation for Block Cryptosystems \\
                 Electronic Codebook (ECB) Mode \\
                 Cipherblock Chaining (CBC) Mode \\
                 Cipher Feedback (CFB) Mode \\
                 Output Feedback (OFB) Mode \\
                 Chapter 7. Exercises \\
                 Chapter 7. Computer Implementations and Exercises \\
                 8. Some Number Theory and Algorithms \\
                 The Prime Number Theorem \\
                 Fermat's Little Theorem \\
                 The Euler Phi Function \\
                 Euler's Theorem \\
                 Modular Orders of Invertible Modular Integers \\
                 Primitive Roots \\
                 Existence of Primitive Roots \\
                 Determination of Primitive Roots \\
                 Order of Powers Formula \\
                 Prime Number Generation \\
                 Fermat's Primality Test \\
                 Carmichael Numbers \\
                 The Miller-Rabin Test \\
                 The Miller-Rabin Test with a Factoring Enhancement \\
                 The Pollard p - 1 Factoring Algorithm \\
                 Chapter 8. Exercises \\
                 Chapter 8. Computer Implementations and Exercises \\
                 9. Public Key Cryptography \\
                 An Informal Analogy for a Public Key Cryptosystem \\
                 The Quest for Secure Electronic Key Exchange \\
                 One-Way Functions \\
                 Review of the Discrete Logarithm Problem \\
                 The Diffie-Hellman Key Exchange \\
                 The Quest for a Complete Public Key Cryptosystem \\
                 The RSA Cryptosystem \\
                 Digital Signatures and Authentication \\
                 The EIGamal Cryptosystem \\
                 Digital Signatures with EIGamal \\
                 Knapsack Problems \\
                 The Merkle-Hellman Knapsack Cryptosystem \\
                 Government Controls on Cryptography \\
                 A Security Guarantee for RSA \\
                 Chapter 9. Exercises \\
                 Chapter 9. Computer Implementations and Exercises \\
                 10. Finite Fields in General, and GF(28) in Particular
                 \\
                 Binary Operations \\
                 Rings \\
                 Fields \\
                 Zp[X] = the Polynomials with Coefficients in Zp \\
                 Addition and Multiplication of Polynomials in Zp[X] \\
                 Vector Representation of Polynomials \\
                 Zp[X] is a Ring \\
                 Divisibility in Zp[X] \\
                 The Division Algorithm for Zp[X] \\
                 Congruences in Zp[X] Modulo a Fixed Polynomial \\
                 Building Finite Fields from Zp[X] \\
                 The Fields GF(24) and GF(28) \\
                 The Euclidean Algorithm for Polynomials \\
                 Chapter 10. Exercises \\
                 Chapter 10. Computer Implementations and Exercises \\
                 11. The Advanced Encryption Standard (AES) Protocol \\
                 An Open Call for a Replacement to DES \\
                 Nibbles \\
                 A Scaled-Down Version of AES \\
                 Decryption in the Scaled-Down Version of AES \\
                 AES \\
                 Byte Representation and Arithmetic \\
                 The AES Encryption Algorithm \\
                 The AES Decryption Algorithm \\
                 Security of the AES \\
                 Chapter 11. Exercises \\
                 Chapter 11. Computer Implementations and Exercises \\
                 12. Elliptic Curve Cryptography \\
                 Elliptic Curves over the Real Numbers \\
                 The Addition Operation for Elliptic Curves \\
                 Groups \\
                 Elliptic Curves over Zp \\
                 The Variety of Sizes of Modular Elliptic Curves \\
                 The Addition Operation for Elliptic Curves over Zp \\
                 The Discrete Logarithm Problem on Modular Elliptic
                 Curves \\
                 An Elliptic Curve Version of the Diffie-Hellman Key
                 Exchange \\
                 Fast Integer Multiplication of Points on Modular
                 Elliptic Curves \\
                 Representing Plaintexts on Modular Elliptic Curves \\
                 An Elliptic Curve Version of the EIGamal Cryptosystem
                 \\
                 A Factoring Algorithm Based on Elliptic Curves \\
                 Chapter 12. Exercises \\
                 Chapter 12. Computer Implementations and Exercises \\
                 Appendices \\
                 Appendix A. Sets and Basic Counting Principles \\
                 Concepts and Notations for Sets \\
                 Two Basic Counting Principles \\
                 Appendix B. Randomness and Probability \\
                 Probability Terminology and Axioms \\
                 Conditional Probability \\
                 Conditioning and Bayes' Formula \\
                 Random Variables \\
                 Appendix C. Solutions to All Exercises for the Reader
                 \\
                 Chapter 1. An Overview of the Subject \\
                 Chapter 2. Divisibility and Modular Arithmetic \\
                 Chapter 3. The Evolution of Codemaking until the
                 Computer Era \\
                 Chapter 4. Matrices and the Hill Cryptosystem \\
                 Chapter 5. The Evolution of Codebreaking until the
                 Computer Era \\
                 Chapter 6. Representation and Arithmetic of Integers in
                 Different Bases \\
                 Chapter 7. Block Cryptosystems and the Data Encryption
                 Standard (DES) \\
                 Chapter 8. Some Number Theory and Algorithms \\
                 Chapter 9. Public Key Cryptography \\
                 Chapter 10. Finite Fields in General, and GF(28) in
                 Particular \\
                 Chapter 11. The Advanced Encryption Standard (AES)
                 Protocol \\
                 Chapter 12. Elliptic Curve Cryptography \\
                 Appendix D. Answers and Brief Solutions to Selected
                 Odd-Numbered Exercises \\
                 Chapter 1 \\
                 Chapter 2 \\
                 Chapter 3 \\
                 Chapter 4 \\
                 Chapter 5 \\
                 Chapter 6 \\
                 Chapter 7 \\
                 Chapter 8 \\
                 Chapter 9 \\
                 Chapter 10 \\
                 Chapter 11 \\
                 Chapter 12 \\
                 Appendix E. Suggestions for Further Reading \\
                 Synopsis \\
                 History of Cryptography \\
                 Mathematical Foundations \\
                 Computer Implementations \\
                 Elliptic Curves \\
                 Additional Topics in Cryptography",
}

@Book{Stewart:2011:CCI,
  author =       "James Michael Stewart and Ed Tittel and Mike Chapple",
  title =        "{CISSP}: Certified Information Systems Security
                 Professional Study Guide",
  publisher =    pub-WILEY,
  address =      pub-WILEY:adr,
  edition =      "Fifth",
  pages =        "????",
  year =         "2011",
  ISBN =         "0-470-94498-6",
  ISBN-13 =      "978-0-470-94498-1",
  LCCN =         "QA76.3 .T5735 2011",
  bibdate =      "Mon Jan 10 18:23:52 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://catalogimages.wiley.com/images/db/jimages/9780470944981.jpg",
  abstract =     "This comprehensive book will guide readers through
                 CISSP exam topics, including: Access Control
                 Application Development, Security Business Continuity
                 and Disaster Recovery Planning, Cryptography
                 Information Security Governance and Risk Management,
                 Legal, Regulations, Investigations and Compliance
                 Operations Security, Physical (Environmental) Security,
                 Security Architecture and Design, Telecommunications
                 and Network Security. This study guide will be complete
                 with 100\% coverage of the exam objectives, real world
                 scenarios, hands-on exercises, and challenging review
                 questions, both in the book and on the CD.",
  acknowledgement = ack-nhfb,
  subject =      "Electronic data processing personnel; Certification;
                 Computer networks; Examinations; Study guides; Computer
                 security; COMPUTERS / Certification Guides / General",
  tableofcontents = "1 Accountability and Access Control \\
                 2 Attacks and Monitoring \\
                 3 ISO Model, Protocols, Network Security, and Network
                 Infrastructure \\
                 4 Communications Security and Countermeasures \\
                 5 Security Management Concepts and Principles \\
                 6 Asset Value, Policies, and Roles \\
                 7 Data and Application Security Issues \\
                 8 Malicious Code and Application Attacks \\
                 9 Cryptography and Private Key Algorithms \\
                 10 PKI and Cryptographic Applications \\
                 11 Principles of Computer Design \\
                 12 Principles of Security Models \\
                 13 Administrative Management \\
                 14 Auditing and Monitoring \\
                 15 Business Continuity Planning \\
                 16 Disaster Recovery Planning \\
                 17 Law and Investigations \\
                 18 Incidents and Ethics \\
                 19 Physical Security Requirements",
}

@InProceedings{Stipcevic:2011:QRN,
  author =       "M. Stipcevic",
  booktitle =    "{2011 Proceedings of the 34th International Convention
                 MIPRO}",
  title =        "Quantum random number generators and their use in
                 cryptography",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "1474--1479",
  year =         "2011",
  bibdate =      "Fri Jan 6 07:45:38 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5967293",
  acknowledgement = ack-nhfb,
  book-URL =     "http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5945021",
}

@Article{Sung:2011:DCE,
  author =       "Jaechul Sung",
  title =        "Differential cryptanalysis of eight-round {SEED}",
  journal =      j-INFO-PROC-LETT,
  volume =       "111",
  number =       "10",
  pages =        "474--478",
  day =          "30",
  month =        apr,
  year =         "2011",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Thu Mar 31 12:47:00 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Szaban:2011:IQB,
  author =       "Miroslaw Szaban and Franciszek Seredynski",
  title =        "Improving quality of {DES} {S}-boxes by cellular
                 automata-based {S}-boxes",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "57",
  number =       "2",
  pages =        "216--226",
  month =        aug,
  year =         "2011",
  CODEN =        "JOSUED",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Tue Sep 6 21:51:16 MDT 2011",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0920-8542&volume=57&issue=2;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0920-8542&volume=57&issue=2&spage=216",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Article{Tan:2011:CTA,
  author =       "Zuowen Tan",
  title =        "Comments on a Threshold Authenticated Encryption
                 Scheme",
  journal =      j-INT-J-COMPUT-APPL,
  volume =       "33",
  number =       "2",
  pages =        "132--136",
  year =         "2011",
  DOI =          "https://doi.org/10.2316/Journal.202.2011.2.202-2858",
  ISSN =         "1206-212X (print), 1925-7074 (electronic)",
  ISSN-L =       "1206-212X",
  bibdate =      "Sat Apr 21 17:27:14 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijca.bib",
  URL =          "https://www.tandfonline.com/doi/full/10.2316/Journal.202.2011.2.202-2858",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Computer Applications",
  journal-URL =  "https://www.tandfonline.com/loi/tjca20",
  online-date =  "11 Jul 2015",
}

@Article{Tang:2011:IDC,
  author =       "Xuehai Tang and Bing Sun and Ruilin Li and Chao Li",
  title =        "Impossible differential cryptanalysis of 13-round
                 {CLEFIA-128}",
  journal =      j-J-SYST-SOFTW,
  volume =       "84",
  number =       "7",
  pages =        "1191--1196",
  month =        jul,
  year =         "2011",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212",
  ISSN-L =       "0164-1212",
  bibdate =      "Tue Jun 21 10:22:31 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Tartary:2011:EIT,
  author =       "Christophe Tartary and Huaxiong Wang and Yun Zhang",
  title =        "An Efficient and Information Theoretically Secure
                 Rational Secret Sharing Scheme Based on Symmetric
                 Bivariate Polynomials",
  journal =      j-INT-J-FOUND-COMP-SCI,
  volume =       "22",
  number =       "6",
  pages =        "1395--1416",
  month =        sep,
  year =         "2011",
  CODEN =        "IFCSEN",
  DOI =          "https://doi.org/10.1142/S0129054111008775",
  ISSN =         "0129-0541 (print), 1793-6373 (electronic)",
  ISSN-L =       "0129-0541",
  bibdate =      "Thu Sep 22 12:07:39 MDT 2011",
  bibsource =    "http://ejournals.wspc.com.sg/ijfcs/mkt/archive.shtml;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Foundations of Computer
                 Science (IJFCS)",
  journal-URL =  "http://www.worldscientific.com/loi/ijfcs",
}

@Article{Taylor:2011:CAS,
  author =       "Ken Taylor and Scott Rickard and Konstantinos
                 Drakakis",
  title =        "{Costas} Arrays: Survey, Standardization, and {MATLAB}
                 Toolbox",
  journal =      j-TOMS,
  volume =       "37",
  number =       "4",
  pages =        "41:1--41:31",
  month =        feb,
  year =         "2011",
  CODEN =        "ACMSCU",
  DOI =          "https://doi.org/10.1145/1916461.1916465",
  ISSN =         "0098-3500 (print), 1557-7295 (electronic)",
  ISSN-L =       "0098-3500",
  bibdate =      "Tue Mar 1 16:05:18 MST 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toms/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/toms.bib",
  abstract =     "A Costas array is an arrangement of N dots on an
                 N-by-N grid, one per row, one per column, such that no
                 two dots share the same displacement vector with any
                 other pair. Costas arrays have applications in
                 SONAR\slash RADAR systems, communication systems,
                 cryptography, and other areas. We present a
                 standardization of notation and language which can be
                 used to discuss Costas array generation techniques and
                 array manipulations. Using this standardization we can
                 concisely and clearly state various theorems about
                 Costas arrays, including several new theorems about the
                 symmetries of Costas arrays. We also define labels for
                 each array (generated, emergent, and sporadic), which
                 describe whether the array is generated using a known
                 technique, generated using a semiempirical variation of
                 a known technique, or of unexplained origin.",
  acknowledgement = ack-nhfb,
  articleno =    "41",
  fjournal =     "ACM Transactions on Mathematical Software (TOMS)",
  journal-URL =  "http://dl.acm.org/pub.cfm?id=J782",
}

@Article{Taylor:2011:DR,
  author =       "Greg Taylor and George Cox",
  title =        "Digital randomness",
  journal =      j-IEEE-SPECTRUM,
  volume =       "48",
  number =       "9",
  pages =        "32--58",
  month =        sep,
  year =         "2011",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.2011.5995897",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Thu Sep 01 15:46:04 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://spectrum.ieee.org/semiconductors/processors/behind-intels-new-randomnumber-generator/",
  abstract =     "Imagine that it's 1995 and you're about to make your
                 very first online purchase. You open your Netscape
                 browser, sipping coffee as the home page slowly loads.
                 You then navigate to Amazon.com, a new online bookstore
                 your friend told you about. As you proceed to make your
                 purchase and enter your payment information, the
                 address your browser points to changes from one
                 starting with ``http'' to one that begins with
                 ``https.'' That signals that your computer has
                 established an encrypted connection with Amazon's
                 server. This allows you to send credit card information
                 to the server without worrying that an identity thief
                 will intercept the transmission.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  onlinedate =   "22 August 2011",
  remark =       "Issue cover story.",
}

@Article{Terai:2011:BRB,
  author =       "Saif Terai",
  title =        "Book Review: {{\booktitle{Foundations of Logic and
                 Mathematics Applications to Computer Science and
                 Cryptography}}, by Yves Nievergelt}",
  journal =      j-SIGACT,
  volume =       "42",
  number =       "4",
  pages =        "17--21",
  month =        dec,
  year =         "2011",
  CODEN =        "SIGNDM",
  DOI =          "https://doi.org/10.1145/2078162.2078165",
  ISSN =         "0163-5700 (print), 1943-5827 (electronic)",
  ISSN-L =       "0163-5700",
  bibdate =      "Tue Mar 20 14:39:02 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib",
  note =         "See \cite{Nievergelt:2002:FLM}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGACT News",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J697",
}

@Article{Terrovitis:2011:LGR,
  author =       "Manolis Terrovitis and Nikos Mamoulis and Panos
                 Kalnis",
  title =        "Local and global recoding methods for anonymizing
                 set-valued data",
  journal =      j-VLDB-J,
  volume =       "20",
  number =       "1",
  pages =        "83--106",
  month =        feb,
  year =         "2011",
  CODEN =        "VLDBFR",
  DOI =          "https://doi.org/10.1007/s00778-010-0192-8",
  ISSN =         "1066-8888 (print), 0949-877X (electronic)",
  ISSN-L =       "1066-8888",
  bibdate =      "Mon Feb 7 10:43:36 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "In this paper, we study the problem of protecting
                 privacy in the publication of set-valued data. Consider
                 a collection of supermarket transactions that contains
                 detailed information about items bought together by
                 individuals. Even after removing all personal
                 characteristics of the buyer, which can serve as links
                 to his identity, the publication of such data is still
                 subject to privacy attacks from adversaries who have
                 partial knowledge about the set. Unlike most previous
                 works, we do not distinguish data as sensitive and
                 non-sensitive, but we consider them both as potential
                 quasi-identifiers and potential sensitive data,
                 depending on the knowledge of the adversary.",
  acknowledgement = ack-nhfb,
  fjournal =     "VLDB Journal: Very Large Data Bases",
  journal-URL =  "http://portal.acm.org/toc.cfm?id=J869",
}

@Article{Ulutas:2011:MIS,
  author =       "Mustafa Ulutas and G{\"u}zin Ulutas and Vasif V.
                 Nabiyev",
  title =        "Medical image security and {EPR} hiding using
                 {Shamir}'s secret sharing scheme",
  journal =      j-J-SYST-SOFTW,
  volume =       "84",
  number =       "3",
  pages =        "341--353",
  month =        mar,
  year =         "2011",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212",
  ISSN-L =       "0164-1212",
  bibdate =      "Tue Jun 21 10:22:26 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@InProceedings{Vaikuntanathan:2011:CBN,
  author =       "V. Vaikuntanathan",
  title =        "Computing Blindfolded: New Developments in Fully
                 Homomorphic Encryption",
  crossref =     "IEEE:2011:PIA",
  pages =        "5--16",
  year =         "2011",
  DOI =          "https://doi.org/10.1109/FOCS.2011.98",
  bibdate =      "Thu Apr 12 09:34:22 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/focs2010.bib",
  acknowledgement = ack-nhfb,
  book-URL =     "http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6108120",
}

@Article{Vembuselvi:2011:LLL,
  author =       "C. Vembuselvi and S. Selvakumar",
  title =        "{LISISAP}: link level signature based secure anonymous
                 protocol for prevention of traffic analysis attacks",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "2",
  pages =        "1--10",
  month =        mar,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1943371.1943392",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:00 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "For any communication (wired or wireless) such as
                 control and data, the identity of source and
                 destination is revealed in the header portion of the
                 packet. Adversaries obtain sensitive information such
                 as the identity, location of a critical node, route,
                 data, etc., during communication by using traffic
                 analysis attacks, viz., similarity attack, data
                 integrity attack, packet counting attack, latency
                 attack, and clogging attack. Anonymous communication
                 prevents adversaries from doing traffic analysis
                 against the routing information embedded in the routing
                 messages and data packets. In order to thwart such
                 traffic analysis, anonymous communication protocols
                 were developed. In this paper, the existing anonymous
                 communication protocols were analyzed in terms of
                 techniques used, challenges, and applications.
                 Anonymous Routing protocol with Multiple Routes (ARMR)
                 is one of the existing protocols that achieves better
                 route anonymity using fake routes and multiple paths.
                 However, in ARMR, adversaries can modify the data with
                 genuine user pseudonyms and send the modified data to
                 the destination. In order to prevent data modification
                 by adversary at link level, in this paper a Link level
                 SIgnature based Secure Anonymous Protocol (LISISAP)
                 protocol is proposed. In LISISAP, source node generates
                 a signature for the data and sends the signature along
                 with the encrypted data to the next node. Further, the
                 next node verifies the signature. If signature matches,
                 it generates its own signature and sends the encrypted
                 data to its next node. Otherwise, it discards the
                 packet. Verified data and signature are sent by each
                 intermediate node until it reaches the destination. In
                 LISISAP, even if adversaries modify the data, every
                 node in the route including the destination node
                 verifies the data and discards the data if there is no
                 match in the signature. Similarity attacks can be
                 prevented by making the data look different on each hop
                 which could be achieved by encrypting the data with
                 link key. Proposed protocol, LISISAP is implemented and
                 tested in Smart and Secure Network. From the
                 experimental results, it is evident that the data
                 generated by source node is sent anonymously to the
                 destination. Thus, in LISISAP protocol, communication
                 is secure between nodes without revealing the node
                 identities. Anonymous properties such as identity
                 privacy, location privacy, route anonymity, and
                 robustness against several attacks were achieved.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Wang:2011:CHI,
  author =       "Xu An Wang and Jian Weng and Xiaoyuan Yang and Minqing
                 Zhang",
  title =        "Cryptanalysis of an (hierarchical) identity based
                 parallel key-insulated encryption scheme",
  journal =      j-J-SYST-SOFTW,
  volume =       "84",
  number =       "2",
  pages =        "219--225",
  month =        feb,
  year =         "2011",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212",
  ISSN-L =       "0164-1212",
  bibdate =      "Tue Jun 21 10:22:24 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Wang:2011:CIB,
  author =       "Xu An Wang and Jian Weng and Xiaoyuan Yang and
                 Yanjiang Yang",
  title =        "Cryptanalysis of an identity based broadcast
                 encryption scheme without random oracles",
  journal =      j-INFO-PROC-LETT,
  volume =       "111",
  number =       "10",
  pages =        "461--464",
  day =          "30",
  month =        apr,
  year =         "2011",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Thu Mar 31 12:47:00 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Wang:2011:HAB,
  author =       "Guojun Wang and Qin Liu and Jie Wu and Minyi Guo",
  title =        "Hierarchical attribute-based encryption and scalable
                 user revocation for sharing data in cloud servers",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "5",
  pages =        "320--331",
  month =        jul,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:24 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811000678",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wang:2011:MMW,
  author =       "Yini Wang and Sheng Wen and Silvio Cesare and Wanlei
                 Zhou and Yang Xiang",
  title =        "The Microcosmic Model of Worm Propagation",
  journal =      j-COMP-J,
  volume =       "54",
  number =       "10",
  pages =        "1700--1720",
  month =        oct,
  year =         "2011",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxr082",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Sat Oct 1 18:10:35 MDT 2011",
  bibsource =    "http://comjnl.oxfordjournals.org/content/54/10.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/54/10/1700.full.pdf+html",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "August 19, 2011",
}

@Article{Wang:2011:RBM,
  author =       "Kai Wang and Guillaume Lavou{\'e} and Florence Denis
                 and Atilla Baskurt",
  title =        "Robust and blind mesh watermarking based on volume
                 moments",
  journal =      j-COMPUTERS-AND-GRAPHICS,
  volume =       "35",
  number =       "1",
  pages =        "1--19",
  month =        feb,
  year =         "2011",
  CODEN =        "COGRD2",
  DOI =          "https://doi.org/10.1016/j.cag.2010.09.010",
  ISSN =         "0097-8493 (print), 1873-7684 (electronic)",
  ISSN-L =       "0097-8493",
  bibdate =      "Mon Feb 13 16:42:01 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compgraph.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/00978493",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0097849310001433",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers and Graphics",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00978493",
}

@Article{Wang:2011:RDA,
  author =       "Xiang-yang Wang and Pan-pan Niu and Ming-yu Lu",
  title =        "A robust digital audio watermarking scheme using
                 wavelet moment invariance",
  journal =      j-J-SYST-SOFTW,
  volume =       "84",
  number =       "8",
  pages =        "1408--1421",
  month =        aug,
  year =         "2011",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212",
  ISSN-L =       "0164-1212",
  bibdate =      "Tue Jun 21 10:22:32 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Ward:2011:CCM,
  author =       "Mark Ward",
  title =        "Code-cracking machine returned to life",
  journal =      "BBC News",
  day =          "27",
  month =        may,
  year =         "2011",
  bibdate =      "Fri May 27 12:26:57 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.bbc.co.uk/news/technology-13566878",
  abstract =     "The National Museum of Computing has finished
                 restoring a Tunny machine --- a key part of Allied
                 code-cracking during World War II.\par

                 Tunny machines helped to unscramble Allied
                 interceptions of the encrypted orders Hitler sent to
                 his generals.\par

                 The rebuild was completed even though almost no circuit
                 diagrams or parts of the original machines
                 survived.\par

                 Intelligence gathered via code-cracking at Bletchley
                 underpinned the success of Allied operations to end
                 WWII.",
  acknowledgement = ack-nhfb,
}

@Article{Weissman:2011:LLB,
  author =       "Clark Weissman and Timothy Levin",
  title =        "Lessons Learned from Building a High-Assurance Crypto
                 Gateway",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "1",
  pages =        "31--39",
  month =        jan # "\slash " # feb,
  year =         "2011",
  DOI =          "https://doi.org/10.1109/MSP.2010.201",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 8 15:50:31 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  keywords =     "CCEVS (Common Criteria Evaluation and Validation
                 Scheme)",
}

@Article{Wen:2011:DSH,
  author =       "Yamin Wen and Fangguo Zhang",
  title =        "Delegatable secret handshake scheme",
  journal =      j-J-SYST-SOFTW,
  volume =       "84",
  number =       "12",
  pages =        "2284--2292",
  month =        dec,
  year =         "2011",
  CODEN =        "JSSODM",
  DOI =          "https://doi.org/10.1016/j.jss.2011.06.046",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Mon Feb 6 15:39:27 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0164121211001580",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Willyard:2011:MM,
  author =       "C. Willyard",
  title =        "Me, myself, or {I}",
  journal =      j-IEEE-SPECTRUM,
  volume =       "48",
  number =       "6",
  pages =        "52--84",
  month =        jun,
  year =         "2011",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.2011.5779792",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Fri Jan 17 18:54:05 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "bizarre e-mails; Browsers; data privacy; Facebook;
                 Facebook account; Hotmail account; online identity;
                 Privacy; privacy-related minidramas; Social factors;
                 Social network services; social networking (online);
                 social networks; Web sites",
}

@Article{Wu:2011:HQI,
  author =       "Chia-Chun Wu and Shang-Juh Kao and Min-Shiang Hwang",
  title =        "A high quality image sharing with steganography and
                 adaptive authentication scheme",
  journal =      j-J-SYST-SOFTW,
  volume =       "84",
  number =       "12",
  pages =        "2196--2207",
  month =        dec,
  year =         "2011",
  CODEN =        "JSSODM",
  DOI =          "https://doi.org/10.1016/j.jss.2011.06.021",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Mon Feb 6 15:39:27 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0164121211001488",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Xing-Yuan:2011:PRS,
  author =       "Wang Xing-Yuan and Qin Xue and Xie Yi-Xin",
  title =        "Pseudo-Random Sequences Generated by a Class of
                 One-Dimensional Smooth Map",
  journal =      j-CHIN-PHYS-LETT,
  volume =       "28",
  number =       "8",
  pages =        "080501",
  year =         "2011",
  CODEN =        "CPLEEU",
  DOI =          "https://doi.org/10.1088/0256-307X/28/8/080501",
  ISSN =         "0256-307X (print), 1741-3540 (electronic)",
  ISSN-L =       "0256-307X",
  bibdate =      "Wed Feb 22 08:59:20 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://stacks.iop.org/0256-307X/28/i=8/a=080501",
  abstract =     "We extend a class of a one-dimensional smooth map. We
                 make sure that for each desired interval of the
                 parameter the map's Lyapunov exponent is positive. Then
                 we propose a novel parameter perturbation method based
                 on the good property of the extended one-dimensional
                 smooth map. We perturb the parameter $r$ in each
                 iteration by the real number $ x_i$ generated by the
                 iteration. The auto-correlation function and NIST
                 statistical test suite are taken to illustrate the
                 method's randomness finally. We provide an application
                 of this method in image encryption. Experiments show
                 that the pseudo-random sequences are suitable for this
                 application.",
  acknowledgement = ack-nhfb,
  fjournal =     "Chinese Physics Letters",
}

@Article{Xiong:2011:CIB,
  author =       "Hu Xiong and Zhiguang Qin and Fagen Li",
  title =        "Cryptanalysis of an Identity Based Signcryption
                 without Random Oracles",
  journal =      j-FUND-INFO,
  volume =       "107",
  number =       "1",
  pages =        "105--109",
  month =        jan,
  year =         "2011",
  CODEN =        "FUMAAJ",
  DOI =          "https://doi.org/10.3233/FI-2011-395",
  ISSN =         "0169-2968 (print), 1875-8681 (electronic)",
  ISSN-L =       "0169-2968",
  bibdate =      "Sat Mar 5 17:11:40 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/fundinfo2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Fundamenta Informaticae",
  journal-URL =  "http://content.iospress.com/journals/fundamenta-informaticae",
}

@Article{Yang:2011:ACD,
  author =       "Yang Yang and Xiaohu Tang and Udaya Parampalli",
  title =        "Authentication Codes from Difference Balanced
                 Functions",
  journal =      j-INT-J-FOUND-COMP-SCI,
  volume =       "22",
  number =       "6",
  pages =        "1417--1429",
  month =        sep,
  year =         "2011",
  CODEN =        "IFCSEN",
  DOI =          "https://doi.org/10.1142/S0129054111008787",
  ISSN =         "0129-0541 (print), 1793-6373 (electronic)",
  ISSN-L =       "0129-0541",
  bibdate =      "Thu Sep 22 12:07:39 MDT 2011",
  bibsource =    "http://ejournals.wspc.com.sg/ijfcs/mkt/archive.shtml;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Foundations of Computer
                 Science (IJFCS)",
  journal-URL =  "http://www.worldscientific.com/loi/ijfcs",
}

@Article{Yang:2011:CCK,
  author =       "Guomin Yang and Chik How Tan",
  title =        "Certificateless cryptography with {KGC} trust level
                 $3$",
  journal =      j-THEOR-COMP-SCI,
  volume =       "412",
  number =       "39",
  pages =        "5446--5457",
  day =          "9",
  month =        sep,
  year =         "2011",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Tue Aug 30 18:51:54 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/03043975",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{Yang:2011:CPK,
  author =       "Guomin Yang and Chik How Tan",
  title =        "Certificateless public key encryption: a new generic
                 construction and two pairing-free schemes",
  journal =      j-THEOR-COMP-SCI,
  volume =       "412",
  number =       "8--10",
  pages =        "662--674",
  day =          "4",
  month =        mar,
  year =         "2011",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Wed Aug 31 10:15:30 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/03043975",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{Yang:2011:GSS,
  author =       "Ching-Nung Yang and Yu-Ying Chu",
  title =        "A general $ (k, n) $ scalable secret image sharing
                 scheme with the smooth scalability",
  journal =      j-J-SYST-SOFTW,
  volume =       "84",
  number =       "10",
  pages =        "1726--1733",
  month =        oct,
  year =         "2011",
  CODEN =        "JSSODM",
  DOI =          "https://doi.org/10.1016/j.jss.2011.05.008",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Mon Feb 6 15:39:24 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0164121211001105",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Yengisetty:2011:AVC,
  author =       "Subba Rao V. Yengisetty and Bimal K. Roy",
  title =        "Applications of visual cryptography",
  journal =      j-INT-J-PAR-EMER-DIST-SYS,
  volume =       "26",
  number =       "5",
  pages =        "429--442",
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1080/17445760.2011.574628",
  ISSN =         "1744-5760 (print), 1744-5779 (electronic)",
  ISSN-L =       "1744-5760",
  bibdate =      "Sun Nov 4 10:46:55 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjparemerdistsys.bib;
                 http://www.tandfonline.com/toc/gpaa20/26/5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Parallel, Emergent and
                 Distributed Systems: IJPEDS",
  journal-URL =  "http://www.tandfonline.com/loi/gpaa20",
  onlinedate =   "28 Oct 2011",
}

@Article{Yong:2011:SPP,
  author =       "J. Yong",
  title =        "Security and Privacy Preservation for Mobile
                 {E}-Learning via Digital Identity Attributes",
  journal =      j-J-UCS,
  volume =       "17",
  number =       "2",
  pages =        "296--??",
  month =        "????",
  year =         "2011",
  CODEN =        "????",
  ISSN =         "0948-695X (print), 0948-6968 (electronic)",
  ISSN-L =       "0948-6968",
  bibdate =      "Fri Apr 6 05:52:28 MDT 2012",
  bibsource =    "http://www.jucs.org/jucs;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.jucs.org/jucs_17_2/security_and_privacy_preservation",
  acknowledgement = ack-nhfb,
  fjournal =     "J.UCS: Journal of Universal Computer Science",
  journal-URL =  "http://www.jucs.org/jucs",
}

@Article{Yoon:2011:SBC,
  author =       "Eun-Jun Yoon and Kee-Young Yoo",
  title =        "A secure broadcasting cryptosystem and its application
                 to grid computing",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "27",
  number =       "5",
  pages =        "620--626",
  month =        may,
  year =         "2011",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Tue Aug 30 13:10:40 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/0167739X",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Yu:2011:CLE,
  author =       "Yong Yu and Yi Mu and Guilin Wang and Ying Sun",
  title =        "Cryptanalysis of an Off-Line Electronic Cash Scheme
                 Based on Proxy Blind Signature",
  journal =      j-COMP-J,
  volume =       "54",
  number =       "10",
  pages =        "1645--1651",
  month =        oct,
  year =         "2011",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxr068",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Sat Oct 1 18:10:35 MDT 2011",
  bibsource =    "http://comjnl.oxfordjournals.org/content/54/10.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/54/10/1645.full.pdf+html",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "July 27, 2011",
}

@Article{Yu:2011:FSI,
  author =       "Jia Yu and Fanyu Kong and Xiangguo Cheng and Rong Hao
                 and Jianxi Fan",
  title =        "Forward-Secure Identity-Based Public-Key Encryption
                 without Random Oracles",
  journal =      j-FUND-INFO,
  volume =       "111",
  number =       "2",
  pages =        "241--256",
  month =        apr,
  year =         "2011",
  CODEN =        "FUMAAJ",
  DOI =          "https://doi.org/10.3233/FI-2011-562",
  ISSN =         "0169-2968 (print), 1875-8681 (electronic)",
  ISSN-L =       "0169-2968",
  bibdate =      "Sat Mar 5 17:13:50 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/fundinfo2010.bib",
  note =         "See erratum \cite{Yu:2012:EPF}.",
  acknowledgement = ack-nhfb,
  fjournal =     "Fundamenta Informaticae",
  journal-URL =  "http://content.iospress.com/journals/fundamenta-informaticae",
}

@Article{Yum:2011:ACO,
  author =       "Dae Hyun Yum and Pil Joong Lee",
  title =        "On the average cost of order-preserving encryption
                 based on hypergeometric distribution",
  journal =      j-INFO-PROC-LETT,
  volume =       "111",
  number =       "19",
  pages =        "956--959",
  day =          "15",
  month =        oct,
  year =         "2011",
  CODEN =        "IFPLAT",
  DOI =          "https://doi.org/10.1016/j.ipl.2011.07.004",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Sat Feb 4 08:08:40 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019011001906",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Zhang:2011:AGK,
  author =       "Lei Zhang and Qianhong Wu and Bo Qin and Josep
                 Domingo-Ferrer and {\'U}rsula
                 Gonz{\'a}lez-Nicol{\'a}s",
  title =        "Asymmetric group key agreement protocol for open
                 networks and its application to broadcast encryption",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "55",
  number =       "15",
  pages =        "3246--3255",
  day =          "27",
  month =        oct,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1016/j.comnet.2011.06.016",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Sat Feb 4 10:22:52 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/13891286",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1389128611002283",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286",
}

@Article{Zhang:2011:EPK,
  author =       "Bo Zhang and Fangguo Zhang",
  title =        "An efficient public key encryption with
                 conjunctive-subset keywords search",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "34",
  number =       "1",
  pages =        "262--267",
  month =        jan,
  year =         "2011",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Wed Jan 28 15:43:49 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804510001293",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Netw. Comput. Appl.",
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Zhang:2011:FBP,
  author =       "Meng Zhang and Niraj K. Jha",
  title =        "{FinFET}-Based Power Management for Improved {DPA}
                 Resistance with Low Overhead",
  journal =      j-JETC,
  volume =       "7",
  number =       "3",
  pages =        "10:1--10:??",
  month =        aug,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2000502.2000503",
  ISSN =         "1550-4832",
  ISSN-L =       "1550-4832",
  bibdate =      "Thu Aug 18 12:25:13 MDT 2011",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jetc/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "Differential power analysis (DPA) is a side-channel
                 attack that statistically analyzes the power
                 consumption of a cryptographic system to obtain secret
                 information. This type of attack is well known as a
                 major threat to information security. Effective
                 solutions with low energy and area cost for improved
                 DPA resistance are urgently needed, especially for
                 energy-constrained modern devices that are often in the
                 physical proximity of attackers. This article presents
                 a novel countermeasure against DPA attacks on smart
                 cards and other digital ICs based on FinFETs, an
                 emerging substitute for bulk CMOS at the 22nm
                 technology node and beyond. We exploit the adaptive
                 power management characteristic of FinFETs to generate
                 a high level of noise at critical moments in the
                 execution of a cryptosystem to thwart DPA attacks.",
  acknowledgement = ack-nhfb,
  articleno =    "10",
  fjournal =     "ACM Journal on Emerging Technologies in Computing
                 Systems (JETC)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J967",
}

@Article{Zhang:2011:PFB,
  author =       "Peng Zhang and Jiankun Hu and Cai Li and Mohammed
                 Bennamoun and Vijayakumar Bhagavatula",
  title =        "A pitfall in fingerprint bio-cryptographic key
                 generation",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "5",
  pages =        "311--319",
  month =        jul,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:24 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811000459",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zhang:2011:SIR,
  author =       "Jun Zhang and Yang Xiang and Wanlei Zhou and Lei Ye
                 and Yi Mu",
  title =        "Secure Image Retrieval Based on Visual Content and
                 Watermarking Protocol",
  journal =      j-COMP-J,
  volume =       "54",
  number =       "10",
  pages =        "1661--1674",
  month =        oct,
  year =         "2011",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxr078",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Sat Oct 1 18:10:35 MDT 2011",
  bibsource =    "http://comjnl.oxfordjournals.org/content/54/10.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/54/10/1661.full.pdf+html",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "August 7, 2011",
}

@Article{Zhang:2011:TNT,
  author =       "Zhenxia Zhang and Azzedine Boukerche and Hussam
                 Ramadan",
  title =        "{TEASE}: a novel {Tunnel-based sEcure Authentication
                 SchemE} to support smooth handoff in {IEEE 802.11}
                 wireless networks",
  journal =      j-J-PAR-DIST-COMP,
  volume =       "71",
  number =       "7",
  pages =        "897--905",
  month =        jul,
  year =         "2011",
  CODEN =        "JPDCER",
  DOI =          "https://doi.org/10.1016/j.jpdc.2010.12.003",
  ISSN =         "0743-7315 (print), 1096-0848 (electronic)",
  ISSN-L =       "0743-7315",
  bibdate =      "Sat Feb 25 09:11:34 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jpardistcomp.bib;
                 http://www.sciencedirect.com/science/journal/07437315",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0743731510002686",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Parallel and Distributed Computing",
  journal-URL =  "http://www.sciencedirect.com/science/journal/07437315",
}

@Article{Zhou:2011:PSA,
  author =       "Tao Zhou and Jing Xu",
  title =        "Provable secure authentication protocol with anonymity
                 for roaming service in global mobility networks",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "55",
  number =       "1",
  pages =        "205--213",
  day =          "7",
  month =        jan,
  year =         "2011",
  CODEN =        "????",
  ISSN =         "1389-1286",
  ISSN-L =       "1389-1286",
  bibdate =      "Sat Apr 2 08:42:42 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/13891286",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286",
}

@Book{Abbate:2012:RGWa,
  author =       "Janet Abbate",
  title =        "Recoding Gender: Women's Changing Participation in
                 Computing",
  publisher =    pub-MIT,
  address =      pub-MIT:adr,
  pages =        "x + 247",
  year =         "2012",
  ISBN =         "0-262-01806-3 (hardcover), 0-262-30546-1 (e-book),
                 1-283-95309-9",
  ISBN-13 =      "978-0-262-01806-7 (hardcover), 978-0-262-30546-4
                 (e-book), 978-1-283-95309-2",
  LCCN =         "QA76.9.W65 A33 2012",
  bibdate =      "Fri Jan 17 13:38:13 MST 2020",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  series =       "History of computing",
  URL =          "http://mitpress.mit.edu/9780262018067",
  abstract =     "Today, women earn a relatively low percentage of
                 computer science degrees and hold proportionately few
                 technical computing jobs. Meanwhile, the stereotype of
                 the male ``computer geek'' seems to be everywhere in
                 popular culture. Few people know that women were a
                 significant presence in the early decades of computing
                 in both the United States and Britain. Indeed,
                 programming in postwar years was considered woman's
                 work (perhaps in contrast to the more manly task of
                 building the computers themselves). In Recoding Gender,
                 Janet Abbate explores the untold history of women in
                 computer science and programming from the Second World
                 War to the late twentieth century. Demonstrating how
                 gender has shaped the culture of computing, she offers
                 a valuable historical perspective on today's concerns
                 over women's underrepresentation in the field. Abbate
                 describes the experiences of women who worked with the
                 earliest electronic digital computers: Colossus, the
                 wartime codebreaking computer at Bletchley Park outside
                 London, and the American ENIAC, developed to calculate
                 ballistics. She examines postwar methods for recruiting
                 programmers, and the 1960s redefinition of programming
                 as the more masculine ``software engineering.'' She
                 describes the social and business innovations of two
                 early software entrepreneurs, Elsie Shutt and Stephanie
                 Shirley; and she examines the career paths of women in
                 academic computer science. Abbate's account of the bold
                 and creative strategies of women who loved computing
                 work, excelled at it, and forged successful careers
                 will provide inspiration for those working to change
                 gendered computing culture.",
  acknowledgement = ack-nhfb,
  subject =      "Women in computer science; Computer industry;
                 COMPUTERS; Computer Literacy.; Computer Science.; Data
                 Processing.; Hardware; General.; Information
                 Technology.; Machine Theory.; Reference.; History.;
                 Computer industry.; Women in computer science.",
  tableofcontents = "Introduction: Rediscovering Women's History in
                 Computing \\
                 1. Breaking Codes and Finding Trajectories: Women at
                 the Dawn of the Digital Age \\
                 2. Seeking the Perfect Programmer: Gender and Skill in
                 Early Data Processing \\
                 3. Software Crisis or Identity Crisis? Gender, Labor,
                 and Programming Methods \\
                 4. Female Entrepreneurs: Reimagining Software as a
                 Business \\
                 5. Gender in Academic Computing: Alternative Career
                 Paths and Norms \\
                 Appendix: Oral History Interviews Conducted for This
                 Project",
}

@Article{Abdalla:2012:LBH,
  author =       "Michel Abdalla and Angelo {De Caro} and Karina
                 Mochetti",
  title =        "Lattice-Based Hierarchical Inner Product Encryption",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7533",
  pages =        "121--138",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-33481-8_7",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:24:28 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012i.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-33481-8_7/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-33481-8",
  book-URL =     "http://www.springerlink.com/content/978-3-642-33481-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Abdalla:2012:LRS,
  author =       "Michel Abdalla and Jill-J{\^e}nn Vie",
  title =        "Leakage-Resilient Spatial Encryption",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7533",
  pages =        "78--99",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-33481-8_5",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:24:28 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012i.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-33481-8_5/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-33481-8",
  book-URL =     "http://www.springerlink.com/content/978-3-642-33481-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Abe:2012:TBG,
  author =       "Masayuki Abe",
  title =        "Tools over Bilinear Groups for Modular Design of
                 Cryptographic Tasks",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7496",
  pages =        "1--1",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-33272-2_1",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:23:50 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012h.bib",
  URL =          "http://link.springer.com/accesspage/chapter/10.1007/978-3-642-33272-2_1",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-33272-2",
  book-URL =     "http://www.springerlink.com/content/978-3-642-33272-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Ahmadi:2012:SKE,
  author =       "Hadi Ahmadi and Reihaneh Safavi-Naini",
  title =        "Secret Key Establishment over Noisy Channels",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6888",
  pages =        "132--147",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-27901-0_11",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:19:37 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-27901-0_11/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-27901-0",
  book-URL =     "http://www.springerlink.com/content/978-3-642-27901-0",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Aizatulin:2012:VCC,
  author =       "Mihhail Aizatulin and Fran{\c{c}}ois Dupressoir",
  title =        "Verifying Cryptographic Code in {C}: Some Experience
                 and the {Csec} Challenge",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7140",
  pages =        "1--20",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-29420-4_1",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:24:55 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012b.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-29420-4_1/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-29420-4",
  book-URL =     "http://www.springerlink.com/content/978-3-642-29420-4",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Al-Qarni:2012:EII,
  author =       "Garsah Farhan Al-Qarni and Farzin Deravi",
  title =        "Explicit Integration of Identity Information from Skin
                 Regions to Improve Face Recognition",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7325",
  pages =        "30--37",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-31298-4_4",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:20:06 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012e.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-31298-4_4/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-31298-4",
  book-URL =     "http://www.springerlink.com/content/978-3-642-31298-4",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Al-Sinani:2012:UCB,
  author =       "Haitham S. Al-Sinani and Chris J. Mitchell",
  title =        "A Universal Client-Based Identity Management Tool",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7163",
  pages =        "49--74",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-29804-2_4",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:25:24 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012b.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-29804-2_4/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-29804-2",
  book-URL =     "http://www.springerlink.com/content/978-3-642-29804-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Albrecht:2012:SDL,
  author =       "Alexander Albrecht and Felix Naumann",
  title =        "Schema Decryption for Large Extract-Transform-Load
                 Systems",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7532",
  pages =        "116--125",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-34002-4_9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:24:27 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012i.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-34002-4_9/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-34002-4",
  book-URL =     "http://www.springerlink.com/content/978-3-642-34002-4",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{AlMashrafi:2012:AIM,
  author =       "Mufeed AlMashrafi and Harry Bartlett and Leonie
                 Simpson and Ed Dawson and Kenneth Koon-Ho Wong",
  title =        "Analysis of Indirect Message Injection for {MAC}
                 Generation Using Stream Ciphers",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7372",
  pages =        "138--151",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-31448-3_11",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:21:08 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012f.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-31448-3_11/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-31448-3",
  book-URL =     "http://www.springerlink.com/content/978-3-642-31448-3",
  fjournal =     "Lecture Notes in Computer Science",
  remark =       "Yes, first author's family name is spelled ALMashrafi
                 in the paper's author list.",
}

@Article{Alomair:2012:AEH,
  author =       "Basel Alomair",
  title =        "Authenticated Encryption: How Reordering Can Impact
                 Performance",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7341",
  pages =        "84--99",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-31284-7_6",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:20:27 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012e.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-31284-7_6/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-31284-7",
  book-URL =     "http://www.springerlink.com/content/978-3-642-31284-7",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Alvarez:2012:CAB,
  author =       "Rafael {\'A}lvarez and Francisco Mart{\'\i}nez and
                 Jos{\'e}-Francisco Vicent and Antonio Zamora",
  title =        "Cryptographic Applications of $ 3 \times 3 $ Block
                 Upper Triangular Matrices",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7209",
  pages =        "97--104",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-28931-6_10",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:26:21 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012c.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-28931-6_10/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-28931-6",
  book-URL =     "http://www.springerlink.com/content/978-3-642-28931-6",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Ambrose:2012:RII,
  author =       "Jude A. Ambrose and Roshan G. Ragel and Sri
                 Parameswaran",
  title =        "Randomized Instruction Injection to Counter Power
                 Analysis Attacks",
  journal =      j-TECS,
  volume =       "11",
  number =       "3",
  pages =        "69:1--69:??",
  month =        sep,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2345770.2345782",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Mon Oct 22 10:44:19 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tecs.bib",
  abstract =     "Side-channel attacks in general and power analysis
                 attacks in particular are becoming a major security
                 concern in embedded systems. Countermeasures proposed
                 against power analysis attacks are data and table
                 masking, current flattening, dummy instruction
                 insertion and bit-flips balancing. All these techniques
                 are either susceptible to multi-order power analysis
                 attack, not sufficiently generic to cover all
                 encryption algorithms, or burden the system with high
                 area, run-time or energy cost. In this article, we
                 propose a randomized instruction injection technique (
                 RIJID ) that overcomes the pitfalls of previous
                 countermeasures. RIJID scrambles the power profile of a
                 cryptographic application by injecting random
                 instructions at random points of execution and
                 therefore protects the system against power analysis
                 attacks. Two different ways of triggering the
                 instruction injection are also presented: (1)
                 softRIJID, a hardware/software approach, where special
                 instructions are used in the code for triggering the
                 injection at runtime; and (2) autoRIJID, a hardware
                 approach, where the code injection is triggered by the
                 processor itself via detecting signatures of encryption
                 routines at runtime. A novel signature detection
                 technique is also introduced for identifying encryption
                 routines within application programs at runtime.
                 Further, a simple obfuscation metric (RIJIDindex) based
                 on cross-correlation that measures the scrambling
                 provided by any code injection technique is introduced,
                 which coarsely indicates the level of scrambling
                 achieved. Our processor models cost 1.9\% additional
                 area in the hardware/software approach and 1.2\% in the
                 hardware approach for a RISC based processor, and costs
                 on average 29.8\% in runtime and 27.1\% in energy for
                 the former and 25.0\% in runtime and 28.5\% in energy
                 for the later, for industry standard cryptographic
                 applications.",
  acknowledgement = ack-nhfb,
  articleno =    "69",
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?&idx=J840",
}

@Article{Andreeva:2012:SAS,
  author =       "Elena Andreeva and Andrey Bogdanov and Bart Mennink
                 and Bart Preneel and Christian Rechberger",
  title =        "On security arguments of the second round {SHA-3}
                 candidates",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "2",
  pages =        "103--120",
  month =        apr,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0156-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:37 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0156-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
  keywords =     "Classification; Differential attacks; Hash functions;
                 Security reductions; SHA-3 competition; US National
                 Institute for Standards and Technology (NIST)
                 cryptographic hash algorithm design competition",
}

@TechReport{Anonymous:2012:SHS,
  author =       "Anonymous",
  key =          "FIPS-180-4",
  title =        "{Secure Hash Standard (SHS)}",
  type =         "{Federal Information Processing Standards}
                 Publication",
  number =       "FIPS Pub 180-4",
  institution =  pub-NIST,
  address =      pub-NIST:adr,
  pages =        "v + 30",
  month =        mar,
  year =         "2012",
  bibdate =      "Wed Jan 30 09:27:44 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/datacompression.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  URL =          "http://csrc.nist.gov/publications/fips/fips180-4/fips-180-4.pdf;
                 http://csrc.nist.gov/publications/PubsFIPS.html#fips180-4",
  acknowledgement = ack-nhfb,
  keywords =     "computer security; cryptography; Federal Information
                 Processing Standards; hash algorithm; hash function;
                 message digest; Secure Hash Standard",
}

@Article{Anzala-Yamajako:2012:RAC,
  author =       "Alexandre Anzala-Yamajako",
  title =        "Review of {{\booktitle{Algorithmic Cryptanalysis}}, by
                 Antoine Joux}",
  journal =      j-SIGACT,
  volume =       "43",
  number =       "4",
  pages =        "13--16",
  month =        dec,
  year =         "2012",
  CODEN =        "SIGNDM",
  DOI =          "https://doi.org/10.1145/2421119.2421122",
  ISSN =         "0163-5700 (print), 1943-5827 (electronic)",
  ISSN-L =       "0163-5700",
  bibdate =      "Sun May 5 10:25:40 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGACT News",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J697",
}

@Article{Anzala-Yamajako:2012:RBC,
  author =       "Alexandre Anzala-Yamajako",
  title =        "Review of {{\booktitle{Algorithmic Cryptanalysis}}, by
                 Antoine Joux}",
  journal =      j-SIGACT,
  volume =       "43",
  number =       "4",
  pages =        "13--16",
  month =        dec,
  year =         "2012",
  CODEN =        "SIGNDM",
  DOI =          "https://doi.org/10.1145/2421119.2421122",
  ISSN =         "0163-5700 (print), 1943-5827 (electronic)",
  ISSN-L =       "0163-5700",
  bibdate =      "Sun May 5 10:25:40 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGACT News",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J697",
}

@Article{Apavatjrut:2012:EEA,
  author =       "Anya Apavatjrut and Wassim Znaidi and Antoine
                 Fraboulet and Claire Goursaud and Katia
                 Jaffr{\`e}s-Runser and C{\'e}dric Lauradoux and Marine
                 Minier",
  title =        "Energy efficient authentication strategies for network
                 coding",
  journal =      j-CCPE,
  volume =       "24",
  number =       "10",
  pages =        "1086--1107",
  month =        jul,
  year =         "2012",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.1767",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Mon Nov 5 07:44:49 MST 2012",
  bibsource =    "http://www.interscience.wiley.com/jpages/1532-0626;
                 https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "22 Jun 2011",
}

@Article{Arapinis:2012:RET,
  author =       "Myrto Arapinis and Sergiu Bursuc and Mark D. Ryan",
  title =        "Reduction of Equational Theories for Verification of
                 Trace Equivalence: Re-encryption, Associativity and
                 Commutativity",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7215",
  pages =        "169--188",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-28641-4_10",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:26:29 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012c.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-28641-4_10/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-28641-4",
  book-URL =     "http://www.springerlink.com/content/978-3-642-28641-4",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Armknecht:2012:STH,
  author =       "Frederik Armknecht and Stefan Katzenbeisser and
                 Andreas Peter",
  title =        "Shift-Type Homomorphic Encryption and Its Application
                 to Fully Homomorphic Encryption",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7374",
  pages =        "234--251",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-31410-0_15",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:21:11 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012f.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-31410-0_15/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-31410-0",
  book-URL =     "http://www.springerlink.com/content/978-3-642-31410-0",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Arnold:2012:ICC,
  author =       "T. W. Arnold and C. Buscaglia and F. Chan and V.
                 Condorelli and J. Dayka and W. Santiago-Fernandez and
                 N. Hadzic and M. D. Hocker and M. Jordan and T. E.
                 Morris and K. Werner",
  title =        "{IBM 4765} cryptographic coprocessor",
  journal =      j-IBM-JRD,
  volume =       "56",
  number =       "1",
  pages =        "10:1--10:13",
  month =        "????",
  year =         "2012",
  CODEN =        "IBMJAE",
  DOI =          "https://doi.org/10.1147/JRD.2011.2178736",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  ISSN-L =       "0018-8646",
  bibdate =      "Fri Apr 13 09:44:32 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ibmjrd.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IBM Journal of Research and Development",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5288520",
}

@Article{Arora:2012:ILM,
  author =       "Divya Arora and Najwa Aaraj and Anand Raghunathan and
                 Niraj K. Jha",
  title =        "{INVISIOS}: a Lightweight, Minimally Intrusive Secure
                 Execution Environment",
  journal =      j-TECS,
  volume =       "11",
  number =       "3",
  pages =        "60:1--60:??",
  month =        sep,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2345770.2345772",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Mon Oct 22 10:44:19 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tecs.bib",
  abstract =     "Many information security attacks exploit
                 vulnerabilities in ``trusted'' and privileged software
                 executing on the system, such as the operating system
                 (OS). On the other hand, most security mechanisms
                 provide no immunity to security-critical user
                 applications if vulnerabilities are present in the
                 underlying OS. While technologies have been proposed
                 that facilitate isolation of security-critical
                 software, they require either significant computational
                 resources and are hence not applicable to many
                 resource-constrained embedded systems, or necessitate
                 extensive redesign of the underlying processors and
                 hardware. In this work, we propose INVISIOS: a
                 lightweight, minimally intrusive hardware-software
                 architecture to make the execution of security-critical
                 software invisible to the OS, and hence protected from
                 its vulnerabilities. The INVISIOS software architecture
                 encapsulates the security-critical software into a
                 self-contained software module. While this module is
                 part of the kernel and is run with kernel-level
                 privileges, its code, data, and execution are
                 transparent to and protected from the rest of the
                 kernel. The INVISIOS hardware architecture consists of
                 simple add-on hardware components that are responsible
                 for bootstrapping the secure core, ensuring that it is
                 exercised by applications in only permitted ways, and
                 enforcing the isolation of its code and data. We
                 implemented INVISIOS by enhancing a full-system
                 emulator and Linux to model the proposed software and
                 hardware enhancements, and applied it to protect a
                 commercial cryptographic library. Our experiments
                 demonstrate that INVISIOS is capable of facilitating
                 secure execution at very small overheads, making it
                 suitable for resource-constrained embedded systems and
                 systems-on-chip.",
  acknowledgement = ack-nhfb,
  articleno =    "60",
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?&idx=J840",
}

@Article{Arriaga:2012:JSS,
  author =       "Afonso Arriaga and Manuel Barbosa and Pooya Farshim",
  title =        "On the Joint Security of Signature and Encryption
                 Schemes under Randomness Reuse: Efficiency and Security
                 Amplification",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7341",
  pages =        "206--223",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-31284-7_13",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:20:27 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012e.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-31284-7_13/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-31284-7",
  book-URL =     "http://www.springerlink.com/content/978-3-642-31284-7",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Arsalan:2012:IRW,
  author =       "Muhammad Arsalan and Sana Ambreen Malik and Asifullah
                 Khan",
  title =        "Intelligent reversible watermarking in integer wavelet
                 domain for medical images",
  journal =      j-J-SYST-SOFTW,
  volume =       "85",
  number =       "4",
  pages =        "883--894",
  month =        apr,
  year =         "2012",
  CODEN =        "JSSODM",
  DOI =          "https://doi.org/10.1016/j.jss.2011.11.005",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Fri Feb 17 07:42:13 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0164121211002858",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Attrapadung:2012:ABE,
  author =       "Nuttapong Attrapadung and Javier Herranz and Fabien
                 Laguillaumie and Beno{\^\i}t Libert and Elie de
                 Panafieu and Carla R{\`a}fols",
  title =        "Attribute-based encryption schemes with constant-size
                 ciphertexts",
  journal =      j-THEOR-COMP-SCI,
  volume =       "422",
  number =       "1",
  pages =        "15--38",
  day =          "9",
  month =        mar,
  year =         "2012",
  CODEN =        "TCSCDI",
  DOI =          "https://doi.org/10.1016/j.tcs.2011.12.004",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Thu Feb 2 08:49:27 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2010.bib;
                 http://www.sciencedirect.com/science/journal/03043975",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0304397511009649",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{Avoine:2012:PFS,
  author =       "Gildas Avoine and Xavier Carpent and Benjamin Martin",
  title =        "Privacy-friendly synchronized ultralightweight
                 authentication protocols in the storm",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "35",
  number =       "2",
  pages =        "826--843",
  month =        mar,
  year =         "2012",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Wed Jan 28 15:44:13 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804511002335",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Netw. Comput. Appl.",
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Ayday:2012:DAA,
  author =       "Erman Ayday and Farshid Delgosha and Faramarz Fekri",
  title =        "Data authenticity and availability in multihop
                 wireless sensor networks",
  journal =      j-TOSN,
  volume =       "8",
  number =       "2",
  pages =        "10:1--10:??",
  month =        mar,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2140522.2140523",
  ISSN =         "1550-4859 (print), 1550-4867 (electronic)",
  ISSN-L =       "1550-4859",
  bibdate =      "Fri Apr 6 18:38:19 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/tosn.bib",
  abstract =     "Security services such as data confidentiality,
                 authenticity, and availability are critical in wireless
                 sensor networks (WSNs) deployed in adversarial
                 environments. Due to the resource constrain's of sensor
                 nodes, the existing protocols currently in use in adhoc
                 networks cannot be employed in WSNs. In this article,
                 we propose a protocol called location-aware
                 network-coding security (LNCS) that provides all the
                 aforementioned security services. By dividing the
                 terrain into nonoverlapping cells, the nodes take
                 advantage of the location information to derive
                 different location-binding keys. The key idea in LNCS
                 is that all the nodes involved in the protocol
                 collaborate in every phase. We employ random network
                 coding in order to provide data availability
                 significantly higher than that in other schemes. A hash
                 tree-based authentication mechanism is utilized to
                 filter the bogus packets enroute. We provide a
                 comparison between our scheme and previously proposed
                 schemes. The results reveal significant improvement in
                 data availability while maintaining the same level of
                 data confidentiality and authenticity.",
  acknowledgement = ack-nhfb,
  articleno =    "10",
  fjournal =     "ACM Transactions on Sensor Networks (TOSN)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J981",
}

@Article{Ayub:2012:BRB,
  author =       "Abu Mohammad Omar Shehab Uddin Ayub",
  title =        "Book Review: {{\booktitle{The Cryptoclub: Using
                 Mathematics to Make and Break Secret Codes}}, by Janet
                 Beissinger and Vera Pless}",
  journal =      j-SIGACT,
  volume =       "43",
  number =       "1",
  pages =        "9--14",
  month =        mar,
  year =         "2012",
  CODEN =        "SIGNDM",
  DOI =          "https://doi.org/10.1145/2160649.2160652",
  ISSN =         "0163-5700 (print), 1943-5827 (electronic)",
  ISSN-L =       "0163-5700",
  bibdate =      "Tue Mar 20 14:39:02 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib",
  note =         "See \cite{Beissinger:2006:CUM}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGACT News",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J697",
}

@Article{Backes:2012:GCP,
  author =       "Michael Backes and Matteo Maffei and Kim Pecina",
  title =        "{G2C}: Cryptographic Protocols from Goal-Driven
                 Specifications",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6993",
  pages =        "57--77",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-27375-9_4",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:21:58 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-27375-9_4/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-27375-9",
  book-URL =     "http://www.springerlink.com/content/978-3-642-27375-9",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Baelde:2012:TPR,
  author =       "David Baelde and Pierre Courtieu and David
                 Gross-Amblard and Christine Paulin-Mohring",
  title =        "Towards Provably Robust Watermarking",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7406",
  pages =        "201--216",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-32347-8_14",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:21:53 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012g.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-32347-8_14/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-32347-8",
  book-URL =     "http://www.springerlink.com/content/978-3-642-32347-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Bahi:2012:SCS,
  author =       "Jacques M. Bahi and Jean-Fran{\c{c}}ois Couchot and
                 Christophe Guyeux",
  title =        "Steganography: a Class of Secure and Robust
                 Algorithms",
  journal =      j-COMP-J,
  volume =       "55",
  number =       "6",
  pages =        "653--666",
  month =        jun,
  year =         "2012",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxr116",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Wed May 30 11:20:33 MDT 2012",
  bibsource =    "http://comjnl.oxfordjournals.org/content/55/6.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/55/6/653.full.pdf+html",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "November 18, 2011",
}

@Article{Bai:2012:SSR,
  author =       "Yu Bai and Yanlong Liu",
  title =        "A Synchronization Strengthen {RFID} Authentication
                 Protocol Based on Key Array",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7530",
  pages =        "113--119",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-33478-8_15",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:24:25 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012i.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-33478-8_15/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-33478-8",
  book-URL =     "http://www.springerlink.com/content/978-3-642-33478-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Bailin:2012:ERG,
  author =       "David Bailin",
  title =        "Essay Review: The geese that never cackled.
                 {{\booktitle{Secret Days: Codebreaking in Bletchley
                 Park}}, by Asa Briggs. ISBN 978-1-84832-615-6},
                 {Scope}: review. {Level}: general readership",
  journal =      j-CONTEMP-PHYS,
  volume =       "53",
  number =       "3",
  pages =        "256--262",
  year =         "2012",
  CODEN =        "CTPHAF",
  DOI =          "https://doi.org/10.1080/00107514.2012.657248",
  ISSN =         "0010-7514 (print), 1366-5812 (electronic)",
  ISSN-L =       "0010-7514",
  bibdate =      "Thu Feb 18 20:08:52 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/contempphys.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Contemporary Physics",
  journal-URL =  "http://www.tandfonline.com/loi/tcph20",
}

@Article{Balfanz:2012:FA,
  author =       "Dirk Balfanz and Richard Chow and Ori Eisen and Markus
                 Jakobsson and Steve Kirsch and Scott Matsumoto and
                 Jesus Molina and Paul van Oorschot",
  title =        "The Future of Authentication",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "1",
  pages =        "22--27",
  month =        jan # "\slash " # feb,
  year =         "2012",
  DOI =          "https://doi.org/10.1109/MSP.2012.24",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 15 12:40:29 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
}

@Article{Banik:2012:DFA,
  author =       "Subhadeep Banik and Subhamoy Maitra and Santanu
                 Sarkar",
  title =        "A Differential Fault Attack on the Grain Family of
                 Stream Ciphers",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7428",
  pages =        "122--139",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-33027-8_8",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:22:21 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012g.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-33027-8_8/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-33027-8",
  book-URL =     "http://www.springerlink.com/content/978-3-642-33027-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Barak:2012:IPO,
  author =       "Boaz Barak and Oded Goldreich and Russell Impagliazzo
                 and Steven Rudich and Amit Sahai and Salil Vadhan and
                 Ke Yang",
  title =        "On the (im)possibility of obfuscating programs",
  journal =      j-J-ACM,
  volume =       "59",
  number =       "2",
  pages =        "6:1--6:48",
  month =        apr,
  year =         "2012",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/2160158.2160159",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Fri Apr 27 16:20:34 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Informally, an obfuscator $O$ is an (efficient,
                 probabilistic) ``compiler'' that takes as input a
                 program (or circuit) $P$ and produces a new program $
                 O(P)$ that has the same functionality as $P$ yet is
                 ``unintelligible'' in some sense. Obfuscators, if they
                 exist, would have a wide variety of cryptographic and
                 complexity-theoretic applications, ranging from
                 software protection to homomorphic encryption to
                 complexity-theoretic analogues of Rice's theorem. Most
                 of these applications are based on an interpretation of
                 the ``unintelligibility'' condition in obfuscation as
                 meaning that $ O(P)$ is a ``virtual black box,'' in the
                 sense that anything one can efficiently compute given $
                 O(P)$, one could also efficiently compute given oracle
                 access to $P$. In this work, we initiate a theoretical
                 investigation of obfuscation. Our main result is that,
                 even under very weak formalizations of the above
                 intuition, obfuscation is impossible. We prove this by
                 constructing a family of efficient programs $P$ that
                 are unobfuscatable in the sense that (a) given any
                 efficient program $P$ ' that computes the same function
                 as a program $ P \in p$, the ``source code'' $P$ can be
                 efficiently reconstructed, yet (b) given oracle access
                 to a (randomly selected) program $ P \in p$, no
                 efficient algorithm can reconstruct $P$ (or even
                 distinguish a certain bit in the code from random)
                 except with negligible probability. We extend our
                 impossibility result in a number of ways, including
                 even obfuscators that (a) are not necessarily
                 computable in polynomial time, (b) only approximately
                 preserve the functionality, and (c) only need to work
                 for very restricted models of computation (TC$^0$). We
                 also rule out several potential applications of
                 obfuscators, by constructing ``unobfuscatable''
                 signature schemes, encryption schemes, and pseudorandom
                 function families.",
  acknowledgement = ack-nhfb,
  articleno =    "6",
  fjournal =     "Journal of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J401",
}

@Article{Barbay:2012:BRB,
  author =       "J{\'e}r{\'e}my Barbay",
  title =        "Book Review: {{\booktitle{Understanding and Applying
                 Cryptography and Data Security}}, by Adam J. Elbirt}",
  journal =      j-SIGACT,
  volume =       "43",
  number =       "1",
  pages =        "18--21",
  month =        mar,
  year =         "2012",
  CODEN =        "SIGNDM",
  DOI =          "https://doi.org/10.1145/2160649.2160655",
  ISSN =         "0163-5700 (print), 1943-5827 (electronic)",
  ISSN-L =       "0163-5700",
  bibdate =      "Tue Mar 20 14:39:02 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib",
  note =         "See \cite{Elbirt:2009:UAC}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGACT News",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J697",
}

@Article{Barthe:2012:ACA,
  author =       "Gilles Barthe and Benjamin Gr{\'e}goire and C{\'e}sar
                 Kunz",
  title =        "Automation in Computer-Aided Cryptography: Proofs,
                 Attacks and Designs",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7679",
  pages =        "7--8",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-35308-6_3",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:18:48 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012l.bib",
  URL =          "http://link.springer.com/accesspage/chapter/10.1007/978-3-642-35308-6_3",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-35308-6",
  book-URL =     "http://www.springerlink.com/content/978-3-642-35308-6",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Barthe:2012:CACa,
  author =       "Gilles Barthe and Juan Manuel Crespo and Benjamin
                 Gr{\'e}goire and C{\'e}sar Kunz",
  title =        "Computer-Aided Cryptographic Proofs",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7406",
  pages =        "11--27",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-32347-8_2",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:21:53 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012g.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-32347-8_2/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-32347-8",
  book-URL =     "http://www.springerlink.com/content/978-3-642-32347-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Barthe:2012:CACb,
  author =       "Gilles Barthe and Benjamin Gr{\'e}goire and Santiago
                 Zanella B{\'e}guelin",
  title =        "Computer-Aided Cryptographic Proofs",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7460",
  pages =        "1--2",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-33125-1_1",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:23:03 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012h.bib",
  URL =          "http://link.springer.com/accesspage/chapter/10.1007/978-3-642-33125-1_1",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-33125-1",
  book-URL =     "http://www.springerlink.com/content/978-3-642-33125-1",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Bas:2012:BLK,
  author =       "Patrick Bas and Teddy Furon",
  title =        "Are 128 Bits {Long} Keys Possible in Watermarking?",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7394",
  pages =        "191--191",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-32805-3_15",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:21:38 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012f.bib",
  URL =          "http://link.springer.com/accesspage/chapter/10.1007/978-3-642-32805-3_15",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-32805-3",
  book-URL =     "http://www.springerlink.com/content/978-3-642-32805-3",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Basin:2012:PRI,
  author =       "David Basin and Cas Cremers and Simon Meier",
  title =        "Provably Repairing the {ISO\slash IEC 9798} Standard
                 for Entity Authentication",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7215",
  pages =        "129--148",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-28641-4_8",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:26:29 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012c.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-28641-4_8/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-28641-4",
  book-URL =     "http://www.springerlink.com/content/978-3-642-28641-4",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Batina:2012:HEB,
  author =       "Lejla Batina and Stefaan Seys and Dave Singel{\'e}e
                 and Ingrid Verbauwhede",
  title =        "Hierarchical {ECC}-Based {RFID} Authentication
                 Protocol",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7055",
  pages =        "183--201",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-25286-0_12",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:23:19 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-25286-0_12/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-25286-0",
  book-URL =     "http://www.springerlink.com/content/978-3-642-25286-0",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Battistello:2012:TBA,
  author =       "Patrick Battistello and Joaquin Garcia-Alfaro and
                 Cyril Del{\'e}tr{\'e}",
  title =        "Transaction-based authentication and key agreement
                 protocol for inter-domain {VoIP}",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "35",
  number =       "5",
  pages =        "1579--1597",
  month =        sep,
  year =         "2012",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Wed Jan 28 15:44:23 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804512000653",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Netw. Comput. Appl.",
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Bayrak:2012:AII,
  author =       "Ali Galip Bayrak and Nikola Velickovic and Paolo Ienne
                 and Wayne Burleson",
  title =        "An architecture-independent instruction shuffler to
                 protect against side-channel attacks",
  journal =      j-TACO,
  volume =       "8",
  number =       "4",
  pages =        "20:1--20:??",
  month =        jan,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2086696.2086699",
  ISSN =         "1544-3566 (print), 1544-3973 (electronic)",
  ISSN-L =       "1544-3566",
  bibdate =      "Sat Jan 21 07:49:49 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/taco.bib",
  abstract =     "Embedded cryptographic systems, such as smart cards,
                 require secure implementations that are robust to a
                 variety of low-level attacks. Side-Channel Attacks
                 (SCA) exploit the information such as power
                 consumption, electromagnetic radiation and acoustic
                 leaking through the device to uncover the secret
                 information. Attackers can mount successful attacks
                 with very modest resources in a short time period.
                 Therefore, many methods have been proposed to increase
                 the security against SCA. Randomizing the execution
                 order of the instructions that are independent, i.e.,
                 random shuffling, is one of the most popular among
                 them. Implementing instruction shuffling in software is
                 either implementation specific or has a significant
                 performance or code size overhead.",
  acknowledgement = ack-nhfb,
  articleno =    "20",
  fjournal =     "ACM Transactions on Architecture and Code Optimization
                 (TACO)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J924",
}

@Article{Behnia:2012:SEI,
  author =       "Rouzbeh Behnia and Swee-Huay Heng and Che-Sheng Gan",
  title =        "Short and Efficient Identity-Based Undeniable
                 Signature Scheme",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7449",
  pages =        "143--148",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-32287-7_12",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:22:50 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012g.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-32287-7_12/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-32287-7",
  book-URL =     "http://www.springerlink.com/content/978-3-642-32287-7",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Beimel:2012:SSS,
  author =       "Amos Beimel and Oriol Farr{\`a}s and Yuval Mintz",
  title =        "Secret Sharing Schemes for Very Dense Graphs",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7417",
  pages =        "144--161",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-32009-5_10",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:22:07 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012g.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-32009-5_10/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-32009-5",
  book-URL =     "http://www.springerlink.com/content/978-3-642-32009-5",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Bellare:2012:IBL,
  author =       "Mihir Bellare and Eike Kiltz and Chris Peikert and
                 Brent Waters",
  title =        "Identity-Based (Lossy) Trapdoor Functions and
                 Applications",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7237",
  pages =        "228--245",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-29011-4_14;
                 https://doi.org/10.1007/978-3-642-29011-4_15",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Dec 15 20:55:01 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs.bib",
  URL =          "http://link.springer.com/accesspage/chapter/10.1007/978-3-642-29011-4_14;
                 http://link.springer.com/chapter/10.1007/978-3-642-29011-4_15/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-29011-4",
  book-URL =     "http://www.springerlink.com/content/978-3-642-29011-4",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Bellare:2012:MIS,
  author =       "Mihir Bellare and Thomas Ristenpart and Stefano
                 Tessaro",
  title =        "Multi-instance Security and Its Application to
                 Password-Based Cryptography",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7417",
  pages =        "312--329",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-32009-5_19",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:22:07 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012g.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-32009-5_19/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-32009-5",
  book-URL =     "http://www.springerlink.com/content/978-3-642-32009-5",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Bencsath:2012:CSD,
  author =       "Boldizs{\'a}r Bencs{\'a}th and G{\'a}bor P{\'e}k and
                 Levente Butty{\'a}n and M{\'a}rk F{\'e}legyh{\'a}zi",
  title =        "The Cousins of {Stuxnet}: {Duqu}, {Flame}, and
                 {Gauss}",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "4",
  pages =        "971--1003",
  day =          "06",
  month =        nov,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4040971",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:49 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/4/971",
  abstract =     "Stuxnet was the first targeted malware that received
                 worldwide attention for causing physical damage in an
                 industrial infrastructure seemingly isolated from the
                 onlineworld. Stuxnet was a powerful targeted
                 cyber-attack, and soon other malware samples were
                 discovered that belong to this family. In this paper,
                 we will first present our analysis of Duqu, an
                 information-collecting malware sharing striking
                 similarities with Stuxnet. We describe our
                 contributions in the investigation ranging from the
                 original detection of Duquvia finding the dropper file
                 to the design of a Duqu detector toolkit. We then
                 continue with the analysis of the Flame advanced
                 information-gathering malware. Flame is unique in the
                 sense that it used advanced cryptographic techniques to
                 masquerade as a legitimate proxy and we are currently
                 collecting intelligence information to be able to break
                 its very special encryption mechanism. Besides
                 explaining the operation of these pieces of malware, we
                 also examine if and how they could have been detected
                 by vigilant system administrators manually or in a
                 semi-automated manner using available tools. Finally,
                 we discuss lessons that the community can learn from
                 these incidents. We focus on technical issues, and
                 avoid speculations on the origin of these threats and
                 other geopolitical questions.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Aftermath of Stuxnet.",
}

@Article{Bender:2012:DSP,
  author =       "Jens Bender and {\"O}zg{\"u}r Dagdelen and Marc
                 Fischlin and Dennis K{\"u}gler",
  title =        "Domain-Specific Pseudonymous Signatures for the
                 {German} Identity Card",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7483",
  pages =        "104--119",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-33383-5_7",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:23:33 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012h.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-33383-5_7/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-33383-5",
  book-URL =     "http://www.springerlink.com/content/978-3-642-33383-5",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Berghel:2012:ITF,
  author =       "Hal Berghel",
  title =        "Identity Theft and Financial Fraud: Some Strangeness
                 in the Proportions",
  journal =      j-COMPUTER,
  volume =       "45",
  number =       "1",
  pages =        "86--89",
  month =        jan,
  year =         "2012",
  CODEN =        "CPTRB4",
  DOI =          "https://doi.org/10.1109/MC.2012.16",
  ISSN =         "0018-9162",
  ISSN-L =       "0018-9162",
  bibdate =      "Tue Jan 24 17:27:23 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computer2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
}

@Article{Bergsma:2012:PAW,
  author =       "Timothy T. Bergsma and Michael S. Smith",
  title =        "\pkg{Sumo}: An Authenticating {Web} Application with
                 an Embedded {R} Session",
  journal =      j-R-JOURNAL,
  volume =       "4",
  number =       "1",
  pages =        "60--63",
  month =        jun,
  year =         "2012",
  CODEN =        "????",
  ISSN =         "2073-4859",
  bibdate =      "Thu Aug 13 15:54:57 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/rjournal.bib",
  URL =          "http://journal.r-project.org/archive/2012-1/RJournal_2012-1_Bergsma+Smith.pdf",
  acknowledgement = ack-r-project,
  fjournal =     "The R Journal",
  journal-URL =  "http://journal.r-project.org/",
}

@Article{Bernstein:2012:SIN,
  author =       "Daniel J. Bernstein and Tanja Lange and Peter
                 Schwabe",
  title =        "The Security Impact of a New Cryptographic Library",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7533",
  pages =        "159--176",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-33481-8_9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:24:28 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012i.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-33481-8_9/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-33481-8",
  book-URL =     "http://www.springerlink.com/content/978-3-642-33481-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@TechReport{Bertoni:2012:KIO,
  author =       "Guido Bertoni and Joan Daemen and Micha{\"e}l Peeters
                 and Gilles {Van Assche} and Ronny {Van Keer}",
  title =        "{{\sc Keccak}} implementation overview",
  type =         "Report",
  institution =  "STMicroelectronics",
  address =      "Antwerp, Belgium (??)",
  pages =        "59",
  day =          "29",
  month =        may,
  year =         "2012",
  bibdate =      "Fri Dec 14 15:25:32 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  URL =          "http://keccak.noekeon.org/Keccak-implementation-3.2.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "hash function; Keccak (`catch-ack'); NIST Secure Hash
                 Algorithm (SHA-3)",
  lastaccess =   "14 December 2012",
}

@Misc{Bertoni:2012:KSF,
  author =       "Guido Bertoni and Joan Daemen and Micha{\"e}l Peeters
                 and Gilles {Van Assche}",
  title =        "The {Keccak} sponge function family",
  howpublished = "Web site",
  day =          "24",
  month =        oct,
  year =         "2012",
  bibdate =      "Fri Dec 14 10:18:19 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://keccak.noekeon.org/",
  abstract =     "From the Web site: ``Keccak is a family of sponge
                 functions. The sponge function is a generalization of
                 the concept of cryptographic hash function with
                 infinite output and can perform quasi all symmetric
                 cryptographic functions, from hashing to pseudo-random
                 number generation to authenticated encryption.''",
  acknowledgement = ack-nhfb,
  lastaccess =   "14 December 2012",
}

@Article{Bhargavan:2012:VCI,
  author =       "Karthikeyan Bhargavan and C{\'e}dric Fournet and
                 Ricardo Corin and Eugen Zalinescu",
  title =        "Verified Cryptographic Implementations for {TLS}",
  journal =      j-TISSEC,
  volume =       "15",
  number =       "1",
  pages =        "3:1--3:??",
  month =        mar,
  year =         "2012",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/2133375.2133378",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Sat Mar 24 09:45:43 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tissec.bib",
  abstract =     "We narrow the gap between concrete implementations of
                 cryptographic protocols and their verified models. We
                 develop and verify a small functional implementation of
                 the Transport Layer Security protocol (TLS 1.0). We
                 make use of the same executable code for
                 interoperability testing against mainstream
                 implementations for automated symbolic cryptographic
                 verification and automated computational cryptographic
                 verification. We rely on a combination of recent tools
                 and also develop a new tool for extracting
                 computational models from executable code. We obtain
                 strong security guarantees for TLS as used in typical
                 deployments.",
  acknowledgement = ack-nhfb,
  articleno =    "3",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@Article{Bhatnagar:2012:IVE,
  author =       "Gaurav Bhatnagar and Q. M. Jonathan Wu and
                 Balasubramanian Raman",
  title =        "Image and Video Encryption based on Dual Space-Filling
                 Curves",
  journal =      j-COMP-J,
  volume =       "55",
  number =       "6",
  pages =        "667--685",
  month =        jun,
  year =         "2012",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxs009",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Wed May 30 11:20:33 MDT 2012",
  bibsource =    "http://comjnl.oxfordjournals.org/content/55/6.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/55/6/667.full.pdf+html",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "February 16, 2012",
}

@Article{Bhatnagar:2012:NRA,
  author =       "Gaurav Bhatnagar and Q. M. Jonathan Wu and
                 Balasubramanian Raman",
  title =        "A new robust adjustable logo watermarking scheme",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "1",
  pages =        "40--58",
  month =        feb,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:27 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811001398",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Biagioli:2012:CCS,
  author =       "Mario Biagioli",
  title =        "From ciphers to confidentiality: secrecy, openness and
                 priority in science",
  journal =      j-BRITISH-J-HIST-SCI,
  volume =       "45",
  number =       "2",
  pages =        "213--233",
  month =        jun,
  year =         "2012",
  CODEN =        "BJHSAT",
  DOI =          "https://doi.org/10.1017/S0007087412000088",
  ISSN =         "0007-0874 (print), 1474-001X (electronic)",
  ISSN-L =       "0007-0874",
  bibdate =      "Sat Jun 23 14:42:27 MDT 2012",
  bibsource =    "http://journals.cambridge.org/action/displayJournal?jid=BJH;
                 https://www.math.utah.edu/pub/tex/bib/bjhs2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "British J. Hist. Sci.",
  fjournal =     "British Journal for the History of Science",
  journal-URL =  "http://journals.cambridge.org/action/displayJournal?jid=BJH",
  onlinedate =   "20 March 2012",
}

@Article{Bichsel:2012:DMA,
  author =       "Patrik Bichsel and Jan Camenisch and Bart {De Decker}
                 and Jorn Lapon and Vincent Naessens",
  title =        "Data-Minimizing Authentication Goes Mobile",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7394",
  pages =        "55--71",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-32805-3_5",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:21:38 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012f.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-32805-3_5/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-32805-3",
  book-URL =     "http://www.springerlink.com/content/978-3-642-32805-3",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Biddle:2012:GPL,
  author =       "Robert Biddle and Sonia Chiasson and P. C. {Van
                 Oorschot}",
  title =        "Graphical passwords: {Learning} from the first twelve
                 years",
  journal =      j-COMP-SURV,
  volume =       "44",
  number =       "4",
  pages =        "19:1--19:??",
  month =        aug,
  year =         "2012",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2333112.2333114",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Sep 6 09:45:45 MDT 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "Starting around 1999, a great many graphical password
                 schemes have been proposed as alternatives to
                 text-based password authentication. We provide a
                 comprehensive overview of published research in the
                 area, covering both usability and security aspects as
                 well as system evaluation. The article first catalogues
                 existing approaches, highlighting novel features of
                 selected schemes and identifying key usability or
                 security advantages. We then review usability
                 requirements for knowledge-based authentication as they
                 apply to graphical passwords, identify security threats
                 that such systems must address and review known
                 attacks, discuss methodological issues related to
                 empirical evaluation, and identify areas for further
                 research and improved methodology.",
  acknowledgement = ack-nhfb,
  articleno =    "19",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Biskup:2012:RBR,
  author =       "Joachim Biskup and Cornelia Tadros",
  title =        "Revising Belief without Revealing Secrets",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7153",
  pages =        "51--70",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-28472-4_4",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:25:11 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012b.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-28472-4_4/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-28472-4",
  book-URL =     "http://www.springerlink.com/content/978-3-642-28472-4",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Biswas:2012:IBA,
  author =       "Subir Biswas and Jelena Misi{\'c} and Vojislav
                 Misi{\'c}",
  title =        "An identity-based authentication scheme for safety
                 messages in {WAVE}-enabled {VANETs}",
  journal =      j-INT-J-PAR-EMER-DIST-SYS,
  volume =       "27",
  number =       "6",
  pages =        "541--562",
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1080/17445760.2011.641965",
  ISSN =         "1744-5760 (print), 1744-5779 (electronic)",
  ISSN-L =       "1744-5760",
  bibdate =      "Sun Nov 4 10:46:57 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjparemerdistsys.bib;
                 http://www.tandfonline.com/toc/gpaa20/27/6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Parallel, Emergent and
                 Distributed Systems: IJPEDS",
  journal-URL =  "http://www.tandfonline.com/loi/gpaa20",
  onlinedate =   "12 Jan 2012",
}

@Book{Blanchette:2012:BPC,
  author =       "Jean-Fran{\c{c}}ois Blanchette",
  title =        "Burdens of Proof: Cryptographic Culture and Evidence
                 Law in the Age of Electronic Documents",
  publisher =    pub-MIT,
  address =      pub-MIT:adr,
  pages =        "276",
  year =         "2012",
  ISBN =         "0-262-01751-2 (hardcover)",
  ISBN-13 =      "978-0-262-01751-0 (hardcover)",
  LCCN =         "K2269.5 .B58 2012",
  bibdate =      "Tue May 7 10:56:16 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  subject =      "Electronic evidence; Data encryption (Computer
                 science); Law and legislation",
  tableofcontents = "Introduction \\
                 Communication in the presence of adversaries \\
                 On the brink of a revolution \\
                 The equivalent of a written signature \\
                 Written proof \\
                 Paper and state \\
                 The Cryptographic imagination \\
                 Epilogue",
}

@Article{Blasco:2012:FAS,
  author =       "Jorge Blasco and Julio Cesar Hernandez-Castro and
                 Jos{\'e} Mar{\'\i}a de Fuentes and Benjam{\'\i}n
                 Ramos",
  title =        "A framework for avoiding steganography usage over
                 {HTTP}",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "35",
  number =       "1",
  pages =        "491--501",
  month =        jan,
  year =         "2012",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Wed Jan 28 15:44:09 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804511001901",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Netw. Comput. Appl.",
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Blomer:2012:TKG,
  author =       "Johannes Bl{\"o}mer",
  title =        "{Turing und Kryptografie}. ({German}) [{Turing} and
                 cryptography]",
  journal =      j-INFORMATIK-SPEKTRUM,
  volume =       "35",
  number =       "4",
  pages =        "261--270",
  month =        aug,
  year =         "2012",
  CODEN =        "INSKDW",
  DOI =          "https://doi.org/10.1007/s00287-012-0622-7",
  ISSN =         "0170-6012 (print), 1432-122X (electronic)",
  ISSN-L =       "0170-6012",
  bibdate =      "Fri Jul 13 07:26:18 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/bibnet/authors/t/turing-alan-mathison.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.springerlink.com/content/0170-6012/",
  note =         "Special Issue: Alan Turing",
  URL =          "http://www.springerlink.com/content/703t016671n87094/",
  acknowledgement = ack-nhfb,
  fjournal =     "Informatik Spektrum",
  language =     "German",
}

@Article{Bogdanov:2012:KAC,
  author =       "Andrey Bogdanov and Lars R. Knudsen and Gregor Leander
                 and Francois-Xavier Standaert",
  title =        "Key-Alternating Ciphers in a Provable Setting:
                 Encryption Using a Small Number of Public
                 Permutations",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7237",
  pages =        "45--62",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-29011-4_4;
                 https://doi.org/10.1007/978-3-642-29011-4_5",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Dec 15 20:55:01 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs.bib",
  URL =          "http://link.springer.com/accesspage/chapter/10.1007/978-3-642-29011-4_4;
                 http://link.springer.com/chapter/10.1007/978-3-642-29011-4_5/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-29011-4",
  book-URL =     "http://www.springerlink.com/content/978-3-642-29011-4",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Bogdanov:2012:UTC,
  author =       "Dan Bogdanov and Roman Jagom{\"a}gis and Sven Laur",
  title =        "A Universal Toolkit for Cryptographically Secure
                 Privacy-Preserving Data Mining",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7299",
  pages =        "112--126",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-30428-6_9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:19:32 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012d.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-30428-6_9/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-30428-6",
  book-URL =     "http://www.springerlink.com/content/978-3-642-30428-6",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Bogdanov:2012:ZCL,
  author =       "Andrey Bogdanov and Meiqin Wang",
  title =        "Zero-Correlation Linear Cryptanalysis with Reduced
                 Data Complexity",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7549",
  pages =        "29--48",
  year =         "2012",
  DOI =          "https://doi.org/10.1007/978-3-642-34047-5_3",
  bibdate =      "Fri Jan 31 08:05:18 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012.bib",
  acknowledgement = ack-nhfb,
  keywords =     "TEA (Tiny Encryption Algorithm)",
  remark =       "Fast Software Encryption 2012",
}

@Article{Boldi:2012:IUG,
  author =       "Paolo Boldi and Francesco Bonchi and Aristides Gionis
                 and Tamir Tassa",
  title =        "Injecting uncertainty in graphs for identity
                 obfuscation",
  journal =      j-PROC-VLDB-ENDOWMENT,
  volume =       "5",
  number =       "11",
  pages =        "1376--1387",
  month =        jul,
  year =         "2012",
  CODEN =        "????",
  ISSN =         "2150-8097",
  bibdate =      "Tue Nov 6 16:43:15 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/vldbe.bib",
  abstract =     "Data collected nowadays by social-networking
                 applications create fascinating opportunities for
                 building novel services, as well as expanding our
                 understanding about social structures and their
                 dynamics. Unfortunately, publishing social-network
                 graphs is considered an ill-advised practice due to
                 privacy concerns. To alleviate this problem, several
                 anonymization methods have been proposed, aiming at
                 reducing the risk of a privacy breach on the published
                 data, while still allowing to analyze them and draw
                 relevant conclusions. In this paper we introduce a new
                 anonymization approach that is based on injecting
                 uncertainty in social graphs and publishing the
                 resulting uncertain graphs. While existing approaches
                 obfuscate graph data by adding or removing edges
                 entirely, we propose using a finer-grained perturbation
                 that adds or removes edges partially: this way we can
                 achieve the same desired level of obfuscation with
                 smaller changes in the data, thus maintaining higher
                 utility. Our experiments on real-world networks confirm
                 that at the same level of identity obfuscation our
                 method provides higher usefulness than existing
                 randomized methods that publish standard graphs.",
  acknowledgement = ack-nhfb,
  fjournal =     "Proceedings of the VLDB Endowment",
}

@TechReport{Boldyreva:2012:NPG,
  author =       "Alexandra Boldyreva and Virendra Kumar",
  title =        "A New Pseudorandom Generator from Collision-Resistant
                 Hash Functions",
  type =         "Report",
  institution =  "School of Computer Science, Georgia Institute of
                 Technology",
  address =      "Atlanta, GA, USA",
  day =          "6",
  month =        feb,
  year =         "2012",
  bibdate =      "Wed Feb 15 10:44:11 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://eprint.iacr.org/2012/056",
  abstract =     "We present a new hash-function-based pseudorandom
                 generator (PRG). Our PRG is reminiscent of the
                 classical constructions iterating a function on a
                 random seed and extracting Goldreich-Levin hardcore
                 bits at each iteration step. The latest PRG of this
                 type that relies on reasonable assumptions (regularity
                 and one-wayness) is due to Haitner et al. In addition
                 to a regular one-way function, each iteration in their
                 ``randomized iterate'' scheme uses a new
                 pairwise-independent function, whose descriptions are
                 part of the seed of the PRG. Our construction does not
                 use pairwise-independent functions and is thus more
                 efficient, requiring less computation and a
                 significantly shorter seed. Our scheme's security
                 relies on the standard notions of collision-resistance
                 and regularity of the underlying hash function, where
                 the collision-resistance is required to be {\em
                 exponential}. In particular, any polynomial-time
                 adversary should have less than $ 2^{-n / 2} $
                 probability of finding collisions, where $n$ is the
                 output size of the hash function. We later show how to
                 relax the regularity assumption by introducing a new
                 notion that we call {\em worst-case regularity}, which
                 lower bounds the size of preimages of different
                 elements from the range (while the common regularity
                 assumption requires all such sets to be of equal size).
                 Unlike previous results, we provide a concrete security
                 statement.",
  acknowledgement = ack-nhfb,
  remark =       "A preliminary version appears in Proceedings of the
                 2012 Cryptographers' Track of the RSA Conference
                 (CT-RSA '12).",
}

@Article{Boldyreva:2012:SSE,
  author =       "Alexandra Boldyreva and Jean Paul Degabriele and
                 Kenneth G. Paterson and Martijn Stam",
  title =        "Security of Symmetric Encryption in the Presence of
                 Ciphertext Fragmentation",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7237",
  pages =        "682--699",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-29011-4_39;
                 https://doi.org/10.1007/978-3-642-29011-4_40",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Dec 15 20:55:01 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs.bib",
  URL =          "http://link.springer.com/accesspage/chapter/10.1007/978-3-642-29011-4_39;
                 http://link.springer.com/chapter/10.1007/978-3-642-29011-4_40/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-29011-4",
  book-URL =     "http://www.springerlink.com/content/978-3-642-29011-4",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Boneh:2012:FEN,
  author =       "Dan Boneh and Amit Sahai and Brent Waters",
  title =        "Functional encryption: a new vision for public-key
                 cryptography",
  journal =      j-CACM,
  volume =       "55",
  number =       "11",
  pages =        "56--64",
  month =        nov,
  year =         "2012",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2366316.2366333",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Oct 25 09:59:18 MDT 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cacm2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "Decryption keys allow users to learn a specific
                 function of the encrypted data and nothing else.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Boneh:2012:PBC,
  author =       "Dan Boneh",
  title =        "Pairing-Based Cryptography: Past, Present, and
                 Future",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7658",
  pages =        "1--1",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-34961-4_1",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:18:20 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012l.bib",
  URL =          "http://link.springer.com/accesspage/chapter/10.1007/978-3-642-34961-4_1",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-34961-4",
  book-URL =     "http://www.springerlink.com/content/978-3-642-34961-4",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Borghoff:2012:PLL,
  author =       "Julia Borghoff and Anne Canteaut and Tim G{\"u}neysu
                 and Elif Bilge Kavun and Miroslav Knezevic",
  title =        "{PRINCE} --- a Low-Latency Block Cipher for Pervasive
                 Computing Applications",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7658",
  pages =        "208--225",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-34961-4_14",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:18:20 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012l.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-34961-4_14/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-34961-4",
  book-URL =     "http://www.springerlink.com/content/978-3-642-34961-4",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Bosch:2012:SDR,
  author =       "Christoph B{\"o}sch and Qiang Tang and Pieter Hartel
                 and Willem Jonker",
  title =        "Selective Document Retrieval from Encrypted Database",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7483",
  pages =        "224--241",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-33383-5_14",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:23:33 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012h.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-33383-5_14/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-33383-5",
  book-URL =     "http://www.springerlink.com/content/978-3-642-33383-5",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Bouti:2012:SCB,
  author =       "Adil Bouti and J{\"o}rg Keller",
  title =        "Securing cloud-based computations against malicious
                 providers",
  journal =      j-OPER-SYS-REV,
  volume =       "46",
  number =       "2",
  pages =        "38--42",
  month =        jul,
  year =         "2012",
  CODEN =        "OSRED8",
  DOI =          "https://doi.org/10.1145/2331576.2331583",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Fri Jul 13 12:36:08 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/opersysrev.bib",
  abstract =     "Security in clouds often focuses on preventing clients
                 from gaining information about other clients'
                 computations. However, cloud providers might also be a
                 source for loss of confidentiality. We present a
                 protocol to delegate computations into clouds with
                 encrypted data. The protocol is based on homomorphic
                 properties of encryption algorithms. The protocol can
                 also be used to amend existing applications by software
                 patches of binaries. We evaluate the protocol by a
                 proof-of-concept implementation to investigate
                 practicability, and discuss variants and extensions to
                 increase the prototype's efficiency.",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J597",
}

@Article{Braun:2012:ULA,
  author =       "Bastian Braun and Stefan Kucher and Martin Johns and
                 Joachim Posegga",
  title =        "A User-Level Authentication Scheme to Mitigate {Web}
                 Session-Based Vulnerabilities",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7449",
  pages =        "17--29",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-32287-7_2",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:22:50 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012g.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-32287-7_2/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-32287-7",
  book-URL =     "http://www.springerlink.com/content/978-3-642-32287-7",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Brennan:2012:ASC,
  author =       "Michael Brennan and Sadia Afroz and Rachel
                 Greenstadt",
  title =        "Adversarial stylometry: Circumventing authorship
                 recognition to preserve privacy and anonymity",
  journal =      j-TISSEC,
  volume =       "15",
  number =       "3",
  pages =        "12:1--12:??",
  month =        nov,
  year =         "2012",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/2382448.2382450",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Wed Nov 28 17:25:14 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tissec.bib",
  abstract =     "The use of stylometry, authorship recognition through
                 purely linguistic means, has contributed to literary,
                 historical, and criminal investigation breakthroughs.
                 Existing stylometry research assumes that authors have
                 not attempted to disguise their linguistic writing
                 style. We challenge this basic assumption of existing
                 stylometry methodologies and present a new area of
                 research: adversarial stylometry. Adversaries have a
                 devastating effect on the robustness of existing
                 classification methods. Our work presents a framework
                 for creating adversarial passages including
                 obfuscation, where a subject attempts to hide her
                 identity, and imitation, where a subject attempts to
                 frame another subject by imitating his writing style,
                 and translation where original passages are obfuscated
                 with machine translation services. This research
                 demonstrates that manual circumvention methods work
                 very well while automated translation methods are not
                 effective. The obfuscation method reduces the
                 techniques' effectiveness to the level of random
                 guessing and the imitation attempts succeed up to 67\%
                 of the time depending on the stylometry technique used.
                 These results are more significant given the fact that
                 experimental subjects were unfamiliar with stylometry,
                 were not professional writers, and spent little time on
                 the attacks. This article also contributes to the field
                 by using human subjects to empirically validate the
                 claim of high accuracy for four current techniques
                 (without adversaries). We have also compiled and
                 released two corpora of adversarial stylometry texts to
                 promote research in this field with a total of 57
                 unique authors. We argue that this field is important
                 to a multidisciplinary approach to privacy, security,
                 and anonymity.",
  acknowledgement = ack-nhfb,
  articleno =    "12",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@Article{Brooks:2012:QCE,
  author =       "M. Brooks",
  title =        "Quantum cash and the end of counterfeiting",
  journal =      j-IEEE-SPECTRUM,
  volume =       "49",
  number =       "6",
  pages =        "58--59",
  month =        jun,
  year =         "2012",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.2012.6203970",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 07:02:09 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Encryption; fake bills; fundamental particles;
                 high-tech inks; holograms; holography; National banks;
                 Online banking; paper; paper money; Particle
                 measurements; Photonics; printing presses; public key
                 cryptography; quantum cash; Quantum computing; quantum
                 cryptography; Quantum mechanics; quantum physicists;
                 watermarking; watermarks",
}

@Article{Broustis:2012:GAN,
  author =       "Ioannis Broustis and Ganapathy S. Sundaram and Harish
                 Viswanathan",
  title =        "Group Authentication: a New Paradigm for Emerging
                 Applications",
  journal =      j-BELL-LABS-TECH-J,
  volume =       "17",
  number =       "3",
  pages =        "157--173",
  month =        dec,
  year =         "2012",
  CODEN =        "BLTJFD",
  DOI =          "https://doi.org/10.1002/bltj.21566",
  ISSN =         "1089-7089 (print), 1538-7305 (electronic)",
  ISSN-L =       "1089-7089",
  bibdate =      "Thu Mar 7 07:32:06 MST 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bstj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Bell Labs Technical Journal",
  journal-URL =  "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1538-7305/issues/",
  onlinedate =   "27 Dec 2012",
}

@Article{Brumley:2012:SFI,
  author =       "Billy Bob Brumley",
  title =        "Secure and Fast Implementations of Two Involution
                 Ciphers",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7127",
  pages =        "269--282",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-27937-9_19",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:24:40 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012b.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-27937-9_19/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-27937-9",
  book-URL =     "http://www.springerlink.com/content/978-3-642-27937-9",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Caballero-Gil:2012:LAR,
  author =       "C. Caballero-Gil and P. Caballero-Gil and A.
                 Peinado-Dom{\'\i}nguez and J. Molina-Gil",
  title =        "Lightweight Authentication for {RFID} Used in
                 {VANETs}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6928",
  pages =        "493--500",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-27579-1_64",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Mon Dec 24 07:14:13 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/978-3-642-27579-1_64",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-27579-1",
  book-URL =     "http://www.springerlink.com/content/978-3-642-27579-1",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Camenisch:2012:EAA,
  author =       "Jan Camenisch and Thomas Gro{\ss}",
  title =        "Efficient Attributes for Anonymous Credentials",
  journal =      j-TISSEC,
  volume =       "15",
  number =       "1",
  pages =        "4:1--4:??",
  month =        mar,
  year =         "2012",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/2133375.2133379",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Sat Mar 24 09:45:43 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tissec.bib",
  abstract =     "We extend the Camenisch-Lysyanskaya anonymous
                 credential system such that selective disclosure of
                 attributes becomes highly efficient. The resulting
                 system significantly improves upon existing approaches,
                 which suffer from a linear number of modular
                 exponentiations in the total number of attributes. This
                 limitation makes them unfit for many practical
                 applications, such as electronic identity cards. Our
                 novel approach can incorporate a large number of binary
                 and finite-set attributes without significant
                 performance impact. It compresses all such attributes
                 into a single attribute base and, thus, boosts the
                 efficiency of all proofs of possession. The core idea
                 is to encode discrete binary and finite-set values as
                 prime numbers. We then use the divisibility property
                 for efficient proofs of their presence or absence. In
                 addition, we contribute efficient methods for
                 conjunctions and disjunctions. The system builds on the
                 strong RSA assumption. We demonstrate the aptness of
                 our method in realistic application scenarios, notably
                 electronic identity cards, and show its advantages for
                 small devices, such as smartcards and cell phones.",
  acknowledgement = ack-nhfb,
  articleno =    "4",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@Article{Cao:2012:ITM,
  author =       "Zhen Cao and Hui Deng and Zhi Guan and Zhong Chen",
  title =        "Information-theoretic modeling of false data filtering
                 schemes in wireless sensor networks",
  journal =      j-TOSN,
  volume =       "8",
  number =       "2",
  pages =        "14:1--14:??",
  month =        mar,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2140522.2140527",
  ISSN =         "1550-4859 (print), 1550-4867 (electronic)",
  ISSN-L =       "1550-4859",
  bibdate =      "Fri Apr 6 18:38:19 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tosn.bib",
  abstract =     "False data filtering schemes are designed to filter
                 out false data injected by malicious sensors; they keep
                 the network immune to bogus event reports. Theoretic
                 understanding of false data filtering schemes and
                 guidelines to further improve their designs are still
                 lacking. This article first presents an
                 information-theoretic model of false data filtering
                 schemes. From the information-theoretic view, we define
                 the scheme's filtering capacity C$_{F i}$ as the
                 uncertainty-reduction ratio of the target input
                 variable, given the output. This metric not only
                 performs better than existing metrics but also implies
                 that only by optimizing the false negative rate and
                 false positive rate simultaneously, can we promote a
                 scheme's overall performance. Based on the
                 investigation from the modeling efforts, we propose
                 HiFi, a hybrid authentication-based false data
                 filtering scheme. HiFi leverages the benefits of both
                 symmetric and asymmetric cryptography and achieves a
                 high filtering capacity, as well as low computation and
                 communication overhead. Performance analysis
                 demonstrates that our proposed metric is rational and
                 useful, and that HiFi is effective and energy
                 efficient.",
  acknowledgement = ack-nhfb,
  articleno =    "14",
  fjournal =     "ACM Transactions on Sensor Networks (TOSN)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J981",
}

@Article{Cao:2012:SRH,
  author =       "Jin Cao and Hui Li and Maode Ma and Yueyu Zhang and
                 Chengzhe Lai",
  title =        "A simple and robust handover authentication between
                 {HeNB} and {eNB} in {LTE} networks",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "56",
  number =       "8",
  pages =        "2119--2131",
  day =          "24",
  month =        may,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1016/j.comnet.2012.02.012",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Fri May 18 08:27:51 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/13891286",
  URL =          "http://www.sciencedirect.com/science/article/pii/S138912861200076X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286",
}

@Article{Carota:2012:FFI,
  author =       "Serenella Carota and Flavio Corradini and Damiano
                 Falcioni and Maria Laura Maggiulli",
  title =        "{FedCohesion}: Federated Identity Management in the
                 {Marche} Region",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7452",
  pages =        "112--124",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-32701-8_11",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:22:54 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012h.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-32701-8_11/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-32701-8",
  book-URL =     "http://www.springerlink.com/content/978-3-642-32701-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Cevallos:2012:USR,
  author =       "Alfonso Cevallos and Serge Fehr and Rafail Ostrovsky
                 and Yuval Rabani",
  title =        "Unconditionally-Secure Robust Secret Sharing with
                 Compact Shares",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7237",
  pages =        "195--208",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-29011-4_12;
                 https://doi.org/10.1007/978-3-642-29011-4_13",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Dec 15 20:55:01 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs.bib",
  URL =          "http://link.springer.com/accesspage/chapter/10.1007/978-3-642-29011-4_12;
                 http://link.springer.com/chapter/10.1007/978-3-642-29011-4_13/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-29011-4",
  book-URL =     "http://www.springerlink.com/content/978-3-642-29011-4",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Chadha:2012:AVE,
  author =       "Rohit Chadha and {\c{S}}tefan Ciob{\^a}c{\u{a}} and
                 Steve Kremer",
  title =        "Automated Verification of Equivalence Properties of
                 Cryptographic Protocols",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7211",
  pages =        "108--127",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-28869-2_6",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:26:23 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012c.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-28869-2_6/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-28869-2",
  book-URL =     "http://www.springerlink.com/content/978-3-642-28869-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Chang:2012:GBP,
  author =       "Ting-Yi Chang and Cheng-Jung Tsai and Jyun-Hao Lin",
  title =        "A graphical-based password keystroke dynamic
                 authentication system for touch screen handheld mobile
                 devices",
  journal =      j-J-SYST-SOFTW,
  volume =       "85",
  number =       "5",
  pages =        "1157--1165",
  month =        may,
  year =         "2012",
  CODEN =        "JSSODM",
  DOI =          "https://doi.org/10.1016/j.jss.2011.12.044",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Mon Feb 27 06:33:47 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0164121211003256",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Chang:2012:PRS,
  author =       "Shih-Ying Chang and Yue-Hsun Lin and Hung-Min Sun and
                 Mu-En Wu",
  title =        "Practical {RSA} signature scheme based on periodical
                 rekeying for wireless sensor networks",
  journal =      j-TOSN,
  volume =       "8",
  number =       "2",
  pages =        "13:1--13:??",
  month =        mar,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2140522.2140526",
  ISSN =         "1550-4859 (print), 1550-4867 (electronic)",
  ISSN-L =       "1550-4859",
  bibdate =      "Fri Apr 6 18:38:19 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tosn.bib",
  abstract =     "Broadcast is an efficient communication channel on
                 wireless sensor networks. Through authentic broadcast,
                 deployed sensors can perform legitimate actions issued
                 by a base station. According to previous literature, a
                 complete solution for authentic broadcast is digital
                 signature based on asymmetric cryptography. However,
                 asymmetric cryptography utilizes expensive operations,
                 which result in computational bottlenecks. Among these
                 cryptosystems, Elliptic Curve Cryptography (ECC) seems
                 to be the most efficient and the most popular choice.
                 Unfortunately, signature verification in ECC is not
                 efficient enough. In this article, we propose an
                 authentic broadcast scheme based on RSA. Unlike
                 conventional approaches, the proposed scheme adopts
                 short moduli to enhance performance. Meanwhile, the
                 weakness of short moduli can be fixed with rekeying
                 strategies. To minimize the rekeying overhead, a
                 Multi-Modulus RSA generation algorithm, which can
                 reduce communication overhead by 50\%, is proposed. We
                 implemented the proposed scheme on MICAz. On 512-bit
                 moduli, each verification spends at most 0.077 seconds,
                 which is highly competitive with other public-key
                 cryptosystems.",
  acknowledgement = ack-nhfb,
  articleno =    "13",
  fjournal =     "ACM Transactions on Sensor Networks (TOSN)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J981",
}

@TechReport{Chang:2012:TRR,
  author =       "S.-j. Chang and R. Perlner and W. E. Burr and M. S.
                 Turan and J. M. Kelsey and S. Paul and L. E. Bassham",
  title =        "Third-Round Report of the {SHA-3} Cryptographic Hash
                 Algorithm Competition",
  type =         "Report",
  institution =  pub-NIST,
  address =      pub-NIST:adr,
  year =         "2012",
  bibdate =      "Tue Mar 18 10:58:02 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  acknowledgement = ack-nhfb,
}

@Article{Che:2012:WAM,
  author =       "Xiangjiu Che and Zhanheng Gao",
  title =        "Watermarking algorithm for {$3$D} mesh based on
                 multi-scale radial basis functions",
  journal =      j-INT-J-PAR-EMER-DIST-SYS,
  volume =       "27",
  number =       "2",
  pages =        "133--141",
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1080/17445760.2011.574631",
  ISSN =         "1744-5760 (print), 1744-5779 (electronic)",
  ISSN-L =       "1744-5760",
  bibdate =      "Sun Nov 4 10:46:56 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjparemerdistsys.bib;
                 http://www.tandfonline.com/toc/gpaa20/27/2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Parallel, Emergent and
                 Distributed Systems: IJPEDS",
  journal-URL =  "http://www.tandfonline.com/loi/gpaa20",
  onlinedate =   "03 Oct 2011",
}

@Article{Chen:2012:AIB,
  author =       "Yu Chen and Zongyang Zhang and Dongdai Lin and Zhenfu
                 Cao",
  title =        "Anonymous Identity-Based Hash Proof System and Its
                 Applications",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7496",
  pages =        "143--160",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-33272-2_10",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:23:50 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012h.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-33272-2_10/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-33272-2",
  book-URL =     "http://www.springerlink.com/content/978-3-642-33272-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Chen:2012:CKS,
  author =       "Zhenhua Chen and Chunying Wu and Daoshun Wang and
                 Shundong Li",
  title =        "Conjunctive Keywords Searchable Encryption with
                 Efficient Pairing, Constant Ciphertext and Short
                 Trapdoor",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7299",
  pages =        "176--189",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-30428-6_15",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:19:32 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012d.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-30428-6_15/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-30428-6",
  book-URL =     "http://www.springerlink.com/content/978-3-642-30428-6",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Chen:2012:DCC,
  author =       "Jian Chen and Jeffrey S. Rosenthal",
  title =        "Decrypting classical cipher text using {Markov} chain
                 {Monte Carlo}",
  journal =      j-STAT-COMPUT,
  volume =       "22",
  number =       "2",
  pages =        "397--413",
  month =        mar,
  year =         "2012",
  CODEN =        "STACE3",
  DOI =          "https://doi.org/10.1007/s11222-011-9232-5",
  ISSN =         "0960-3174 (print), 1573-1375 (electronic)",
  ISSN-L =       "0960-3174",
  bibdate =      "Sat Jan 31 12:22:08 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/statcomput.bib",
  URL =          "http://link.springer.com/article/10.1007/s11222-011-9232-5",
  acknowledgement = ack-nhfb,
  fjournal =     "Statistics and Computing",
  journal-URL =  "http://link.springer.com/journal/11222",
}

@Article{Chen:2012:FAA,
  author =       "Yuanmi Chen and Phong Q. Nguyen",
  title =        "Faster Algorithms for Approximate Common Divisors:
                 Breaking Fully-Homomorphic-Encryption Challenges over
                 the Integers",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7237",
  pages =        "502--519",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-29011-4_29;
                 https://doi.org/10.1007/978-3-642-29011-4_30",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Dec 15 20:55:01 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs.bib",
  URL =          "http://link.springer.com/accesspage/chapter/10.1007/978-3-642-29011-4_29;
                 http://link.springer.com/chapter/10.1007/978-3-642-29011-4_30/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-29011-4",
  book-URL =     "http://www.springerlink.com/content/978-3-642-29011-4",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Chen:2012:FSD,
  author =       "Cheng Chen and Zhenfeng Zhang and Dengguo Feng",
  title =        "Fully Secure Doubly-Spatial Encryption under Simple
                 Assumptions",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7496",
  pages =        "253--263",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-33272-2_16",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:23:50 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012h.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-33272-2_16/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-33272-2",
  book-URL =     "http://www.springerlink.com/content/978-3-642-33272-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Chen:2012:IBE,
  author =       "Yu Chen and Zongyang Zhang and Dongdai Lin and Zhenfu
                 Cao",
  title =        "Identity-Based Extractable Hash Proofs and Their
                 Applications",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7341",
  pages =        "153--170",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-31284-7_10",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:20:27 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012e.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-31284-7_10/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-31284-7",
  book-URL =     "http://www.springerlink.com/content/978-3-642-31284-7",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Chen:2012:IDC,
  author =       "Jiazhe Chen and Meiqin Wang and Bart Preneel",
  title =        "Impossible Differential Cryptanalysis of the
                 Lightweight Block Ciphers {TEA}, {XTEA} and {HIGHT}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7374",
  pages =        "117--137",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-31410-0_8",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:21:11 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012f.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-31410-0_8/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-31410-0",
  book-URL =     "http://www.springerlink.com/content/978-3-642-31410-0",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Chen:2012:NCB,
  author =       "Yu Chen and Song Luo and Jianbin Hu and Zhong Chen",
  title =        "A Novel Commutative Blinding Identity Based Encryption
                 Scheme",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6888",
  pages =        "73--89",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-27901-0_7",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:19:37 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-27901-0_7/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-27901-0",
  book-URL =     "http://www.springerlink.com/content/978-3-642-27901-0",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Chen:2012:SRF,
  author =       "Fan Chen and Hongjie He and Yaoran Huo and Hongxia
                 Wang",
  title =        "Self-recovery Fragile Watermarking Scheme with
                 Variable Watermark Payload",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7128",
  pages =        "142--155",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-32205-1_13",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:24:41 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012b.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-32205-1_13/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-32205-1",
  book-URL =     "http://www.springerlink.com/content/978-3-642-32205-1",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Cheng:2012:PAI,
  author =       "Pengqi Cheng and Yan Gu and Zihong Lv and Jianfei Wang
                 and Wenlei Zhu and Zhen Chen and Jiwei Huang",
  title =        "A Performance Analysis of Identity-Based Encryption
                 Schemes",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7222",
  pages =        "289--303",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-32298-3_19",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:17:56 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012c.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-32298-3_19/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-32298-3",
  book-URL =     "http://www.springerlink.com/content/978-3-642-32298-3",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Chiasson:2012:MWB,
  author =       "Sonia Chiasson and Chris Deschamps",
  title =        "The {MVP} {Web}-Based Authentication Framework",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7397",
  pages =        "16--24",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-32946-3_2",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:21:41 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012f.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-32946-3_2/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-32946-3",
  book-URL =     "http://www.springerlink.com/content/978-3-642-32946-3",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Chien:2012:IAM,
  author =       "Hung-Yu Chien",
  title =        "Improved Anonymous Multi-receiver Identity-Based
                 Encryption",
  journal =      j-COMP-J,
  volume =       "55",
  number =       "4",
  pages =        "439--446",
  month =        apr,
  year =         "2012",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxr086",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Mar 27 18:19:58 MDT 2012",
  bibsource =    "http://comjnl.oxfordjournals.org/content/55/4.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  note =         "See comment on insecurity \cite{Wang:2014:IIA}.",
  URL =          "http://comjnl.oxfordjournals.org/content/55/4/439.full.pdf+html",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "September 15, 2011",
}

@Article{Chmiel:2012:EPC,
  author =       "Krzysztof Chmiel and Anna Grocholewska-Czurylo and
                 Janusz Stoklosa",
  title =        "Evaluation of {PP-1} Cipher Resistance against
                 Differential and Linear Cryptanalysis in Comparison to
                 a {DES}-like Cipher",
  journal =      j-FUND-INFO,
  volume =       "114",
  number =       "3--4",
  pages =        "239--269",
  month =        aug,
  year =         "2012",
  CODEN =        "FUMAAJ",
  DOI =          "https://doi.org/10.3233/FI-2012-627",
  ISSN =         "0169-2968 (print), 1875-8681 (electronic)",
  ISSN-L =       "0169-2968",
  bibdate =      "Sat Mar 5 17:14:51 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/fundinfo2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Fundamenta Informaticae",
  journal-URL =  "http://content.iospress.com/journals/fundamenta-informaticae",
}

@Article{Cho:2012:CBF,
  author =       "Jung-Sik Cho and Young-Sik Jeong and Sang Oh Park",
  title =        "Consideration on the Brute-force Attack Cost and
                 Retrieval Cost: a Hash-based radio-frequency
                 identification ({RFID}) {Tag Mutual Authentication
                 Protocol}",
  journal =      j-COMPUT-MATH-APPL,
  volume =       "69",
  number =       "1",
  pages =        "58--65",
  month =        jan,
  year =         "2012",
  CODEN =        "CMAPDK",
  DOI =          "https://doi.org/10.1016/j.camwa.2012.02.025",
  ISSN =         "0898-1221 (print), 1873-7668 (electronic)",
  ISSN-L =       "0898-1221",
  bibdate =      "Wed Mar 01 07:38:57 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  note =         "See cryptanalysis \cite{Safkhani:2014:CCA}.",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0898122112001393",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers and Mathematics with Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/08981221",
}

@Article{Choi:2012:LTF,
  author =       "Seung Geol Choi and Hoeteck Wee",
  title =        "Lossy trapdoor functions from homomorphic reproducible
                 encryption",
  journal =      j-INFO-PROC-LETT,
  volume =       "112",
  number =       "20",
  pages =        "794--798",
  day =          "31",
  month =        oct,
  year =         "2012",
  CODEN =        "IFPLAT",
  DOI =          "https://doi.org/10.1016/j.ipl.2012.07.012",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Fri Aug 3 09:47:38 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019012002001",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Chow:2012:EPV,
  author =       "Yang-Wai Chow and Willy Susilo and Duncan S. Wong",
  title =        "Enhancing the Perceived Visual Quality of a Size
                 Invariant Visual Cryptography Scheme",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7618",
  pages =        "10--21",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-34129-8_2",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:25:56 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012k.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-34129-8_2/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-34129-8",
  book-URL =     "http://www.springerlink.com/content/978-3-642-34129-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Chung:2012:CBI,
  author =       "Yu-Fang Chung and Zhen-Yu Wu",
  title =        "Casting Ballots over {Internet} Connection Against
                 Bribery and Coercion",
  journal =      j-COMP-J,
  volume =       "55",
  number =       "10",
  pages =        "1169--1179",
  month =        oct,
  year =         "2012",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxs003",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Fri Oct 26 08:44:19 MDT 2012",
  bibsource =    "http://comjnl.oxfordjournals.org/content/55/10.toc;
                 https://www.math.utah.edu/pub/tex/bib/comp2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/55/10/1169.full.pdf+html",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "February 5, 2012",
}

@Misc{Clark:2012:RLA,
  author =       "Liat Clark and Ian Steadman",
  title =        "The Rich Legacy of {Alan Turing}",
  howpublished = "Wired UK Web site.",
  day =          "18",
  month =        jun,
  year =         "2012",
  bibdate =      "Wed Jun 20 10:22:53 2012",
  bibsource =    "https://www.math.utah.edu/pub/bibnet/authors/t/turing-alan-mathison.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.wired.com/wiredscience/2012/06/alan-turing-legacy/",
  acknowledgement = ack-nhfb,
  keywords =     "Delilah telephone encoder/decoder; Fibonacci sequence;
                 Manchester Mark 1; morphogenesis; MOSAIC (Ministry of
                 Supply Automatic Integrator and Computer); National
                 Physical Laboratory (NPL); Naval Bombe; Pilot ACE
                 (Automatic Computing Engine); SIGSALY telephone
                 encoder/decoder; speech encryption; Turbochamp
                 (computer chess); Turing machine",
  remark =       "From the article: ``Alan Turing [in 1943] had
                 developed the Naval Bombe, an adaptation of his
                 decryption Bombe device capable of laying bare the
                 secrets of the complex German Naval Enigma. Churchill
                 would later comment that Turing had made the single
                 biggest contribution to Allied victory in the war.''",
}

@Article{Clear:2012:CPA,
  author =       "Michael Clear and Karl Reid and Desmond Ennis and
                 Arthur Hughes and Hitesh Tewari",
  title =        "Collaboration-Preserving Authenticated Encryption for
                 Operational Transformation Systems",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7483",
  pages =        "204--223",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-33383-5_13",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:23:33 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012h.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-33383-5_13/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-33383-5",
  book-URL =     "http://www.springerlink.com/content/978-3-642-33383-5",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Constantin:2012:RSN,
  author =       "Lucian Constantin",
  title =        "Researchers set new cryptanalysis world record for
                 pairing-based cryptography",
  journal =      j-NETWORK-WORLD,
  day =          "19",
  month =        jun,
  year =         "2012",
  ISSN =         "0887-7661 (print), 1944-7655 (electronic)",
  ISSN-L =       "0887-7661",
  bibdate =      "Sat Jun 23 12:09:08 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.networkworld.com/news/2012/061912-researchers-set-new-cryptanalysis-world-260338.html",
  abstract =     "Researchers from Fujitsu Laboratories, Japan's
                 National Institute of Information and Communications
                 Technology (NICT) and Kyushu University have set a new
                 cryptanalysis world record by cracking a 278-digit-long
                 (923-bit) key used in a pairing-based cryptography
                 system, Japanese IT services provider Fujitsu said
                 Monday.\par

                 The cryptanalysts who worked on this project cracked
                 the 923-bit encryption key in 148.2 days by using 21
                 computers with a total of 252 cores. It had been
                 previously estimated that pairing-based cryptography of
                 this length would require several hundred thousand
                 years to break, the researchers said.",
  acknowledgement = ack-nhfb,
  fjournal =     "Network World",
}

@Article{Cordeiro:2012:IMB,
  author =       "Weverton Luis da Costa Cordeiro and Fl{\'a}vio Roberto
                 Santos and Gustavo Huff Mauch and Marinho Pilla
                 Barcelos and Luciano Paschoal Gaspary",
  title =        "Identity management based on adaptive puzzles to
                 protect {P2P} systems from {Sybil} attacks",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "56",
  number =       "11",
  pages =        "2569--2589",
  day =          "31",
  month =        jul,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1016/j.comnet.2012.03.026",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Fri Jun 29 12:23:11 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/13891286",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1389128612001417",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286",
}

@Article{Coron:2012:PKC,
  author =       "Jean-S{\'e}bastien Coron and David Naccache and Mehdi
                 Tibouchi",
  title =        "Public Key Compression and Modulus Switching for Fully
                 Homomorphic Encryption over the Integers",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7237",
  pages =        "446--464",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-29011-4_26;
                 https://doi.org/10.1007/978-3-642-29011-4_27",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Dec 15 20:55:01 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs.bib",
  URL =          "http://link.springer.com/accesspage/chapter/10.1007/978-3-642-29011-4_26;
                 http://link.springer.com/chapter/10.1007/978-3-642-29011-4_27/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-29011-4",
  book-URL =     "http://www.springerlink.com/content/978-3-642-29011-4",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Courtland:2012:VCG,
  author =       "Rachel Courtland",
  title =        "Virtual currency gets real",
  journal =      j-IEEE-SPECTRUM,
  volume =       "49",
  number =       "6",
  pages =        "52--53",
  month =        jun,
  year =         "2012",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.2012.6204182",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 07:02:09 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Cryptography; Currency; Digital systems; Exchange
                 rates; Government policies; Online banking; Privacy",
}

@Article{Coutinho:2012:RPT,
  author =       "S. C. Coutinho",
  title =        "Review of {{\booktitle{Primality Testing and Integer
                 Factorization in Public Key Cryptography}} by Song Y.
                 Yan}",
  journal =      j-SIGACT,
  volume =       "43",
  number =       "2",
  pages =        "33--35",
  month =        jun,
  year =         "2012",
  CODEN =        "SIGNDM",
  DOI =          "https://doi.org/10.1145/2261417.2261426",
  ISSN =         "0163-5700 (print), 1943-5827 (electronic)",
  ISSN-L =       "0163-5700",
  bibdate =      "Tue Nov 6 17:32:01 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGACT News",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J697",
}

@Article{Dacosta:2012:OTC,
  author =       "Italo Dacosta and Saurabh Chakradeo and Mustaque
                 Ahamad and Patrick Traynor",
  title =        "One-time cookies: Preventing session hijacking attacks
                 with stateless authentication tokens",
  journal =      j-TOIT,
  volume =       "12",
  number =       "1",
  pages =        "1:1--1:??",
  month =        jun,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2220352.2220353",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Tue Jul 10 18:01:14 MDT 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tois.bib",
  abstract =     "HTTP cookies are the de facto mechanism for session
                 authentication in Web applications. However, their
                 inherent security weaknesses allow attacks against the
                 integrity of Web sessions. HTTPS is often recommended
                 to protect cookies, but deploying full HTTPS support
                 can be challenging due to performance and financial
                 concerns, especially for highly distributed
                 applications. Moreover, cookies can be exposed in a
                 variety of ways even when HTTPS is enabled. In this
                 article, we propose one-time cookies (OTC), a more
                 robust alternative for session authentication. OTC
                 prevents attacks such as session hijacking by signing
                 each user request with a session secret securely stored
                 in the browser. Unlike other proposed solutions, OTC
                 does not require expensive state synchronization in the
                 Web application, making it easily deployable in highly
                 distributed systems. We implemented OTC as a plug-in
                 for the popular WordPress platform and as an extension
                 for Firefox and Firefox for mobile browsers. Our
                 extensive experimental analysis shows that OTC
                 introduces a latency of less than 6 ms when compared to
                 cookies --- a negligible overhead for most Web
                 applications. Moreover, we show that OTC can be
                 combined with HTTPS to effectively add another layer of
                 security to Web applications. In so doing, we
                 demonstrate that one-time cookies can significantly
                 improve the security of Web applications with minimal
                 impact on performance and scalability.",
  acknowledgement = ack-nhfb,
  articleno =    "1",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Das:2012:DPB,
  author =       "Ashok Kumar Das and Pranay Sharma and Santanu
                 Chatterjee and Jamuna Kanta Sing",
  title =        "A dynamic password-based user authentication scheme
                 for hierarchical wireless sensor networks",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "35",
  number =       "5",
  pages =        "1646--1656",
  month =        sep,
  year =         "2012",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Wed Jan 28 15:44:23 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804512000926",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Netw. Comput. Appl.",
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Dautrich:2012:SLU,
  author =       "Jonathan L. Dautrich and Chinya V. Ravishankar",
  title =        "Security Limitations of Using Secret Sharing for Data
                 Outsourcing",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7371",
  pages =        "145--160",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-31540-4_12",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:21:06 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012f.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-31540-4_12/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-31540-4",
  book-URL =     "http://www.springerlink.com/content/978-3-642-31540-4",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{David:2012:PRE,
  author =       "C. David and J. Wu",
  title =        "Pseudoprime Reductions of Elliptic Curves",
  journal =      j-CAN-J-MATH,
  volume =       "64",
  number =       "1",
  pages =        "81--101",
  month =        feb,
  year =         "2012",
  CODEN =        "CJMAAB",
  DOI =          "https://doi.org/10.4153/CJM-2011-044-x",
  ISSN =         "0008-414X (print), 1496-4279 (electronic)",
  ISSN-L =       "0008-414X",
  bibdate =      "Sat Feb 4 10:03:45 MST 2012",
  bibsource =    "http://cms.math.ca/cjm/v64/;
                 https://www.math.utah.edu/pub/tex/bib/canjmath2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "Let $E$ be an elliptic curve over $ \mathbb Q$ without
                 complex multiplication, and for each prime $p$ of good
                 reduction, let $ n_E(p) = | E(\mathbb F_p) |$. For any
                 integer $b$, we consider elliptic pseudoprimes to the
                 base $b$. More precisely, let $ Q_{E, b}(x)$ be the
                 number of primes $ p \leq x$ such that $ b^{n_E(p)}
                 \equiv b \, ({\rm mod} \, n_E(p))$, and let $ \pi_{E,
                 b}^{\operatorname {pseu}}(x)$ be the number of
                 compositive $ n_E(p)$ such that $ b^{n_E(p)} \equiv b
                 \, ({\rm mod} \, n_E(p))$ (also called elliptic curve
                 pseudoprimes). Motivated by cryptography applications,
                 we address the problem of finding upper bounds for $
                 Q_{E, b}(x)$ and $ \pi_{E, b}^{\operatorname
                 {pseu}}(x)$, generalising some of the literature for
                 the classical pseudoprimes to this new setting.",
  acknowledgement = ack-nhfb,
  fjournal =     "Canadian Journal of Mathematics = Journal canadien de
                 math{\'e}matiques",
  journal-URL =  "http://cms.math.ca/cjm/",
}

@Article{David:2012:UCO,
  author =       "Bernardo Machado David and Anderson C. A. Nascimento",
  title =        "Universally Composable Oblivious Transfer from Lossy
                 Encryption and the {McEliece} Assumptions",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7412",
  pages =        "80--99",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-32284-6_5",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:22:00 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012g.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-32284-6_5/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-32284-6",
  book-URL =     "http://www.springerlink.com/content/978-3-642-32284-6",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{delRey:2012:EDI,
  author =       "A. Mart{\'\i}n del Rey and G. Rodr{\'\i}guez
                 S{\'a}nchez and A. de la Villa Cuenca",
  title =        "Encrypting Digital Images Using Cellular Automata",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7209",
  pages =        "78--88",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-28931-6_8",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:26:21 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012c.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-28931-6_8/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-28931-6",
  book-URL =     "http://www.springerlink.com/content/978-3-642-28931-6",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Demme:2012:SCV,
  author =       "John Demme and Robert Martin and Adam Waksman and
                 Simha Sethumadhavan",
  title =        "Side-channel vulnerability factor: a metric for
                 measuring information leakage",
  journal =      j-COMP-ARCH-NEWS,
  volume =       "40",
  number =       "3",
  pages =        "106--117",
  month =        jun,
  year =         "2012",
  CODEN =        "CANED2",
  DOI =          "https://doi.org/10.1145/2366231.2337172",
  ISSN =         "0163-5964 (print), 1943-5851 (electronic)",
  ISSN-L =       "0163-5964",
  bibdate =      "Thu Sep 6 10:21:07 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  note =         "ISCA '12 conference proceedings.",
  abstract =     "There have been many attacks that exploit side-effects
                 of program execution to expose secret information and
                 many proposed countermeasures to protect against these
                 attacks. However there is currently no systematic,
                 holistic methodology for understanding information
                 leakage. As a result, it is not well known how design
                 decisions affect information leakage or the
                 vulnerability of systems to side-channel attacks. In
                 this paper, we propose a metric for measuring
                 information leakage called the Side-channel
                 Vulnerability Factor (SVF). SVF is based on our
                 observation that all side-channel attacks ranging from
                 physical to microarchitectural to software rely on
                 recognizing leaked execution patterns. SVF quantifies
                 patterns in attackers' observations and measures their
                 correlation to the victim's actual execution patterns
                 and in doing so captures systems' vulnerability to
                 side-channel attacks. In a detailed case study of
                 on-chip memory systems, SVF measurements help expose
                 unexpected vulnerabilities in whole-system designs and
                 shows how designers can make performance-security
                 trade-offs. Thus, SVF provides a quantitative approach
                 to secure computer architecture.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGARCH Computer Architecture News",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J89",
}

@Article{Deng:2012:VIA,
  author =       "Aidong Deng and Jianeng Tang and Li Zhao and Cairong
                 Zou",
  title =        "The variable-interval arithmetic coding using
                 asymptotic deterministic randomness for data
                 compression and encryption",
  journal =      j-J-STAT-COMPUT-SIMUL,
  volume =       "82",
  number =       "10",
  pages =        "1545--1555",
  year =         "2012",
  CODEN =        "JSCSAJ",
  DOI =          "https://doi.org/10.1080/00949655.2011.587423",
  ISSN =         "0094-9655 (print), 1026-7778 (electronic), 1563-5163",
  ISSN-L =       "0094-9655",
  bibdate =      "Tue Apr 22 09:13:07 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/datacompression.bib;
                 https://www.math.utah.edu/pub/tex/bib/jstatcomputsimul.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Statistical Computation and Simulation",
  journal-URL =  "http://www.tandfonline.com/loi/gscs20",
}

@Article{Diem:2012:UES,
  author =       "Claus Diem",
  title =        "On the use of expansion series for stream ciphers",
  journal =      j-LMS-J-COMPUT-MATH,
  volume =       "15",
  pages =        "326--340",
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1112/S146115701200109X",
  ISSN =         "1461-1570",
  bibdate =      "Mon Nov 5 05:57:20 MST 2012",
  bibsource =    "http://journals.cambridge.org/action/displayJournal?jid=JCM;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lms-j-comput-math.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "LMS J. Comput. Math.",
  fjournal =     "LMS Journal of Computation and Mathematics",
  journal-URL =  "http://journals.cambridge.org/action/displayJournal?jid=JCM",
  onlinedate =   "24 September 2012",
}

@Article{Ding:2012:CLS,
  author =       "Lin Ding and Jie Guan",
  title =        "Cryptanalysis of {Loiss} Stream Cipher",
  journal =      j-COMP-J,
  volume =       "55",
  number =       "10",
  pages =        "1192--1201",
  month =        oct,
  year =         "2012",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxs047",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Fri Oct 26 08:44:19 MDT 2012",
  bibsource =    "http://comjnl.oxfordjournals.org/content/55/10.toc;
                 https://www.math.utah.edu/pub/tex/bib/comp2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/55/10/1192.full.pdf+html",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "May 21, 2012",
}

@Article{Ding:2012:NRR,
  author =       "L. Ding and J. Guan and W.-l. Sun",
  title =        "New Results of Related-key Attacks on All {Py}-Family
                 of Stream Ciphers",
  journal =      j-J-UCS,
  volume =       "18",
  number =       "12",
  pages =        "1741--??",
  month =        "????",
  year =         "2012",
  CODEN =        "????",
  ISSN =         "0948-6968",
  ISSN-L =       "0948-6968",
  bibdate =      "Thu Nov 8 12:03:11 MST 2012",
  bibsource =    "http://www.jucs.org/jucs;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jucs.bib",
  URL =          "http://www.jucs.org/jucs_18_12/new_results_of_related",
  acknowledgement = ack-nhfb,
  fjournal =     "J.UCS: Journal of Universal Computer Science",
  journal-URL =  "http://www.jucs.org/jucs",
}

@Article{Diong:2012:DAU,
  author =       "Mouhamadou L. Diong and Patrick Bas and Chlo{\'e}
                 Pelle and Wadih Sawaya",
  title =        "Document Authentication Using {$2$D} Codes: Maximizing
                 the Decoding Performance Using Statistical Inference",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7394",
  pages =        "39--54",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-32805-3_4",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:21:38 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012f.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-32805-3_4/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-32805-3",
  book-URL =     "http://www.springerlink.com/content/978-3-642-32805-3",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Djebbar:2012:ASB,
  author =       "Fatiha Djebbar and Beghdad Ayad",
  title =        "Audio Steganalysis Based on Lossless Data-Compression
                 Techniques",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7618",
  pages =        "1--9",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-34129-8_1",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:25:56 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012k.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-34129-8_1/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-34129-8",
  book-URL =     "http://www.springerlink.com/content/978-3-642-34129-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Dodis:2012:MAR,
  author =       "Yevgeniy Dodis and Eike Kiltz and Krzysztof Pietrzak
                 and Daniel Wichs",
  title =        "Message Authentication, Revisited",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7237",
  pages =        "355--374",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-29011-4_21;
                 https://doi.org/10.1007/978-3-642-29011-4_22",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Dec 15 20:55:01 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs.bib",
  URL =          "http://link.springer.com/accesspage/chapter/10.1007/978-3-642-29011-4_21;
                 http://link.springer.com/chapter/10.1007/978-3-642-29011-4_22/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-29011-4",
  book-URL =     "http://www.springerlink.com/content/978-3-642-29011-4",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Dolev:2012:ATC,
  author =       "Shlomi Dolev and Marina Kopeetsky",
  title =        "Anonymous transactions in computer networks",
  journal =      j-TAAS,
  volume =       "7",
  number =       "2",
  pages =        "26:1--26:??",
  month =        jul,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2240166.2240176",
  ISSN =         "1556-4665 (print), 1556-4703 (electronic)",
  ISSN-L =       "1556-4665",
  bibdate =      "Tue Nov 6 19:20:32 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/taas.bib",
  abstract =     "We present schemes for providing anonymous
                 transactions while privacy and anonymity are preserved,
                 providing user's anonymous authentication in
                 distributed networks such as the Internet. We first
                 present a practical scheme for anonymous transactions
                 while the transaction resolution is assisted by a
                 Trusted Authority. This practical scheme is extended to
                 a theoretical scheme where a Trusted Authority is not
                 involved in the transaction resolution. Both schemes
                 assume that all the players interact over anonymous
                 secure channels. Given authority that generates for
                 each player hard to produce evidence EVID (e.g.,
                 problem instance with or without a solution) to each
                 player, the identity of a user U is defined by the
                 ability to prove possession of aforementioned evidence.
                 We use zero-knowledge proof techniques to repeatedly
                 identify U by providing a proof that U has evidence
                 EVID, without revealing EVID, therefore avoiding
                 identity theft. In both schemes the authority provides
                 each user with a unique random string. A player U may
                 produce a unique user name and password for each other
                 player S using a one-way function over the random
                 string and the IP address of S. The player does not
                 have to maintain any information in order to reproduce
                 the user name and password used for accessing a player
                 S. Moreover, the player U may execute transactions with
                 a group of players S$^U$ in two phases; in the first
                 phase the player interacts with each server without
                 revealing information concerning its identity and
                 without possibly identifying linkability among the
                 servers in S$^U$. In the second phase the player allows
                 linkability and therefore transaction commitment with
                 all servers in S$^U$, while preserving anonymity (for
                 future transactions).",
  acknowledgement = ack-nhfb,
  articleno =    "26",
  fjournal =     "ACM Transactions on Autonomous and Adaptive Systems
                 (TAAS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1010",
}

@Article{Domnitser:2012:NMC,
  author =       "Leonid Domnitser and Aamer Jaleel and Jason Loew and
                 Nael Abu-Ghazaleh and Dmitry Ponomarev",
  title =        "Non-monopolizable caches: Low-complexity mitigation of
                 cache side channel attacks",
  journal =      j-TACO,
  volume =       "8",
  number =       "4",
  pages =        "35:1--35:??",
  month =        jan,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2086696.2086714",
  ISSN =         "1544-3566 (print), 1544-3973 (electronic)",
  ISSN-L =       "1544-3566",
  bibdate =      "Sat Jan 21 07:49:49 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/taco.bib",
  abstract =     "We propose a flexibly-partitioned cache design that
                 either drastically weakens or completely eliminates
                 cache-based side channel attacks. The proposed
                 Non-Monopolizable (NoMo) cache dynamically reserves
                 cache lines for active threads and prevents other
                 co-executing threads from evicting reserved lines.
                 Unreserved lines remain available for dynamic sharing
                 among threads. NoMo requires only simple modifications
                 to the cache replacement logic, making it
                 straightforward to adopt. It requires no software
                 support enabling it to automatically protect
                 pre-existing binaries. NoMo results in performance
                 degradation of about 1\% on average. We demonstrate
                 that NoMo can provide strong security guarantees for
                 the AES and Blowfish encryption algorithms.",
  acknowledgement = ack-nhfb,
  articleno =    "35",
  fjournal =     "ACM Transactions on Architecture and Code Optimization
                 (TACO)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J924",
}

@Article{Dong:2012:KKD,
  author =       "Le Dong and Wenling Wu and Shuang Wu and Jian Zou",
  title =        "Known-Key Distinguisher on Round-Reduced {$3$D} Block
                 Cipher",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7115",
  pages =        "55--69",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-27890-7_5",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:24:29 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-27890-7_5/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-27890-7",
  book-URL =     "http://www.springerlink.com/content/978-3-642-27890-7",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Dong:2012:NCV,
  author =       "Deshuai Dong and Longjiang Qu and Shaojing Fu and Chao
                 Li",
  title =        "New Constructions of Vectorial {Boolean} Functions
                 with Good Cryptographic Properties",
  journal =      j-INT-J-FOUND-COMP-SCI,
  volume =       "23",
  number =       "3",
  pages =        "749--??",
  month =        apr,
  year =         "2012",
  CODEN =        "IFCSEN",
  DOI =          "https://doi.org/10.1142/S0129054112500086",
  ISSN =         "0129-0541 (print), 1793-6373 (electronic)",
  ISSN-L =       "0129-0541",
  bibdate =      "Sat Nov 3 13:16:05 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijfcs.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Foundations of Computer
                 Science (IJFCS)",
  journal-URL =  "http://www.worldscientific.com/loi/ijfcs",
}

@Article{Dong:2012:NDI,
  author =       "Huanhe Dong and Xiangrong Wang and Wencai Zhao",
  title =        "A new $4$-dimensional implicit vector-form loop
                 algebra with arbitrary constants and the corresponding
                 computing formula of constant $ \gamma $ in the
                 {Variation} identity",
  journal =      j-APPL-MATH-COMP,
  volume =       "218",
  number =       "22",
  pages =        "10998--11008",
  day =          "15",
  month =        jul,
  year =         "2012",
  CODEN =        "AMHCBQ",
  DOI =          "https://doi.org/10.1016/j.amc.2012.04.061",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Mon Jun 25 12:18:46 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/applmathcomput2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/00963003",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0096300312004602",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Dong:2012:UAS,
  author =       "Qi Dong and Donggang Liu",
  title =        "Using Auxiliary Sensors for Pairwise Key Establishment
                 in {WSN}",
  journal =      j-TECS,
  volume =       "11",
  number =       "3",
  pages =        "59:1--59:??",
  month =        sep,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2345770.2345771",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Mon Oct 22 10:44:19 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tecs.bib",
  abstract =     "Many techniques have been developed recently for
                 establishing pairwise keys in sensor networks. However,
                 some of them are vulnerable to a few compromised sensor
                 nodes, while others could involve expensive protocols
                 for establishing keys. This article introduces a much
                 better alternative that can achieve both high
                 resilience to node compromises and high efficiency in
                 key establishment. The main idea is to deploy a small
                 number of additional sensor nodes, called assisting
                 nodes, to help key establishment between sensor nodes.
                 The proposed approach has many advantages over existing
                 approaches. In particular, a sensor node only needs to
                 make a few local communications and perform a few
                 efficient hash operations to setup a key with any other
                 sensor node in the network at a very high probability.
                 The majority of sensor nodes only need to store a
                 single key. Besides, it also provides high resilience
                 to node compromises. The theoretical analysis,
                 simulation studies, and experiments on TelosB sensor
                 motes also demonstrate the advantages of this key
                 establishment protocol in sensor networks.",
  acknowledgement = ack-nhfb,
  articleno =    "59",
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?&idx=J840",
}

@Article{Dorn:2012:ECE,
  author =       "Michael Dorn and Peter Wackersreuther and Christian
                 B{\"o}hm",
  title =        "Efficient Comparison of Encrypted Biometric
                 Templates",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7449",
  pages =        "129--142",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-32287-7_11",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:22:50 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012g.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-32287-7_11/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-32287-7",
  book-URL =     "http://www.springerlink.com/content/978-3-642-32287-7",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Doss:2012:MDA,
  author =       "Robin Doss and Wanlei Zhou and Saravanan Sundaresan
                 and Shui Yu and Longxiang Gao",
  title =        "A minimum disclosure approach to authentication and
                 privacy in {RFID} systems",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "56",
  number =       "15",
  pages =        "3401--3416",
  day =          "15",
  month =        oct,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1016/j.comnet.2012.06.018",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Thu Sep 6 10:36:22 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/13891286",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1389128612002447",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286",
}

@Article{Drosou:2012:SAH,
  author =       "Anastasios Drosou and Dimosthenis Ioannidis and
                 Konstantinos Moustakas and Dimitrios Tzovaras",
  title =        "Spatiotemporal analysis of human activities for
                 biometric authentication",
  journal =      j-COMP-VIS-IMAGE-UNDERSTANDING,
  volume =       "116",
  number =       "3",
  pages =        "411--421",
  month =        mar,
  year =         "2012",
  CODEN =        "CVIUF4",
  DOI =          "https://doi.org/10.1016/j.cviu.2011.08.009",
  ISSN =         "1077-3142 (print), 1090-235X (electronic)",
  ISSN-L =       "1077-3142",
  bibdate =      "Wed Mar 7 19:09:52 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cvgip.bib;
                 http://www.sciencedirect.com/science/journal/10773142",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1077314211002098",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Vision and Image Understanding: CVIU",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10773142",
}

@Article{Duncan:2012:CAI,
  author =       "Christian A. Duncan and Vir V. Phoha",
  title =        "On the Complexity of Aggregating Information for
                 Authentication and Profiling",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7122",
  pages =        "58--71",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-28879-1_5",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:24:36 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-28879-1_5/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-28879-1",
  book-URL =     "http://www.springerlink.com/content/978-3-642-28879-1",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Dunkelman:2012:MCE,
  author =       "Orr Dunkelman and Nathan Keller and Adi Shamir",
  title =        "Minimalism in Cryptography: The {Even--Mansour} Scheme
                 Revisited",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7237",
  pages =        "336--354",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-29011-4_20;
                 https://doi.org/10.1007/978-3-642-29011-4_21",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Dec 15 20:55:01 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs.bib",
  URL =          "http://link.springer.com/accesspage/chapter/10.1007/978-3-642-29011-4_20;
                 http://link.springer.com/chapter/10.1007/978-3-642-29011-4_21/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-29011-4",
  book-URL =     "http://www.springerlink.com/content/978-3-642-29011-4",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Dunkelman:2012:MEK,
  author =       "Orr Dunkelman",
  title =        "From Multiple Encryption to Knapsacks --- Efficient
                 Dissection of Composite Problems",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7668",
  pages =        "16--16",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-34931-7_2",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:18:33 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012l.bib",
  URL =          "http://link.springer.com/accesspage/chapter/10.1007/978-3-642-34931-7_2",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-34931-7",
  book-URL =     "http://www.springerlink.com/content/978-3-642-34931-7",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Eisenbarth:2012:CIP,
  author =       "Thomas Eisenbarth and Zheng Gong and Tim G{\"u}neysu
                 and Stefan Heyse and Sebastiaan Indesteege",
  title =        "Compact Implementation and Performance Evaluation of
                 Block Ciphers in {ATtiny} Devices",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7374",
  pages =        "172--187",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-31410-0_11",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:21:11 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012f.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-31410-0_11/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-31410-0",
  book-URL =     "http://www.springerlink.com/content/978-3-642-31410-0",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Ekberg:2012:AEP,
  author =       "Jan-Erik Ekberg and Alexandra Afanasyeva and N.
                 Asokan",
  title =        "Authenticated Encryption Primitives for
                 Size-Constrained Trusted Computing",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7344",
  pages =        "1--18",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-30921-2_1",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:20:31 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012e.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-30921-2_1/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-30921-2",
  book-URL =     "http://www.springerlink.com/content/978-3-642-30921-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{ElBansarkhani:2012:ELB,
  author =       "Rachid {El Bansarkhani} and Mohammed Meziani",
  title =        "An Efficient Lattice-Based Secret Sharing
                 Construction",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7322",
  pages =        "160--168",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-30955-7_14",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:20:02 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012e.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-30955-7_14/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-30955-7",
  book-URL =     "http://www.springerlink.com/content/978-3-642-30955-7",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Engels:2012:HLA,
  author =       "Daniel Engels and Markku-Juhani O. Saarinen and Peter
                 Schweitzer",
  title =        "The {Hummingbird-$2$} Lightweight Authenticated
                 Encryption Algorithm",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7055",
  pages =        "19--31",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-25286-0_2",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:23:19 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-25286-0_2/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-25286-0",
  book-URL =     "http://www.springerlink.com/content/978-3-642-25286-0",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Erguler:2012:PAI,
  author =       "Imran Erguler and Emin Anarim",
  title =        "Practical attacks and improvements to an efficient
                 radio frequency identification authentication
                 protocol",
  journal =      j-CCPE,
  volume =       "24",
  number =       "17",
  pages =        "2069--2080",
  day =          "10",
  month =        dec,
  year =         "2012",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.1838",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Mon Nov 5 07:44:57 MST 2012",
  bibsource =    "http://www.interscience.wiley.com/jpages/1532-0626;
                 https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "2 Oct 2011",
}

@Article{Everett:2012:EC,
  author =       "Bernard Everett",
  title =        "The encryption conundrum",
  journal =      j-NETWORK-SECURITY,
  volume =       "2012",
  number =       "4",
  pages =        "15--18",
  month =        apr,
  year =         "2012",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(12)70027-2",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 17:00:41 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485812700272",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@InProceedings{Fahl:2012:WEM,
  author =       "Sascha Fahl and Marian Harbach and Thomas Muders and
                 Lars Baumg{\"a}rtner and Bernd Freisleben and Matthew
                 Smith",
  editor =       "????",
  booktitle =    "{ACM Conference on Computer and Communications
                 Security}",
  title =        "Why {Eve} and {Mallory} love {Android}: An analysis of
                 {Android SSL} (in)security",
  publisher =    pub-ACM,
  address =      pub-ACM:adr,
  pages =        "50--61",
  year =         "2012",
  DOI =          "????",
  ISBN =         "????",
  ISBN-13 =      "????",
  LCCN =         "????",
  bibdate =      "Mon Mar 09 11:59:36 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "????",
  acknowledgement = ack-nhfb,
  remark =       "Cite in \cite[reference ]{Schneier:2015:SWC}.",
}

@Article{Fang:2012:CCS,
  author =       "Liming Fang and Willy Susilo and Chunpeng Ge and
                 Jiandong Wang",
  title =        "Chosen-ciphertext secure anonymous conditional proxy
                 re-encryption with keyword search",
  journal =      j-THEOR-COMP-SCI,
  volume =       "462",
  number =       "1",
  pages =        "39--58",
  day =          "30",
  month =        nov,
  year =         "2012",
  CODEN =        "TCSCDI",
  DOI =          "https://doi.org/10.1016/j.tcs.2012.08.017",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Wed Oct 24 08:35:00 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2010.bib;
                 http://www.sciencedirect.com/science/journal/03043975",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0304397512007906",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{Fanyang:2012:SAK,
  author =       "Fanyang and Naixue Xiong and Jong Hyuk Park",
  title =        "A self-adaptive {$K$} selection mechanism for
                 re-authentication load balancing in large-scale
                 systems",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "61",
  number =       "1",
  pages =        "166--188",
  month =        jul,
  year =         "2012",
  CODEN =        "JOSUED",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Fri Oct 26 07:41:32 MDT 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0920-8542&volume=61&issue=1;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0920-8542&volume=61&issue=1&spage=166",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Article{Farras:2012:LTM,
  author =       "Oriol Farr{\`a}s and Ignacio Gracia and Sebasti{\`a}
                 Mart{\'\i}n and Carles Padr{\'o}",
  title =        "Linear threshold multisecret sharing schemes",
  journal =      j-INFO-PROC-LETT,
  volume =       "112",
  number =       "17--18",
  pages =        "667--673",
  day =          "30",
  month =        sep,
  year =         "2012",
  CODEN =        "IFPLAT",
  DOI =          "https://doi.org/10.1016/j.ipl.2012.05.008",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Fri Jul 6 11:52:37 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019012001378",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Faust:2012:PLR,
  author =       "Sebastian Faust and Krzysztof Pietrzak and Joachim
                 Schipper",
  title =        "Practical Leakage-Resilient Symmetric Cryptography",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7428",
  pages =        "213--232",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-33027-8_13",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:22:21 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012g.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-33027-8_13/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-33027-8",
  book-URL =     "http://www.springerlink.com/content/978-3-642-33027-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Fei:2012:GTK,
  author =       "Han Fei and Qin Jing and Zhao Huawei and Hu Jiankun",
  title =        "A General Transformation from {KP-ABE} to Searchable
                 Encryption",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7672",
  pages =        "165--178",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-35362-8_14",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:18:38 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012l.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-35362-8_14/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-35362-8",
  book-URL =     "http://www.springerlink.com/content/978-3-642-35362-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Feng:2012:CAO,
  author =       "Hui Feng and Hefei Ling and Fuhao Zou and Weiqi Yan
                 and Zhengding Lu",
  title =        "A collusion attack optimization strategy for digital
                 fingerprinting",
  journal =      j-TOMCCAP,
  volume =       "8",
  number =       "2S",
  pages =        "36:1--36:??",
  month =        sep,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2344436.2344442",
  ISSN =         "1551-6857 (print), 1551-6865 (electronic)",
  ISSN-L =       "1551-6857",
  bibdate =      "Tue Nov 6 18:13:05 MST 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tomccap/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tomccap.bib",
  abstract =     "Collusion attack is a cost-efficient attack for
                 digital fingerprinting. In this article, we propose a
                 novel collusion attack strategy, Iterative Optimization
                 Collusion Attack (IOCA), which is based upon the
                 gradient attack and the principle of informed watermark
                 embedding. We evaluate the performance of the proposed
                 collusion attack strategy in defeating four typical
                 fingerprinting schemes under a well-constructed
                 evaluation framework. The simulation results show that
                 the proposed strategy performs more effectively than
                 the gradient attack, and adopting no more than three
                 fingerprinted copies can sufficiently collapse examined
                 fingerprinting schemes. Meanwhile, the content resulted
                 from the proposed attack still preserves high
                 perceptual quality.",
  acknowledgement = ack-nhfb,
  articleno =    "36",
  fjournal =     "ACM Transactions on Multimedia Computing,
                 Communications, and Applications",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J961",
}

@Article{Feng:2012:USD,
  author =       "XiaoXiao Feng and Koichi Matsumoto and Shigeo
                 Sugimoto",
  title =        "Uncovering the Secrets of {Daoism} {{\em Fus}} Using
                 Digital {Dao-Fa Hui-Yuan}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7634",
  pages =        "1--10",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-34752-8_1",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:26:16 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012k.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-34752-8_1/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-34752-8",
  book-URL =     "http://www.springerlink.com/content/978-3-642-34752-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Fernandez-Mir:2012:SRA,
  author =       "Albert Fern{\`a}ndez-Mir and Rolando Trujillo-Rasua",
  title =        "A Scalable {RFID} Authentication Protocol Supporting
                 Ownership Transfer and Controlled Delegation",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7055",
  pages =        "147--162",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-25286-0_10",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:23:19 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-25286-0_10/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-25286-0",
  book-URL =     "http://www.springerlink.com/content/978-3-642-25286-0",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Fleischmann:2012:MFA,
  author =       "Ewan Fleischmann and Christian Forler and Stefan
                 Lucks",
  title =        "{McOE}: a Family of Almost Foolproof On-Line
                 Authenticated Encryption Schemes",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7549",
  pages =        "196--215",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-34047-5_12",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:24:44 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012i.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-34047-5_12/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-34047-5",
  book-URL =     "http://www.springerlink.com/content/978-3-642-34047-5",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Fokkink:2012:TCG,
  author =       "Robbert Fokkink",
  title =        "Tossing Coins to Guess a Secret Number",
  journal =      j-AMER-MATH-MONTHLY,
  volume =       "119",
  number =       "4",
  pages =        "337--339",
  month =        apr,
  year =         "2012",
  CODEN =        "AMMYAE",
  DOI =          "https://doi.org/10.4169/amer.math.monthly.119.04.337",
  ISSN =         "0002-9890 (print), 1930-0972 (electronic)",
  ISSN-L =       "0002-9890",
  bibdate =      "Thu Nov 8 07:34:14 MST 2012",
  bibsource =    "http://www.jstor.org/journals/00029890.html;
                 http://www.jstor.org/stable/10.4169/amermathmont.119.issue-4;
                 https://www.math.utah.edu/pub/tex/bib/amermathmonthly2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.jstor.org/stable/pdfplus/10.4169/amer.math.monthly.119.04.337.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "American Mathematical Monthly",
  journal-URL =  "https://www.jstor.org/journals/00029890.htm",
}

@Article{Forler:2012:DAC,
  author =       "Christian Forler and Stefan Lucks and Jakob Wenzel",
  title =        "Designing the {API} for a Cryptographic Library",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7308",
  pages =        "75--88",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-30598-6_6",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:19:45 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012e.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-30598-6_6/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-30598-6",
  book-URL =     "http://www.springerlink.com/content/978-3-642-30598-6",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Fraczek:2012:MSI,
  author =       "W. Fraczek and W. Mazurczyk and K. Szczypiorski",
  title =        "Multilevel Steganography: Improving Hidden
                 Communication in Networks",
  journal =      j-J-UCS,
  volume =       "18",
  number =       "14",
  pages =        "1967--??",
  month =        "????",
  year =         "2012",
  CODEN =        "????",
  ISSN =         "0948-6968",
  ISSN-L =       "0948-6968",
  bibdate =      "Thu Nov 8 12:03:13 MST 2012",
  bibsource =    "http://www.jucs.org/jucs;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jucs.bib",
  URL =          "http://www.jucs.org/jucs_18_14/multilevel_steganography_improving_hidden",
  acknowledgement = ack-nhfb,
  fjournal =     "J.UCS: Journal of Universal Computer Science",
  journal-URL =  "http://www.jucs.org/jucs",
}

@Article{Fridrich:2012:MTS,
  author =       "Jessica Fridrich",
  title =        "Modern Trends in Steganography and Steganalysis",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7128",
  pages =        "1--1",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-32205-1_1",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:24:41 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012b.bib",
  URL =          "http://link.springer.com/accesspage/chapter/10.1007/978-3-642-32205-1_1",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-32205-1",
  book-URL =     "http://www.springerlink.com/content/978-3-642-32205-1",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Fu:2012:EHA,
  author =       "Anmin Fu and Yuqing Zhang and Zhenchao Zhu and Qi Jing
                 and Jingyu Feng",
  title =        "An efficient handover authentication scheme with
                 privacy preservation for {IEEE} 802.16m network",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "6",
  pages =        "741--749",
  month =        sep,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:29 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812001009",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Fujioka:2012:SEI,
  author =       "Atsushi Fujioka and Taiichi Saito and Keita Xagawa",
  title =        "Security Enhancement of Identity-Based Identification
                 with Reversibility",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7618",
  pages =        "202--213",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-34129-8_18",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:25:56 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012k.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-34129-8_18/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-34129-8",
  book-URL =     "http://www.springerlink.com/content/978-3-642-34129-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Fujioka:2012:SEP,
  author =       "Atsushi Fujioka and Taiichi Saito and Keita Xagawa",
  title =        "Security Enhancements by {OR}-Proof in Identity-Based
                 Identification",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7341",
  pages =        "135--152",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-31284-7_9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:20:27 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012e.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-31284-7_9/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-31284-7",
  book-URL =     "http://www.springerlink.com/content/978-3-642-31284-7",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Fujioka:2012:SHI,
  author =       "Atsushi Fujioka and Taiichi Saito and Keita Xagawa",
  title =        "Secure Hierarchical Identity-Based Identification
                 without Random Oracles",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7483",
  pages =        "258--273",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-33383-5_16",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:23:33 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012h.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-33383-5_16/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-33383-5",
  book-URL =     "http://www.springerlink.com/content/978-3-642-33383-5",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Gagne:2012:AVB,
  author =       "Martin Gagn{\'e} and Pascal Lafourcade and Yassine
                 Lakhnech and Reihaneh Safavi-Naini",
  title =        "Automated Verification of Block Cipher Modes of
                 Operation, an Improved Method",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6888",
  pages =        "23--31",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-27901-0_3",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:19:37 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-27901-0_3/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-27901-0",
  book-URL =     "http://www.springerlink.com/content/978-3-642-27901-0",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Gao:2012:DES,
  author =       "Chong-zhi Gao and Dongqing Xie and Baodian Wei",
  title =        "Deniable Encryptions Secure against Adaptive Chosen
                 Ciphertext Attack",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7232",
  pages =        "46--62",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-29101-2_4",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:18:09 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012c.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-29101-2_4/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-29101-2",
  book-URL =     "http://www.springerlink.com/content/978-3-642-29101-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Gao:2012:RHC,
  author =       "Xifeng Gao and Caiming Zhang and Yan Huang and Zhigang
                 Deng",
  title =        "A robust high-capacity affine-transformation-invariant
                 scheme for watermarking {$3$D} geometric models",
  journal =      j-TOMCCAP,
  volume =       "8",
  number =       "2S",
  pages =        "34:1--34:??",
  month =        sep,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2344436.2344440",
  ISSN =         "1551-6857 (print), 1551-6865 (electronic)",
  ISSN-L =       "1551-6857",
  bibdate =      "Tue Nov 6 18:13:05 MST 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tomccap/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tomccap.bib",
  abstract =     "In this article we propose a novel, robust, and
                 high-capacity watermarking method for 3D meshes with
                 arbitrary connectivities in the spatial domain based on
                 affine invariants. Given a 3D mesh model, a watermark
                 is embedded as affine-invariant length ratios of one
                 diagonal segment to the residing diagonal intersected
                 by the other one in a coplanar convex quadrilateral. In
                 the extraction process, a watermark is recovered by
                 combining all the watermark pieces embedded in length
                 ratios through majority voting. Extensive experimental
                 results demonstrate the robustness, high computational
                 efficiency, high capacity, and
                 affine-transformation-invariant characteristics of the
                 proposed approach.",
  acknowledgement = ack-nhfb,
  articleno =    "34",
  fjournal =     "ACM Transactions on Multimedia Computing,
                 Communications, and Applications",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J961",
}

@Article{Garcia:2012:ERP,
  author =       "Sergio Sanchez Garcia and Ana Gomez Oliva and Emilia
                 Perez-Belleboni",
  title =        "Is {Europe} Ready for a Pan-{European} Identity
                 Management System?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "4",
  pages =        "44--49",
  month =        jul # "\slash " # aug,
  year =         "2012",
  DOI =          "https://doi.org/10.1109/MSP.2012.58",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 29 17:25:32 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
}

@Article{Gaspar:2012:SEF,
  author =       "Lubos Gaspar and Viktor Fischer and Lilian Bossuet and
                 Robert Fouquet",
  title =        "Secure Extension of {FPGA} General Purpose Processors
                 for Symmetric Key Cryptography with Partial
                 Reconfiguration Capabilities",
  journal =      j-TRETS,
  volume =       "5",
  number =       "3",
  pages =        "16:1--16:??",
  month =        oct,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2362374.2362380",
  ISSN =         "1936-7406 (print), 1936-7414 (electronic)",
  ISSN-L =       "1936-7406",
  bibdate =      "Tue Nov 6 18:07:44 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/trets.bib",
  abstract =     "In data security systems, general purpose processors
                 (GPPs) are often extended by a cryptographic
                 accelerator. The article presents three ways of
                 extending GPPs for symmetric key cryptography
                 applications. Proposed extensions guarantee secure key
                 storage and management even if the system is facing
                 protocol, software and cache memory attacks. The system
                 is partitioned into processor, cipher, and key memory
                 zones. The three security zones are separated at
                 protocol, system, architecture and physical levels. The
                 proposed principle was validated on Altera NIOS II,
                 Xilinx MicroBlaze and Microsemi Cortex M1 soft-core
                 processor extensions. We show that stringent separation
                 of the cipher zone is helpful for partial
                 reconfiguration of the security module, if the
                 enciphering algorithm needs to be dynamically changed.
                 However, the key zone including reconfiguration
                 controller must remain static in order to maintain the
                 high level of security required. We demonstrate that
                 the principle is feasible in partially reconfigurable
                 field programmable gate arrays (FPGAs) such as Altera
                 Stratix V or Xilinx Virtex 6 and also to some extent in
                 FPGAs featuring hardwired general purpose processors
                 such as Cortex M3 in Microsemi SmartFusion FPGA.
                 Although the three GPPs feature different data
                 interfaces, we show that the processors with their
                 extensions reach the required high security level while
                 maintaining partial reconfiguration capability.",
  acknowledgement = ack-nhfb,
  articleno =    "16",
  fjournal =     "ACM Transactions on Reconfigurable Technology and
                 Systems (TRETS)",
  journal-URL =  "http://portal.acm.org/toc.cfm?id=J1151",
}

@Article{Gazi:2012:EOS,
  author =       "Peter Ga{\v{z}}i and Stefano Tessaro",
  title =        "Efficient and Optimally Secure Key-Length Extension
                 for Block Ciphers via Randomized Cascading",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7237",
  pages =        "63--80",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-29011-4_6",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Dec 15 20:55:01 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-29011-4_6/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-29011-4",
  book-URL =     "http://www.springerlink.com/content/978-3-642-29011-4",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Gentry:2012:FHE,
  author =       "Craig Gentry and Shai Halevi and Nigel P. Smart",
  title =        "Fully Homomorphic Encryption with Polylog Overhead",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7237",
  pages =        "465--482",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-29011-4_27;
                 https://doi.org/10.1007/978-3-642-29011-4_28",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Dec 15 20:55:01 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs.bib",
  URL =          "http://link.springer.com/accesspage/chapter/10.1007/978-3-642-29011-4_27;
                 http://link.springer.com/chapter/10.1007/978-3-642-29011-4_28/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-29011-4",
  book-URL =     "http://www.springerlink.com/content/978-3-642-29011-4",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Gentry:2012:RSB,
  author =       "Craig Gentry and Shai Halevi and Chris Peikert and
                 Nigel P. Smart",
  title =        "Ring Switching in {BGV}-Style Homomorphic Encryption",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7485",
  pages =        "19--37",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-32928-9_2",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:23:35 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012h.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-32928-9_2/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-32928-9",
  book-URL =     "http://www.springerlink.com/content/978-3-642-32928-9",
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Georgiev:2012:MDC,
  author =       "Martin Georgiev and Subodh Iyengar and Suman Jana and
                 Rishita Anubhai and Dan Boneh and Vitaly Shmatikov",
  editor =       "????",
  booktitle =    "{ACM Conference on Computer and Communications
                 Security}",
  title =        "The most dangerous code in the world: Validating {SSL}
                 certificates in non-browser software",
  publisher =    pub-ACM,
  address =      pub-ACM:adr,
  pages =        "??--??",
  year =         "2012",
  DOI =          "????",
  ISBN =         "????",
  ISBN-13 =      "????",
  LCCN =         "????",
  bibdate =      "Mon Mar 09 12:03:58 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "????",
  acknowledgement = ack-nhfb,
  remark =       "Cite in \cite[reference 38]{Schneier:2015:SWC}.",
}

@Article{Gibson-Robinson:2012:AAL,
  author =       "Thomas Gibson-Robinson and Gavin Lowe",
  title =        "Analysing Applications Layered on Unilaterally
                 Authenticating Protocols",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7140",
  pages =        "164--181",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-29420-4_11",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:24:55 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012b.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-29420-4_11/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-29420-4",
  book-URL =     "http://www.springerlink.com/content/978-3-642-29420-4",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Gierlichs:2012:ICD,
  author =       "Benedikt Gierlichs and J{\"o}rn-Marc Schmidt and
                 Michael Tunstall",
  title =        "Infective Computation and Dummy Rounds: Fault
                 Protection for Block Ciphers without
                 Check-before-Output",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7533",
  pages =        "305--321",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-33481-8_17",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:24:28 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012i.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-33481-8_17/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-33481-8",
  book-URL =     "http://www.springerlink.com/content/978-3-642-33481-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Gligor:2012:SLT,
  author =       "Virgil Gligor",
  title =        "Street-Level Trust Semantics for Attribute
                 Authentication (Transcript of Discussion)",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7622",
  pages =        "116--125",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-35694-0_13",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:26:01 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012k.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-35694-0_13/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-35694-0",
  book-URL =     "http://www.springerlink.com/content/978-3-642-35694-0",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Godor:2012:HBM,
  author =       "Gy{\H{o}}z{\H{o}} G{\'o}dor and S{\'a}ndor Imre",
  title =        "Hash-Based Mutual Authentication Protocol for Low-Cost
                 {RFID} Systems",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7479",
  pages =        "76--87",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-32808-4_8",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:23:28 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012h.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-32808-4_8/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-32808-4",
  book-URL =     "http://www.springerlink.com/content/978-3-642-32808-4",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Gong:2012:KNF,
  author =       "Zheng Gong and Svetla Nikova and Yee Wei Law",
  title =        "{KLEIN}: a New Family of Lightweight Block Ciphers",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7055",
  pages =        "1--18",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-25286-0_1",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:23:19 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-25286-0_1/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-25286-0",
  book-URL =     "http://www.springerlink.com/content/978-3-642-25286-0",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Gonzalez-Pardo:2012:CID,
  author =       "Antonio Gonz{\'a}lez-Pardo and Pablo Varona and David
                 Camacho and Francisco de Borja Rodriguez Ortiz",
  title =        "Communication by identity discrimination in
                 bio-inspired multi-agent systems",
  journal =      j-CCPE,
  volume =       "24",
  number =       "6",
  pages =        "589--603",
  month =        "????",
  year =         "2012",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.1866",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Wed Apr 4 09:18:01 MDT 2012",
  bibsource =    "http://www.interscience.wiley.com/jpages/1532-0626;
                 https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Prac\-tice and
                 Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "12 Oct 2011",
}

@Misc{Goodin:2012:CBS,
  author =       "Dan Goodin",
  title =        "Crypto breakthrough shows {Flame} was designed by
                 world-class scientists: The spy malware achieved an
                 attack unlike any cryptographers have seen before",
  howpublished = "Web document.",
  day =          "7",
  month =        jun,
  year =         "2012",
  bibdate =      "Fri Sep 19 11:38:24 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://arstechnica.com/security/2012/06/flame-crypto-breakthrough/",
  acknowledgement = ack-nhfb,
  remark =       "The article describes how a chosen plaintext combined
                 with a forced collision on the MD5 checksum algorithm
                 was used to create fraudulent digital signatures that
                 allowed the attackers to inject hostile malware into
                 the Microsoft Windows update system.",
}

@Article{Goodrich:2012:EVW,
  author =       "Michael T. Goodrich and Charalampos Papamanthou and
                 Duy Nguyen and Roberto Tamassia and Cristina Videira
                 Lopes and Olga Ohrimenko and Nikos Triandopoulos",
  title =        "Efficient verification of web-content searching
                 through authenticated web crawlers",
  journal =      j-PROC-VLDB-ENDOWMENT,
  volume =       "5",
  number =       "10",
  pages =        "920--931",
  month =        jun,
  year =         "2012",
  CODEN =        "????",
  ISSN =         "2150-8097",
  bibdate =      "Tue Nov 6 16:43:13 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/vldbe.bib",
  abstract =     "We consider the problem of verifying the correctness
                 and completeness of the result of a keyword search. We
                 introduce the concept of an authenticated web crawler
                 and present its design and prototype implementation. An
                 authenticated web crawler is a trusted program that
                 computes a specially-crafted signature over the web
                 contents it visits. This signature enables (i) the
                 verification of common Internet queries on web pages,
                 such as conjunctive keyword searches---this guarantees
                 that the output of a conjunctive keyword search is
                 correct and complete; (ii) the verification of the
                 content returned by such Internet queries---this
                 guarantees that web data is authentic and has not been
                 maliciously altered since the computation of the
                 signature by the crawler. In our solution, the search
                 engine returns a cryptographic proof of the query
                 result. Both the proof size and the verification time
                 are proportional only to the sizes of the query
                 description and the query result, but do not depend on
                 the number or sizes of the web pages over which the
                 search is performed. As we experimentally demonstrate,
                 the prototype implementation of our system provides a
                 low communication overhead between the search engine
                 and the user, and fast verification of the returned
                 results by the user.",
  acknowledgement = ack-nhfb,
  fjournal =     "Proceedings of the VLDB Endowment",
}

@Article{Gorawski:2012:EAS,
  author =       "Marcin Gorawski and Michal Lorek and Michal Gorawski",
  title =        "Encrypted Adaptive Storage Model --- Analysis and
                 Performance Tests",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7449",
  pages =        "118--128",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-32287-7_10",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:22:50 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012g.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-32287-7_10/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-32287-7",
  book-URL =     "http://www.springerlink.com/content/978-3-642-32287-7",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Gorbunov:2012:FEB,
  author =       "Sergey Gorbunov and Vinod Vaikuntanathan and Hoeteck
                 Wee",
  title =        "Functional Encryption with Bounded Collusions via
                 Multi-party Computation",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7417",
  pages =        "162--179",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-32009-5_11",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:22:07 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012g.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-32009-5_11/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-32009-5",
  book-URL =     "http://www.springerlink.com/content/978-3-642-32009-5",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Gouvea:2012:HSI,
  author =       "Conrado P. L. Gouv{\^e}a and Julio L{\'o}pez",
  title =        "High Speed Implementation of Authenticated Encryption
                 for the {MSP430X} Microcontroller",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7533",
  pages =        "288--304",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-33481-8_16",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:24:28 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012i.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-33481-8_16/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-33481-8",
  book-URL =     "http://www.springerlink.com/content/978-3-642-33481-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Grossschadl:2012:EJI,
  author =       "Johann Gro{\ss}sch{\"a}dl and Dan Page and Stefan
                 Tillich",
  title =        "Efficient {Java} Implementation of Elliptic Curve
                 Cryptography for {J2ME}-Enabled Mobile Devices",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7322",
  pages =        "189--207",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-30955-7_17",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:20:02 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012e.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-30955-7_17/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-30955-7",
  book-URL =     "http://www.springerlink.com/content/978-3-642-30955-7",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Groth:2012:NTN,
  author =       "Jens Groth and Rafail Ostrovsky and Amit Sahai",
  title =        "New Techniques for Noninteractive Zero-Knowledge",
  journal =      j-J-ACM,
  volume =       "59",
  number =       "3",
  pages =        "11:1--11:??",
  month =        jun,
  year =         "2012",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/2220357.2220358",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Mon Jul 9 16:30:52 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Noninteractive zero-knowledge (NIZK) proof systems are
                 fundamental primitives used in many cryptographic
                 constructions, including public-key encryption secure
                 against chosen ciphertext attack, digital signatures,
                 and various other cryptographic protocols. We introduce
                 new techniques for constructing NIZK proofs based on
                 groups with a bilinear map. Compared to previous
                 constructions of NIZK proofs, our techniques yield
                 dramatic reduction in the length of the common
                 reference string (proportional to security parameter)
                 and the size of the proofs (proportional to security
                 parameter times the circuit size). Our novel techniques
                 allow us to answer several long-standing open questions
                 in the theory of noninteractive proofs. We construct
                 the first perfect NIZK argument system for all NP. We
                 construct the first universally composable NIZK
                 argument for all NP in the presence of an adaptive
                 adversary. We construct a non-interactive zap for all
                 NP, which is the first that is based on a standard
                 cryptographic security assumption.",
  acknowledgement = ack-nhfb,
  articleno =    "11",
  fjournal =     "Journal of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J401",
}

@Article{Guo:2012:AKE,
  author =       "Yanfei Guo and Zhenfeng Zhang",
  title =        "Authenticated Key Exchange with Entities from
                 Different Settings and Varied Groups",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7496",
  pages =        "276--287",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-33272-2_18",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:23:50 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012h.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-33272-2_18/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-33272-2",
  book-URL =     "http://www.springerlink.com/content/978-3-642-33272-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Guo:2012:EBP,
  author =       "Lifeng Guo and Lei Hu",
  title =        "Efficient bidirectional proxy re-encryption with
                 direct chosen-ciphertext security",
  journal =      j-COMPUT-MATH-APPL,
  volume =       "63",
  number =       "1",
  pages =        "151--157",
  month =        jan,
  year =         "2012",
  CODEN =        "CMAPDK",
  ISSN =         "0898-1221 (print), 1873-7668 (electronic)",
  ISSN-L =       "0898-1221",
  bibdate =      "Wed Mar 1 21:51:03 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computmathappl2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0898122111009680",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers and Mathematics with Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/08981221",
}

@Article{Guo:2012:ETD,
  author =       "Teng Guo and Feng Liu and ChuanKun Wu",
  title =        "On the Equivalence of Two Definitions of Visual
                 Cryptography Scheme",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7232",
  pages =        "217--227",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-29101-2_15",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:18:09 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012c.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-29101-2_15/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-29101-2",
  book-URL =     "http://www.springerlink.com/content/978-3-642-29101-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Gupta:2012:CDF,
  author =       "Swati Gupta and Seongho Cho and C.-C. Jay Kuo",
  title =        "Current Developments and Future Trends in Audio
                 Authentication",
  journal =      j-IEEE-MULTIMEDIA,
  volume =       "19",
  number =       "1",
  pages =        "50--59",
  month =        jan # "\slash " # mar,
  year =         "2012",
  CODEN =        "IEMUE4",
  DOI =          "https://doi.org/10.1109/MMUL.2011.74",
  ISSN =         "1070-986X (print), 1941-0166 (electronic)",
  ISSN-L =       "1070-986X",
  bibdate =      "Thu Mar 1 14:21:05 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeemultimedia.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE MultiMedia",
}

@Article{Hamamreh:2012:RPA,
  author =       "Rushdi Hamamreh",
  title =        "Routing path authentication in link-state routing
                 protocols",
  journal =      j-NETWORK-SECURITY,
  volume =       "2012",
  number =       "5",
  pages =        "14--20",
  month =        may,
  year =         "2012",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(12)70037-5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 17:00:42 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485812700375",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Han:2012:ERI,
  author =       "Qi Han and Yinghui Zhang and Xiaofeng Chen and Hui Li
                 and Jiaxiang Quan",
  title =        "Efficient and Robust Identity-Based Handoff
                 Authentication in Wireless Networks",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7645",
  pages =        "180--191",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-34601-9_14",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:17:59 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012k.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-34601-9_14/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-34601-9",
  book-URL =     "http://www.springerlink.com/content/978-3-642-34601-9",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Han:2012:MIA,
  author =       "Fengling Han and Ron van Schyndel",
  title =        "{M}-Identity and Its Authentication Protocol for
                 Secure Mobile Commerce Applications",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7672",
  pages =        "1--10",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-35362-8_1",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:18:38 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012l.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-35362-8_1/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-35362-8",
  book-URL =     "http://www.springerlink.com/content/978-3-642-35362-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Han:2012:PPD,
  author =       "Jinguang Han and Willy Susilo and Yi Mu and Jun Yan",
  title =        "Privacy-Preserving Decentralized Key-Policy
                 Attribute-Based Encryption",
  journal =      j-IEEE-TRANS-PAR-DIST-SYS,
  volume =       "23",
  number =       "11",
  pages =        "2150--2162",
  month =        nov,
  year =         "2012",
  CODEN =        "ITDSEO",
  DOI =          "https://doi.org/10.1109/TPDS.2012.50",
  ISSN =         "1045-9219 (print), 1558-2183 (electronic)",
  ISSN-L =       "1045-9219",
  bibdate =      "Mon Oct 22 08:15:38 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranspardistsys.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Parallel and Distributed
                 Systems",
  journal-URL =  "http://www.computer.org/tpds/archives.htm",
}

@Book{Hanyok:2012:EHH,
  author =       "Robert J. Hanyok",
  title =        "Eavesdropping on {Hell}: historical guide to {Western}
                 communications intelligence and the {Holocaust},
                 1939--1945",
  publisher =    pub-DOVER,
  address =      pub-DOVER:adr,
  edition =      "Second",
  pages =        "xxi + 196",
  year =         "2012",
  ISBN =         "0-486-48127-1",
  ISBN-13 =      "978-0-486-48127-2",
  LCCN =         "D810.C88 H36 2012",
  bibdate =      "Thu Dec 28 09:30:45 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://catdir.loc.gov/catdir/enhancements/fy1108/2011011467-d.html;
                 http://www.loc.gov/catdir/enhancements/fy1318/2011011467-t.html",
  acknowledgement = ack-nhfb,
  remark =       "Originally published: Fort Meade, Md. : Center for
                 Cryptologic History, National Security Agency, 2005.
                 With new pref.",
  subject =      "World War, 1939--1945; Cryptography; Eavesdropping;
                 United States; Great Britain; Holocaust, Jewish
                 (1939--1945); Confidential communications; Germany;
                 Military intelligence; Electronic intelligence",
  tableofcontents = "Background \\
                 The context of European and Nazi anti-Semitism \\
                 Overview of the Western Communications Intelligence
                 System During World War II \\
                 Step 1: setting the requirements, priorities, and
                 divisions of effort \\
                 Step 2: intercepting the messages \\
                 Step 3: Processing the intercept \\
                 Step 4: Disseminating the COMINT \\
                 From intercept to decryption \\
                 The story of one German police message \\
                 Selected Topics of the Holocaust \\
                 The general course of the Holocaust and the Allied
                 COMINT \\
                 Jewish refugees, the Holocaust, and the growing strife
                 in Palestine \\
                 The Vichy regime and the Jews \\
                 The destruction of Hungary's Jews, 1944 \\
                 Japan and the Jews in the Far East \\
                 Nazi gold: national and personal assets looted by Nazis
                 and placed in Swiss banks, 1943 \\
                 1945: Some Observations about Western Communications
                 Intelligence and the Holocaust \\
                 What was known from Western COMINT \\
                 When the COMINT agencies knew about the Holocaust",
}

@Article{Hao:2012:SAM,
  author =       "Feng Hao and Dylan Clarke",
  title =        "Security Analysis of a Multi-factor Authenticated Key
                 Exchange Protocol",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7341",
  pages =        "1--11",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-31284-7_1",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:20:27 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012e.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-31284-7_1/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-31284-7",
  book-URL =     "http://www.springerlink.com/content/978-3-642-31284-7",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{He:2012:ECT,
  author =       "Debiao He and Sahadeo Padhye and Jianhua Chen",
  title =        "An efficient certificateless two-party authenticated
                 key agreement protocol",
  journal =      j-COMPUT-MATH-APPL,
  volume =       "64",
  number =       "6",
  pages =        "1914--1926",
  month =        sep,
  year =         "2012",
  CODEN =        "CMAPDK",
  ISSN =         "0898-1221 (print), 1873-7668 (electronic)",
  ISSN-L =       "0898-1221",
  bibdate =      "Wed Mar 1 21:51:13 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computmathappl2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0898122112002490",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers and Mathematics with Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/08981221",
}

@InProceedings{Heninger:2012:MYP,
  author =       "Nadia Heninger and Zakir Durumeric and Eric Wustrow
                 and J. Alex Halderman",
  editor =       "????",
  booktitle =    "{Proceedings of the 21st USENIX Security Symposium,
                 August 2012}",
  title =        "Mining Your {Ps} and {Qs}: Detection of Widespread
                 Weak Keys in Network Devices",
  publisher =    pub-USENIX,
  address =      pub-USENIX:adr,
  pages =        "205--220",
  year =         "2012",
  DOI =          "https://doi.org/10.5555/2362793.2362828",
  ISBN =         "????",
  ISBN-13 =      "????",
  LCCN =         "????",
  bibdate =      "Sun Nov 30 07:40:33 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://dl.acm.org/doi/10.5555/2362793.2362828;
                 https://factorable.net/paper.html;
                 https://factorable.net/weakkeys12.conference.pdf;
                 https://factorable.net/weakkeys12.extended.pdf",
  abstract =     "RSA and DSA can fail catastrophically when used with
                 malfunctioning random number generators, but the extent
                 to which these problems arise in practice has never
                 been comprehensively studied at Internet scale. We
                 perform the largest ever network survey of TLS and SSH
                 servers and present evidence that vulnerable keys are
                 surprisingly widespread. We find that 0.75\% of TLS
                 certificates share keys due to insufficient entropy
                 during key generation, and we suspect that another
                 1.70\% come from the same faulty implementations and
                 may be susceptible to compromise. Even more alarmingly,
                 we are able to obtain RSA private keys for 0.50\% of
                 TLS hosts and 0.03\% of SSH hosts, because their public
                 keys shared nontrivial common factors due to entropy
                 problems, and DSA private keys for 1.03\% of SSH hosts,
                 because of insufficient signature randomness. We
                 cluster and investigate the vulnerable hosts, finding
                 that the vast majority appear to be headless or
                 embedded devices. In experiments with three software
                 components commonly used by these devices, we are able
                 to reproduce the vulnerabilities and identify specific
                 software behaviors that induce them, including a
                 boot-time entropy hole in the Linux random number
                 generator. Finally, we suggest defenses and draw
                 lessons for developers, users, and the security
                 community.",
  acknowledgement = ack-nhfb,
  remark =       "Cite in \cite[reference 42]{Schneier:2015:SWC}.",
  xxpages =      "1--16",
}

@Article{Herbert:2012:SMP,
  author =       "Matthias Herbert and Tobias Thieme and Jan Zibuschka
                 and Heiko Ro{\ss}nagel",
  title =        "Secure Mashup-Providing Platforms --- Implementing
                 Encrypted Wiring",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7059",
  pages =        "99--108",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-27997-3_9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:23:24 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-27997-3_9/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-27997-3",
  book-URL =     "http://www.springerlink.com/content/978-3-642-27997-3",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Hernandez-Castro:2012:AFH,
  author =       "Julio Cesar Hernandez-Castro and Pedro Peris-Lopez and
                 Masoumeh Safkhani and Nasour Bagheri",
  title =        "Another Fallen Hash-Based {RFID} Authentication
                 Protocol",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7322",
  pages =        "29--37",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-30955-7_4",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:20:02 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012e.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-30955-7_4/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-30955-7",
  book-URL =     "http://www.springerlink.com/content/978-3-642-30955-7",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Hernandez-Castro:2012:MTA,
  author =       "Julio Cesar Hernandez-Castro and Juan Manuel
                 Estevez-Tapiador and Pedro Peris-Lopez and John A.
                 Clark and El-Ghazali Talbi",
  title =        "Metaheuristic Traceability Attack Against {SLMAP}, an
                 {RFID} Lightweight Authentication Protocol",
  journal =      j-INT-J-FOUND-COMP-SCI,
  volume =       "23",
  number =       "2",
  pages =        "543--553",
  month =        feb,
  year =         "2012",
  CODEN =        "IFCSEN",
  DOI =          "https://doi.org/10.1142/S0129054112400278",
  ISSN =         "0129-0541 (print), 1793-6373 (electronic)",
  ISSN-L =       "0129-0541",
  bibdate =      "Sat Mar 24 15:27:30 MDT 2012",
  bibsource =    "http://ejournals.wspc.com.sg/ijfcs/mkt/archive.shtml;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijfcs.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Foundations of Computer
                 Science (IJFCS)",
  journal-URL =  "http://www.worldscientific.com/loi/ijfcs",
}

@Article{Herzberg:2012:TJA,
  author =       "Amir Herzberg and Ronen Margulies",
  title =        "Training {Johnny} to Authenticate (Safely)",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "1",
  pages =        "37--45",
  month =        jan # "\slash " # feb,
  year =         "2012",
  DOI =          "https://doi.org/10.1109/MSP.2011.129",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 15 12:40:29 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
}

@Article{Hess:2012:GJC,
  author =       "Florian Hess",
  title =        "Generalised {Jacobians} in Cryptography and Coding
                 Theory",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7369",
  pages =        "1--15",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-31662-3_1",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:21:04 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012f.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-31662-3_1/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-31662-3",
  book-URL =     "http://www.springerlink.com/content/978-3-642-31662-3",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Heyse:2012:LEA,
  author =       "Stefan Heyse and Eike Kiltz and Vadim Lyubashevsky and
                 Christof Paar and Krzysztof Pietrzak",
  title =        "{Lapin}: An Efficient Authentication Protocol Based on
                 Ring-{LPN}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7549",
  pages =        "346--365",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-34047-5_20",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:24:44 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012i.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-34047-5_20/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-34047-5",
  book-URL =     "http://www.springerlink.com/content/978-3-642-34047-5",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Heyse:2012:TOC,
  author =       "Stefan Heyse and Tim G{\"u}neysu",
  title =        "Towards One Cycle per Bit Asymmetric Encryption:
                 Code-Based Cryptography on Reconfigurable Hardware",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7428",
  pages =        "340--355",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-33027-8_20",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:22:21 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012g.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-33027-8_20/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-33027-8",
  book-URL =     "http://www.springerlink.com/content/978-3-642-33027-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Hoang:2012:ESB,
  author =       "Viet Tung Hoang and Ben Morris and Phillip Rogaway",
  title =        "An Enciphering Scheme Based on a Card Shuffle",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7417",
  pages =        "1--13",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-32009-5_1",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:22:07 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012g.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-32009-5_1/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-32009-5",
  book-URL =     "http://www.springerlink.com/content/978-3-642-32009-5",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Hohenberger:2012:DDQ,
  author =       "Susan Hohenberger and Allison Lewko and Brent Waters",
  title =        "Detecting Dangerous Queries: a New Approach for Chosen
                 Ciphertext Security",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7237",
  pages =        "663--681",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-29011-4_38;
                 https://doi.org/10.1007/978-3-642-29011-4_39",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Dec 15 20:55:01 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs.bib",
  URL =          "http://link.springer.com/accesspage/chapter/10.1007/978-3-642-29011-4_38;
                 http://link.springer.com/chapter/10.1007/978-3-642-29011-4_39/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-29011-4",
  book-URL =     "http://www.springerlink.com/content/978-3-642-29011-4",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Holbl:2012:ITP,
  author =       "Marko H{\"o}lbl and Tatjana Welzer and Bostjan
                 Brumen",
  title =        "An improved two-party identity-based authenticated key
                 agreement protocol using pairings",
  journal =      j-J-COMP-SYS-SCI,
  volume =       "78",
  number =       "1",
  pages =        "142--150",
  month =        jan,
  year =         "2012",
  CODEN =        "JCSSBM",
  DOI =          "https://doi.org/10.1016/j.jcss.2011.01.002",
  ISSN =         "0022-0000 (print), 1090-2724 (electronic)",
  ISSN-L =       "0022-0000",
  bibdate =      "Tue Jan 29 15:27:18 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsyssci.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0022000011000031",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer and System Sciences",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00220000",
}

@Article{Hollings:2012:CCE,
  author =       "Christopher Hollings",
  title =        "{I, Claudius} and the cipher extraordinary",
  journal =      j-MATH-GAZ,
  volume =       "96",
  number =       "537",
  pages =        "466--470",
  month =        nov,
  year =         "2012",
  CODEN =        "MAGAAS",
  DOI =          "https://doi.org/10.1017/S002555720000509X",
  ISSN =         "0025-5572",
  ISSN-L =       "0025-5572",
  bibdate =      "Tue May 5 12:04:24 MDT 2015",
  bibsource =    "http://journals.cambridge.org/action/displayIssue?jid=MAG&volumeId=96&issueId=537;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/mathgaz2010.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "Math. Gaz.",
  fjournal =     "The Mathematical Gazette",
  journal-URL =  "http://journals.cambridge.org/action/displayBackIssues?jid=MAG",
}

@Article{Hore:2012:IED,
  author =       "Bijit Hore and Ee-Chien Chang and Mamadou H. Diallo
                 and Sharad Mehrotra",
  title =        "Indexing Encrypted Documents for Supporting Efficient
                 Keyword Search",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7482",
  pages =        "93--110",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-32873-2_7",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:23:32 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012h.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-32873-2_7/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-32873-2",
  book-URL =     "http://www.springerlink.com/content/978-3-642-32873-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Hore:2012:SMR,
  author =       "Bijit Hore and Sharad Mehrotra and Mustafa Canim and
                 Murat Kantarcioglu",
  title =        "Secure multidimensional range queries over outsourced
                 data",
  journal =      j-VLDB-J,
  volume =       "21",
  number =       "3",
  pages =        "333--358",
  month =        jun,
  year =         "2012",
  CODEN =        "VLDBFR",
  DOI =          "https://doi.org/10.1007/s00778-011-0245-7",
  ISSN =         "1066-8888 (print), 0949-877X (electronic)",
  ISSN-L =       "1066-8888",
  bibdate =      "Tue Jun 26 17:39:07 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/vldbj.bib",
  abstract =     "In this paper, we study the problem of supporting
                 multidimensional range queries on encrypted data. The
                 problem is motivated by secure data outsourcing
                 applications where a client may store his/her data on a
                 remote server in encrypted form and want to execute
                 queries using server's computational capabilities. The
                 solution approach is to compute a secure indexing tag
                 of the data by applying bucketization (a generic form
                 of data partitioning) which prevents the server from
                 learning exact values but still allows it to check if a
                 record satisfies the query predicate. Queries are
                 evaluated in an approximate manner where the returned
                 set of records may contain some false positives. These
                 records then need to be weeded out by the client which
                 comprises the computational overhead of our scheme. We
                 develop a bucketization procedure for answering
                 multidimensional range queries on multidimensional
                 data. For a given bucketization scheme, we derive cost
                 and disclosure-risk metrics that estimate client's
                 computational overhead and disclosure risk
                 respectively. Given a multidimensional dataset, its
                 bucketization is posed as an optimization problem where
                 the goal is to minimize the risk of disclosure while
                 keeping query cost (client's computational overhead)
                 below a certain user-specified threshold value. We
                 provide a tunable data bucketization algorithm that
                 allows the data owner to control the trade-off between
                 disclosure risk and cost. We also study the trade-off
                 characteristics through an extensive set of experiments
                 on real and synthetic data.",
  acknowledgement = ack-nhfb,
  fjournal =     "VLDB Journal: Very Large Data Bases",
  journal-URL =  "http://portal.acm.org/toc.cfm?id=J869",
}

@Article{Hsieh:2012:EHF,
  author =       "Wen-Bin Hsieh and Jenq-Shiou Leu",
  title =        "Exploiting hash functions to intensify the remote user
                 authentication scheme",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "6",
  pages =        "791--798",
  month =        sep,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:29 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812000910",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hu:2012:VMS,
  author =       "Chunqiang Hu and Xiaofeng Liao and Xiuzhen Cheng",
  title =        "Verifiable multi-secret sharing based on {LFSR}
                 sequences",
  journal =      j-THEOR-COMP-SCI,
  volume =       "445",
  number =       "1",
  pages =        "52--62",
  day =          "3",
  month =        aug,
  year =         "2012",
  CODEN =        "TCSCDI",
  DOI =          "https://doi.org/10.1016/j.tcs.2012.05.006",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Mon Jun 11 14:41:52 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2010.bib;
                 http://www.sciencedirect.com/science/journal/03043975",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0304397512004276",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{Hwang:2012:ABA,
  author =       "Jung Yeon Hwang and Sungwook Eom and Ku-Young Chang
                 and Pil Joong Lee and DaeHun Nyang",
  title =        "Anonymity-Based Authenticated Key Agreement with Full
                 Binding Property",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7690",
  pages =        "177--191",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-35416-8_13",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:18:58 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012l.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-35416-8_13/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-35416-8",
  book-URL =     "http://www.springerlink.com/content/978-3-642-35416-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Hyla:2012:CBE,
  author =       "Tomasz Hyla and Jerzy Peja{\'s}",
  title =        "Certificate-Based Encryption Scheme with General
                 Access Structure",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7564",
  pages =        "41--55",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-33260-9_3",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:25:02 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012j.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-33260-9_3/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-33260-9",
  book-URL =     "http://www.springerlink.com/content/978-3-642-33260-9",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Isobe:2012:SAL,
  author =       "Takanori Isobe and Kyoji Shibutani",
  title =        "Security Analysis of the Lightweight Block Ciphers
                 {XTEA}, {LED} and {Piccolo}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7372",
  pages =        "71--86",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-31448-3_6",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:21:08 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012f.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-31448-3_6/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-31448-3",
  book-URL =     "http://www.springerlink.com/content/978-3-642-31448-3",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Isobe:2012:SCL,
  author =       "Takanori Isobe and Toshihiro Ohigashi and Masakatu
                 Morii",
  title =        "Slide Cryptanalysis of Lightweight Stream Cipher
                 {RAKAPOSHI}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7631",
  pages =        "138--155",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-34117-5_9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:26:12 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012k.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-34117-5_9/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-34117-5",
  book-URL =     "http://www.springerlink.com/content/978-3-642-34117-5",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Jain:2012:BAS,
  author =       "Anil K. Jain and Karthik Nandakumar",
  title =        "Biometric Authentication: System Security and User
                 Privacy",
  journal =      j-COMPUTER,
  volume =       "45",
  number =       "11",
  pages =        "87--92",
  month =        nov,
  year =         "2012",
  CODEN =        "CPTRB4",
  DOI =          "https://doi.org/10.1109/MC.2012.364",
  ISSN =         "0018-9162",
  ISSN-L =       "0018-9162",
  bibdate =      "Wed Nov 14 18:24:24 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computer2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
}

@Article{Jajodia:2012:RET,
  author =       "Sushil Jajodia and Witold Litwin and Thomas Schwarz",
  title =        "Recoverable Encryption through Noised Secret over a
                 Large Cloud",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7450",
  pages =        "13--24",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-32344-7_2",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:22:51 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012h.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-32344-7_2/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-32344-7",
  book-URL =     "http://www.springerlink.com/content/978-3-642-32344-7",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Jakobsson:2012:AWD,
  author =       "Markus Jakobsson and Richard Chow and Jesus Molina",
  title =        "Authentication --- Are We Doing Well Enough?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "1",
  pages =        "19--21",
  month =        jan # "\slash " # feb,
  year =         "2012",
  DOI =          "https://doi.org/10.1109/MSP.2012.5",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 15 12:40:29 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
}

@Article{Jeong:2012:IKP,
  author =       "Kyung Chul Jeong and Dong Hoon Lee and Daewan Han",
  title =        "An Improved Known Plaintext Attack on {PKZIP}
                 Encryption Algorithm",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7259",
  pages =        "235--247",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-31912-9_16",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:18:40 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012d.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-31912-9_16/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-31912-9",
  book-URL =     "http://www.springerlink.com/content/978-3-642-31912-9",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Jia:2012:PKD,
  author =       "Zhongtian Jia and Xiaodong Lin and Seng-Hua Tan and
                 Lixiang Li and Yixian Yang",
  title =        "Public key distribution scheme for delay tolerant
                 networks based on two-channel cryptography",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "35",
  number =       "3",
  pages =        "905--913",
  month =        may,
  year =         "2012",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Wed Jan 28 15:44:17 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804511000634",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Netw. Comput. Appl.",
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Jiang:2012:DCA,
  author =       "Xinghao Jiang and Tanfeng Sun and Yue Zhou and Yun Q.
                 Shi",
  title =        "A Drift Compensation Algorithm for {H.264\slash AVC}
                 Video Robust Watermarking Scheme",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7128",
  pages =        "30--41",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-32205-1_5",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:24:41 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012b.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-32205-1_5/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-32205-1",
  book-URL =     "http://www.springerlink.com/content/978-3-642-32205-1",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Jing:2012:MVB,
  author =       "Huiyun Jing and Xin He and Qi Han and Xiamu Niu",
  title =        "Motion Vector Based Information Hiding Algorithm for
                 {H.264\slash AVC} against Motion Vector Steganalysis",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7197",
  pages =        "91--98",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-28490-8_10",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:26:04 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012b.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-28490-8_10/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-28490-8",
  book-URL =     "http://www.springerlink.com/content/978-3-642-28490-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Jovanovic:2012:FAL,
  author =       "Philipp Jovanovic and Martin Kreuzer and Ilia Polian",
  title =        "A Fault Attack on the {LED Block} Cipher",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7275",
  pages =        "120--134",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-29912-4_10",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:19:00 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012d.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-29912-4_10/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-29912-4",
  book-URL =     "http://www.springerlink.com/content/978-3-642-29912-4",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Jun:2012:IIR,
  author =       "Jong Yun Jun and Kunho Kim and Jae-Pil Heo and
                 Sung-eui Yoon",
  title =        "{IRIW}: Image Retrieval Based Image Watermarking for
                 Large-Scale Image Databases",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7128",
  pages =        "126--141",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-32205-1_12",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:24:41 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012b.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-32205-1_12/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-32205-1",
  book-URL =     "http://www.springerlink.com/content/978-3-642-32205-1",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Kang:2012:AKM,
  author =       "Hyun-Sun Kang and Chang-Seop Park",
  title =        "An Authentication and Key Management Scheme for the
                 Proxy Mobile {IPv6}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7690",
  pages =        "144--160",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-35416-8_11",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:18:58 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012l.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-35416-8_11/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-35416-8",
  book-URL =     "http://www.springerlink.com/content/978-3-642-35416-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Karafyllidis:2012:QGC,
  author =       "Ioannis G. Karafyllidis",
  title =        "Quantum Gate Circuit Model of Signal Integration in
                 Bacterial Quorum Sensing",
  journal =      j-TCBB,
  volume =       "9",
  number =       "2",
  pages =        "571--579",
  month =        mar,
  year =         "2012",
  CODEN =        "ITCBCY",
  DOI =          "https://doi.org/10.1109/TCBB.2011.104",
  ISSN =         "1545-5963 (print), 1557-9964 (electronic)",
  ISSN-L =       "1545-5963",
  bibdate =      "Thu Jan 26 16:30:44 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcbb.bib",
  abstract =     "Bacteria evolved cell to cell communication processes
                 to gain information about their environment and
                 regulate gene expression. Quorum sensing is such a
                 process in which signaling molecules, called
                 autoinducers, are produced, secreted and detected. In
                 several cases bacteria use more than one autoinducers
                 and integrate the information conveyed by them. It has
                 not yet been explained adequately why bacteria evolved
                 such signal integration circuits and what can learn
                 about their environments using more than one
                 autoinducers since all signaling pathways merge in one.
                 Here quantum information theory, which includes
                 classical information theory as a special case, is used
                 to construct a quantum gate circuit that reproduces
                 recent experimental results.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE/ACM Transactions on Computational Biology and
                 Bioinformatics",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J954",
}

@Article{Kasamatsu:2012:TSE,
  author =       "Kohei Kasamatsu and Takahiro Matsuda and Keita Emura
                 and Nuttapong Attrapadung and Goichiro Hanaoka",
  title =        "Time-Specific Encryption from Forward-Secure
                 Encryption",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7485",
  pages =        "184--204",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-32928-9_11",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:23:35 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012h.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-32928-9_11/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-32928-9",
  book-URL =     "http://www.springerlink.com/content/978-3-642-32928-9",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Kasper:2012:SCA,
  author =       "Timo Kasper and David Oswald and Christof Paar",
  title =        "Side-Channel Analysis of Cryptographic {RFIDs} with
                 Analog Demodulation",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7055",
  pages =        "61--77",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-25286-0_5",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:23:19 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-25286-0_5/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-25286-0",
  book-URL =     "http://www.springerlink.com/content/978-3-642-25286-0",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Katz:2012:TSP,
  author =       "Jonathan Katz and Philip MacKenzie and Gelareh Taban
                 and Virgil Gligor",
  title =        "Two-server password-only authenticated key exchange",
  journal =      j-J-COMP-SYS-SCI,
  volume =       "78",
  number =       "2",
  pages =        "651--669",
  month =        mar,
  year =         "2012",
  CODEN =        "JCSSBM",
  DOI =          "https://doi.org/10.1016/j.jcss.2011.09.005",
  ISSN =         "0022-0000 (print), 1090-2724 (electronic)",
  ISSN-L =       "0022-0000",
  bibdate =      "Tue Jan 29 15:27:18 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsyssci.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0022000011001048",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer and System Sciences",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00220000",
}

@Article{Kawachi:2012:SKE,
  author =       "Akinori Kawachi and Hirotoshi Takebe and Keisuke
                 Tanaka",
  title =        "Symmetric-Key Encryption Scheme with Multi-ciphertext
                 Non-malleability",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7631",
  pages =        "123--137",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-34117-5_8",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:26:12 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012k.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-34117-5_8/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-34117-5",
  book-URL =     "http://www.springerlink.com/content/978-3-642-34117-5",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Kawai:2012:SHS,
  author =       "Yutaka Kawai and Noboru Kunihiro",
  title =        "Secret Handshake Scheme with Request-Based-Revealing",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7163",
  pages =        "1--16",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-29804-2_1",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:25:24 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012b.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-29804-2_1/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-29804-2",
  book-URL =     "http://www.springerlink.com/content/978-3-642-29804-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Kikuchi:2012:SSN,
  author =       "Ryo Kikuchi and Atsushi Fujioka and Yoshiaki Okamoto
                 and Taiichi Saito",
  title =        "Strong Security Notions for Timed-Release Public-Key
                 Encryption Revisited",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7259",
  pages =        "88--108",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-31912-9_7",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:18:40 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012d.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-31912-9_7/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-31912-9",
  book-URL =     "http://www.springerlink.com/content/978-3-642-31912-9",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Kim:2012:INS,
  author =       "Hwi-Gang Kim and Eun Jung Lee and Gang-Joon Yoon and
                 Sung-Dae Yang and Eui Chul Lee and Sang Min Yoon",
  title =        "Illumination Normalization for {SIFT} Based Finger
                 Vein Authentication",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7432",
  pages =        "21--30",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-33191-6_3",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:22:26 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012g.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-33191-6_3/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-33191-6",
  book-URL =     "http://www.springerlink.com/content/978-3-642-33191-6",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Kim:2012:SAH,
  author =       "Hyoungshick Kim and John Tang and Ross Anderson",
  title =        "Social Authentication: Harder Than It Looks",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7397",
  pages =        "1--15",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-32946-3_1",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:21:41 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012f.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-32946-3_1/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-32946-3",
  book-URL =     "http://www.springerlink.com/content/978-3-642-32946-3",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Kim:2012:SLT,
  author =       "Tiffany Hyun-Jin Kim and Virgil Gligor and Adrian
                 Perrig",
  title =        "Street-Level Trust Semantics for Attribute
                 Authentication",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7622",
  pages =        "96--115",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-35694-0_12",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:26:01 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012k.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-35694-0_12/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-35694-0",
  book-URL =     "http://www.springerlink.com/content/978-3-642-35694-0",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Kim:2012:SSS,
  author =       "Cheonshik Kim and Dongkyoo Shin and Dongil Shin and
                 Ching-Nung Yang",
  title =        "A $ (2, 2) $ Secret Sharing Scheme Based on {Hamming}
                 Code and {AMBTC}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7197",
  pages =        "129--139",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-28490-8_14",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:26:04 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012b.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-28490-8_14/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-28490-8",
  book-URL =     "http://www.springerlink.com/content/978-3-642-28490-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Klisowski:2012:CCP,
  author =       "Michal Klisowski and Vasyl Ustimenko",
  title =        "On the Comparison of Cryptographical Properties of Two
                 Different Families of Graphs with Large Cycle
                 Indicator",
  journal =      j-MATH-COMPUT-SCI,
  volume =       "6",
  number =       "2",
  pages =        "181--198",
  month =        jun,
  year =         "2012",
  CODEN =        "????",
  ISSN =         "1661-8270 (print), 1661-8289 (electronic)",
  ISSN-L =       "1661-8270",
  bibdate =      "Tue Nov 6 10:16:25 MST 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=1661-8270&volume=6&issue=2;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/math-comput-sci.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=1661-8270&volume=6&issue=2&spage=181",
  acknowledgement = ack-nhfb,
  fjournal =     "Mathematics in Computer Science",
  journal-URL =  "http://www.springerlink.com/content/1661-8270/",
}

@Article{Kocabas:2012:CPB,
  author =       "{\"U}nal Kocaba{\c{s}} and Andreas Peter and Stefan
                 Katzenbeisser and Ahmad-Reza Sadeghi",
  title =        "Converse {PUF}-Based Authentication",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7344",
  pages =        "142--158",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-30921-2_9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:20:31 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012e.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-30921-2_9/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-30921-2",
  book-URL =     "http://www.springerlink.com/content/978-3-642-30921-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Koeberl:2012:EPD,
  author =       "Patrick Koeberl and Jiangtao Li and Roel Maes and
                 Anand Rajan and Claire Vishik and Marcin W{\'o}jcik",
  title =        "Evaluation of a {PUF} Device Authentication Scheme on
                 a Discrete 0.13um {SRAM}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7222",
  pages =        "271--288",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-32298-3_18",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:17:56 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012c.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-32298-3_18/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-32298-3",
  book-URL =     "http://www.springerlink.com/content/978-3-642-32298-3",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Kolesnikov:2012:LPP,
  author =       "Vladimir Kolesnikov and Abdullatif Shikfa",
  title =        "On The Limits of Privacy Provided by Order-Preserving
                 Encryption",
  journal =      j-BELL-LABS-TECH-J,
  volume =       "17",
  number =       "3",
  pages =        "135--146",
  month =        dec,
  year =         "2012",
  CODEN =        "BLTJFD",
  DOI =          "https://doi.org/10.1002/bltj.21564",
  ISSN =         "1089-7089 (print), 1538-7305 (electronic)",
  ISSN-L =       "1089-7089",
  bibdate =      "Thu Mar 7 07:32:06 MST 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bstj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Bell Labs Technical Journal",
  journal-URL =  "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1538-7305/issues/",
  onlinedate =   "27 Dec 2012",
}

@Article{Kostinger:2012:SBL,
  author =       "Martin K{\"o}stinger and Peter M. Roth and Horst
                 Bischof",
  title =        "Synergy-Based Learning of Facial Identity",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7476",
  pages =        "195--204",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-32717-9_20",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:23:24 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012h.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-32717-9_20/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-32717-9",
  book-URL =     "http://www.springerlink.com/content/978-3-642-32717-9",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Koyama:2012:NTD,
  author =       "Takuma Koyama and Lei Wang and Yu Sasaki and Kazuo
                 Sakiyama and Kazuo Ohta",
  title =        "New Truncated Differential Cryptanalysis on {$3$D}
                 Block Cipher",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7232",
  pages =        "109--125",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-29101-2_8",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:18:09 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012c.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-29101-2_8/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-29101-2",
  book-URL =     "http://www.springerlink.com/content/978-3-642-29101-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Koz:2012:ASE,
  author =       "Alper Koz and Claude Delpha",
  title =        "Adaptive Selection of Embedding Locations for Spread
                 Spectrum Watermarking of Compressed Audio",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7128",
  pages =        "97--110",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-32205-1_10",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:24:41 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012b.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-32205-1_10/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-32205-1",
  book-URL =     "http://www.springerlink.com/content/978-3-642-32205-1",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Kraetzer:2012:PCS,
  author =       "Christian Kraetzer and Jana Dittmann",
  title =        "Plausibility Considerations on Steganalysis as a
                 Security Mechanism --- Discussions on the Example of
                 Audio Steganalysis",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7228",
  pages =        "80--101",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-31971-6_5",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:18:04 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012c.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-31971-6_5/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-31971-6",
  book-URL =     "http://www.springerlink.com/content/978-3-642-31971-6",
  fjournal =     "Lecture Notes in Computer Science",
}

@Book{Krantz:2012:EAM,
  author =       "Steven G. (Steven George) Krantz",
  title =        "Elements of advanced mathematics",
  publisher =    pub-CHAPMAN-HALL-CRC,
  address =      pub-CHAPMAN-HALL-CRC:adr,
  edition =      "Third",
  pages =        "xvi + 351",
  year =         "2012",
  ISBN =         "1-4398-9834-0 (hardcover)",
  ISBN-13 =      "978-1-4398-9834-5 (hardcover)",
  LCCN =         "QA37.3 .K73 2012",
  bibdate =      "Tue May 5 16:13:54 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/mathgaz2010.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://marc.crcnetbase.com/isbn/9781439898345",
  abstract =     "From the Preface to the Third Edition: On the whole,
                 we have retained the content and character of the first
                 two editions. But we have added material on point-set
                 topology (Chapter 8), on theoretical computer science
                 (Chapter 9), on the P/NP problem (Chapter 10), and on
                 zero-knowledge proofs and RSA encryption (Chapter 12).
                 The topology chapter of course builds on the existing
                 material on real analysis. The computer science
                 chapters show connections of basic set theory and logic
                 with current hot topics in the technology sector. The
                 material on cryptography is exciting, timely, and fun.
                 These new chapters help to make the book more current
                 and significant. It should of course be understood that
                 these four chapters may be considered to be optional.
                 Skipping them will in no way detract from reading the
                 rest of the book. Some readers consider Chapter 5 on
                 axiomatics and rigorous logic to be optional. To be
                 sure, it is a more demanding chapter than some of the
                 others. But it contains important material, some of
                 which is at least alluded to later in the book. Readers
                 who do not want to spend much time on Chapter 5 might
                 wish to at least have a look at it. The main message
                 here is that Chapters 5, 8, 9, 10, and 12 provide an
                 open-ended venue for students to explore and to learn.
                 My experience with teaching this course is that the
                 aggregate material causes many of the students to get
                 really turned on to mathematics. They need to have a
                 means for further exploration and reading. These
                 chapters give them that opportunity, and exercises to
                 back up the reading. The new Chapter 12 is dessert. It
                 presents the very new ideas of zero-knowledge proofs
                 and RSA encryption.",
  acknowledgement = ack-nhfb,
  author-dates = "1951--",
  subject =      "Mathematics; MATHEMATICS / General.; MATHEMATICS /
                 Algebra / General.; MATHEMATICS / Set Theory.",
  tableofcontents = "Basic Logic \\
                 Principles of Logic \\
                 Truth \\
                 ``And'' and ``Or'' \\
                 ``Not'' \\
                 ``If-Then'' \\
                 Contrapositive, Converse, and ``Iff'' \\
                 Quantifiers \\
                 Truth and Provability \\
                 \\
                 Methods of Proof \\
                 What Is a Proof? \\
                 Direct Proof \\
                 Proof by Contradiction \\
                 Proof by Induction \\
                 Other Methods of Proof \\
                 \\
                 Set Theory \\
                 Undefinable Terms \\
                 Elements of Set Theory \\
                 Venn Diagrams \\
                 Further Ideas in Elementary Set Theory \\
                 Indexing and Extended Set Operations \\
                 \\
                 Relations and Functions \\
                 Relations \\
                 Order Relations \\
                 Functions \\
                 Combining Functions \\
                 Cantor s Notion of Cardinality \\
                 \\
                 Axioms of Set Theory, Paradoxes, and Rigor \\
                 Axioms of Set Theory \\
                 The Axiom of Choice \\
                 Independence and Consistency \\
                 Set Theory and Arithmetic \\
                 \\
                 Number Systems \\
                 The Natural Number System \\
                 The Integers \\
                 The Rational Numbers \\
                 The Real Number System \\
                 The Nonstandard Real Number System \\
                 The Complex Numbers \\
                 The Quaternions, the Cayley Numbers, and Beyond \\
                 \\
                 More on the Real Number System \\
                 Introductory Remark \\
                 Sequences \\
                 Open Sets and Closed Sets \\
                 Compact Sets \\
                 The Cantor Set \\
                 \\
                 A Glimpse of Topology \\
                 What Is Topology? \\
                 First Definitions \\
                 Mappings \\
                 The Separation Axioms \\
                 Compactness \\
                 \\
                 Theoretical Computer Science \\
                 Introductory Remarks \\
                 Primitive Recursive Functions \\
                 General Recursive Functions \\
                 Description of Boolean Algebra \\
                 Axioms of Boolean Algebra \\
                 Theorems in Boolean Algebra \\
                 Illustration of the Use of Boolean Logic \\
                 The Robbins Conjecture \\
                 \\
                 The P/NP Problem \\
                 Introduction \\
                 The Complexity of a Problem \\
                 Comparing Polynomial and Exponential Complexity \\
                 Polynomial Complexity \\
                 Assertions That Can Be Verified in Polynomial Time \\
                 Nondeterministic Turing Machines \\
                 Foundations of NP-Completeness \\
                 Polynomial Equivalence \\
                 Definition of NP-Completeness \\
                 \\
                 Examples of Axiomatic Theories \\
                 Group Theory \\
                 Euclidean and Non-Euclidean Geometry \\
                 \\
                 Zero-Knowledge Proofs \\
                 Basics and Background \\
                 Preparation for RSA \\
                 The RSA System Enunciated \\
                 The RSA Encryption System Explicated \\
                 Zero-Knowledge Proofs \\
                 \\
                 Solutions to Selected Exercises \\
                 \\
                 Bibliography \\
                 \\
                 Index",
}

@Article{Ksiezopolski:2012:QMQ,
  author =       "Bogdan Ksiezopolski",
  title =        "{QoP}-{ML}: Quality of protection modelling language
                 for cryptographic protocols",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "4",
  pages =        "569--596",
  month =        jun,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:28 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812000107",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lai:2012:RHB,
  author =       "Hong Lai and Jinghua Xiao and Lixiang Li and Yixian
                 Yang",
  title =        "Recursive hiding of biometrics-based secret sharing
                 scheme using adversary structure",
  journal =      j-INFO-PROC-LETT,
  volume =       "112",
  number =       "17--18",
  pages =        "683--687",
  day =          "30",
  month =        sep,
  year =         "2012",
  CODEN =        "IFPLAT",
  DOI =          "https://doi.org/10.1016/j.ipl.2012.06.006",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Fri Jul 6 11:52:37 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019012001573",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Lambert-Mogiliansky:2012:EII,
  author =       "Ariane Lambert-Mogiliansky and Jerome R. Busemeyer",
  title =        "Emergence and Instability of Individual Identity",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7620",
  pages =        "102--113",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-35659-9_10",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:25:59 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012k.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-35659-9_10/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-35659-9",
  book-URL =     "http://www.springerlink.com/content/978-3-642-35659-9",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Lampe:2012:ATS,
  author =       "Rodolphe Lampe and Jacques Patarin and Yannick
                 Seurin",
  title =        "An Asymptotically Tight Security Analysis of the
                 Iterated Even-{Mansour} Cipher",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7658",
  pages =        "278--295",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-34961-4_18",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:18:20 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012l.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-34961-4_18/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-34961-4",
  book-URL =     "http://www.springerlink.com/content/978-3-642-34961-4",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Lancrenon:2012:IPI,
  author =       "Jean Lancrenon and Roland Gillard",
  title =        "Isolating Partial Information of Indistinguishable
                 Encryptions",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7163",
  pages =        "34--48",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-29804-2_3",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:25:24 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012b.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-29804-2_3/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-29804-2",
  book-URL =     "http://www.springerlink.com/content/978-3-642-29804-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Landecker:2012:TBB,
  author =       "Will Landecker and Thomas Shrimpton and R. Seth
                 Terashima",
  title =        "Tweakable Blockciphers with Beyond Birthday-Bound
                 Security",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7417",
  pages =        "14--30",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-32009-5_2",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:22:07 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012g.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-32009-5_2/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-32009-5",
  book-URL =     "http://www.springerlink.com/content/978-3-642-32009-5",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Launchbury:2012:ELT,
  author =       "John Launchbury and Iavor S. Diatchki and Thomas
                 DuBuisson and Andy Adams-Moran",
  title =        "Efficient lookup-table protocol in secure multiparty
                 computation",
  journal =      j-SIGPLAN,
  volume =       "47",
  number =       "9",
  pages =        "189--200",
  month =        sep,
  year =         "2012",
  CODEN =        "SINODQ",
  DOI =          "https://doi.org/10.1145/2398856.2364556",
  ISSN =         "0362-1340 (print), 1523-2867 (print), 1558-1160
                 (electronic)",
  ISSN-L =       "0362-1340",
  bibdate =      "Thu Nov 15 16:40:19 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigplan2010.bib",
  abstract =     "Secure multiparty computation (SMC) permits a
                 collection of parties to compute a collaborative
                 result, without any of the parties gaining any
                 knowledge about the inputs provided by other parties.
                 Specifications for SMC are commonly presented as
                 boolean circuits, where optimizations come mostly from
                 reducing the number of multiply-operations (including
                 and -gates) --- these are the operations which incur
                 significant cost, either in computation overhead or in
                 communication between the parties. Instead, we take a
                 language-oriented approach, and consequently are able
                 to explore many other kinds of optimizations. We
                 present an efficient and general purpose SMC
                 table-lookup algorithm that can serve as a direct
                 alternative to circuits. Looking up a private (i.e.
                 shared, or encrypted) n -bit argument in a public table
                 requires log(n) parallel-and operations. We use the
                 advanced encryption standard algorithm (AES) as a
                 driving motivation, and by introducing different kinds
                 of parallelization techniques, produce the fastest
                 current SMC implementation of AES, improving the best
                 previously reported results by well over an order of
                 magnitude.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGPLAN Notices",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J706",
  remark =       "ICFP '12 conference proceedings.",
}

@Article{Launchbury:2012:TBC,
  author =       "John Launchbury",
  title =        "Theorem-based circuit derivation in {Cryptol}",
  journal =      j-SIGPLAN,
  volume =       "47",
  number =       "3",
  pages =        "185--186",
  month =        mar,
  year =         "2012",
  CODEN =        "SINODQ",
  DOI =          "https://doi.org/10.1145/2189751.2047894",
  ISSN =         "0362-1340 (print), 1523-2867 (print), 1558-1160
                 (electronic)",
  ISSN-L =       "0362-1340",
  bibdate =      "Thu Jun 7 08:15:00 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigplan2010.bib",
  abstract =     "Even though step-by-step refinement has long been seen
                 as desirable, it is hard to find compelling industrial
                 applications of the technique. In theory, transforming
                 a high-level specification into a high-performance
                 implementation is an ideal means of producing a correct
                 design, but in practice it is hard to make it work, and
                 even harder to make it worthwhile. This talk describes
                 an exception. We introduce the domain-specific
                 language, Cryptol, and work up to a design experience
                 in which theorem-based refinement played a crucial role
                 in producing an industrial quality FPGA encryptor and
                 decryptor for AES. Quite simply, we are unlikely to
                 have succeeded without the technique. The Cryptol
                 specification language was designed by Galois for the
                 NSA as a public standard for specifying cryptographic
                 algorithms. A Cryptol reference specification can serve
                 as the formal documentation for a cryptographic module,
                 eliminating the need for separate and voluminous
                 English descriptions. Cryptol is fully executable,
                 allowing designers to experiment with their programs
                 incrementally as their designs evolve. Cryptol
                 compilers can generate C, C++, and Haskell software
                 implementations, and VHDL or Verilog HDL hardware
                 implementations. These generators can significantly
                 reduce overall life-cycle costs of cryptographic
                 solutions. For example, Cryptol allows engineers and
                 mathematicians to program cryptographic algorithms on
                 FPGAs as if they were writing software. The design
                 experience we describe runs as follows: we begin with a
                 specification for AES written in Cryptol, and over a
                 series of five design stages we produce an industrial
                 grade encrypt core. In each stage, we state theorems
                 which relate the component behaviors in one stage with
                 the corresponding behaviors in the refinement. The
                 resulting cores, running at 350Mhz-440Mhz depending on
                 the FPGA part, bear little relationship to the
                 original, except that the step-by-step theorems ensured
                 we had not gone astray. We then repeat the pattern in
                 generating a circuit for AES decrypt. While there are
                 many similarities between encrypt and decrypt in AES,
                 there are some crucial differences with regard to high
                 performance. First concerns the generation of key
                 material. The AES key is used as a seed for a specific
                 pseudo-random number generator which produces key
                 material for use in each of the AES rounds. For
                 encrypt, the key-generator runs in sync with the action
                 of encryption, so may be scheduled alongside it. For
                 decrypt, they run counter to one-another, creating a
                 major challenge to be overcome. Second, the generated
                 key material has an additional transformation applied
                 to it, which occurs deep in the middle of the high
                 performing core. Using theorems as stepping stones
                 along the way, we redesign the key expansion algorithm
                 so that it will run in sync with the decryption. We
                 then trace parallel steps to the derivation of encrypt,
                 establishing a series of commuting diagrams along the
                 way. Whenever we confronted bugs in the development
                 process, we produced many theorems to isolate the bugs,
                 using theorems as a principled kind of printf. When the
                 bugs were found and eradicated, we elided many of the
                 temporary theorems, leaving behind those that provided
                 important insights into the behavior of the code. This
                 talk is a story of the journey with demonstrations of
                 the tool at work. Its ultimate message is to highlight
                 the value of including a theorem facility within purely
                 functional domain-specific languages.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGPLAN Notices",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J706",
  remark =       "GCPE '11 conference proceedings.",
}

@Book{Lavington:2012:ATH,
  editor =       "S. H. (Simon Hugh) Lavington and Martin Campbell-Kelly
                 and Christopher P. Burton and Roger Johnson",
  title =        "{Alan Turing} and his contemporaries: building the
                 world's first computers",
  publisher =    "British Computer Society",
  address =      "London, UK",
  pages =        "xiv + 111",
  year =         "2012",
  ISBN =         "1-906124-90-6 (paperback), 1-78017-105-6 (PDF e-book),
                 1-78017-106-4 (ePub e-book), 1-78017-107-2 (Kindle
                 e-book)",
  ISBN-13 =      "978-1-906124-90-8 (paperback), 978-1-78017-105-0 (PDF
                 e-book), 978-1-78017-106-7 (ePub e-book),
                 978-1-78017-107-4 (Kindle e-book)",
  LCCN =         "QA76.17 .A423 2012",
  bibdate =      "Fri Jun 29 12:40:35 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/bibnet/authors/t/turing-alan-mathison.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 library.ox.ac.uk:210/ADVANCE",
  price =        "UK\pounds 11.69",
  abstract =     "Secret wartime projects in areas such as
                 code-breaking, radar and ballistics produced a wealth
                 of ideas and technologies that kick-started the
                 development of digital computers. This text tells the
                 story of the people and projects that flourished in the
                 post-war period.",
  acknowledgement = ack-nhfb,
  subject =      "Turing, Alan Mathison; Contemporaries; Computer
                 science; Great Britain; History; Computer scientists;
                 Computers and IT",
  subject-dates = "1912--1954",
}

@Article{Lee:2012:IBS,
  author =       "Woomyo Lee and Jae Woo Seo and Pil Joong Lee",
  title =        "Identity-Based Signcryption from Identity-Based
                 Cryptography",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7115",
  pages =        "70--83",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-27890-7_6",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:24:29 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-27890-7_6/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-27890-7",
  book-URL =     "http://www.springerlink.com/content/978-3-642-27890-7",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Lei:2012:RAW,
  author =       "Baiying Lei and Ing Yann Soon and Zhen Li",
  title =        "A Robust Audio Watermarking Scheme Based on Lifting
                 Wavelet Transform and Singular Value Decomposition",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7128",
  pages =        "86--96",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-32205-1_9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:24:41 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012b.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-32205-1_9/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-32205-1",
  book-URL =     "http://www.springerlink.com/content/978-3-642-32205-1",
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Lenstra:2012:PK,
  author =       "Arjen K. Lenstra and James P. Hughes and Maxime Augier
                 and Joppe W. Bos and Thorsten Kleinjung and Christophe
                 Wachter",
  editor =       "Reihaneh Safavi-Naini and Ran Canetti",
  booktitle =    "{Proceedings of the 32nd Annual Conference on Advances
                 in Cryptology}",
  title =        "Public keys",
  volume =       "7417",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "626--642",
  year =         "2012",
  DOI =          "https://doi.org/10.1007/978-3-642-32009-5_37",
  bibdate =      "Fri Jul 29 08:06:57 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  series =       ser-LNCS,
  URL =          "https://dl.acm.org/doi/10.1007/978-3-642-32009-5_37",
  abstract =     "We performed a sanity check of public keys collected
                 on the web and found that the vast majority works as
                 intended. Our main goal was to test the validity of the
                 assumption that different random choices are made each
                 time keys are generated. We found that this is not
                 always the case, resulting in public keys that offer no
                 security. Our conclusion is that generating secure
                 public keys in the real world is challenging. We did
                 not study usage of public keys.",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-32009-5",
}

@TechReport{Lenstra:2012:RWW,
  author =       "Arjen K. Lenstra and James P. Hughes and Maxime Augier
                 and Joppe W. Bos and Thorsten Kleinjung and Christophe
                 Wachter",
  title =        "{Ron} was wrong, {Whit} is right",
  type =         "Report",
  institution =  "EPFL IC LACAL",
  address =      "Lausanne, Switzerland",
  pages =        "16",
  day =          "14",
  month =        feb,
  year =         "2012",
  bibdate =      "Wed Feb 15 10:37:09 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://eprint.iacr.org/2012/064",
  abstract =     "We performed a sanity check of public keys collected
                 on the web. Our main goal was to test the validity of
                 the assumption that different random choices are made
                 each time keys are generated. We found that the vast
                 majority of public keys work as intended. A more
                 disconcerting finding is that two out of every one
                 thousand RSA moduli that we collected offer no
                 security. Our conclusion is that the validity of the
                 assumption is questionable and that generating keys in
                 the real world for ``multiple-secrets'' cryptosystems
                 such as RSA is significantly riskier than for
                 ``single-secret'' ones such as ElGamal or (EC)DSA which
                 are based on Diffie-Hellman.",
  acknowledgement = ack-nhfb,
  keywords =     "(batch) factoring; 99.8\% security; discrete
                 logarithm; DSA; ECDSA; ElGamal; Euclidean algorithm;
                 K9; RSA; Sanity check; seeding random number
                 generators",
  remark =       "The insecurities described in this article are due to
                 faulty random-number generator, although the failure of
                 that process is yet to be analyzed.",
}

@Article{Lertvorratham:2012:ISM,
  author =       "Supachote Lertvorratham and Pipat Hiranvanichakorn",
  title =        "Integrating Secure Multipath Mobile Ad Hoc Network
                 With Self-Authentication Strategy",
  journal =      j-INT-J-COMPUT-APPL,
  volume =       "34",
  number =       "3",
  pages =        "174--184",
  year =         "2012",
  DOI =          "https://doi.org/10.2316/Journal.202.2012.3.202-3245",
  ISSN =         "1206-212X (print), 1925-7074 (electronic)",
  ISSN-L =       "1206-212X",
  bibdate =      "Sat Apr 21 17:28:10 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijca.bib",
  URL =          "https://www.tandfonline.com/doi/full/10.2316/Journal.202.2012.3.202-3245",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Computer Applications",
  journal-URL =  "https://www.tandfonline.com/loi/tjca20",
  online-date =  "11 Jul 2015",
}

@Article{Lewko:2012:NPM,
  author =       "Allison Lewko and Brent Waters",
  title =        "New Proof Methods for Attribute-Based Encryption:
                 Achieving Full Security through Selective Techniques",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7417",
  pages =        "180--198",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-32009-5_12",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:22:07 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012g.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-32009-5_12/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-32009-5",
  book-URL =     "http://www.springerlink.com/content/978-3-642-32009-5",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Li:2012:BIB,
  author =       "Fagen Li and Muhammad Khurram Khan",
  title =        "A biometric identity-based signcryption scheme",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "28",
  number =       "1",
  pages =        "306--310",
  month =        jan,
  year =         "2012",
  CODEN =        "FGSEVI",
  DOI =          "https://doi.org/10.1016/j.future.2010.11.004",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Thu Mar 8 07:52:12 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib;
                 http://www.sciencedirect.com/science/journal/0167739X",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X10002141",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Li:2012:BVS,
  author =       "Long-Hai Li and Cheng-Qiang Huang and Shao-Feng Fu",
  title =        "Boardroom Voting Scheme with Unconditionally Secret
                 Ballots Based on {DC-Net}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7645",
  pages =        "220--232",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-34601-9_17",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:17:59 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012k.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-34601-9_17/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-34601-9",
  book-URL =     "http://www.springerlink.com/content/978-3-642-34601-9",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Li:2012:ESD,
  author =       "Xiong Li and Yongping Xiong and Jian Ma and Wendong
                 Wang",
  title =        "An efficient and security dynamic identity based
                 authentication protocol for multi-server architecture
                 using smart cards",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "35",
  number =       "2",
  pages =        "763--769",
  month =        mar,
  year =         "2012",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Wed Jan 28 15:44:13 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804511002244",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Netw. Comput. Appl.",
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Li:2012:ESS,
  author =       "Fagen Li and Mingwu Zhang and Tsuyoshi Takagi",
  title =        "Efficient signcryption in the standard model",
  journal =      j-CCPE,
  volume =       "24",
  number =       "17",
  pages =        "1977--1989",
  day =          "10",
  month =        dec,
  year =         "2012",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.1823",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Mon Nov 5 07:44:57 MST 2012",
  bibsource =    "http://www.interscience.wiley.com/jpages/1532-0626;
                 https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "22 Sep 2011",
}

@Article{Li:2012:FDM,
  author =       "Wei Li and Dawu Gu and Zhiqiang Liu and Ya Liu and
                 Xiaohu Huang",
  title =        "Fault Detection of the {MacGuffin Cipher} against
                 Differential Fault Attack",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7222",
  pages =        "102--112",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-32298-3_7",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:17:56 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012c.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-32298-3_7/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-32298-3",
  book-URL =     "http://www.springerlink.com/content/978-3-642-32298-3",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Li:2012:IBO,
  author =       "Fagen Li and Muhammad Khurram Khan and Khaled
                 Alghathbar and Tsuyoshi Takagi",
  title =        "Identity-based online\slash offline signcryption for
                 low power devices",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "35",
  number =       "1",
  pages =        "340--347",
  month =        jan,
  year =         "2012",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Wed Jan 28 15:44:09 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S108480451100155X",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Netw. Comput. Appl.",
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Li:2012:IIA,
  author =       "Yanjun Li and Wenling Wu and Lei Zhang",
  title =        "Improved Integral Attacks on Reduced-Round {CLEFIA}
                 Block Cipher",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7115",
  pages =        "28--39",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-27890-7_3",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:24:29 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-27890-7_3/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-27890-7",
  book-URL =     "http://www.springerlink.com/content/978-3-642-27890-7",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Li:2012:OEA,
  author =       "Jingwei Li and Chunfu Jia and Jin Li and Xiaofeng
                 Chen",
  title =        "Outsourcing Encryption of Attribute-Based Encryption
                 with {MapReduce}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7618",
  pages =        "191--201",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-34129-8_17",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:25:56 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012k.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-34129-8_17/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-34129-8",
  book-URL =     "http://www.springerlink.com/content/978-3-642-34129-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Li:2012:RIB,
  author =       "Jian Li and Hongmei Liu and Jiwu Huang and Yun Q.
                 Shi",
  title =        "Reference index-based {H.264} video watermarking
                 scheme",
  journal =      j-TOMCCAP,
  volume =       "8",
  number =       "2S",
  pages =        "33:1--33:??",
  month =        sep,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2344436.2344439",
  ISSN =         "1551-6857 (print), 1551-6865 (electronic)",
  ISSN-L =       "1551-6857",
  bibdate =      "Tue Nov 6 18:13:05 MST 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tomccap/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tomccap.bib",
  abstract =     "Video watermarking has received much attention over
                 the past years as a promising solution to copy
                 protection. Watermark robustness is still a key issue
                 of research, especially when a watermark is embedded in
                 the compressed video domain. In this article, a robust
                 watermarking scheme for H.264 video is proposed. During
                 video encoding, the watermark is embedded in the index
                 of the reference frame, referred to as reference index,
                 a bitstream syntax element newly proposed in the H.264
                 standard. Furthermore, the video content (current coded
                 blocks) is modified based on an optimization model,
                 aiming at improving watermark robustness without
                 unacceptably degrading the video's visual quality or
                 increasing the video's bit rate. Compared with the
                 existing schemes, our method has the following three
                 advantages: (1) The bit rate of the watermarked video
                 is adjustable; (2) the robustness against common video
                 operations can be achieved; (3) the watermark embedding
                 and extraction are simple. Extensive experiments have
                 verified the good performance of the proposed
                 watermarking scheme.",
  acknowledgement = ack-nhfb,
  articleno =    "33",
  fjournal =     "ACM Transactions on Multimedia Computing,
                 Communications, and Applications",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J961",
}

@Article{Liao:2012:NSM,
  author =       "Xin Liao and Qiao-yan Wen and Ze-li Zhao and Jie
                 Zhang",
  title =        "A Novel Steganographic Method with Four-Pixel
                 Differencing and Modulus Function",
  journal =      j-FUND-INFO,
  volume =       "118",
  number =       "3",
  pages =        "281--289",
  month =        aug,
  year =         "2012",
  CODEN =        "FUMAAJ",
  DOI =          "https://doi.org/10.3233/FI-2012-714",
  ISSN =         "0169-2968 (print), 1875-8681 (electronic)",
  ISSN-L =       "0169-2968",
  bibdate =      "Sat Mar 5 17:15:27 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/fundinfo2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Fundamenta Informaticae",
  journal-URL =  "http://content.iospress.com/journals/fundamenta-informaticae",
}

@Article{Ling:2012:NCC,
  author =       "Zhen Ling and Junzhou Luo and Wei Yu and Xinwen Fu and
                 Dong Xuan and Weijia Jia",
  title =        "A new cell-counting-based attack against {Tor}",
  journal =      j-IEEE-TRANS-NETWORKING,
  volume =       "20",
  number =       "4",
  pages =        "1245--1261",
  month =        aug,
  year =         "2012",
  CODEN =        "IEANEP",
  DOI =          "https://doi.org/10.1109/TNET.2011.2178036",
  ISSN =         "1063-6692 (print), 1558-2566 (electronic)",
  ISSN-L =       "1063-6692",
  bibdate =      "Mon Oct 22 08:33:08 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
  abstract =     "Various low-latency anonymous communication systems
                 such as Tor and Anonymizer have been designed to
                 provide anonymity service for users. In order to hide
                 the communication of users, most of the anonymity
                 systems pack the application data into equal-sized
                 cells (e.g., 512 B for Tor, a known real-world,
                 circuit-based, low-latency anonymous communication
                 network). Via extensive experiments on Tor, we found
                 that the size of IP packets in the Tor network can be
                 very dynamic because a cell is an application concept
                 and the IP layer may repack cells. Based on this
                 finding, we investigate a new cell-counting-based
                 attack against Tor, which allows the attacker to
                 confirm anonymous communication relationship among
                 users very quickly. In this attack, by marginally
                 varying the number of cells in the target traffic at
                 the malicious exit onion router, the attacker can embed
                 a secret signal into the variation of cell counter of
                 the target traffic. The embedded signal will be carried
                 along with the target traffic and arrive at the
                 malicious entry onion router. Then, an accomplice of
                 the attacker at the malicious entry onion router will
                 detect the embedded signal based on the received cells
                 and confirm the communication relationship among users.
                 We have implemented this attack against Tor, and our
                 experimental data validate its feasibility and
                 effectiveness. There are several unique features of
                 this attack. First, this attack is highly efficient and
                 can confirm very short communication sessions with only
                 tens of cells. Second, this attack is effective, and
                 its detection rate approaches 100\% with a very low
                 false positive rate. Third, it is possible to implement
                 the attack in a way that appears to be very difficult
                 for honest participants to detect (e.g., using our
                 hopping-based signal embedding).",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE\slash ACM Transactions on Networking",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J771",
}

@Article{Ling:2012:SHS,
  author =       "Huo-Chong Ling and Raphael C.-W. Phan",
  title =        "On the Security of a Hybrid {SVD--DCT} Watermarking
                 Method Based on {LPSNR}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7087",
  pages =        "257--266",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-25367-6_23",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Mon Dec 24 07:07:43 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/978-3-642-25367-6_23",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-25367-6",
  book-URL =     "http://www.springerlink.com/content/978-3-642-25367-6",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Liu:2012:ESS,
  author =       "Yan-Xiao Liu and Lein Harn and Ching-Nung Yang and
                 Yu-Qing Zhang",
  title =        "Efficient $ (n, t, n) $ secret sharing schemes",
  journal =      j-J-SYST-SOFTW,
  volume =       "85",
  number =       "6",
  pages =        "1325--1332",
  month =        jun,
  year =         "2012",
  CODEN =        "JSSODM",
  DOI =          "https://doi.org/10.1016/j.jss.2012.01.027",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Mon Apr 9 07:26:09 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0164121212000234",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Liu:2012:FVC,
  author =       "Feng Liu and Teng Guo and ChuanKun Wu and Ching-Nung
                 Yang",
  title =        "Flexible Visual Cryptography Scheme without
                 Distortion",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7128",
  pages =        "211--227",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-32205-1_18",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:24:41 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012b.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-32205-1_18/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-32205-1",
  book-URL =     "http://www.springerlink.com/content/978-3-642-32205-1",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Liu:2012:LFA,
  author =       "Zhiqiang Liu and Dawu Gu and Ya Liu and Wei Li",
  title =        "Linear Fault Analysis of Block Ciphers",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7341",
  pages =        "241--256",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-31284-7_15",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:20:27 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012e.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-31284-7_15/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-31284-7",
  book-URL =     "http://www.springerlink.com/content/978-3-642-31284-7",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Liu:2012:SOCa,
  author =       "Shengli Liu and Fangguo Zhang and Kefei Chen",
  title =        "Selective Opening Chosen Ciphertext Security Directly
                 from the {DDH} Assumption",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7645",
  pages =        "100--112",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-34601-9_8",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:17:59 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012k.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-34601-9_8/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-34601-9",
  book-URL =     "http://www.springerlink.com/content/978-3-642-34601-9",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Lopriore:2012:EPP,
  author =       "Lanfranco Lopriore",
  title =        "Encrypted Pointers in Protection System Design",
  journal =      j-COMP-J,
  volume =       "55",
  number =       "4",
  pages =        "497--507",
  month =        apr,
  year =         "2012",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxr107",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Mar 27 18:19:58 MDT 2012",
  bibsource =    "http://comjnl.oxfordjournals.org/content/55/4.toc;
                 https://www.math.utah.edu/pub/tex/bib/comp2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/55/4/497.full.pdf+html",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "November 10, 2011",
}

@Article{Low:2012:BRB,
  author =       "Robert J. Low",
  title =        "Book Review: {{\booktitle{Codes: an Introduction to
                 Information Communication and Cryptography}}, by Norman
                 L. Biggs}",
  journal =      j-SIGACT,
  volume =       "43",
  number =       "1",
  pages =        "27--29",
  month =        mar,
  year =         "2012",
  CODEN =        "SIGNDM",
  DOI =          "https://doi.org/10.1145/2160649.2160658",
  ISSN =         "0163-5700 (print), 1943-5827 (electronic)",
  ISSN-L =       "0163-5700",
  bibdate =      "Tue Mar 20 14:39:02 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib",
  note =         "See \cite{Biggs:2008:CII}.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGACT News",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J697",
}

@Article{Lu:2012:BBE,
  author =       "Rongxing Lu and Xiaodong Lin and Haojin Zhu and
                 Xiaohui Liang and Xuemin (Sherman) Shen",
  title =        "{BECAN}: a {Bandwidth-Efficient Cooperative
                 Authentication Scheme} for Filtering Injected False
                 Data in Wireless Sensor Networks",
  journal =      j-IEEE-TRANS-PAR-DIST-SYS,
  volume =       "23",
  number =       "1",
  pages =        "32--43",
  month =        jan,
  year =         "2012",
  CODEN =        "ITDSEO",
  DOI =          "https://doi.org/10.1109/TPDS.2011.95",
  ISSN =         "1045-9219 (print), 1558-2183 (electronic)",
  ISSN-L =       "1045-9219",
  bibdate =      "Thu Mar 1 14:46:07 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranspardistsys.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Parallel and Distributed
                 Systems",
  journal-URL =  "http://www.computer.org/tpds/archives.htm",
}

@Article{Lu:2012:HOM,
  author =       "Jiqiang Lu and Yongzhuang Wei and Jongsung Kim and
                 Enes Pasalic",
  title =        "The Higher-Order Meet-in-the-Middle Attack and Its
                 Application to the {Camellia} Block Cipher",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7668",
  pages =        "244--264",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-34931-7_15",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:18:33 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012l.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-34931-7_15/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-34931-7",
  book-URL =     "http://www.springerlink.com/content/978-3-642-34931-7",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Lu:2012:IEC,
  author =       "Xianhui Lu and Bao Li and Qixiang Mei and Yamin Liu",
  title =        "Improved Efficiency of Chosen Ciphertext Secure
                 Encryption from Factoring",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7232",
  pages =        "34--45",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-29101-2_3",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:18:09 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012c.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-29101-2_3/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-29101-2",
  book-URL =     "http://www.springerlink.com/content/978-3-642-29101-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Lu:2012:MMA,
  author =       "Jiqiang Lu and Yongzhuang Wei and Enes Pasalic and
                 Pierre-Alain Fouque",
  title =        "Meet-in-the-Middle Attack on Reduced Versions of the
                 {Camellia} Block Cipher",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7631",
  pages =        "197--215",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-34117-5_13",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:26:12 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012k.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-34117-5_13/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-34117-5",
  book-URL =     "http://www.springerlink.com/content/978-3-642-34117-5",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Luo:2012:ESI,
  author =       "Jianqiang Luo and Kevin D. Bowers and Alina Oprea and
                 Lihao Xu",
  title =        "Efficient software implementations of large finite
                 fields {$ {\rm GF}(2^n) $} for secure storage
                 applications",
  journal =      j-TOS,
  volume =       "8",
  number =       "1",
  pages =        "2:1--2:??",
  month =        feb,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2093139.2093141",
  ISSN =         "1553-3077 (print), 1553-3093 (electronic)",
  ISSN-L =       "1553-3077",
  bibdate =      "Fri Mar 16 15:48:59 MDT 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tos/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tos.bib",
  abstract =     "Finite fields are widely used in constructing
                 error-correcting codes and cryptographic algorithms. In
                 practice, error-correcting codes use small finite
                 fields to achieve high-throughput encoding and
                 decoding. Conversely, cryptographic systems employ
                 considerably larger finite fields to achieve high
                 levels of security. We focus on developing efficient
                 software implementations of arithmetic operations in
                 reasonably large finite fields as needed by secure
                 storage applications. In this article, we study several
                 arithmetic operation implementations for finite fields
                 ranging from $ {\rm GF}(2^{32}) $ to $ {\rm
                 GF}(2^{128}) $. We implement multiplication and
                 division in these finite fields by making use of
                 precomputed tables in smaller fields, and several
                 techniques of extending smaller field arithmetic into
                 larger field operations. We show that by exploiting
                 known techniques, as well as new optimizations, we are
                 able to efficiently support operations over finite
                 fields of interest. We perform a detailed evaluation of
                 several techniques, and show that we achieve very
                 practical performance for both multiplication and
                 division. Finally, we show how these techniques find
                 applications in the implementation of HAIL, a highly
                 available distributed cloud storage layer. Using the
                 newly implemented arithmetic operations in $ {\rm
                 GF}(2^{64}) $, HAIL improves its performance by a
                 factor of two, while simultaneously providing a higher
                 level of security.",
  acknowledgement = ack-nhfb,
  articleno =    "2",
  fjournal =     "ACM Transactions on Storage",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J960",
}

@Article{Luo:2012:FSI,
  author =       "Xiangyang Luo and Fenlin Liu and Chunfang Yang and
                 Shiguo Lian and Daoshun Wang",
  title =        "On {F5} Steganography in Images",
  journal =      j-COMP-J,
  volume =       "55",
  number =       "4",
  pages =        "447--456",
  month =        apr,
  year =         "2012",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxr092",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Mar 27 18:19:58 MDT 2012",
  bibsource =    "http://comjnl.oxfordjournals.org/content/55/4.toc;
                 https://www.math.utah.edu/pub/tex/bib/comp2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/55/4/447.full.pdf+html",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "September 12, 2011",
}

@Article{Luo:2012:FSU,
  author =       "Song Luo and Qingni Shen and Zhong Chen",
  title =        "Fully Secure Unidirectional Identity-Based Proxy
                 Re-encryption",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7259",
  pages =        "109--126",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-31912-9_8",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:18:40 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012d.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-31912-9_8/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-31912-9",
  book-URL =     "http://www.springerlink.com/content/978-3-642-31912-9",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Luo:2012:ICB,
  author =       "Junzhou Luo and Xiaogang Wang and Ming Yang",
  title =        "An interval centroid based spread spectrum
                 watermarking scheme for multi-flow traceback",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "35",
  number =       "1",
  pages =        "60--71",
  month =        jan,
  year =         "2012",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Wed Jan 28 15:44:09 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804511000579",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Netw. Comput. Appl.",
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Luo:2012:LVT,
  author =       "Yong Luo and Yan Zhao and Lei Cheng and Jianxin Wang
                 and Xuchong Liu",
  title =        "Lossless Visible Three-Dimensional Watermark of
                 Digital Elevation Model Data",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7220",
  pages =        "138--147",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-31439-1_13",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:17:53 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012c.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-31439-1_13/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-31439-1",
  book-URL =     "http://www.springerlink.com/content/978-3-642-31439-1",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Lupu:2012:IBK,
  author =       "Radu Lupu and Eugen Borcoci and Tinku Rasheed",
  title =        "Identity-Based Key Derivation Method for Low Delay
                 Inter-domain Handover Re-authentication Service",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7161",
  pages =        "162--175",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-29615-4_12",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:25:21 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012b.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-29615-4_12/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-29615-4",
  book-URL =     "http://www.springerlink.com/content/978-3-642-29615-4",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Ma:2012:CIS,
  author =       "Chun-Guang Ma and Ding Wang and Qi-Ming Zhang",
  title =        "Cryptanalysis and Improvement of {Sood} et al.'s
                 Dynamic {ID}-Based Authentication Scheme",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7154",
  pages =        "141--152",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-28073-3_13",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:25:12 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012b.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-28073-3_13/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-28073-3",
  book-URL =     "http://www.springerlink.com/content/978-3-642-28073-3",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Maachaoui:2012:MLA,
  author =       "M. Maachaoui and A. Abou {El Kalam} and C. Fraboul and
                 A. Ait Ouahman",
  title =        "Multi-level Authentication Based Single Sign-On for
                 {IMS} Services",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7394",
  pages =        "174--187",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-32805-3_14",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:21:38 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012f.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-32805-3_14/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-32805-3",
  book-URL =     "http://www.springerlink.com/content/978-3-642-32805-3",
  fjournal =     "Lecture Notes in Computer Science",
}

@Book{MacCormick:2012:NAC,
  author =       "John MacCormick",
  title =        "Nine algorithms that changed the future: the ingenious
                 ideas that drive today's computers",
  publisher =    pub-PRINCETON,
  address =      pub-PRINCETON:adr,
  pages =        "x + 2 + 219",
  year =         "2012",
  ISBN =         "0-691-14714-0 (hardcover), 0-691-15819-3 (paperback)",
  ISBN-13 =      "978-0-691-14714-7 (hardcover), 978-0-691-15819-8
                 (paperback)",
  LCCN =         "QA76 .M21453 2012",
  bibdate =      "Tue May 5 17:16:06 MDT 2015",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/datacompression.bib;
                 https://www.math.utah.edu/pub/tex/bib/mathgaz2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/pagerank.bib;
                 z3950.loc.gov:7090/Voyager",
  note =         "With a foreword by Christopher M. Bishop.",
  URL =          "http://press.princeton.edu/chapters/s9528.pdf;
                 http://www.jstor.org/stable/10.2307/j.ctt7t71s",
  abstract =     "Every day, we use our computers to perform remarkable
                 feats. A simple web search picks out a handful of
                 relevant needles from the world's biggest haystack: the
                 billions of pages on the World Wide Web. Uploading a
                 photo to Facebook transmits millions of pieces of
                 information over numerous error-prone network links,
                 yet somehow a perfect copy of the photo arrives intact.
                 Without even knowing it, we use public-key cryptography
                 to transmit secret information like credit card
                 numbers; and, we use digital signatures to verify the
                 identity of the websites we visit. How do our computers
                 perform these tasks with such ease?\par

                 This is the first book to answer that question in
                 language anyone can understand, revealing the
                 extraordinary ideas that power our PCs, laptops, and
                 smartphones. Using vivid examples, John MacCormick
                 explains the fundamental ``tricks'' behind nine types
                 of computer algorithms, including artificial
                 intelligence (where we learn about the ``nearest
                 neighbor trick'' and ``twenty questions trick''),
                 Google's famous PageRank algorithm (which uses the
                 ``random surfer trick''), data compression, error
                 correction, and much more.\par

                 These revolutionary algorithms have changed our world:
                 this book unlocks their secrets, and lays bare the
                 incredible ideas that our computers use every day.",
  acknowledgement = ack-nhfb,
  author-dates = "1972--",
  subject =      "Computer science; Computer algorithms; Artificial
                 intelligence",
  tableofcontents = "Foreword / ix \\
                 1. Introduction: What Are the Extraordinary Ideas
                 Computers Use Every Day? / 1 \\
                 2. Search Engine Indexing: Finding Needles in the
                 World's Biggest Haystack / 10 \\
                 3. PageRank: The Technology That Launched Google / 24
                 \\
                 4. Public Key Cryptography: Sending Secrets on a
                 Postcard 38 \\
                 5. Error-Correcting Codes: Mistakes That Fix Themselves
                 / 60 \\
                 6. Pattern Recognition: Learning from Experience / 80
                 \\
                 7. Data Compression: Something for Nothing / 105 \\
                 8. Databases: The Quest for Consistency / 122 \\
                 9. Digital Signatures: Who Really Wrote This Software?
                 / 149 \\
                 10. What Is Computable? / 174 \\
                 11. Conclusion: More Genius at Your Fingertips? / 199
                 \\
                 Acknowledgments / 205 \\
                 Sources and Further Reading / 207 \\
                 Index / 211",
}

@Article{Madanayake:2012:BPS,
  author =       "H. L. P. Arjuna Madanayake and R. J. Cintra and V. S.
                 Dimitrov and L. T. Bruton",
  title =        "Block-Parallel Systolic-Array Architecture for {$2$-D}
                 {NTT}-Based Fragile Watermark Embedding",
  journal =      j-PARALLEL-PROCESS-LETT,
  volume =       "22",
  number =       "3",
  pages =        "1250009",
  month =        sep,
  year =         "2012",
  CODEN =        "PPLTEE",
  DOI =          "https://doi.org/10.1142/S0129626412500090",
  ISSN =         "0129-6264 (print), 1793-642X (electronic)",
  ISSN-L =       "0129-6264",
  bibdate =      "Sat Nov 3 13:48:52 MDT 2012",
  bibsource =    "http://ejournals.wspc.com.sg/ppl/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/parallelprocesslett.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Parallel Processing Letters",
  journal-URL =  "http://www.worldscientific.com/loi/ppl",
  keywords =     "NTT (number theoretic transform)",
}

@Article{Madhusudhan:2012:DIB,
  author =       "R. Madhusudhan and R. C. Mittal",
  title =        "Dynamic {ID-based} remote user password authentication
                 schemes using smart cards: a review",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "35",
  number =       "4",
  pages =        "1235--1248",
  month =        jul,
  year =         "2012",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Wed Jan 28 15:44:20 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804512000215",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Netw. Comput. Appl.",
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Maes:2012:PFF,
  author =       "Roel Maes and Anthony {Van Herrewege} and Ingrid
                 Verbauwhede",
  title =        "{PUFKY}: a Fully Functional {PUF}-Based Cryptographic
                 Key Generator",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7428",
  pages =        "302--319",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-33027-8_18",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:22:21 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012g.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-33027-8_18/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-33027-8",
  book-URL =     "http://www.springerlink.com/content/978-3-642-33027-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Maimut:2012:LCR,
  author =       "Diana Maimut and Khaled Ouafi",
  title =        "Lightweight Cryptography for {RFID} Tags",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "2",
  pages =        "76--79",
  month =        mar # "\slash " # apr,
  year =         "2012",
  DOI =          "https://doi.org/10.1109/MSP.2012.43",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 2 06:03:36 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
}

@Article{Maitra:2012:NAC,
  author =       "Subhashis Maitra and Amitabha Sinha",
  title =        "A new algorithm for computing triple-base number
                 system",
  journal =      j-COMP-ARCH-NEWS,
  volume =       "40",
  number =       "4",
  pages =        "3--9",
  month =        sep,
  year =         "2012",
  CODEN =        "CANED2",
  DOI =          "https://doi.org/10.1145/2411116.2411119",
  ISSN =         "0163-5964 (print), 1943-5851 (electronic)",
  ISSN-L =       "0163-5964",
  bibdate =      "Tue Dec 11 08:06:57 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/fparith.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigarch.bib",
  abstract =     "We introduce here a generalized method a new Algorithm
                 to find Triple-Base number system and Triple-Base chain
                 and hence in turn Single Digit Triple-Base number
                 system(SDTBNS). The proposed method is not only simpler
                 and faster than the Algorithms to find Double-Base
                 number system or Double-Base chain, experimentally it
                 also returns a shorter length of Triple-Base chain
                 which in turn reduces the size of the look-up-table to
                 find out SDTBNS. The complexity analysis and
                 experimental results shows the novelty of the proposed
                 Algorithm. Moreover when the proposed method is applied
                 to find scalar multiplication in case of Elliptic Curve
                 Cryptography and coefficient multiplication in case of
                 designing digital filter, its efficiency also proves
                 its novelty. Here we have used third base as $5$
                 because when it is multiplied by $2$ gives $ 10$ which
                 can be efficiently used for decimal shifting, i.e. if
                 an integer '$n$' can be represented in SDTBNS form,
                 then $ n / 10_x$ or $ n \times 10_x$ can also
                 represented in SDTBNS only by diving or multiplying
                 '$n$' by $ 10$.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGARCH Computer Architecture News",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J89",
}

@Article{Majzoub:2012:MRH,
  author =       "Sohaib Majzoub and Hassan Diab",
  title =        "{MorphoSys} reconfigurable hardware for cryptography:
                 the {Twofish} case",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "59",
  number =       "1",
  pages =        "22--41",
  month =        jan,
  year =         "2012",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-010-0413-3",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Tue Dec 13 15:25:33 MST 2011",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0920-8542&volume=59&issue=1;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  URL =          "http://link.springer.com/article/10.1007/s11227-010-0413-3",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Article{Malik:2012:AIC,
  author =       "Sana Ambreen Malik and Asifullah Khan and Mutawarra
                 Hussain and Khurram Jawad and Rafiullah Chamlawi and
                 Abdul Jalil",
  title =        "Authentication of images for {$3$D} cameras:
                 {Reversibly} embedding information using intelligent
                 approaches",
  journal =      j-J-SYST-SOFTW,
  volume =       "85",
  number =       "11",
  pages =        "2665--2673",
  month =        nov,
  year =         "2012",
  CODEN =        "JSSODM",
  DOI =          "https://doi.org/10.1016/j.jss.2012.06.015",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Mon Aug 20 17:08:56 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0164121212001719",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Mansouri:2012:ACA,
  author =       "Shohreh Sharif Mansouri and Elena Dubrova",
  title =        "An Architectural Countermeasure against Power Analysis
                 Attacks for {FSR}-Based Stream Ciphers",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7275",
  pages =        "54--68",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-29912-4_5",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:19:00 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012d.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-29912-4_5/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-29912-4",
  book-URL =     "http://www.springerlink.com/content/978-3-642-29912-4",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Manzanares-Lopez:2012:ICU,
  author =       "Pilar Manzanares-Lopez and Josemaria Malgosa-Sanahuja
                 and Juan Pedro Mu{\~n}oz-Gea",
  title =        "The importance of considering unauthentic transactions
                 in trust management systems",
  journal =      j-J-PAR-DIST-COMP,
  volume =       "72",
  number =       "6",
  pages =        "809--818",
  month =        jun,
  year =         "2012",
  CODEN =        "JPDCER",
  DOI =          "https://doi.org/10.1016/j.jpdc.2012.03.006",
  ISSN =         "0743-7315 (print), 1096-0848 (electronic)",
  ISSN-L =       "0743-7315",
  bibdate =      "Thu Apr 19 16:59:49 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jpardistcomp.bib;
                 http://www.sciencedirect.com/science/journal/07437315",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0743731512000718",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Parallel and Distributed Computing",
  journal-URL =  "http://www.sciencedirect.com/science/journal/07437315",
}

@Article{Markoff:2012:FFO,
  author =       "John Markoff",
  title =        "Flaw found in an online encryption method",
  journal =      j-NY-TIMES,
  day =          "14",
  month =        jan,
  year =         "2012",
  DOI =          "https://www.nytimes.com/2012/02/15/technology/researchers-find-flaw-in-an-online-encryption-method.html",
  bibdate =      "Fri Jul 29 08:09:06 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
}

@Article{Martinez-Julia:2012:NIB,
  author =       "P. Martinez-Julia and A. F. G{\'o}mez-Skarmeta",
  title =        "A Novel Identity-based Network Architecture for Next
                 Generation {Internet}",
  journal =      j-J-UCS,
  volume =       "18",
  number =       "12",
  pages =        "1643--??",
  month =        "????",
  year =         "2012",
  CODEN =        "????",
  ISSN =         "0948-6968",
  ISSN-L =       "0948-6968",
  bibdate =      "Thu Nov 8 12:03:11 MST 2012",
  bibsource =    "http://www.jucs.org/jucs;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jucs.bib",
  URL =          "http://www.jucs.org/jucs_18_12/a_novel_identity_based",
  acknowledgement = ack-nhfb,
  fjournal =     "J.UCS: Journal of Universal Computer Science",
  journal-URL =  "http://www.jucs.org/jucs",
}

@Article{Mathew:2012:EIC,
  author =       "K. Preetha Mathew and Sachin Vasant and Sridhar
                 Venkatesan and C. Pandu Rangan",
  title =        "An Efficient {IND-CCA2} Secure Variant of the
                 {Niederreiter} Encryption Scheme in the Standard
                 Model",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7372",
  pages =        "166--179",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-31448-3_13",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:21:08 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012f.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-31448-3_13/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-31448-3",
  book-URL =     "http://www.springerlink.com/content/978-3-642-31448-3",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Matsuo:2012:MAK,
  author =       "Shin'ichiro Matsuo and Daisuke Moriyama and Moti
                 Yung",
  title =        "Multifactor Authenticated Key Renewal",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7222",
  pages =        "204--220",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-32298-3_14",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:17:56 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012c.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-32298-3_14/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-32298-3",
  book-URL =     "http://www.springerlink.com/content/978-3-642-32298-3",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Maurer:2012:CCN,
  author =       "Ueli Maurer",
  title =        "Constructive Cryptography --- a New Paradigm for
                 Security Definitions and Proofs",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6993",
  pages =        "33--56",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-27375-9_3",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:21:58 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-27375-9_3/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-27375-9",
  book-URL =     "http://www.springerlink.com/content/978-3-642-27375-9",
  fjournal =     "Lecture Notes in Computer Science",
}

@Book{McKay:2012:SLC,
  author =       "Sinclair McKay",
  title =        "The secret lives of codebreakers: the men and women
                 who cracked the {Enigma} code at {Bletchley Park}",
  publisher =    "Plume",
  address =      "New York, NY, USA",
  pages =        "vi + 338",
  year =         "2012",
  ISBN =         "0-452-29871-7",
  ISBN-13 =      "978-0-452-29871-2",
  LCCN =         "D810.C88 M39 2012",
  bibdate =      "Thu Dec 28 10:01:24 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  remark =       "Originally published as: The secret life of Bletchley
                 Park. London: Aurum, 2010.",
  subject =      "World War, 1939--1945; Cryptography; Electronic
                 intelligence; Great Britain; Bletchley Park (Milton
                 Keynes, England); History",
  tableofcontents = "Reporting for duty \\
                 1938--39: The school of codes \\
                 1939: Rounding up the brightest and the best \\
                 The house and the surrounding country \\
                 1939: How do you break the unbreakable? \\
                 1939--40: The Enigma initiation \\
                 Freezing billets and outdoor loos \\
                 1940: the first glimmers of light \\
                 1940: inspiration and intensity \\
                 1940: The coming of the bombes \\
                 1940: Enigma and the Blitz \\
                 Bletchley and the class question \\
                 1941: The Battle of the Atlantic \\
                 Food, booze and too much tea \\
                 1941: The wrens and their larks \\
                 1941: Bletchley and Churchill \\
                 Military or civilian? \\
                 1942: Grave setbacks and internal strife \\
                 The rules of attraction \\
                 1943: A very special relationship \\
                 1943: The hazards of careless talk \\
                 Bletchley and the Russians \\
                 The cultural life of Bletchley Park \\
                 1943--44: The rise of the colossus \\
                 1944--45: D-Day and the end of the war \\
                 1945 and after: The immediate aftermath \\
                 Bletchley's intellectual legacy \\
                 After Bletchley: the silence descends \\
                 The rescue of the Park",
}

@Article{Meerwald:2012:ERW,
  author =       "Peter Meerwald and Andreas Uhl",
  title =        "An Efficient Robust Watermarking Method Integrated in
                 {H.264\slash SVC}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7110",
  pages =        "1--14",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-28693-3_1",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:24:24 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-28693-3_1/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-28693-3",
  book-URL =     "http://www.springerlink.com/content/978-3-642-28693-3",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Mendel:2012:DAL,
  author =       "Florian Mendel and Vincent Rijmen and Deniz Toz and
                 Kerem Var{\i}c{\i}",
  title =        "Differential Analysis of the {LED} Block Cipher",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7658",
  pages =        "190--207",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-34961-4_13",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:18:20 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012l.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-34961-4_13/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-34961-4",
  book-URL =     "http://www.springerlink.com/content/978-3-642-34961-4",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Meshram:2012:IBC,
  author =       "Chandrashekhar Meshram and Suchitra A. Meshram and
                 Mingwu Zhang",
  title =        "An {ID}-based cryptographic mechanisms based on {GDLP}
                 and {IFP}",
  journal =      j-INFO-PROC-LETT,
  volume =       "112",
  number =       "19",
  pages =        "753--758",
  day =          "15",
  month =        oct,
  year =         "2012",
  CODEN =        "IFPLAT",
  DOI =          "https://doi.org/10.1016/j.ipl.2012.06.018",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Fri Jul 27 06:23:44 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  URL =          "http://www.sciencedirect.com/science/article/pii/S002001901200169X",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Meziani:2012:IPS,
  author =       "Mohammed Meziani and Gerhard Hoffmann and Pierre-Louis
                 Cayrel",
  title =        "Improving the Performance of the {SYND} Stream
                 Cipher",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7374",
  pages =        "99--116",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-31410-0_7",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:21:11 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012f.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-31410-0_7/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-31410-0",
  book-URL =     "http://www.springerlink.com/content/978-3-642-31410-0",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Michail:2012:EHT,
  author =       "Harris E. Michail and George S. Athanasiou and Vasilis
                 Kelefouras and George Theodoridis and Costas E.
                 Goutis",
  title =        "On the exploitation of a high-throughput {SHA-256
                 FPGA} design for {HMAC}",
  journal =      j-TRETS,
  volume =       "5",
  number =       "1",
  pages =        "2:1--2:??",
  month =        mar,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2133352.2133354",
  ISSN =         "1936-7406 (print), 1936-7414 (electronic)",
  ISSN-L =       "1936-7406",
  bibdate =      "Tue Mar 20 12:12:48 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/trets.bib",
  abstract =     "High-throughput and area-efficient designs of hash
                 functions and corresponding mechanisms for Message
                 Authentication Codes (MACs) are in high demand due to
                 new security protocols that have arisen and call for
                 security services in every transmitted data packet. For
                 instance, IPv6 incorporates the IPSec protocol for
                 secure data transmission. However, the IPSec's
                 performance bottleneck is the HMAC mechanism which is
                 responsible for authenticating the transmitted data.
                 HMAC's performance bottleneck in its turn is the
                 underlying hash function. In this article a
                 high-throughput and small-size SHA-256 hash function
                 FPGA design and the corresponding HMAC FPGA design is
                 presented. Advanced optimization techniques have been
                 deployed leading to a SHA-256 hashing core which
                 performs more than 30\% better, compared to the next
                 better design. This improvement is achieved both in
                 terms of throughput as well as in terms of
                 throughput/area cost factor. It is the first reported
                 SHA-256 hashing core that exceeds 11Gbps (after place
                 and route in Xilinx Virtex 6 board).",
  acknowledgement = ack-nhfb,
  articleno =    "2",
  fjournal =     "ACM Transactions on Reconfigurable Technology and
                 Systems (TRETS)",
  journal-URL =  "http://portal.acm.org/toc.cfm?id=J1151",
}

@Article{Minier:2012:EEC,
  author =       "Marine Minier and Raphael C.-W. Phan",
  title =        "Energy-Efficient Cryptographic Engineering Paradigm",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7039",
  pages =        "78--88",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-27585-2_7",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:22:58 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-27585-2_7/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-27585-2",
  book-URL =     "http://www.springerlink.com/content/978-3-642-27585-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Minier:2012:RKI,
  author =       "Marine Minier and Mar{\'\i}a Naya-Plasencia",
  title =        "A related key impossible differential attack against $
                 22 $ rounds of the lightweight block cipher {LBlock}",
  journal =      j-INFO-PROC-LETT,
  volume =       "112",
  number =       "16",
  pages =        "624--629",
  day =          "31",
  month =        aug,
  year =         "2012",
  CODEN =        "IFPLAT",
  DOI =          "https://doi.org/10.1016/j.ipl.2012.04.012",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Wed Jun 20 16:46:51 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019012001238",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Mironov:2012:IDP,
  author =       "Ilya Mironov and Omkant Pandey and Omer Reingold and
                 Gil Segev",
  title =        "Incremental Deterministic Public-Key Encryption",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7237",
  pages =        "628--644",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-29011-4_36;
                 https://doi.org/10.1007/978-3-642-29011-4_37",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Dec 15 20:55:01 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs.bib",
  URL =          "http://link.springer.com/accesspage/chapter/10.1007/978-3-642-29011-4_36;
                 http://link.springer.com/chapter/10.1007/978-3-642-29011-4_37/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-29011-4",
  book-URL =     "http://www.springerlink.com/content/978-3-642-29011-4",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Moessner:2012:SAS,
  author =       "M. Moessner and Gul N. Khan",
  title =        "Secure authentication scheme for passive {C1G2 RFID}
                 tags",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "56",
  number =       "1",
  pages =        "273--286",
  day =          "12",
  month =        jan,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1016/j.comnet.2011.09.008",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Sat Feb 4 10:23:02 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/13891286",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1389128611003422",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286",
}

@Article{Moldovyan:2012:BBD,
  author =       "Alexandr Moldovyan and Nikolay Moldovyan and Evgenia
                 Novikova",
  title =        "Blind 384-bit Digital Signature Scheme",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7531",
  pages =        "77--83",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-33704-8_7",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:24:26 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012i.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-33704-8_7/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-33704-8",
  book-URL =     "http://www.springerlink.com/content/978-3-642-33704-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Montecchi:2012:QSE,
  author =       "Leonardo Montecchi and Paolo Lollini and Andrea
                 Bondavalli and Ernesto {La Mattina}",
  title =        "Quantitative Security Evaluation of a Multi-biometric
                 Authentication System",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7613",
  pages =        "209--221",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-33675-1_19",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:25:50 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012k.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-33675-1_19/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-33675-1",
  book-URL =     "http://www.springerlink.com/content/978-3-642-33675-1",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Moore:2012:RFF,
  author =       "Samuel K. Moore",
  title =        "{RSA} Flaw Found",
  journal =      j-IEEE-SPECTRUM,
  volume =       "??",
  number =       "??",
  pages =        "??--??",
  day =          "14",
  month =        feb,
  year =         "2012",
  CODEN =        "IEESAM",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Thu Jul 26 18:41:43 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://spectrum.ieee.org/tech-talk/computing/it/rsa-flaw-found",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
}

@Article{Morad:2012:OEA,
  author =       "Ameer H. Morad",
  title =        "Office Employees Authentication Based on {E}-exam
                 Techniques",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7666",
  pages =        "60--65",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-34478-7_8",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:18:30 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012l.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-34478-7_8/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-34478-7",
  book-URL =     "http://www.springerlink.com/content/978-3-642-34478-7",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Morozov:2012:ZKP,
  author =       "Kirill Morozov and Tsuyoshi Takagi",
  title =        "Zero-Knowledge Protocols for the {McEliece}
                 Encryption",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7372",
  pages =        "180--193",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-31448-3_14",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:21:08 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012f.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-31448-3_14/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-31448-3",
  book-URL =     "http://www.springerlink.com/content/978-3-642-31448-3",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Mroczkowski:2012:CAS,
  author =       "Piotr Mroczkowski and Janusz Szmidt",
  title =        "The Cube Attack on Stream Cipher {Trivium} and
                 Quadraticity Tests",
  journal =      j-FUND-INFO,
  volume =       "114",
  number =       "3--4",
  pages =        "309--318",
  month =        aug,
  year =         "2012",
  CODEN =        "FUMAAJ",
  DOI =          "https://doi.org/10.3233/FI-2012-631",
  ISSN =         "0169-2968 (print), 1875-8681 (electronic)",
  ISSN-L =       "0169-2968",
  bibdate =      "Sat Mar 5 17:14:51 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/fundinfo2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Fundamenta Informaticae",
  journal-URL =  "http://content.iospress.com/journals/fundamenta-informaticae",
}

@Article{Muller:2012:HPC,
  author =       "Sascha M{\"u}ller and Stefan Katzenbeisser",
  title =        "Hiding the Policy in Cryptographic Access Control",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7170",
  pages =        "90--105",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-29963-6_8",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:25:33 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012b.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-29963-6_8/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-29963-6",
  book-URL =     "http://www.springerlink.com/content/978-3-642-29963-6",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Myers:2012:BCM,
  author =       "Steven Myers and Mona Sergi and abhi shelat",
  title =        "Blackbox Construction of a More Than Non-Malleable
                 {CCA 1} Encryption Scheme from Plaintext Awareness",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7485",
  pages =        "149--165",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-32928-9_9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:23:35 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012h.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-32928-9_9/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-32928-9",
  book-URL =     "http://www.springerlink.com/content/978-3-642-32928-9",
  fjournal =     "Lecture Notes in Computer Science",
  remark =       "Yes, `abhi shelat' is spelled in lowercase letters.",
}

@Article{Naranjo:2012:SAK,
  author =       "J. A. M. Naranjo and N. Antequera and L. G. Casado and
                 J. A. L{\'o}pez-Ramos",
  title =        "A suite of algorithms for key distribution and
                 authentication in centralized secure multicast
                 environments",
  journal =      j-J-COMPUT-APPL-MATH,
  volume =       "236",
  number =       "12",
  pages =        "3042--3051",
  month =        jun,
  year =         "2012",
  CODEN =        "JCAMDI",
  ISSN =         "0377-0427 (print), 1879-1778 (electronic)",
  ISSN-L =       "0377-0427",
  bibdate =      "Sat Feb 25 13:24:34 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcomputapplmath2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0377042711000914",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computational and Applied Mathematics",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03770427",
}

@Article{Naskar:2012:FIR,
  author =       "Ruchira Naskar and Rajat Subhra Chakraborty",
  title =        "Fuzzy Inference Rule Based Reversible Watermarking for
                 Digital Images",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7671",
  pages =        "149--163",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-35130-3_11",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:18:37 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012l.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-35130-3_11/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-35130-3",
  book-URL =     "http://www.springerlink.com/content/978-3-642-35130-3",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Nguyen:2012:DQB,
  author =       "Anh P. Nguyen and Thuc D. Nguyen",
  title =        "Determining Quality of {S}-Boxes Using Pseudo Random
                 Sequences Generated from Stream Ciphers",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7440",
  pages =        "72--79",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-33065-0_8",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:22:37 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012g.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-33065-0_8/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-33065-0",
  book-URL =     "http://www.springerlink.com/content/978-3-642-33065-0",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Nguyen:2012:LRS,
  author =       "Manh Ha Nguyen and Keisuke Tanaka and Kenji Yasunaga",
  title =        "Leakage-Resilience of Stateless\slash Stateful
                 Public-Key Encryption from Hash Proofs",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7372",
  pages =        "208--222",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-31448-3_16",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:21:08 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012f.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-31448-3_16/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-31448-3",
  book-URL =     "http://www.springerlink.com/content/978-3-642-31448-3",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Nguyen:2012:SOU,
  author =       "Long Hoang Nguyen and A. W. Roscoe",
  title =        "Short-Output Universal Hash Functions and Their Use in
                 Fast and Secure Data Authentication",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7549",
  pages =        "326--345",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-34047-5_19",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:24:44 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012i.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-34047-5_19/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-34047-5",
  book-URL =     "http://www.springerlink.com/content/978-3-642-34047-5",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Ning:2012:DCA,
  author =       "Huansheng Ning and Hong Liu and Laurence T. Yang and
                 Yan Zhang",
  title =        "Dual cryptography authentication protocol and its
                 security analysis for radio frequency identification
                 systems",
  journal =      j-CCPE,
  volume =       "24",
  number =       "17",
  pages =        "2040--2054",
  day =          "10",
  month =        dec,
  year =         "2012",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.1827",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Mon Nov 5 07:44:57 MST 2012",
  bibsource =    "http://www.interscience.wiley.com/jpages/1532-0626;
                 https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "22 Sep 2011",
}

@Article{Ning:2012:DPB,
  author =       "H. Ning and H. Liu and Q. Liu and G. Ji",
  title =        "Directed Path Based Authentication Scheme for the
                 {Internet of Things}",
  journal =      j-J-UCS,
  volume =       "18",
  number =       "9",
  pages =        "1112--??",
  month =        "????",
  year =         "2012",
  CODEN =        "????",
  ISSN =         "0948-6968",
  ISSN-L =       "0948-6968",
  bibdate =      "Thu Nov 8 12:03:08 MST 2012",
  bibsource =    "http://www.jucs.org/jucs;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jucs.bib",
  URL =          "http://www.jucs.org/jucs_18_9/directed_path_based_authentication",
  acknowledgement = ack-nhfb,
  fjournal =     "J.UCS: Journal of Universal Computer Science",
  journal-URL =  "http://www.jucs.org/jucs",
}

@TechReport{NIST:2012:RRN,
  author =       "{NIST}",
  title =        "Recommendation for Random Number Generation Using
                 Deterministic Random Bit Generators",
  type =         "Special Publication",
  number =       "800-90",
  institution =  pub-NIST,
  address =      pub-NIST:adr,
  year =         "2012",
  bibdate =      "Mon Mar 09 15:53:55 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://csrc.nist.gov/publications/PubsSPs.html#800-90A",
  acknowledgement = ack-nhfb,
  remark =       "Cite in \cite[reference 58]{Schneier:2015:SWC}.",
}

@Article{Nojoumian:2012:SRS,
  author =       "Mehrdad Nojoumian and Douglas R. Stinson",
  title =        "Socio-Rational Secret Sharing as a New Direction in
                 Rational Cryptography",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7638",
  pages =        "18--37",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-34266-0_2",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:26:22 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012k.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-34266-0_2/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-34266-0",
  book-URL =     "http://www.springerlink.com/content/978-3-642-34266-0",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Obrenovic:2012:IUC,
  author =       "{\v{Z}}eljko Obrenovic and Bart den Haak",
  title =        "Integrating User Customization and Authentication: The
                 Identity Crisis",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "5",
  pages =        "82--85",
  month =        sep # "\slash " # oct,
  year =         "2012",
  DOI =          "https://doi.org/10.1109/MSP.2012.119",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Oct 22 07:45:36 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
}

@Article{Obrien:2012:EPM,
  author =       "James F. O'brien and Hany Farid",
  title =        "Exposing photo manipulation with inconsistent
                 reflections",
  journal =      j-TOG,
  volume =       "31",
  number =       "1",
  pages =        "4:1--4:??",
  month =        jan,
  year =         "2012",
  CODEN =        "ATGRDF",
  DOI =          "https://doi.org/10.1145/2077341.2077345",
  ISSN =         "0730-0301 (print), 1557-7368 (electronic)",
  ISSN-L =       "0730-0301",
  bibdate =      "Fri Feb 17 19:15:29 MST 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tog/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tog.bib",
  abstract =     "The advent of sophisticated photo editing software has
                 made it increasingly easier to manipulate digital
                 images. Often visual inspection cannot definitively
                 distinguish the resulting forgeries from authentic
                 photographs. In response, forensic techniques have
                 emerged to detect geometric or statistical
                 inconsistencies that result from specific forms of
                 photo manipulation. In this article we describe a new
                 forensic technique that focuses on geometric
                 inconsistencies that arise when fake reflections are
                 inserted into a photograph or when a photograph
                 containing reflections is manipulated. This analysis
                 employs basic rules of reflective geometry and linear
                 perspective projection, makes minimal assumptions about
                 the scene geometry, and only requires the user to
                 identify corresponding points on an object and its
                 reflection.",
  acknowledgement = ack-nhfb,
  articleno =    "4",
  fjournal =     "ACM Transactions on Graphics",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J778",
}

@Article{Ohtake:2012:AAH,
  author =       "Go Ohtake and Kazuto Ogawa",
  title =        "Application Authentication for Hybrid Services of
                 Broadcasting and Communications Networks",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7115",
  pages =        "171--186",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-27890-7_15",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:24:29 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-27890-7_15/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-27890-7",
  book-URL =     "http://www.springerlink.com/content/978-3-642-27890-7",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Ohzeki:2012:NWM,
  author =       "Kazuo Ohzeki and YuanYu Wei and Yutaka Hirakawa and
                 Kiyotsugu Sato",
  title =        "A New Watermarking Method with Obfuscated Quasi-Chirp
                 Transform",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7128",
  pages =        "57--71",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-32205-1_7",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:24:41 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012b.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-32205-1_7/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-32205-1",
  book-URL =     "http://www.springerlink.com/content/978-3-642-32205-1",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Okamoto:2012:AAH,
  author =       "Tatsuaki Okamoto and Katsuyuki Takashima",
  title =        "Adaptively Attribute-Hiding (Hierarchical) Inner
                 Product Encryption",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7237",
  pages =        "591--608",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-29011-4_34;
                 https://doi.org/10.1007/978-3-642-29011-4_35",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Dec 15 20:55:01 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs.bib",
  URL =          "http://link.springer.com/accesspage/chapter/10.1007/978-3-642-29011-4_34;
                 http://link.springer.com/chapter/10.1007/978-3-642-29011-4_35/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-29011-4",
  book-URL =     "http://www.springerlink.com/content/978-3-642-29011-4",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Oliveira:2012:STA,
  author =       "Leonardo B. Oliveira and Aman Kansal and Conrado P. L.
                 Gouv{\^e}a and Diego F. Aranha and Julio L{\'o}pez and
                 Bodhi Priyantha and Michel Goraczko and Feng Zhao",
  title =        "{Secure-TWS}: Authenticating Node to Multi-user
                 Communication in Shared Sensor Networks",
  journal =      j-COMP-J,
  volume =       "55",
  number =       "4",
  pages =        "384--396",
  month =        apr,
  year =         "2012",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxr089",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Mar 27 18:19:58 MDT 2012",
  bibsource =    "http://comjnl.oxfordjournals.org/content/55/4.toc;
                 https://www.math.utah.edu/pub/tex/bib/comp2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/55/4/384.full.pdf+html",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "September 8, 2011",
}

@Article{Owczarek:2012:LPL,
  author =       "Agnieszka Owczarek and Krzysztof {\'S}lot",
  title =        "Lipreading Procedure for Liveness Verification in
                 Video Authentication Systems",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7208",
  pages =        "115--124",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-28942-2_11",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:26:19 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012c.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-28942-2_11/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-28942-2",
  book-URL =     "http://www.springerlink.com/content/978-3-642-28942-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Pandey:2012:PPS,
  author =       "Omkant Pandey and Yannis Rouselakis",
  title =        "Property Preserving Symmetric Encryption",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7237",
  pages =        "375--391",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-29011-4_22;
                 https://doi.org/10.1007/978-3-642-29011-4_23",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Dec 15 20:55:01 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs.bib",
  URL =          "http://link.springer.com/accesspage/chapter/10.1007/978-3-642-29011-4_22;
                 http://link.springer.com/chapter/10.1007/978-3-642-29011-4_23/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-29011-4",
  book-URL =     "http://www.springerlink.com/content/978-3-642-29011-4",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Pandit:2012:EFS,
  author =       "Tapas Pandit and Rana Barua",
  title =        "Efficient Fully Secure Attribute-Based Encryption
                 Schemes for General Access Structures",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7496",
  pages =        "193--214",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-33272-2_13",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:23:50 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012h.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-33272-2_13/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-33272-2",
  book-URL =     "http://www.springerlink.com/content/978-3-642-33272-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Papas:2012:MLR,
  author =       "Marios Papas and Thomas Houit and Derek Nowrouzezahrai
                 and Markus Gross and Wojciech Jarosz",
  title =        "The magic lens: refractive steganography",
  journal =      j-TOG,
  volume =       "31",
  number =       "6",
  pages =        "186:1--186:??",
  month =        nov,
  year =         "2012",
  CODEN =        "ATGRDF",
  DOI =          "https://doi.org/10.1145/2366145.2366205",
  ISSN =         "0730-0301 (print), 1557-7368 (electronic)",
  ISSN-L =       "0730-0301",
  bibdate =      "Thu Nov 15 16:10:28 MST 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tog/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tog.bib",
  abstract =     "We present an automatic approach to design and
                 manufacture passive display devices based on optical
                 hidden image decoding. Motivated by classical
                 steganography techniques we construct Magic Lenses,
                 composed of refractive lenslet arrays, to reveal hidden
                 images when placed over potentially unstructured
                 printed or displayed source images. We determine the
                 refractive geometry of these surfaces by formulating
                 and efficiently solving an inverse light transport
                 problem, taking into account additional constraints
                 imposed by the physical manufacturing processes. We
                 fabricate several variants on the basic magic lens idea
                 including using a single source image to encode several
                 hidden images which are only revealed when the lens is
                 placed at prescribed orientations on the source image
                 or viewed from different angles. We also present an
                 important special case, the universal lens, that forms
                 an injection mapping from the lens surface to the
                 source image grid, allowing it to be used with
                 arbitrary source images. We use this type of lens to
                 generate hidden animation sequences. We validate our
                 simulation results with many real-world manufactured
                 magic lenses, and experiment with two separate
                 manufacturing processes.",
  acknowledgement = ack-nhfb,
  articleno =    "186",
  fjournal =     "ACM Transactions on Graphics",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J778",
}

@Article{Parent:2012:WAI,
  author =       "Xavier Parent",
  title =        "Why Be Afraid of Identity?",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7360",
  pages =        "295--307",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-29414-3_16",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:20:52 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012f.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-29414-3_16/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-29414-3",
  book-URL =     "http://www.springerlink.com/content/978-3-642-29414-3",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Park:2012:APO,
  author =       "Jong Hyuk Park",
  title =        "An authentication protocol offering service anonymity
                 of mobile device in ubiquitous environment",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "62",
  number =       "1",
  pages =        "105--117",
  month =        oct,
  year =         "2012",
  CODEN =        "JOSUED",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Fri Oct 26 07:42:33 MDT 2012",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0920-8542&volume=62&issue=1;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  URL =          "http://www.springerlink.com/openurl.asp?genre=article&issn=0920-8542&volume=62&issue=1&spage=105",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Article{Park:2012:IDF,
  author =       "JeaHoon Park and JaeCheol Ha",
  title =        "Improved Differential Fault Analysis on Block Cipher
                 {ARIA}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7690",
  pages =        "82--95",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-35416-8_7",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:18:58 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012l.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-35416-8_7/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-35416-8",
  book-URL =     "http://www.springerlink.com/content/978-3-642-35416-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Pathak:2012:PPS,
  author =       "Manas Pathak and Jose Portelo and Bhiksha Raj and
                 Isabel Trancoso",
  title =        "Privacy-Preserving Speaker Authentication",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7483",
  pages =        "1--22",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-33383-5_1",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:23:33 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012h.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-33383-5_1/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-33383-5",
  book-URL =     "http://www.springerlink.com/content/978-3-642-33383-5",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Paul:2012:KSS,
  author =       "Goutam Paul and Ian Davidson and Imon Mukherjee and S.
                 S. Ravi",
  title =        "Keyless Steganography in Spatial Domain Using
                 Energetic Pixels",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7671",
  pages =        "134--148",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-35130-3_10",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:18:37 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012l.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-35130-3_10/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-35130-3",
  book-URL =     "http://www.springerlink.com/content/978-3-642-35130-3",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Peck:2012:CAC,
  author =       "Morgan E. Peck",
  title =        "The cryptoanarchists' answer to cash",
  journal =      j-IEEE-SPECTRUM,
  volume =       "49",
  number =       "6",
  pages =        "50--56",
  month =        jun,
  year =         "2012",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.2012.6203968",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 07:02:09 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Bitcoin; Cryptography; Currency; Digital printing;
                 dollar bill; electronic money; Exchange rates; Internet
                 smut; Public key cryptography; stripper",
}

@Article{Peinado:2012:CAT,
  author =       "Alberto Peinado and Amparo F{\'u}ster-Sabater",
  title =        "Cryptographic Analysis of a Type of Sequence
                 Generators",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7671",
  pages =        "265--276",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-35130-3_19",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:18:37 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012l.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-35130-3_19/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-35130-3",
  book-URL =     "http://www.springerlink.com/content/978-3-642-35130-3",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Pendl:2012:ECC,
  author =       "Christian Pendl and Markus Pelnar and Michael Hutter",
  title =        "Elliptic Curve Cryptography on the {WISP} {UHF} {RFID}
                 Tag",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7055",
  pages =        "32--47",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-25286-0_3",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:23:19 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-25286-0_3/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-25286-0",
  book-URL =     "http://www.springerlink.com/content/978-3-642-25286-0",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Peter:2012:AHE,
  author =       "Andreas Peter and Max Kronberg and Wilke Trei and
                 Stefan Katzenbeisser",
  title =        "Additively Homomorphic Encryption with a Double
                 Decryption Mechanism, Revisited",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7483",
  pages =        "242--257",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-33383-5_15",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:23:33 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012h.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-33383-5_15/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-33383-5",
  book-URL =     "http://www.springerlink.com/content/978-3-642-33383-5",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Petrlic:2012:PRE,
  author =       "Ronald Petrlic",
  title =        "Proxy Re-encryption in a Privacy-Preserving Cloud
                 Computing {DRM} Scheme",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7672",
  pages =        "194--211",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-35362-8_16",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:18:38 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012l.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-35362-8_16/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-35362-8",
  book-URL =     "http://www.springerlink.com/content/978-3-642-35362-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Phan:2012:DDB,
  author =       "Duong Hieu Phan and David Pointcheval and Mario
                 Strefler",
  title =        "Decentralized Dynamic Broadcast Encryption",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7485",
  pages =        "166--183",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-32928-9_10",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:23:35 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012h.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-32928-9_10/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-32928-9",
  book-URL =     "http://www.springerlink.com/content/978-3-642-32928-9",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Phan:2012:MBT,
  author =       "Duong Hieu Phan and David Pointcheval and Mario
                 Strefler",
  title =        "Message-Based Traitor Tracing with Optimal Ciphertext
                 Rate",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7533",
  pages =        "56--77",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-33481-8_4",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:24:28 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012i.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-33481-8_4/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-33481-8",
  book-URL =     "http://www.springerlink.com/content/978-3-642-33481-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Pippal:2012:SVU,
  author =       "Ravi Singh Pippal and Jaidhar C. D. and Shashikala
                 Tapaswi",
  title =        "Security Vulnerabilities of User Authentication Scheme
                 Using Smart Card",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7371",
  pages =        "106--113",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-31540-4_8",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:21:06 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012f.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-31540-4_8/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-31540-4",
  book-URL =     "http://www.springerlink.com/content/978-3-642-31540-4",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Piret:2012:PBC,
  author =       "Gilles Piret and Thomas Roche and Claude Carlet",
  title =        "{PICARO} --- a Block Cipher Allowing Efficient
                 Higher-Order Side-Channel Resistance",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7341",
  pages =        "311--328",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-31284-7_19",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:20:27 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012e.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-31284-7_19/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-31284-7",
  book-URL =     "http://www.springerlink.com/content/978-3-642-31284-7",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Poh:2012:SEC,
  author =       "Geong Sen Poh and Moesfa Soeheila Mohamad and Muhammad
                 Reza Z'aba",
  title =        "Structured Encryption for Conceptual Graphs",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7631",
  pages =        "105--122",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-34117-5_7",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:26:12 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012k.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-34117-5_7/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-34117-5",
  book-URL =     "http://www.springerlink.com/content/978-3-642-34117-5",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Pohls:2012:RDI,
  author =       "Henrich C. P{\"o}hls and Focke H{\"o}hne",
  title =        "The Role of Data Integrity in {EU} Digital Signature
                 Legislation --- Achieving Statutory Trust for
                 Sanitizable Signature Schemes",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7170",
  pages =        "175--192",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-29963-6_13",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:25:33 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012b.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-29963-6_13/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-29963-6",
  book-URL =     "http://www.springerlink.com/content/978-3-642-29963-6",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Poller:2012:EIC,
  author =       "Andreas Poller and Ulrich Waldmann and Sven Vowe and
                 Sven Turpe",
  title =        "Electronic Identity Cards for User Authentication ---
                 Promise and Practice",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "1",
  pages =        "46--54",
  month =        jan # "\slash " # feb,
  year =         "2012",
  DOI =          "https://doi.org/10.1109/MSP.2011.148",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 15 12:40:29 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
}

@Article{Popa:2012:CPQ,
  author =       "Raluca Ada Popa and Catherine M. S. Redfield and
                 Nickolai Zeldovich and Hari Balakrishnan",
  title =        "{CryptDB}: processing queries on an encrypted
                 database",
  journal =      j-CACM,
  volume =       "55",
  number =       "9",
  pages =        "103--111",
  month =        sep,
  year =         "2012",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2330667.2330691",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Oct 23 06:56:18 MDT 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cacm2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Poppelmann:2012:TEA,
  author =       "Thomas P{\"o}ppelmann and Tim G{\"u}neysu",
  title =        "Towards Efficient Arithmetic for Lattice-Based
                 Cryptography on Reconfigurable Hardware",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7533",
  pages =        "139--158",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-33481-8_8",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:24:28 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012i.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-33481-8_8/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-33481-8",
  book-URL =     "http://www.springerlink.com/content/978-3-642-33481-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Priemuth-Schmid:2012:ASV,
  author =       "Deike Priemuth-Schmid",
  title =        "Attacks on Simplified Versions of {K2}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7053",
  pages =        "117--127",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-25261-7_9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:23:16 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-25261-7_9/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-25261-7",
  book-URL =     "http://www.springerlink.com/content/978-3-642-25261-7",
  fjournal =     "Lecture Notes in Computer Science",
  keywords =     "K2 stream cipher",
}

@Article{Pudovkina:2012:RKA,
  author =       "Marina Pudovkina",
  title =        "A Related-Key Attack on Block Ciphers with Weak
                 Recurrent Key Schedules",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6888",
  pages =        "90--101",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-27901-0_8",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:19:37 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-27901-0_8/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-27901-0",
  book-URL =     "http://www.springerlink.com/content/978-3-642-27901-0",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Pyun:2012:IBF,
  author =       "Young June Pyun and Younghee Park and Douglas S.
                 Reeves and Xinyuan Wang and Peng Ning",
  title =        "Interval-based flow watermarking for tracing
                 interactive traffic",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "56",
  number =       "5",
  pages =        "1646--1665",
  day =          "30",
  month =        mar,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1016/j.comnet.2012.01.017",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Thu Apr 12 08:06:25 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/13891286",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1389128612000412",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286",
}

@Article{Rangasamy:2012:ERP,
  author =       "Jothi Rangasamy and Douglas Stebila and Colin Boyd and
                 Juan Manuel Gonz{\'a}lez-Nieto",
  title =        "Effort-Release Public-Key Encryption from
                 Cryptographic Puzzles",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7372",
  pages =        "194--207",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-31448-3_15",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:21:08 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012f.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-31448-3_15/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-31448-3",
  book-URL =     "http://www.springerlink.com/content/978-3-642-31448-3",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Rao:2012:SSA,
  author =       "Burepalli V. S. Rao and Munaga V. N. K. Prasad",
  title =        "Subset Selection Approach for Watermarking Relational
                 Databases",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6411",
  pages =        "181--188",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-27872-3_27",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Mon Dec 24 07:14:53 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/978-3-642-27872-3_27",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-27872-3",
  book-URL =     "http://www.springerlink.com/content/978-3-642-27872-3",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Rifa-Pous:2012:AHD,
  author =       "Helena Rif{\`a}-Pous and Carles Garrigues",
  title =        "Authenticating hard decision sensing reports in
                 cognitive radio networks",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "56",
  number =       "2",
  pages =        "566--576",
  day =          "2",
  month =        feb,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1016/j.comnet.2011.10.006",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Sat Feb 4 10:23:06 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/13891286",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1389128611003720",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286",
}

@Article{Rjasko:2012:BBP,
  author =       "Michal Rja{\v{s}}ko",
  title =        "Black-Box Property of Cryptographic Hash Functions",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6888",
  pages =        "181--193",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-27901-0_14",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:19:37 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-27901-0_14/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-27901-0",
  book-URL =     "http://www.springerlink.com/content/978-3-642-27901-0",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Rodriguez-Vazquez:2012:SCB,
  author =       "Juan Jos{\'e} Rodr{\'\i}guez-V{\'a}zquez and Sixto
                 Romero-S{\'a}nchez and Miguel C{\'a}rdenas-Montes",
  title =        "Speeding Up a Chaos-Based Image Encryption Algorithm
                 Using {GPGPU}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6927",
  pages =        "592--599",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-27549-4_76",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Mon Dec 24 07:13:59 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/978-3-642-27549-4_76",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-27549-4",
  book-URL =     "http://www.springerlink.com/content/978-3-642-27549-4",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Roettger:2012:PKC,
  author =       "Eric Roettger and Hugh C. Williams",
  title =        "Public-Key Cryptography Based on a Cubic Extension of
                 the {Lucas} Functions",
  journal =      j-FUND-INFO,
  volume =       "114",
  number =       "3--4",
  pages =        "325--344",
  month =        aug,
  year =         "2012",
  CODEN =        "FUMAAJ",
  DOI =          "https://doi.org/10.3233/FI-2012-633",
  ISSN =         "0169-2968 (print), 1875-8681 (electronic)",
  ISSN-L =       "0169-2968",
  bibdate =      "Sat Mar 5 17:14:51 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/fundinfo2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Fundamenta Informaticae",
  journal-URL =  "http://content.iospress.com/journals/fundamenta-informaticae",
}

@Article{Rogaway:2012:SCS,
  author =       "Phillip Rogaway and Mark Wooding and Haibin Zhang",
  title =        "The Security of Ciphertext Stealing",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7549",
  pages =        "180--195",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-34047-5_11",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:24:44 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012i.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-34047-5_11/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-34047-5",
  book-URL =     "http://www.springerlink.com/content/978-3-642-34047-5",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Romero:2012:IBB,
  author =       "J. J. Romero",
  title =        "{India}'s big bet on identity",
  journal =      j-IEEE-SPECTRUM,
  volume =       "49",
  number =       "3",
  pages =        "48--56",
  month =        mar,
  year =         "2012",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.2012.6156865",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 07:02:09 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "biometric authentication system; biometrics;
                 biometrics (access control); Biometrics (access
                 control); Government policies; identity; India;
                 Information technology; message authentication;
                 Privacy",
}

@Article{Saarinen:2012:PPK,
  author =       "Markku-Juhani O. Saarinen",
  title =        "The {PASSERINE} Public Key Encryption and
                 Authentication Mechanism",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7127",
  pages =        "283--288",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-27937-9_20",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:24:40 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012b.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-27937-9_20/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-27937-9",
  book-URL =     "http://www.springerlink.com/content/978-3-642-27937-9",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Sachnev:2012:IME,
  author =       "Vasily Sachnev and Hyoung Joong Kim",
  title =        "An Improved Matrix Encoding Scheme for {JPEG}
                 Steganography",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7128",
  pages =        "3--15",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-32205-1_3",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:24:41 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012b.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-32205-1_3/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-32205-1",
  book-URL =     "http://www.springerlink.com/content/978-3-642-32205-1",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Safkhani:2012:SMA,
  author =       "Masoumeh Safkhani and Nasour Bagheri and Somitra Kumar
                 Sanadhya and Majid Naderi and Hamid Behnam",
  title =        "On the Security of Mutual Authentication Protocols for
                 {RFID} Systems: The Case of {Wei} et al. 's Protocol",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7122",
  pages =        "90--103",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-28879-1_7",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:24:36 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-28879-1_7/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-28879-1",
  book-URL =     "http://www.springerlink.com/content/978-3-642-28879-1",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Sahai:2012:DCC,
  author =       "Amit Sahai and Hakan Seyalioglu and Brent Waters",
  title =        "Dynamic Credentials and Ciphertext Delegation for
                 Attribute-Based Encryption",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7417",
  pages =        "199--217",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-32009-5_13",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:22:07 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012g.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-32009-5_13/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-32009-5",
  book-URL =     "http://www.springerlink.com/content/978-3-642-32009-5",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Sallam:2012:EBM,
  author =       "Ahmed I. Sallam and El-Sayed El-Rabaie and Osama S.
                 Faragallah",
  title =        "Encryption-based multilevel model for {DBMS}",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "4",
  pages =        "437--446",
  month =        jun,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:28 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812000417",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Sang:2012:SSF,
  author =       "Lifeng Sang and Anish Arora",
  title =        "A shared-secret free security infrastructure for
                 wireless networks",
  journal =      j-TAAS,
  volume =       "7",
  number =       "2",
  pages =        "23:1--23:??",
  month =        jul,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2240166.2240173",
  ISSN =         "1556-4665 (print), 1556-4703 (electronic)",
  ISSN-L =       "1556-4665",
  bibdate =      "Tue Nov 6 19:20:32 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/taas.bib",
  abstract =     "This article develops a shared-secret free wireless
                 security infrastructure that provides confidentiality,
                 identity authentication, message authentication,
                 integrity, sender nonrepudiation, receiver
                 nonrepudiation, and anonymity. Our infrastructure is
                 based on two physical primitives, namely collaborative
                 jamming and spatial signature enforcement, and a zero
                 knowledge alternative for bootstrapping trust. Notably,
                 it eschews the use of shared secrets, while providing a
                 cryptosystem that is no less secure than conventional
                 cryptosystems.",
  acknowledgement = ack-nhfb,
  articleno =    "23",
  fjournal =     "ACM Transactions on Autonomous and Adaptive Systems
                 (TAAS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1010",
}

@Article{Sarier:2012:SNB,
  author =       "Neyire Deniz Sarier",
  title =        "Security Notions of Biometric Remote Authentication
                 Revisited",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7170",
  pages =        "72--89",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-29963-6_7",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:25:33 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012b.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-29963-6_7/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-29963-6",
  book-URL =     "http://www.springerlink.com/content/978-3-642-29963-6",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Sarma:2012:STP,
  author =       "Amardeo Sarma and Joao Girao",
  title =        "Supporting Trust and Privacy with an Identity-Enabled
                 Architecture",
  journal =      j-FUTURE-INTERNET,
  volume =       "4",
  number =       "4",
  pages =        "1016--1025",
  day =          "19",
  month =        nov,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi4041016",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:49 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/4/4/1016",
  abstract =     "Cost reduction and a vastly increased potential to
                 create new services, such as via the proliferation of
                 the Cloud, have led to many more players and ``end
                 points''. With many of them being new entrants,
                 possibly short-lived, the question of how to handle
                 trust and privacy in this new context arises. In this
                 paper, we specifically look at the underlying
                 infrastructure that connects end-points served by these
                 players, which is an essential part of the overall
                 architecture to enable trust and privacy. We present an
                 enhanced architecture that allows real people, objects
                 and services to reliably interact via an infrastructure
                 providing assured levels of trust.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Privacy in the Future Internet.",
}

@Article{Sasaki:2012:DSW,
  author =       "Yu Sasaki",
  title =        "Double-{SP} Is Weaker Than Single-{SP}: Rebound
                 Attacks on {Feistel} Ciphers with Several Rounds",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7668",
  pages =        "265--282",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-34931-7_16",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:18:33 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012l.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-34931-7_16/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-34931-7",
  book-URL =     "http://www.springerlink.com/content/978-3-642-34931-7",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Sasaki:2012:IKK,
  author =       "Yu Sasaki and Sareh Emami and Deukjo Hong and Ashish
                 Kumar",
  title =        "Improved Known-Key Distinguishers on {Feistel--SP}
                 Ciphers and Application to {Camellia}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7372",
  pages =        "87--100",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-31448-3_7",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:21:08 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012f.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-31448-3_7/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-31448-3",
  book-URL =     "http://www.springerlink.com/content/978-3-642-31448-3",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Satir:2012:CBT,
  author =       "Esra Satir and Hakan Isik",
  title =        "A compression-based text steganography method",
  journal =      j-J-SYST-SOFTW,
  volume =       "85",
  number =       "10",
  pages =        "2385--2394",
  month =        oct,
  year =         "2012",
  CODEN =        "JSSODM",
  DOI =          "https://doi.org/10.1016/j.jss.2012.05.027",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Mon Jul 9 14:35:24 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0164121212001379",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Saxena:2012:BIT,
  author =       "Nitin Saxena and C. Seshadhri",
  title =        "Blackbox Identity Testing for Bounded Top-Fanin
                 Depth-$3$ Circuits: The Field Doesn't Matter",
  journal =      j-SIAM-J-COMPUT,
  volume =       "41",
  number =       "5",
  pages =        "1285--1298",
  month =        "????",
  year =         "2012",
  CODEN =        "SMJCAT",
  DOI =          "https://doi.org/10.1137/10848232",
  ISSN =         "0097-5397 (print), 1095-7111 (electronic)",
  ISSN-L =       "0097-5397",
  bibdate =      "Wed Oct 31 08:33:29 MDT 2012",
  bibsource =    "http://epubs.siam.org/sam-bin/dbq/toclist/SICOMP/41/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/siamjcomput.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "SIAM Journal on Computing",
  journal-URL =  "http://epubs.siam.org/sicomp",
  onlinedate =   "January 2012",
}

@Book{Schaathun:2012:MLI,
  author =       "Hans Georg Schaathun",
  title =        "Machine learning in image steganalysis",
  publisher =    pub-WILEY,
  address =      pub-WILEY:adr,
  pages =        "xi + 284",
  year =         "2012",
  DOI =          "https://doi.org/10.1002/9781118437957",
  ISBN =         "0-470-66305-7, 1-118-43795-0, 1-283-60392-6,
                 1-118-43796-9, 1-118-43798-5, 1-118-43800-0",
  ISBN-13 =      "978-0-470-66305-9, 978-1-118-43795-7,
                 978-1-283-60392-8, 978-1-118-43796-4,
                 978-1-118-43798-8, 978-1-118-43800-8",
  LCCN =         "Q325.5 .S285 2012",
  bibdate =      "Wed Aug 27 07:30:35 MDT 2014",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://onlinelibrary.wiley.com/book/10.1002/9781118437957",
  abstract =     "The only book to look at steganalysis from the
                 perspective of machine learning theory, and to apply
                 the common technique of machine learning to the
                 particular field of steganalysis; ideal for people
                 working in both disciplines.",
  acknowledgement = ack-nhfb,
  subject =      "Computergraphik; Kryptoanalyse; Maschinelles Lernen;
                 Steganographie; Machine learning; Wavelets
                 (Mathematics); Data encryption (Computer science);
                 SCIENCE; Waves and Wave Mechanics; COMPUTERS;
                 Enterprise Applications; Business Intelligence Tools;
                 Intelligence (AI) and Semantics; Machine learning;
                 Wavelets (Mathematics); Data encryption (Computer
                 science); Data encryption (Computer science); Machine
                 learning; Wavelets (Mathematics)",
  tableofcontents = "Front Matter \\
                 Overview \\
                 Introduction \\
                 Steganography and Steganalysis \\
                 Getting Started with a Classifier \\
                 Features \\
                 Histogram Analysis \\
                 Bit-Plane Analysis \\
                 More Spatial Domain Features \\
                 The Wavelets Domain \\
                 Steganalysis in the JPEG Domain \\
                 Calibration Techniques \\
                 Classifiers \\
                 Simulation and Evaluation \\
                 Support Vector Machines \\
                 Other Classification Algorithms \\
                 Feature Selection and Evaluation \\
                 The Steganalysis Problem \\
                 Future of the Field \\
                 Bibliography \\
                 Index",
}

@Article{Schaffer:2012:EII,
  author =       "J. S. Schaffer and M. L. Stokes and N. Yan",
  title =        "Enabling an integrated identity from disparate
                 sources",
  journal =      j-IBM-JRD,
  volume =       "56",
  number =       "6",
  pages =        "6:1--6:10",
  month =        "????",
  year =         "2012",
  CODEN =        "IBMJAE",
  DOI =          "https://doi.org/10.1147/JRD.2012.2214091",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  ISSN-L =       "0018-8646",
  bibdate =      "Fri Jan 25 11:44:56 MST 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ibmjrd.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6355654",
  acknowledgement = ack-nhfb,
  book-URL =     "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5288520",
  fjournal =     "IBM Journal of Research and Development",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5288520",
  keywords =     "digital identities for Web users; social computing;
                 user privacy",
}

@Article{Scheidat:2012:STT,
  author =       "Tobias Scheidat and Karl K{\"u}mmel and Claus
                 Vielhauer",
  title =        "Short Term Template Aging Effects on Biometric Dynamic
                 Handwriting Authentication Performance",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7394",
  pages =        "107--116",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-32805-3_9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:21:38 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012f.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-32805-3_9/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-32805-3",
  book-URL =     "http://www.springerlink.com/content/978-3-642-32805-3",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Schilling:2012:ATU,
  author =       "Thorsten Ernst Schilling and H{\aa}vard Raddum",
  title =        "Analysis of {Trivium} Using Compressed Right Hand Side
                 Equations",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7259",
  pages =        "18--32",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-31912-9_2",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:18:40 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012d.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-31912-9_2/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-31912-9",
  book-URL =     "http://www.springerlink.com/content/978-3-642-31912-9",
  fjournal =     "Lecture Notes in Computer Science",
  keywords =     "Trivium cipher",
}

@Article{Schmitz:2012:NAC,
  author =       "Roland Schmitz and Shujun Li and Christos Grecos and
                 Xinpeng Zhang",
  title =        "A New Approach to Commutative
                 Watermarking-Encryption",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7394",
  pages =        "117--130",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-32805-3_10",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:21:38 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012f.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-32805-3_10/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-32805-3",
  book-URL =     "http://www.springerlink.com/content/978-3-642-32805-3",
  fjournal =     "Lecture Notes in Computer Science",
}

@Book{Schneier:2012:LOE,
  author =       "Bruce Schneier",
  title =        "Liars and outliers: enabling the trust that society
                 needs to thrive",
  publisher =    pub-WILEY,
  address =      pub-WILEY:adr,
  pages =        "384 (est.)",
  year =         "2012",
  ISBN =         "1-118-14330-2 (paperback)",
  ISBN-13 =      "978-1-118-14330-8 (paperback)",
  LCCN =         "????",
  bibdate =      "Thu Feb 2 11:55:24 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://spectrum.ieee.org/at-work/innovation/review-liars-outliers",
  acknowledgement = ack-nhfb,
}

@Article{Schnoor:2012:DES,
  author =       "Henning Schnoor",
  title =        "Deciding Epistemic and Strategic Properties of
                 Cryptographic Protocols",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7459",
  pages =        "91--108",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-33167-1_6",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:23:02 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012h.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-33167-1_6/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-33167-1",
  book-URL =     "http://www.springerlink.com/content/978-3-642-33167-1",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Sengupta:2012:SAI,
  author =       "Madhumita Sengupta and J. K. Mandal",
  title =        "Self Authentication of image through {Daubechies}
                 Transform technique {(SADT)}",
  journal =      "arXiv.org",
  volume =       "??",
  number =       "??",
  pages =        "1--4",
  day =          "9",
  month =        dec,
  year =         "2012",
  CODEN =        "????",
  ISSN =         "2331-8422",
  ISSN-L =       "2331-8422",
  bibdate =      "Fri Mar 9 06:55:56 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/bibnet/authors/d/daubechies-ingrid.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://arxiv.org/abs/1212.1863",
  abstract =     "In this paper a $ 4 \times 4 $ Daubechies transform
                 based authentication technique termed as SADT has been
                 proposed to authenticate gray scale images. The cover
                 image is transformed into the frequency domain using $
                 4 \times 4 $ mask in a row major order using Daubechies
                 transform technique, resulting four frequency subbands
                 AF, HF, VF and DF. One byte of every band in a mask is
                 embedding with two or four bits of secret information.
                 Experimental results are computed and compared with the
                 existing authentication techniques like Li's method
                 [5], SCDFT [6], Region-Based method [7] and other
                 similar techniques based on Mean Square Error (MSE),
                 Peak Signal to Noise Ratio (PSNR) and Image Fidelity
                 (IF), which shows better performance in SADT.",
  acknowledgement = ack-nhfb,
  remark =       "4 page paper in 47th Annual National Convention of
                 COMPUTER SOCIETY OF INDIA, The First International
                 Conference on Intelligent Infrastructure, CSI-2012,
                 held during 1st and 2nd December, 2012 at science city,
                 Kolkata.",
  subject =      "Cryptography and Security (cs.CR); Computer Vision and
                 Pattern Recognition (cs.CV)",
}

@Article{Seo:2012:MPM,
  author =       "Hwajeong Seo and Howon Kim",
  title =        "Multi-precision Multiplication for Public-Key
                 Cryptography on Embedded Microprocessors",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7690",
  pages =        "55--67",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-35416-8_5",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:18:58 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012l.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-35416-8_5/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-35416-8",
  book-URL =     "http://www.springerlink.com/content/978-3-642-35416-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Serrato:2012:IAN,
  author =       "Christy Serrato",
  title =        "Identity assurance and network security",
  journal =      j-NETWORK-SECURITY,
  volume =       "2012",
  number =       "4",
  pages =        "19--20",
  month =        apr,
  year =         "2012",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(12)70028-4",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 17:00:41 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485812700284",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Sethumadhavan:2012:CHD,
  author =       "Simha Sethumadhavan and Ryan Roberts and Yannis
                 Tsividis",
  title =        "A Case for Hybrid Discrete-Continuous Architectures",
  journal =      j-IEEE-COMPUT-ARCHIT-LETT,
  volume =       "11",
  number =       "1",
  pages =        "1--4",
  month =        jan # "\slash " # jun,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/L-CA.2011.22",
  ISSN =         "1556-6056 (print), 1556-6064 (electronic)",
  ISSN-L =       "1556-6056",
  bibdate =      "Thu Jun 20 17:18:18 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeecomputarchitlett.bib",
  abstract =     "Current technology trends indicate that power- and
                 energy-efficiency will limit chip throughput in the
                 future. Current solutions to these problems, either in
                 the way of programmable or fixed-function digital
                 accelerators will soon reach their limits as
                 microarchitectural overheads are successively trimmed.
                 A significant departure from current computing methods
                 is required to carry forward computing advances beyond
                 digital accelerators. In this paper we describe how the
                 energy-efficiency of a large class of problems can be
                 improved by employing a hybrid of the discrete and
                 continuous models of computation instead of the
                 ubiquitous, traditional discrete model of computation.
                 We present preliminary analysis of domains and
                 benchmarks that can be accelerated with the new model.
                 Analysis shows that machine learning, physics and up to
                 one-third of SPEC, RMS and Berkeley suite of
                 applications can be accelerated with the new hybrid
                 model.",
  acknowledgement = ack-nhfb,
  affiliation =  "Sethumadhavan, S (Reprint Author), Columbia Univ, New
                 York, NY 10027 USA. Sethumadhavan, Simha; Roberts,
                 Ryan; Tsividis, Yannis, Columbia Univ, New York, NY
                 10027 USA.",
  author-email = "simha@cs.columbia.edu",
  da =           "2019-06-20",
  doc-delivery-number = "953VM",
  fjournal =     "IEEE Computer Architecture Letters",
  funding-acknowledgement = "DARPA; AFRL [FA8750-10-2-0253,
                 FA9950-09-1-0389]; NSF",
  funding-text = "Sethumadhavan's research is funded by grants from
                 DARPA, AFRL (FA8750-10-2-0253, FA9950-09-1-0389), the
                 NSF CAREER program, gifts from Microsoft Research and
                 Columbia University, and software donations from
                 Synopsys and Wind River. Roberts conducted this
                 research as a GRA in Sethumadhavan's Lab.",
  journal-iso =  "IEEE Comput. Archit. Lett.",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=10208",
  keywords =     "Approximation algorithms; Benchmark testing; Berkeley
                 suite; Computational modeling; Computer architecture;
                 computer architecture; computing methods; continuous
                 models; cryptography; Design studies; Differential
                 equations; discrete model; discrete models; domains
                 analysis; energy conservation; energy-efficiency;
                 fixed-function digital accelerators; forward computing
                 advances; hybrid discrete-continuous architectures;
                 Hybrid systems; machine learning; Mathematical model;
                 microarchitectural overheads; microprocessor chips;
                 power-efficiency; Processor architectures; RMS; SPEC;
                 Very large scale integration",
  number-of-cited-references = "16",
  research-areas = "Computer Science",
  times-cited =  "4",
  unique-id =    "Sethumadhavan:2012:CHD",
  web-of-science-categories = "Computer Science, Hardware \&
                 Architecture",
}

@Article{Shakeri:2012:RZW,
  author =       "Mahsa Shakeri and Mansour Jamzad",
  title =        "A Robust Zero-Watermark Copyright Protection Scheme
                 Based on {DWT} and Image Normalization",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7088",
  pages =        "359--370",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-25346-1_32",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Mon Dec 24 07:07:27 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/978-3-642-25346-1_32",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-25346-1",
  book-URL =     "http://www.springerlink.com/content/978-3-642-25346-1",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Shankar:2012:BDF,
  author =       "Deepa D. Shankar and T. Gireeshkumar and K. Praveen
                 and R. Jithin and Ashji S. Raj",
  title =        "Block Dependency Feature Based Classification Scheme
                 for Uncalibrated Image Steganalysis",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6411",
  pages =        "189--195",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-27872-3_28",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Mon Dec 24 07:14:53 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/978-3-642-27872-3_28",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-27872-3",
  book-URL =     "http://www.springerlink.com/content/978-3-642-27872-3",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Shao:2012:AKP,
  author =       "Jun Shao and Peng Liu and Yuan Zhou",
  title =        "Achieving key privacy without losing {CCA} security in
                 proxy re-encryption",
  journal =      j-J-SYST-SOFTW,
  volume =       "85",
  number =       "3",
  pages =        "655--665",
  month =        mar,
  year =         "2012",
  CODEN =        "JSSODM",
  DOI =          "https://doi.org/10.1016/j.jss.2011.09.034",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Fri Feb 17 07:42:10 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0164121211002421",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Sheldon:2012:IWN,
  author =       "Frederick T. Sheldon and John Mark Weber and Seong-Moo
                 Yoo and W. David Pan",
  title =        "The Insecurity of Wireless Networks",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "4",
  pages =        "54--61",
  month =        jul # "\slash " # aug,
  year =         "2012",
  DOI =          "https://doi.org/10.1109/MSP.2012.60",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 29 17:25:32 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  keywords =     "AES (Advanced Encryption Standard); Beck--Tews attack;
                 Chopchop attack; Counter Mode Cipher Block Chaining
                 Message Authentication Code (CCMP); Halvorsen--Haugen
                 attack; Hole 196 attack; message integrity check (MIC);
                 Temporal Key Integrity Protocol (TKIP); Wi-Fi Protected
                 Access (WPA); Wi-Fi Protected Access version 2 (WPA-2);
                 Wired Equivalency Protocol (WEP)",
}

@Article{Shen:2012:PAS,
  author =       "Jing Shen and Yusong Du",
  title =        "A Password Authentication Scheme against {Smart Card}
                 Security Breach",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7473",
  pages =        "37--44",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-34062-8_5",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:23:20 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012h.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-34062-8_5/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-34062-8",
  book-URL =     "http://www.springerlink.com/content/978-3-642-34062-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Shparlinski:2012:CSD,
  author =       "Igor E. Shparlinski and Katherine E. Stange",
  title =        "Character Sums with Division Polynomials",
  journal =      j-CAN-MATH-BULL,
  volume =       "55",
  number =       "4",
  pages =        "850--??",
  month =        dec,
  year =         "2012",
  CODEN =        "CMBUA3",
  DOI =          "https://doi.org/10.4153/CMB-2011-126-x",
  ISSN =         "0008-4395 (print), 1496-4287 (electronic)",
  ISSN-L =       "0008-4395",
  bibdate =      "Mon Nov 5 08:57:39 MST 2012",
  bibsource =    "http://cms.math.ca/cmb/v55/;
                 https://www.math.utah.edu/pub/tex/bib/canmathbull.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "We obtain nontrivial estimates of quadratic character
                 sums of division polynomials $ \Psi_n(P) $, $ n = 1, 2,
                 \dots $, evaluated at a given point $P$ on an elliptic
                 curve over a finite field of $q$ elements. Our bounds
                 are nontrivial if the order of $P$ is at least $ q^{1 /
                 2 + \varepsilon }$ for some fixed $ \varepsilon > 0$.
                 This work is motivated by an open question about
                 statistical indistinguishability of some
                 cryptographically relevant sequences that was recently
                 brought up by K. Lauter and the second author.",
  acknowledgement = ack-nhfb,
  fjournal =     "Canadian mathematical bulletin = Bulletin canadien de
                 math{\'e}matiques",
  journal-URL =  "http://cms.math.ca/cmb/",
}

@Article{Shrivastava:2012:UIE,
  author =       "Swapnil Shrivastava and Zia Saquib and Gopinath P. and
                 Peeyush Chomal",
  title =        "Unique Identity Enabled Service Delivery through
                 {NSDG}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7452",
  pages =        "103--111",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-32701-8_10",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:22:54 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012h.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-32701-8_10/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-32701-8",
  book-URL =     "http://www.springerlink.com/content/978-3-642-32701-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Siad:2012:NAP,
  author =       "Amar Siad",
  title =        "A New Approach for Private Searches on Public-Key
                 Encrypted Data",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7394",
  pages =        "160--173",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-32805-3_13",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:21:38 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012f.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-32805-3_13/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-32805-3",
  book-URL =     "http://www.springerlink.com/content/978-3-642-32805-3",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Souissi:2012:OCP,
  author =       "Youssef Souissi and Nicolas Debande and Sami Mekki and
                 Sylvain Guilley and Ali Maalaoui",
  title =        "On the Optimality of Correlation Power Attack on
                 Embedded Cryptographic Systems",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7322",
  pages =        "169--178",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-30955-7_15",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:20:02 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012e.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-30955-7_15/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-30955-7",
  book-URL =     "http://www.springerlink.com/content/978-3-642-30955-7",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Spiez:2012:RCT,
  author =       "Stanis{\l}aw Spie{\.z} and Marian Srebrny and Jerzy
                 Urbanowicz",
  title =        "Remarks on the Classical Threshold Secret Sharing
                 Schemes",
  journal =      j-FUND-INFO,
  volume =       "114",
  number =       "3--4",
  pages =        "345--357",
  month =        aug,
  year =         "2012",
  CODEN =        "FUMAAJ",
  DOI =          "https://doi.org/10.3233/FI-2012-634",
  ISSN =         "0169-2968 (print), 1875-8681 (electronic)",
  ISSN-L =       "0169-2968",
  bibdate =      "Sat Mar 5 17:14:51 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/fundinfo2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Fundamenta Informaticae",
  journal-URL =  "http://content.iospress.com/journals/fundamenta-informaticae",
}

@Article{Srinivasan:2012:RAP,
  author =       "Avinash Srinivasan and Lashidhar Chennupati",
  title =        "Robust Authentication of Public Access Points Using
                 Digital Certificates --- a Novel Approach",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7672",
  pages =        "153--164",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-35362-8_13",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:18:38 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012l.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-35362-8_13/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-35362-8",
  book-URL =     "http://www.springerlink.com/content/978-3-642-35362-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Stanek:2012:TEM,
  author =       "Martin Stanek",
  title =        "Threshold Encryption into Multiple Ciphertexts",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6888",
  pages =        "62--72",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-27901-0_6",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:19:37 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-27901-0_6/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-27901-0",
  book-URL =     "http://www.springerlink.com/content/978-3-642-27901-0",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Stefan:2012:ACT,
  author =       "Deian Stefan and Alejandro Russo and Pablo Buiras and
                 Amit Levy and John C. Mitchell and David Mazi{\'e}res",
  title =        "Addressing covert termination and timing channels in
                 concurrent information flow systems",
  journal =      j-SIGPLAN,
  volume =       "47",
  number =       "9",
  pages =        "201--214",
  month =        sep,
  year =         "2012",
  CODEN =        "SINODQ",
  DOI =          "https://doi.org/10.1145/2398856.2364557",
  ISSN =         "0362-1340 (print), 1523-2867 (print), 1558-1160
                 (electronic)",
  ISSN-L =       "0362-1340",
  bibdate =      "Thu Nov 15 16:40:19 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigplan2010.bib",
  abstract =     "When termination of a program is observable by an
                 adversary, confidential information may be leaked by
                 terminating accordingly. While this termination covert
                 channel has limited bandwidth for sequential programs,
                 it is a more dangerous source of information leakage in
                 concurrent settings. We address concurrent termination
                 and timing channels by presenting a dynamic
                 information-flow control system that mitigates and
                 eliminates these channels while allowing termination
                 and timing to depend on secret values. Intuitively, we
                 leverage concurrency by placing such potentially
                 sensitive actions in separate threads. While
                 termination and timing of these threads may expose
                 secret values, our system requires any thread observing
                 these properties to raise its information-flow label
                 accordingly, preventing leaks to lower-labeled
                 contexts. We implement this approach in a Haskell
                 library and demonstrate its applicability by building a
                 web server that uses information-flow control to
                 restrict untrusted web applications.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGPLAN Notices",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J706",
  remark =       "ICFP '12 conference proceedings.",
}

@Article{Stolte:2012:EDA,
  author =       "Daniel Stolte",
  title =        "Experts determine age of book 'nobody can read'",
  journal =      "{UANews}",
  day =          "11",
  month =        feb,
  year =         "2012",
  bibdate =      "Thu Jun 28 13:19:31 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://uanews.org/node/37825;
                 http://www.rdmag.com/News/2011/02/Materials-Testing-Experts-determine-age-of-book-nobody-can-read/",
  acknowledgement = ack-nhfb,
  keywords =     "Voynich manuscript",
}

@Article{Su:2012:IIN,
  author =       "Chen Su and Haining Fan",
  title =        "Impact of {Intel}'s new instruction sets on software
                 implementation of {$ {\rm GF}(2)[x] $} multiplication",
  journal =      j-INFO-PROC-LETT,
  volume =       "112",
  number =       "12",
  pages =        "497--502",
  day =          "30",
  month =        jun,
  year =         "2012",
  CODEN =        "IFPLAT",
  DOI =          "https://doi.org/10.1016/j.ipl.2012.03.012",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Mon May 21 07:13:00 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/fparith.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019012000804",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  keywords =     "AVX; Cryptography; GF(2)[x] multiplication; Karatsuba
                 algorithm; PCLMULQDQ; SSE",
}

@Article{Suciu:2012:SED,
  author =       "Dan Suciu",
  title =        "{SQL} on an encrypted database: technical
                 perspective",
  journal =      j-CACM,
  volume =       "55",
  number =       "9",
  pages =        "102--102",
  month =        sep,
  year =         "2012",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2330667.2330690",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Oct 23 06:56:18 MDT 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cacm2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Suoranta:2012:ASM,
  author =       "Sanna Suoranta and Jani Heikkinen and Pekka
                 Silvekoski",
  title =        "Authentication Session Migration",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7127",
  pages =        "17--32",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-27937-9_2",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:24:40 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012b.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-27937-9_2/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-27937-9",
  book-URL =     "http://www.springerlink.com/content/978-3-642-27937-9",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Suoranta:2012:SAM,
  author =       "Sanna Suoranta and Andr{\'e} Andrade and Tuomas Aura",
  title =        "Strong Authentication with Mobile Phone",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7483",
  pages =        "70--85",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-33383-5_5",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:23:33 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012h.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-33383-5_5/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-33383-5",
  book-URL =     "http://www.springerlink.com/content/978-3-642-33383-5",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Sur:2012:SSU,
  author =       "Arijit Sur and Vignesh Ramanathan",
  title =        "Secure Steganography Using Randomized Cropping",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7110",
  pages =        "82--95",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-28693-3_6",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:24:24 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-28693-3_6/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-28693-3",
  book-URL =     "http://www.springerlink.com/content/978-3-642-28693-3",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Suriadi:2012:PCV,
  author =       "Suriadi Suriadi and Chun Ouyang and Ernest Foo",
  title =        "Privacy Compliance Verification in Cryptographic
                 Protocols",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7400",
  pages =        "251--276",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-35179-2_11",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:21:45 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012g.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-35179-2_11/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-35179-2",
  book-URL =     "http://www.springerlink.com/content/978-3-642-35179-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Tan:2012:LCP,
  author =       "Zuowen Tan",
  title =        "A lightweight conditional privacy-preserving
                 authentication and access control scheme for pervasive
                 computing environments",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "35",
  number =       "6",
  pages =        "1839--1846",
  month =        nov,
  year =         "2012",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Wed Jan 28 15:44:25 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804512001609",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Netw. Comput. Appl.",
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Tan:2012:SLM,
  author =       "Shunquan Tan",
  title =        "Steganalysis of {LSB} Matching Revisited for
                 Consecutive Pixels Using {B}-Spline Functions",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7128",
  pages =        "16--29",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-32205-1_4",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:24:41 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012b.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-32205-1_4/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-32205-1",
  book-URL =     "http://www.springerlink.com/content/978-3-642-32205-1",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Tang:2012:RSS,
  author =       "Zhaohui Tang and Hoon Wei Lim and Huaxiong Wang",
  title =        "Revisiting a Secret Sharing Approach to Network
                 Codes",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7496",
  pages =        "300--317",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-33272-2_20",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:23:50 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012h.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-33272-2_20/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-33272-2",
  book-URL =     "http://www.springerlink.com/content/978-3-642-33272-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Tani:2012:EQA,
  author =       "Seiichiro Tani and Hirotada Kobayashi and Keiji
                 Matsumoto",
  title =        "Exact Quantum Algorithms for the Leader Election
                 Problem",
  journal =      j-TOCT,
  volume =       "4",
  number =       "1",
  pages =        "1:1--1:??",
  month =        mar,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2141938.2141939",
  ISSN =         "1942-3454 (print), 1942-3462 (electronic)",
  ISSN-L =       "1942-3454",
  bibdate =      "Tue Nov 6 18:23:48 MST 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toct/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/toct.bib",
  abstract =     "This article gives a separation between quantum and
                 classical models in pure (i.e., noncryptographic)
                 computing abilities with no restriction on the amount
                 of available computing resources, by considering the
                 exact solvability of the leader election problem in
                 anonymous networks, a celebrated unsolvable problem in
                 classical distributed computing. The goal of the leader
                 election problem is to elect a unique leader from among
                 distributed parties. In an anonymous network, all
                 parties with the same number of communication links are
                 identical. It is well-known that no classical algorithm
                 can exactly solve (i.e., in bounded time without error)
                 the leader election problem in anonymous networks, even
                 if the number of parties is given. This article devises
                 a quantum algorithm that, if the number of parties is
                 given, exactly solves the problem for any network
                 topology in polynomial rounds with polynomial
                 communication/time complexity with respect to the
                 number of parties, when the parties are connected with
                 quantum communication links and they have the ability
                 of quantum computing. Our algorithm works even when
                 only an upper bound of the number of parties is given.
                 In such a case, no classical algorithm can solve the
                 problem even under the zero-error setting, the setting
                 in which error is not allowed but running time may be
                 unbounded.",
  acknowledgement = ack-nhfb,
  articleno =    "1",
  fjournal =     "ACM Transactions on Computation Theory (TOCT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1190",
}

@Article{Tassa:2012:SDC,
  author =       "Tamir Tassa and Ehud Gudes",
  title =        "Secure distributed computation of anonymized views of
                 shared databases",
  journal =      j-TODS,
  volume =       "37",
  number =       "2",
  pages =        "11:1--11:??",
  month =        may,
  year =         "2012",
  CODEN =        "ATDSD3",
  DOI =          "https://doi.org/10.1145/2188349.2188353",
  ISSN =         "0362-5915 (print), 1557-4644 (electronic)",
  ISSN-L =       "0362-5915",
  bibdate =      "Fri Jun 1 17:45:19 MDT 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tods/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tods.bib",
  abstract =     "We consider the problem of computing efficient
                 anonymizations of partitioned databases. Given a
                 database that is partitioned between several sites,
                 either horizontally or vertically, we devise secure
                 distributed algorithms that allow the different sites
                 to obtain a k -anonymized and l-diverse view of the
                 union of their databases, without disclosing sensitive
                 information. Our algorithms are based on the sequential
                 algorithm [Goldberger and Tassa 2010] that offers
                 anonymizations with utility that is significantly
                 better than other anonymization algorithms, and in
                 particular those that were implemented so far in the
                 distributed setting. Our algorithms can apply to
                 different generalization techniques and utility
                 measures and to any number of sites. While previous
                 distributed algorithms depend on costly cryptographic
                 primitives, the cryptographic assumptions of our
                 solution are surprisingly minimal.",
  acknowledgement = ack-nhfb,
  articleno =    "11",
  fjournal =     "ACM Transactions on Database Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J777",
}

@Article{Terrovitis:2012:PPD,
  author =       "Manolis Terrovitis and Nikos Mamoulis and John
                 Liagouris and Spiros Skiadopoulos",
  title =        "Privacy preservation by disassociation",
  journal =      j-PROC-VLDB-ENDOWMENT,
  volume =       "5",
  number =       "10",
  pages =        "944--955",
  month =        jun,
  year =         "2012",
  CODEN =        "????",
  ISSN =         "2150-8097",
  bibdate =      "Tue Nov 6 16:43:13 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/vldbe.bib",
  abstract =     "In this work, we focus on protection against identity
                 disclosure in the publication of sparse
                 multidimensional data. Existing multidimensional
                 anonymization techniques (a) protect the privacy of
                 users either by altering the set of quasi-identifiers
                 of the original data (e.g., by generalization or
                 suppression) or by adding noise (e.g., using
                 differential privacy) and/or (b) assume a clear
                 distinction between sensitive and non-sensitive
                 information and sever the possible linkage. In many
                 real world applications the above techniques are not
                 applicable. For instance, consider web search query
                 logs. Suppressing or generalizing anonymization methods
                 would remove the most valuable information in the
                 dataset: the original query terms. Additionally, web
                 search query logs contain millions of query terms which
                 cannot be categorized as sensitive or non-sensitive
                 since a term may be sensitive for a user and
                 non-sensitive for another. Motivated by this
                 observation, we propose an anonymization technique
                 termed disassociation that preserves the original terms
                 but hides the fact that two or more different terms
                 appear in the same record. We protect the users'
                 privacy by disassociating record terms that participate
                 in identifying combinations. This way the adversary
                 cannot associate with high probability a record with a
                 rare combination of terms. To the best of our
                 knowledge, our proposal is the first to employ such a
                 technique to provide protection against identity
                 disclosure. We propose an anonymization algorithm based
                 on our approach and evaluate its performance on real
                 and synthetic datasets, comparing it against other
                 state-of-the-art methods based on generalization and
                 differential privacy.",
  acknowledgement = ack-nhfb,
  fjournal =     "Proceedings of the VLDB Endowment",
}

@Article{Thorpe:2012:CRB,
  author =       "Christopher Thorpe and Steven R. Willis",
  title =        "Cryptographic Rule-Based Trading",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7397",
  pages =        "65--72",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-32946-3_6",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:21:41 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012f.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-32946-3_6/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-32946-3",
  book-URL =     "http://www.springerlink.com/content/978-3-642-32946-3",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Tian:2012:SSB,
  author =       "Huawei Tian and Zheng Wang and Yao Zhao and Rongrong
                 Ni and Lunming Qin",
  title =        "Spread Spectrum-Based Multi-bit Watermarking for
                 Free-View Video",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7128",
  pages =        "156--166",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-32205-1_14",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:24:41 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012b.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-32205-1_14/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-32205-1",
  book-URL =     "http://www.springerlink.com/content/978-3-642-32205-1",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Tian:2012:TOE,
  author =       "Hui Tian and Hong Jiang and Ke Zhou and Dan Feng",
  title =        "Transparency-Orientated Encoding Strategies for
                 {Voice-over-IP} Steganography",
  journal =      j-COMP-J,
  volume =       "55",
  number =       "6",
  pages =        "702--716",
  month =        jun,
  year =         "2012",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxr111",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Wed May 30 11:20:33 MDT 2012",
  bibsource =    "http://comjnl.oxfordjournals.org/content/55/6.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/55/6/702.full.pdf+html",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "November 3, 2011",
}

@Article{Tong:2012:NBD,
  author =       "Xiao-jun Tong",
  title =        "The novel bilateral --- {Diffusion} image encryption
                 algorithm with dynamical compound chaos",
  journal =      j-J-SYST-SOFTW,
  volume =       "85",
  number =       "4",
  pages =        "850--858",
  month =        apr,
  year =         "2012",
  CODEN =        "JSSODM",
  DOI =          "https://doi.org/10.1016/j.jss.2011.10.051",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Fri Feb 17 07:42:13 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0164121211002834",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Trammel:2012:DTP,
  author =       "John Trammel and {\"U}mit Yal{\c{c}}inalp and Andrei
                 Kalfas and James Boag and Dan Brotsky",
  title =        "Device Token Protocol for Persistent Authentication
                 Shared across Applications",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7592",
  pages =        "230--243",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-33427-6_20",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:25:26 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012j.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-33427-6_20/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-33427-6",
  book-URL =     "http://www.springerlink.com/content/978-3-642-33427-6",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Tsaur:2012:ESM,
  author =       "Woei-Jiunn Tsaur and Jia-Hong Li and Wei-Bin Lee",
  title =        "An efficient and secure multi-server authentication
                 scheme with key agreement",
  journal =      j-J-SYST-SOFTW,
  volume =       "85",
  number =       "4",
  pages =        "876--882",
  month =        apr,
  year =         "2012",
  CODEN =        "JSSODM",
  DOI =          "https://doi.org/10.1016/j.jss.2011.10.049",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Fri Feb 17 07:42:13 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0164121211002810",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Tsay:2012:VUL,
  author =       "Joe-Kai Tsay and Stig F. Mj{\o}lsnes",
  title =        "A Vulnerability in the {UMTS} and {LTE} Authentication
                 and Key Agreement Protocols",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7531",
  pages =        "65--76",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-33704-8_6",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:24:26 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012i.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-33704-8_6/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-33704-8",
  book-URL =     "http://www.springerlink.com/content/978-3-642-33704-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Tseng:2012:ERI,
  author =       "Yuh-Min Tseng and Tung-Tso Tsai",
  title =        "Efficient Revocable {ID}-Based Encryption with a
                 Public Channel",
  journal =      j-COMP-J,
  volume =       "55",
  number =       "4",
  pages =        "475--486",
  month =        apr,
  year =         "2012",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxr098",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Mar 27 18:19:58 MDT 2012",
  bibsource =    "http://comjnl.oxfordjournals.org/content/55/4.toc;
                 https://www.math.utah.edu/pub/tex/bib/comp2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/55/4/475.full.pdf+html",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "September 29, 2011",
}

@Article{Tsougenis:2012:PEM,
  author =       "E. D. Tsougenis and G. A. Papakostas and D. E.
                 Koulouriotis and V. D. Tourassis",
  title =        "Performance evaluation of moment-based watermarking
                 methods: a review",
  journal =      j-J-SYST-SOFTW,
  volume =       "85",
  number =       "8",
  pages =        "1864--1884",
  month =        aug,
  year =         "2012",
  CODEN =        "JSSODM",
  DOI =          "https://doi.org/10.1016/j.jss.2012.02.045",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Fri May 18 08:44:03 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0164121212000684",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Vaikuntanathan:2012:HCE,
  author =       "Vinod Vaikuntanathan",
  title =        "How to Compute on Encrypted Data",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7668",
  pages =        "1--15",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-34931-7_1",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:18:33 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012l.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-34931-7_1/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-34931-7",
  book-URL =     "http://www.springerlink.com/content/978-3-642-34931-7",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Valamehr:2012:IRM,
  author =       "Jonathan Valamehr and Melissa Chase and Seny Kamara
                 and Andrew Putnam and Dan Shumow and Vinod
                 Vaikuntanathan and Timothy Sherwood",
  title =        "Inspection resistant memory: architectural support for
                 security from physical examination",
  journal =      j-COMP-ARCH-NEWS,
  volume =       "40",
  number =       "3",
  pages =        "130--141",
  month =        jun,
  year =         "2012",
  CODEN =        "CANED2",
  DOI =          "https://doi.org/10.1145/2366231.2337174",
  ISSN =         "0163-5964 (print), 1943-5851 (electronic)",
  ISSN-L =       "0163-5964",
  bibdate =      "Thu Sep 6 10:21:07 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  note =         "ISCA '12 conference proceedings.",
  abstract =     "The ability to safely keep a secret in memory is
                 central to the vast majority of security schemes, but
                 storing and erasing these secrets is a difficult
                 problem in the face of an attacker who can obtain
                 unrestricted physical access to the underlying
                 hardware. Depending on the memory technology, the very
                 act of storing a 1 instead of a 0 can have physical
                 side effects measurable even after the power has been
                 cut. These effects cannot be hidden easily, and if the
                 secret stored on chip is of sufficient value, an
                 attacker may go to extraordinary means to learn even a
                 few bits of that information. Solving this problem
                 requires a new class of architectures that measurably
                 increase the difficulty of physical analysis. In this
                 paper we take a first step towards this goal by
                 focusing on one of the backbones of any hardware
                 system: on-chip memory. We examine the relationship
                 between security, area, and efficiency in these
                 architectures, and quantitatively examine the resulting
                 systems through cryptographic analysis and
                 microarchitectural impact. In the end, we are able to
                 find an efficient scheme in which, even if an adversary
                 is able to inspect the value of a stored bit with a
                 probabilistic error of only 5\%, our system will be
                 able to prevent that adversary from learning any
                 information about the original un-coded bits with
                 99.9999999999\% probability.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGARCH Computer Architecture News",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J89",
}

@Article{Vivek:2012:CSE,
  author =       "S. Sree Vivek and S. Sharmila Deva Selvi and C. Pandu
                 Rangan",
  title =        "Compact Stateful Encryption Schemes with Ciphertext
                 Verifiability",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7631",
  pages =        "87--104",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-34117-5_6",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:26:12 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012k.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-34117-5_6/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-34117-5",
  book-URL =     "http://www.springerlink.com/content/978-3-642-34117-5",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Vleju:2012:CCA,
  author =       "Mircea Boris Vleju",
  title =        "A Client-Centric {ASM}-Based Approach to Identity
                 Management in Cloud Computing",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7518",
  pages =        "34--43",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-33999-8_5",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:24:11 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012i.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-33999-8_5/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-33999-8",
  book-URL =     "http://www.springerlink.com/content/978-3-642-33999-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Wang:2012:BRR,
  author =       "Ding Wang and Chun-guang Ma and Sen-dong Zhao and
                 Chang-li Zhou",
  title =        "Breaking a Robust Remote User Authentication Scheme
                 Using Smart Cards",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7513",
  pages =        "110--118",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-35606-3_13",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:24:06 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012i.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-35606-3_13/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-35606-3",
  book-URL =     "http://www.springerlink.com/content/978-3-642-35606-3",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Wang:2012:FOP,
  author =       "Xu An Wang and Xinyi Huang and Xiaoyuan Yang and
                 Longfei Liu and Xuguang Wu",
  title =        "Further observation on proxy re-encryption with
                 keyword search",
  journal =      j-J-SYST-SOFTW,
  volume =       "85",
  number =       "3",
  pages =        "643--654",
  month =        mar,
  year =         "2012",
  CODEN =        "JSSODM",
  DOI =          "https://doi.org/10.1016/j.jss.2011.09.035",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Fri Feb 17 07:42:10 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0164121211002433",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Wang:2012:MCE,
  author =       "Jinwei Wang and Shiguo Lian",
  title =        "On multiwatermarking in cloud environment",
  journal =      j-CCPE,
  volume =       "24",
  number =       "17",
  pages =        "2151--2164",
  day =          "10",
  month =        dec,
  year =         "2012",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.1820",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Mon Nov 5 07:44:57 MST 2012",
  bibsource =    "http://www.interscience.wiley.com/jpages/1532-0626;
                 https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "16 Sep 2011",
}

@Article{Wang:2012:NFS,
  author =       "Hui Wang and Anthony T. S. Ho and Xi Zhao",
  title =        "A Novel Fast Self-restoration Semi-fragile
                 Watermarking Algorithm for Image Content Authentication
                 Resistant to {JPEG} Compression",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7128",
  pages =        "72--85",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-32205-1_8",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:24:41 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012b.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-32205-1_8/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-32205-1",
  book-URL =     "http://www.springerlink.com/content/978-3-642-32205-1",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Wang:2012:NIS,
  author =       "Xiaofeng Wang and Nanning Zheng and Jianru Xue and
                 Zhenli Liu",
  title =        "A Novel Image Signature Method for Content
                 Authentication",
  journal =      j-COMP-J,
  volume =       "55",
  number =       "6",
  pages =        "686--701",
  month =        jun,
  year =         "2012",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxr108",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Wed May 30 11:20:33 MDT 2012",
  bibsource =    "http://comjnl.oxfordjournals.org/content/55/6.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/55/6/686.full.pdf+html",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "October 15, 2011",
}

@Article{Wang:2012:PAC,
  author =       "Lei Wang and Yu Sasaki and Kazuo Sakiyama and Kazuo
                 Ohta",
  title =        "Polynomial-Advantage Cryptanalysis of {$3$D} Cipher
                 and {$3$D}-Based Hash Function",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7631",
  pages =        "170--181",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-34117-5_11",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:26:12 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012k.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-34117-5_11/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-34117-5",
  book-URL =     "http://www.springerlink.com/content/978-3-642-34117-5",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Wang:2012:PCE,
  author =       "Qingju Wang and Andrey Bogdanov",
  title =        "The provable constructive effect of diffusion
                 switching mechanism in {CLEFIA}-type block ciphers",
  journal =      j-INFO-PROC-LETT,
  volume =       "112",
  number =       "11",
  pages =        "427--432",
  day =          "15",
  month =        jun,
  year =         "2012",
  CODEN =        "IFPLAT",
  DOI =          "https://doi.org/10.1016/j.ipl.2012.02.006",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Mon May 21 07:12:59 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019012000555",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Wang:2012:RTC,
  author =       "Liyun Wang and Hefei Ling and Fuhao Zou and Zhengding
                 Lu",
  title =        "Real-Time Compressed-Domain Video Watermarking
                 Resistance to Geometric Distortions",
  journal =      j-IEEE-MULTIMEDIA,
  volume =       "19",
  number =       "1",
  pages =        "70--79",
  month =        jan # "\slash " # mar,
  year =         "2012",
  CODEN =        "IEMUE4",
  DOI =          "https://doi.org/10.1109/MMUL.2011.76",
  ISSN =         "1070-986X (print), 1941-0166 (electronic)",
  ISSN-L =       "1070-986X",
  bibdate =      "Thu Mar 1 14:21:05 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeemultimedia.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE MultiMedia",
}

@Article{Wang:2012:SPB,
  author =       "Ding Wang and Chun-guang Ma and Peng Wu",
  title =        "Secure Password-Based Remote User Authentication
                 Scheme with Non-tamper Resistant Smart Cards",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7371",
  pages =        "114--121",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-31540-4_9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:21:06 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012f.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-31540-4_9/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-31540-4",
  book-URL =     "http://www.springerlink.com/content/978-3-642-31540-4",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Watanabe:2012:ITT,
  author =       "Yohei Watanabe and Takenobu Seito and Junji Shikata",
  title =        "Information-Theoretic Timed-Release Security:
                 Key-Agreement, Encryption, and Authentication Codes",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7412",
  pages =        "167--186",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-32284-6_10",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:22:00 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012g.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-32284-6_10/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-32284-6",
  book-URL =     "http://www.springerlink.com/content/978-3-642-32284-6",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Waters:2012:FER,
  author =       "Brent Waters",
  title =        "Functional Encryption for Regular Languages",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7417",
  pages =        "218--235",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-32009-5_14",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:22:07 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012g.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-32009-5_14/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-32009-5",
  book-URL =     "http://www.springerlink.com/content/978-3-642-32009-5",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Wei:2012:CSO,
  author =       "Fushan Wei and Zhenfeng Zhang and Chuangui Ma",
  title =        "Corrigendum to {``Gateway-oriented
                 password-authenticated key exchange protocol in the
                 standard model' [J. Syst. Softw. {\bf 85} (March (3))
                 (2012) 760--768]}",
  journal =      j-J-SYST-SOFTW,
  volume =       "85",
  number =       "9",
  pages =        "2192--2192",
  month =        sep,
  year =         "2012",
  CODEN =        "JSSODM",
  DOI =          "https://doi.org/10.1016/j.jss.2012.05.070",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Thu Jun 28 16:13:33 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  note =         "See \cite{Wei:2012:GOP}.",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0164121212001550",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Wei:2012:GOP,
  author =       "Fushan Wei and Zhenfeng Zhang and Chuangui Ma",
  title =        "Gateway-oriented password-authenticated key exchange
                 protocol in the standard model",
  journal =      j-J-SYST-SOFTW,
  volume =       "85",
  number =       "3",
  pages =        "760--768",
  month =        mar,
  year =         "2012",
  CODEN =        "JSSODM",
  DOI =          "https://doi.org/10.1016/j.jss.2011.09.061",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Fri Feb 17 07:42:10 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0164121211002597",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Wei:2012:IRK,
  author =       "Yuechuan Wei and Chao Li and Dan Cao",
  title =        "Improved Related-Key Rectangle Attack on the Full
                 {HAS-160} Encryption Mode",
  journal =      j-INT-J-FOUND-COMP-SCI,
  volume =       "23",
  number =       "3",
  pages =        "733--??",
  month =        apr,
  year =         "2012",
  CODEN =        "IFCSEN",
  DOI =          "https://doi.org/10.1142/S0129054112500074",
  ISSN =         "0129-0541 (print), 1793-6373 (electronic)",
  ISSN-L =       "0129-0541",
  bibdate =      "Sat Nov 3 13:16:05 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijfcs.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Foundations of Computer
                 Science (IJFCS)",
  journal-URL =  "http://www.worldscientific.com/loi/ijfcs",
}

@Article{Wei:2012:NCI,
  author =       "Xiaopeng Wei and Ling Guo and Qiang Zhang and Jianxin
                 Zhang and Shiguo Lian",
  title =        "A novel color image encryption algorithm based on
                 {DNA} sequence operation and hyper-chaotic system",
  journal =      j-J-SYST-SOFTW,
  volume =       "85",
  number =       "2",
  pages =        "290--299",
  month =        feb,
  year =         "2012",
  CODEN =        "JSSODM",
  DOI =          "https://doi.org/10.1016/j.jss.2011.08.017",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Mon Feb 6 15:39:32 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0164121211002147",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Wei:2012:NTB,
  author =       "Zhuo Wei and Xuhua Ding and Robert Huijie Deng and
                 Yongdong Wu",
  title =        "No Tradeoff between Confidentiality and Performance:
                 An Analysis on {H.264\slash SVC} Partial Encryption",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7394",
  pages =        "72--86",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-32805-3_6",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:21:38 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012f.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-32805-3_6/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-32805-3",
  book-URL =     "http://www.springerlink.com/content/978-3-642-32805-3",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Weir:2012:AVC,
  author =       "Jonathan Weir and WeiQi Yan",
  title =        "Authenticating Visual Cryptography Shares Using {$2$D}
                 Barcodes",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7128",
  pages =        "196--210",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-32205-1_17",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:24:41 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012b.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-32205-1_17/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-32205-1",
  book-URL =     "http://www.springerlink.com/content/978-3-642-32205-1",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Weir:2012:IHV,
  author =       "Jonathan Weir and Weiqi Yan and Mohan S. Kankanhalli",
  title =        "Image hatching for visual cryptography",
  journal =      j-TOMCCAP,
  volume =       "8",
  number =       "2S",
  pages =        "32:1--32:??",
  month =        sep,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2344436.2344438",
  ISSN =         "1551-6857 (print), 1551-6865 (electronic)",
  ISSN-L =       "1551-6857",
  bibdate =      "Tue Nov 6 18:13:05 MST 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tomccap/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tomccap.bib",
  abstract =     "Image hatching (or nonphotorealistic line-art) is a
                 technique widely used in the printing or engraving of
                 currency. Diverse styles of brush strokes have
                 previously been adopted for different areas of an image
                 to create aesthetically pleasing textures and shading.
                 Because there is no continuous tone within these types
                 of images, a multilevel scheme is proposed, which uses
                 different textures based on a threshold level. These
                 textures are then applied to the different levels and
                 are then combined to build up the final hatched image.
                 The proposed technique allows a secret to be hidden
                 using Visual Cryptography (VC) within the hatched
                 images. Visual cryptography provides a very powerful
                 means by which one secret can be distributed into two
                 or more pieces known as shares. When the shares are
                 superimposed exactly together, the original secret can
                 be recovered without computation. Also provided is a
                 comparison between the original grayscale images and
                 the resulting hatched images that are generated by the
                 proposed algorithm. This reinforces that the overall
                 quality of the hatched scheme is sufficient. The
                 Structural SIMilarity index (SSIM) is used to perform
                 this comparison.",
  acknowledgement = ack-nhfb,
  articleno =    "32",
  fjournal =     "ACM Transactions on Multimedia Computing,
                 Communications, and Applications",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J961",
}

@Article{Weng:2012:NCC,
  author =       "Zhiwei Weng and Jian Weng and Kai He and Yingkai Li",
  title =        "New Chosen Ciphertext Secure Public Key Encryption in
                 the Standard Model with Public Verifiability",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "6839",
  pages =        "170--176",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-25944-9_22",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Mon Dec 24 07:11:45 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/978-3-642-25944-9_22",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-25944-9",
  book-URL =     "http://www.springerlink.com/content/978-3-642-25944-9",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Wu:2012:AST,
  author =       "Shengbao Wu and Mingsheng Wang",
  title =        "Automatic Search of Truncated Impossible Differentials
                 for Word-Oriented Block Ciphers",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7668",
  pages =        "283--302",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-34931-7_17",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:18:33 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012l.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-34931-7_17/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-34931-7",
  book-URL =     "http://www.springerlink.com/content/978-3-642-34931-7",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Wu:2012:DAA,
  author =       "Hongjun Wu and Tao Huang and Phuong Ha Nguyen and
                 Huaxiong Wang and San Ling",
  title =        "Differential Attacks against Stream Cipher {ZUC}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7658",
  pages =        "262--277",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-34961-4_17",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:18:20 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012l.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-34961-4_17/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-34961-4",
  book-URL =     "http://www.springerlink.com/content/978-3-642-34961-4",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Wu:2012:PSC,
  author =       "Wei Wu and Yi Mu and Willy Susilo and Xinyi Huang and
                 Li Xu",
  title =        "A Provably Secure Construction of Certificate-Based
                 Encryption from Certificateless Encryption",
  journal =      j-COMP-J,
  volume =       "55",
  number =       "10",
  pages =        "1157--1168",
  month =        oct,
  year =         "2012",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxr130",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Fri Oct 26 08:44:19 MDT 2012",
  bibsource =    "http://comjnl.oxfordjournals.org/content/55/10.toc;
                 https://www.math.utah.edu/pub/tex/bib/comp2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/55/10/1157.full.pdf+html",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "January 5, 2012",
}

@Article{Wu:2012:RGB,
  author =       "Xiaotian Wu and Wei Sun",
  title =        "Random grid-based visual secret sharing for general
                 access structures with cheat-preventing ability",
  journal =      j-J-SYST-SOFTW,
  volume =       "85",
  number =       "5",
  pages =        "1119--1134",
  month =        may,
  year =         "2012",
  CODEN =        "JSSODM",
  DOI =          "https://doi.org/10.1016/j.jss.2011.12.041",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Mon Feb 27 06:33:47 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0164121211003220",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Wu:2012:RIB,
  author =       "Tsu-Yang Wu and Yuh-Min Tseng and Tung-Tso Tsai",
  title =        "A revocable {ID}-based authenticated group key
                 exchange protocol with resistant to malicious
                 participants",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "56",
  number =       "12",
  pages =        "2994--3006",
  day =          "16",
  month =        aug,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1016/j.comnet.2012.05.011",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Mon Jul 9 14:38:47 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/13891286",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1389128612001995",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286",
}

@Article{Wu:2012:SWG,
  author =       "Hao-tian Wu and Yiu-ming Cheung",
  title =        "Secure Watermarking on {$3$D} Geometry via {ICA} and
                 Orthogonal Transformation",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7110",
  pages =        "52--62",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-28693-3_4",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:24:24 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-28693-3_4/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-28693-3",
  book-URL =     "http://www.springerlink.com/content/978-3-642-28693-3",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Wu:2012:UFS,
  author =       "Xiaotian Wu and Duanhao Ou and Qiming Liang and Wei
                 Sun",
  title =        "A user-friendly secret image sharing scheme with
                 reversible steganography based on cellular automata",
  journal =      j-J-SYST-SOFTW,
  volume =       "85",
  number =       "8",
  pages =        "1852--1863",
  month =        aug,
  year =         "2012",
  CODEN =        "JSSODM",
  DOI =          "https://doi.org/10.1016/j.jss.2012.02.046",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Fri May 18 08:44:03 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0164121212000696",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Xi:2012:MDA,
  author =       "Kai Xi and Jiankun Hu and Fengling Han",
  title =        "Mobile device access control: an improved correlation
                 based face authentication scheme and its {Java ME}
                 application",
  journal =      j-CCPE,
  volume =       "24",
  number =       "10",
  pages =        "1066--1085",
  month =        jul,
  year =         "2012",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.1797",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Mon Nov 5 07:44:49 MST 2012",
  bibsource =    "http://www.interscience.wiley.com/jpages/1532-0626;
                 https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/java2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "28 Jul 2011",
}

@Article{Xie:2012:DPK,
  author =       "Xiang Xie and Rui Xue and Rui Zhang",
  title =        "Deterministic Public Key Encryption and Identity-Based
                 Encryption from Lattices in the Auxiliary-Input
                 Setting",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7485",
  pages =        "1--18",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-32928-9_1",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:23:35 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012h.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-32928-9_1/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-32928-9",
  book-URL =     "http://www.springerlink.com/content/978-3-642-32928-9",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Xie:2012:ORI,
  author =       "Min Xie and Libin Wang",
  title =        "One-round identity-based key exchange with {Perfect
                 Forward Security}",
  journal =      j-INFO-PROC-LETT,
  volume =       "112",
  number =       "14--15",
  pages =        "587--591",
  day =          "15",
  month =        aug,
  year =         "2012",
  CODEN =        "IFPLAT",
  DOI =          "https://doi.org/10.1016/j.ipl.2012.05.001",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Wed May 30 11:09:52 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019012001196",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Xie:2012:RAA,
  author =       "Yulai Xie",
  title =        "Review of {{\booktitle{Applied Algebra: Codes, Ciphers
                 and Discrete Algorithms}}, by Darel W. Hardy, Fred
                 Richman, and Carol L. Walker}",
  journal =      j-SIGACT,
  volume =       "43",
  number =       "3",
  pages =        "25--27",
  month =        sep,
  year =         "2012",
  CODEN =        "SIGNDM",
  DOI =          "https://doi.org/10.1145/2421096.2421101",
  ISSN =         "0163-5700 (print), 1943-5827 (electronic)",
  ISSN-L =       "0163-5700",
  bibdate =      "Sun May 5 10:25:39 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGACT News",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J697",
}

@Article{Xie:2012:RBA,
  author =       "Yulai Xie",
  title =        "Review of {{\booktitle{Applied Algebra: Codes, Ciphers
                 and Discrete Algorithms}}, by Darel W. Hardy, Fred
                 Richman, and Carol L. Walker}",
  journal =      j-SIGACT,
  volume =       "43",
  number =       "3",
  pages =        "25--27",
  month =        sep,
  year =         "2012",
  CODEN =        "SIGNDM",
  DOI =          "https://doi.org/10.1145/2421096.2421101",
  ISSN =         "0163-5700 (print), 1943-5827 (electronic)",
  ISSN-L =       "0163-5700",
  bibdate =      "Sun May 5 10:25:39 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGACT News",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J697",
}

@Article{Xiong:2012:CBP,
  author =       "Kaiqi Xiong and Ronghua Wang and Wenliang Du and Peng
                 Ning",
  title =        "Containing bogus packet insertion attacks for
                 broadcast authentication in sensor networks",
  journal =      j-TOSN,
  volume =       "8",
  number =       "3",
  pages =        "20:1--20:??",
  month =        jul,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2240092.2240094",
  ISSN =         "1550-4859 (print), 1550-4867 (electronic)",
  ISSN-L =       "1550-4859",
  bibdate =      "Tue Nov 6 18:02:35 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tosn.bib",
  abstract =     "Broadcast is a critical communication primitive in
                 wireless sensor networks. The multihop nature of sensor
                 networks makes it necessary for sensor nodes to forward
                 broadcast messages so that the messages can reach an
                 entire network. Authentication of broadcast messages is
                 an important but challenging problem in sensor
                 networks. Public key cryptography (PKC) has been used
                 recently to address this problem. However, PKC-based
                 authentication techniques are susceptible to bogus
                 packet insertion attacks in which attackers keep
                 broadcasting bogus messages and force
                 resource-constrained sensor nodes to forward such
                 messages. Moreover, because it takes time to do
                 signature verifications, it is impractical for each
                 node to authenticate every received message before
                 forwarding it. In this article, we propose a dynamic
                 window scheme to thwart the aforementioned bogus packet
                 insertion attacks which permits sensor nodes to
                 efficiently broadcast messages. Within this scheme, a
                 sensor node has the ability to determine whether or not
                 to verify an incoming message before forwarding the
                 message. We further study the property of this dynamic
                 window scheme and investigate the best strategy for
                 thwarting bogus packet insertion attacks. We propose
                 three strategies for finding the optimal parameters by
                 an improved additive increase multiplicative decrease
                 (AIMD) window updating function so that the proposed
                 dynamic window scheme can achieve the best overall
                 performance with respect to the authentication and
                 forwarding times of messages. Numerical validations
                 show that our proposed scheme performs very well in
                 terms of energy saving and broadcast delays based on
                 three different metrics, including average
                 authentication delays, the percentage of nodes
                 receiving fake messages, and the percentage of nodes
                 forwarding fake messages.",
  acknowledgement = ack-nhfb,
  articleno =    "20",
  fjournal =     "ACM Transactions on Sensor Networks (TOSN)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J981",
}

@Article{Xiong:2012:CLR,
  author =       "Hao Xiong and Cong Zhang and Tsz Hon Yuen and Echo P.
                 Zhang and Siu Ming Yiu and Sihan Qing",
  title =        "Continual Leakage-Resilient Dynamic Secret Sharing in
                 the Split-State Model",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7618",
  pages =        "119--130",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-34129-8_11",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:25:56 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012k.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-34129-8_11/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-34129-8",
  book-URL =     "http://www.springerlink.com/content/978-3-642-34129-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Xiong:2012:PPK,
  author =       "Kaiqi Xiong",
  title =        "The Performance of Public Key-Based Authentication
                 Protocols",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7645",
  pages =        "206--219",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-34601-9_16",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:17:59 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012k.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-34601-9_16/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-34601-9",
  book-URL =     "http://www.springerlink.com/content/978-3-642-34601-9",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Xu:2012:AHA,
  author =       "Chang Xu and Zhoujun Li and Yi Mu and Hua Guo and Tao
                 Guo",
  title =        "Affiliation-Hiding Authenticated Asymmetric Group Key
                 Agreement",
  journal =      j-COMP-J,
  volume =       "55",
  number =       "10",
  pages =        "1180--1191",
  month =        oct,
  year =         "2012",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxs022",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Fri Oct 26 08:44:19 MDT 2012",
  bibsource =    "http://comjnl.oxfordjournals.org/content/55/10.toc;
                 https://www.math.utah.edu/pub/tex/bib/comp2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/55/10/1180.full.pdf+html",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "March 16, 2012",
}

@Article{Xu:2012:APA,
  author =       "Zhi Xu and Hungyuan Hsu and Xin Chen and Sencun Zhu
                 and Ali R. Hurson",
  title =        "{AK-PPM}: An Authenticated Packet Attribution Scheme
                 for Mobile Ad Hoc Networks",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7462",
  pages =        "147--168",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-33338-5_8",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:23:06 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012h.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-33338-5_8/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-33338-5",
  book-URL =     "http://www.springerlink.com/content/978-3-642-33338-5",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Yamada:2012:PBR,
  author =       "Takaaki Yamada and Isao Echizen",
  title =        "{PC}-Based Real-Time Video Watermark Embedding System
                 Independent of Platform for Parallel Computing",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7110",
  pages =        "15--33",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-28693-3_2",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:24:24 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-28693-3_2/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-28693-3",
  book-URL =     "http://www.springerlink.com/content/978-3-642-28693-3",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Yamada:2012:UEW,
  author =       "Takaaki Yamada and Yoshiyasu Takahashi",
  title =        "Use of ``Emergable Watermarks'' as Copy Indicators for
                 Securing Video Content",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7128",
  pages =        "181--195",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-32205-1_16",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:24:41 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012b.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-32205-1_16/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-32205-1",
  book-URL =     "http://www.springerlink.com/content/978-3-642-32205-1",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Yamaguchi:2012:EVC,
  author =       "Yasushi Yamaguchi",
  title =        "An Extended Visual Cryptography Scheme for
                 Continuous-Tone Images",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7128",
  pages =        "228--242",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-32205-1_19",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:24:41 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012b.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-32205-1_19/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-32205-1",
  book-URL =     "http://www.springerlink.com/content/978-3-642-32205-1",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Yan:2012:SMA,
  author =       "Diqun Yan and Rangding Wang and Xianmin Yu and Jie
                 Zhu",
  title =        "Steganography for {MP3} audio by exploiting the rule
                 of window switching",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "5",
  pages =        "704--716",
  month =        jul,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:29 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812000673",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Yang:2012:BPN,
  author =       "Shuguo Yang and Yongbin Zhou and Jiye Liu and Danyang
                 Chen",
  title =        "Back Propagation Neural Network Based Leakage
                 Characterization for Practical Security Analysis of
                 Cryptographic Implementations",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7259",
  pages =        "169--185",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-31912-9_12",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:18:40 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012d.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-31912-9_12/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-31912-9",
  book-URL =     "http://www.springerlink.com/content/978-3-642-31912-9",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Yang:2012:EMA,
  author =       "Rui Yang and Zhenhua Qu and Jiwu Huang",
  title =        "Exposing {MP3} audio forgeries using frame offsets",
  journal =      j-TOMCCAP,
  volume =       "8",
  number =       "2S",
  pages =        "35:1--35:??",
  month =        sep,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2344436.2344441",
  ISSN =         "1551-6857 (print), 1551-6865 (electronic)",
  ISSN-L =       "1551-6857",
  bibdate =      "Tue Nov 6 18:13:05 MST 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tomccap/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tomccap.bib",
  abstract =     "Audio recordings should be authenticated before they
                 are used as evidence. Although audio watermarking and
                 signature are widely applied for authentication, these
                 two techniques require accessing the original audio
                 before it is published. Passive authentication is
                 necessary for digital audio, especially for the most
                 popular audio format: MP3. In this article, we propose
                 a passive approach to detect forgeries of MP3 audio.
                 During the process of MP3 encoding the audio samples
                 are divided into frames, and thus each frame has its
                 own frame offset after encoding. Forgeries lead to the
                 breaking of framing grids. So the frame offset is a
                 good indication for locating forgeries, and it can be
                 retrieved by the identification of the quantization
                 characteristic. In this way, the doctored positions can
                 be automatically located. Experimental results
                 demonstrate that the proposed approach is effective in
                 detecting some common forgeries, such as deletion,
                 insertion, substitution, and splicing. Even when the
                 bit rate is as low as 32 kbps, the detection rate is
                 above 99\%.",
  acknowledgement = ack-nhfb,
  articleno =    "35",
  fjournal =     "ACM Transactions on Multimedia Computing,
                 Communications, and Applications",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J961",
}

@Article{Yang:2012:LUC,
  author =       "Bo Yang and Mingwu Zhang",
  title =        "{LR-UESDE}: a Continual-Leakage Resilient Encryption
                 with Unbounded Extensible Set Delegation",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7496",
  pages =        "125--142",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-33272-2_9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:23:50 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012h.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-33272-2_9/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-33272-2",
  book-URL =     "http://www.springerlink.com/content/978-3-642-33272-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Yang:2012:NIB,
  author =       "Geng Yang and Qiang Zhou and Xiaolong Xu and Jian Xu
                 and Chunming Rong",
  title =        "A Novel Identity-Based Key Management and Encryption
                 Scheme for Distributed System",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7672",
  pages =        "123--138",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-35362-8_11",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:18:38 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012l.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-35362-8_11/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-35362-8",
  book-URL =     "http://www.springerlink.com/content/978-3-642-35362-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Yang:2012:PST,
  author =       "Jun-Han Yang and Tian-Jie Cao",
  title =        "Provably secure three-party password authenticated key
                 exchange protocol in the standard model",
  journal =      j-J-SYST-SOFTW,
  volume =       "85",
  number =       "2",
  pages =        "340--350",
  month =        feb,
  year =         "2012",
  CODEN =        "JSSODM",
  DOI =          "https://doi.org/10.1016/j.jss.2011.08.024",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Mon Feb 6 15:39:32 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0164121211002172",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Yang:2012:SAK,
  author =       "Zheng Yang and J{\"o}rg Schwenk",
  title =        "Strongly Authenticated Key Exchange Protocol from
                 Bilinear Groups without Random Oracles",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7496",
  pages =        "264--275",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-33272-2_17",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:23:50 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012h.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-33272-2_17/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-33272-2",
  book-URL =     "http://www.springerlink.com/content/978-3-642-33272-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Yang:2012:WSI,
  author =       "Chunfang Yang and Fenlin Liu and Shiguo Lian and
                 Xiangyang Luo and Daoshun Wang",
  title =        "Weighted Stego-Image Steganalysis of Messages Hidden
                 into Each Bit Plane",
  journal =      j-COMP-J,
  volume =       "55",
  number =       "6",
  pages =        "717--727",
  month =        jun,
  year =         "2012",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxr112",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Wed May 30 11:20:33 MDT 2012",
  bibsource =    "http://comjnl.oxfordjournals.org/content/55/6.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/55/6/717.full.pdf+html",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "October 28, 2011",
}

@Article{Yasuda:2012:ASM,
  author =       "Takanori Yasuda and Tsuyoshi Takagi and Kouichi
                 Sakurai",
  title =        "Application of Scalar Multiplication of {Edwards}
                 Curves to Pairing-Based Cryptography",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7631",
  pages =        "19--36",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-34117-5_2",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:26:12 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012k.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-34117-5_2/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-34117-5",
  book-URL =     "http://www.springerlink.com/content/978-3-642-34117-5",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Yavuz:2012:BFB,
  author =       "Attila A. Yavuz and Peng Ning and Michael K. Reiter",
  title =        "{BAF} and {FI-BAF}: Efficient and Publicly Verifiable
                 Cryptographic Schemes for Secure Logging in
                 Resource-Constrained Systems",
  journal =      j-TISSEC,
  volume =       "15",
  number =       "2",
  pages =        "9:1--9:??",
  month =        jul,
  year =         "2012",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/2240276.2240280",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Tue Jul 31 17:02:31 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tissec.bib",
  abstract =     "Audit logs are an integral part of modern computer
                 systems due to their forensic value. Protecting audit
                 logs on a physically unprotected machine in hostile
                 environments is a challenging task, especially in the
                 presence of active adversaries. It is critical for such
                 a system to have forward security and append-only
                 properties such that when an adversary compromises a
                 logging machine, she cannot forge or selectively delete
                 the log entries accumulated before the compromise.
                 Existing public-key-based secure logging schemes are
                 computationally costly. Existing symmetric secure
                 logging schemes are not publicly verifiable and open to
                 certain attacks. In this article, we develop a new
                 forward-secure and aggregate signature scheme called
                 Blind-Aggregate-Forward (BAF), which is suitable for
                 secure logging in resource-constrained systems. BAF is
                 the only cryptographic secure logging scheme that can
                 produce publicly verifiable, forward-secure and
                 aggregate signatures with low computation,
                 key/signature storage, and signature communication
                 overheads for the loggers, without requiring any online
                 trusted third party support. A simple variant of BAF
                 also allows a fine-grained verification of log entries
                 without compromising the security or computational
                 efficiency of BAF. We prove that our schemes are secure
                 in Random Oracle Model (ROM). We also show that they
                 are significantly more efficient than all the previous
                 publicly verifiable cryptographic secure logging
                 schemes.",
  acknowledgement = ack-nhfb,
  articleno =    "9",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@Article{Yavuz:2012:ECR,
  author =       "Attila A. Yavuz and Peng Ning and Michael K. Reiter",
  title =        "Efficient, Compromise Resilient and Append-Only
                 Cryptographic Schemes for Secure Audit Logging",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7397",
  pages =        "148--163",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-32946-3_12",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:21:41 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012f.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-32946-3_12/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-32946-3",
  book-URL =     "http://www.springerlink.com/content/978-3-642-32946-3",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Yoneyama:2012:ORA,
  author =       "Kazuki Yoneyama",
  title =        "One-Round Authenticated Key Exchange with Strong
                 Forward Secrecy in the Standard Model against
                 Constrained Adversary",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7631",
  pages =        "69--86",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-34117-5_5",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:26:12 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012k.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-34117-5_5/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-34117-5",
  book-URL =     "http://www.springerlink.com/content/978-3-642-34117-5",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Yoshida:2012:OGT,
  author =       "Maki Yoshida and Toru Fujiwara and Marc Fossorier",
  title =        "Optimum General Threshold Secret Sharing",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7412",
  pages =        "187--204",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-32284-6_11",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:22:00 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012g.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-32284-6_11/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-32284-6",
  book-URL =     "http://www.springerlink.com/content/978-3-642-32284-6",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Yoshino:2012:SIP,
  author =       "Masayuki Yoshino and Noboru Kunihiro and Ken Naganuma
                 and Hisayoshi Sato",
  title =        "Symmetric Inner-Product Predicate Encryption Based on
                 Three Groups",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7496",
  pages =        "215--234",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-33272-2_14",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:23:50 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012h.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-33272-2_14/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-33272-2",
  book-URL =     "http://www.springerlink.com/content/978-3-642-33272-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{You:2012:DDS,
  author =       "Ilsun You and Jong-Hyouk Lee and Kouichi Sakurai",
  title =        "{DSSH}: Digital signature based secure handover for
                 network-based mobility management",
  journal =      j-INT-J-COMPUT-SYST-SCI-ENG,
  volume =       "27",
  number =       "3",
  pages =        "??--??",
  month =        "????",
  year =         "2012",
  CODEN =        "CSSEEI",
  ISSN =         "0267-6192",
  ISSN-L =       "0267-6192",
  bibdate =      "Tue Dec 3 12:04:33 MST 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsystscieng.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Computer Systems Science and
                 Engineering",
}

@Article{Yu:2012:EPF,
  author =       "Jia Yu and Fanyu and Kong and Xiangguo Cheng and Rong
                 Hao and Jianxi Fan",
  title =        "Erratum to the paper: {Forward-Secure Identity-Based
                 Public-Key Encryption without Random Oracles}",
  journal =      j-FUND-INFO,
  volume =       "114",
  number =       "1",
  pages =        "103--103",
  month =        jan,
  year =         "2012",
  CODEN =        "FUMAAJ",
  DOI =          "https://doi.org/10.3233/FI-2011-619",
  ISSN =         "0169-2968 (print), 1875-8681 (electronic)",
  ISSN-L =       "0169-2968",
  bibdate =      "Sat Mar 5 17:14:40 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/fundinfo2010.bib",
  note =         "See \cite{Yu:2011:FSI}.",
  acknowledgement = ack-nhfb,
  fjournal =     "Fundamenta Informaticae",
  journal-URL =  "http://content.iospress.com/journals/fundamenta-informaticae",
}

@Article{Yu:2012:IRI,
  author =       "Jia Yu and Fanyu Kong and Xiangguo Cheng and Rong Hao
                 and Jianxi Fan",
  title =        "Intrusion-resilient identity-based signature:
                 {Security} definition and construction",
  journal =      j-J-SYST-SOFTW,
  volume =       "85",
  number =       "2",
  pages =        "382--391",
  month =        feb,
  year =         "2012",
  CODEN =        "JSSODM",
  DOI =          "https://doi.org/10.1016/j.jss.2011.08.034",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Mon Feb 6 15:39:32 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0164121211002342",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Yu:2012:NWM,
  author =       "Zhiwei Yu and Chaokun Wang and Clark Thomborson and
                 Jianmin Wang and Shiguo Lian and Athanasios V.
                 Vasilakos",
  title =        "A novel watermarking method for software protection in
                 the cloud",
  journal =      j-SPE,
  volume =       "42",
  number =       "4",
  pages =        "409--430",
  month =        "????",
  year =         "2012",
  CODEN =        "SPEXBL",
  DOI =          "https://doi.org/10.1002/spe.1088",
  ISSN =         "0038-0644 (print), 1097-024X (electronic)",
  ISSN-L =       "0038-0644",
  bibdate =      "Wed Apr 4 09:38:34 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/spe.bib;
                 http://www3.interscience.wiley.com/journalfinder.html",
  acknowledgement = ack-nhfb,
  fjournal =     "Software---Practice and Experience",
  journal-URL =  "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1097-024X",
  onlinedate =   "23 May 2011",
}

@Article{Yu:2012:SME,
  author =       "Jia Yu and Shuguang Wang and Huawei Zhao and Minglei
                 Shu and Jialiang Lv and Qiang Guo",
  title =        "A Simultaneous Members Enrollment and Revocation
                 Protocol for Secret Sharing Schemes",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7299",
  pages =        "190--197",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-30428-6_16",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:19:32 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012d.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-30428-6_16/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-30428-6",
  book-URL =     "http://www.springerlink.com/content/978-3-642-30428-6",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Yuen:2012:IBE,
  author =       "Tsz Hon Yuen and Sherman S. M. Chow and Ye Zhang and
                 Siu Ming Yiu",
  title =        "Identity-Based Encryption Resilient to Continual
                 Auxiliary Leakage",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7237",
  pages =        "117--134",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-29011-4_8;
                 https://doi.org/10.1007/978-3-642-29011-4_9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Sat Dec 15 20:55:01 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs.bib",
  URL =          "http://link.springer.com/accesspage/chapter/10.1007/978-3-642-29011-4_8;
                 http://link.springer.com/chapter/10.1007/978-3-642-29011-4_9/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-29011-4",
  book-URL =     "http://www.springerlink.com/content/978-3-642-29011-4",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Yum:2012:OPE,
  author =       "Dae Hyun Yum and Duk Soo Kim and Jin Seok Kim and Pil
                 Joong Lee",
  title =        "Order-Preserving Encryption for Non-uniformly
                 Distributed Plaintexts",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7115",
  pages =        "84--97",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-27890-7_7",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:24:29 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-27890-7_7/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-27890-7",
  book-URL =     "http://www.springerlink.com/content/978-3-642-27890-7",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Zhang:2012:AOP,
  author =       "Jiuling Zhang and Beixing Deng and Xing Li",
  title =        "Additive Order Preserving Encryption Based Encrypted
                 Documents Ranking in Secure Cloud Storage",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7332",
  pages =        "58--65",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-31020-1_8",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:20:15 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012e.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-31020-1_8/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-31020-1",
  book-URL =     "http://www.springerlink.com/content/978-3-642-31020-1",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Zhang:2012:CCB,
  author =       "Leo Yu Zhang and Chengqing Li and Kwok-Wo Wong and Shi
                 Shu and Guanrong Chen",
  title =        "Cryptanalyzing a chaos-based image encryption
                 algorithm using alternate structure",
  journal =      j-J-SYST-SOFTW,
  volume =       "85",
  number =       "9",
  pages =        "2077--2085",
  month =        sep,
  year =         "2012",
  CODEN =        "JSSODM",
  DOI =          "https://doi.org/10.1016/j.jss.2012.04.002",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Thu Jun 28 16:13:33 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  URL =          "http://www.sciencedirect.com/science/article/pii/S016412121200101X",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Zhang:2012:EEF,
  author =       "Yunmei Zhang and Joseph K. Liu and Xinyi Huang and Man
                 Ho Au and Willy Susilo",
  title =        "Efficient Escrow-Free Identity-Based Signature",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7496",
  pages =        "161--174",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-33272-2_11",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:23:50 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012h.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-33272-2_11/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-33272-2",
  book-URL =     "http://www.springerlink.com/content/978-3-642-33272-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Zhang:2012:EHO,
  author =       "Wentao Zhang and Bozhan Su and Wenling Wu and Dengguo
                 Feng and Chuankun Wu",
  title =        "Extending Higher-Order Integral: An Efficient Unified
                 Algorithm of Constructing Integral Distinguishers for
                 Block Ciphers",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7341",
  pages =        "117--134",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-31284-7_8",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:20:27 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012e.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-31284-7_8/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-31284-7",
  book-URL =     "http://www.springerlink.com/content/978-3-642-31284-7",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Zhang:2012:LDC,
  author =       "Haibin Zhang",
  title =        "Length-Doubling Ciphers and Tweakable Ciphers",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7341",
  pages =        "100--116",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-31284-7_7",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:20:27 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012e.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-31284-7_7/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-31284-7",
  book-URL =     "http://www.springerlink.com/content/978-3-642-31284-7",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Zhang:2012:TCS,
  author =       "Zhifang Zhang and Yeow Meng Chee and San Ling and
                 Mulan Liu and Huaxiong Wang",
  title =        "Threshold changeable secret sharing schemes
                 revisited",
  journal =      j-THEOR-COMP-SCI,
  volume =       "418",
  number =       "1",
  pages =        "106--115",
  day =          "10",
  month =        feb,
  year =         "2012",
  CODEN =        "TCSCDI",
  DOI =          "https://doi.org/10.1016/j.tcs.2011.09.027",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Thu Jan 19 15:34:40 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2010.bib;
                 http://www.sciencedirect.com/science/journal/03043975",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0304397511008206",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{Zhao:2012:FCS,
  author =       "Xingwen Zhao and Fangguo Zhang",
  title =        "Fully {CCA2} secure identity-based broadcast
                 encryption with black-box accountable authority",
  journal =      j-J-SYST-SOFTW,
  volume =       "85",
  number =       "3",
  pages =        "708--716",
  month =        mar,
  year =         "2012",
  CODEN =        "JSSODM",
  DOI =          "https://doi.org/10.1016/j.jss.2011.09.045",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Fri Feb 17 07:42:10 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  URL =          "http://www.sciencedirect.com/science/article/pii/S016412121100255X",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Zhao:2012:IAS,
  author =       "Yifan Zhao and Swee-Won Lo and Robert H. Deng and
                 Xuhua Ding",
  title =        "An Improved Authentication Scheme for {H.264\slash
                 SVC} and Its Performance Evaluation over Non-stationary
                 Wireless Mobile Networks",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7645",
  pages =        "192--205",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-34601-9_15",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:17:59 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012k.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-34601-9_15/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-34601-9",
  book-URL =     "http://www.springerlink.com/content/978-3-642-34601-9",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Zhao:2012:SSM,
  author =       "Hong Zhao and Yun Q. Shi and Nirwan Ansari",
  title =        "Steganography in Streaming Multimedia over Networks",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7110",
  pages =        "96--114",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-28693-3_7",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:24:24 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-28693-3_7/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-28693-3",
  book-URL =     "http://www.springerlink.com/content/978-3-642-28693-3",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Zhao:2012:SSS,
  author =       "Dawei Zhao and Haipeng Peng and Cong Wang and Yixian
                 Yang",
  title =        "A secret sharing scheme with a short share realizing
                 the {$ (t, n) $} threshold and the adversary
                 structure",
  journal =      j-COMPUT-MATH-APPL,
  volume =       "64",
  number =       "4",
  pages =        "611--615",
  month =        aug,
  year =         "2012",
  CODEN =        "CMAPDK",
  DOI =          "https://doi.org/10.1016/j.camwa.2011.12.067",
  ISSN =         "0898-1221 (print), 1873-7668 (electronic)",
  ISSN-L =       "0898-1221",
  MRclass =      "94A60 (91A80)",
  MRnumber =     "2948607",
  MRreviewer =   "Maura Beth Paterson",
  bibdate =      "Wed Mar 1 21:51:12 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computmathappl2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0898122111011382",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers and Mathematics with Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/08981221",
}

@Article{Zhou:2012:CBF,
  author =       "Qing Zhou and Xiaofeng Liao",
  title =        "Collision-based flexible image encryption algorithm",
  journal =      j-J-SYST-SOFTW,
  volume =       "85",
  number =       "2",
  pages =        "400--407",
  month =        feb,
  year =         "2012",
  CODEN =        "JSSODM",
  DOI =          "https://doi.org/10.1016/j.jss.2011.08.032",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Mon Feb 6 15:39:32 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0164121211002329",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Zhu:2012:JLS,
  author =       "Xinglei Zhu and Chang W. Chen",
  title =        "A joint layered scheme for reliable and secure mobile
                 {JPEG-2000} streaming",
  journal =      j-TOMCCAP,
  volume =       "8",
  number =       "3",
  pages =        "30:1--30:??",
  month =        jul,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2240136.2240143",
  ISSN =         "1551-6857 (print), 1551-6865 (electronic)",
  ISSN-L =       "1551-6857",
  bibdate =      "Tue Nov 6 18:13:06 MST 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tomccap/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tomccap.bib",
  abstract =     "This article presents a novel joint layered approach
                 to simultaneously achieve both reliable and secure
                 mobile JPEG-2000 image streaming. With a priori
                 knowledge of JPEG-2000 source coding and channel
                 coding, the proposed joint system integrates
                 authentication into the media error protection
                 components to ensure that every source-decodable media
                 unit is authenticated. By such a dedicated design, the
                 proposed scheme protects both compressed JPEG-2000
                 codestream and the authentication data from wireless
                 channel impairments. It is fundamentally different from
                 many existing systems that consider the problem of
                 media authentication separately from the other
                 operations in the media transmission system. By
                 utilizing the contextual relationship, such as coding
                 dependency and content importance between media slices
                 for authentication hash appending, the proposed scheme
                 generates an extremely low authentication overhead.
                 Under this joint layered coding framework, an optimal
                 rate allocation algorithm for source coding, channel
                 coding, and media authentication is developed to
                 guarantee end-to-end media quality. Experiment results
                 on JPEG-2000 images validate the proposed scheme and
                 demonstrate that the performance of the proposed scheme
                 is approaching its upper bound, in which case no
                 authentication is applied to the media stream.",
  acknowledgement = ack-nhfb,
  articleno =    "30",
  fjournal =     "ACM Transactions on Multimedia Computing,
                 Communications, and Applications",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J961",
}

@Article{Zmudzinski:2012:WEU,
  author =       "Sascha Zmudzinski and Martin Steinebach",
  title =        "Watermark Embedding Using Audio Fingerprinting",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7228",
  pages =        "63--79",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-31971-6_4",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:18:04 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012c.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-31971-6_4/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-31971-6",
  book-URL =     "http://www.springerlink.com/content/978-3-642-31971-6",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Zorpette:2012:BEC,
  author =       "Glenn Zorpette",
  title =        "The beginning of the end of cash [Special Report]",
  journal =      j-IEEE-SPECTRUM,
  volume =       "49",
  number =       "6",
  pages =        "27--29",
  month =        jun,
  year =         "2012",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.2012.6203962",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 07:02:09 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "cash; credit card; Credit cards; cryptography; debit
                 card; digital economy; electronic money; encryption;
                 Government; Mobile communication; Online banking;
                 prepaid debit card; smart cards; Social network
                 services; Special issues and sections",
}

@Article{Zwattendorfer:2012:CBL,
  author =       "Bernd Zwattendorfer and Arne Tauber and Klaus
                 Stranacher and Peter Reichst{\"a}dter",
  title =        "Cross-Border Legal Identity Management",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7443",
  pages =        "149--161",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-33489-4_13",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Wed Dec 19 15:22:42 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012g.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-33489-4_13/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-33489-4",
  book-URL =     "http://www.springerlink.com/content/978-3-642-33489-4",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Acar:2013:SPA,
  author =       "Tolga Acar and Mira Belenkiy and Alptekin
                 K{\"u}p{\c{c}}{\"u}",
  title =        "Single password authentication",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "57",
  number =       "13",
  pages =        "2597--2614",
  day =          "9",
  month =        sep,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1016/j.comnet.2013.05.007",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Tue Aug 6 11:25:50 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/13891286",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1389128613001667",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286",
}

@TechReport{Adj:2013:WDC,
  author =       "Gora Adj and Alfred Menezes and Thomaz Oliveira and
                 Francisco Rodriguez-Henriquez",
  title =        "Weakness of {$ \mathbb {F}_{3^{6509}} $} for discrete
                 logarithm cryptography",
  type =         "Report",
  institution =  "University of Waterloo",
  address =      "Waterloo, ON, Canada",
  pages =        "25",
  day =          "15",
  month =        jul,
  year =         "2013",
  bibdate =      "Thu Feb 27 06:04:08 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://crypto.2013.rump.cr.yp.to/;
                 http://eprint.iacr.org/2013/446",
  abstract =     "In 2013, Joux, and then Barbulescu, Gaudry, Joux and
                 Thom{\'e}, presented new algorithms for computing
                 discrete logarithms in finite fields of small and
                 medium characteristic. We show that these new
                 algorithms render the finite field $ \mathbb {F}_{3^{6
                 \cdot 509}} = \mathbb {F}_{3^{3054}} $ weak for
                 discrete logarithm cryptography in the sense that
                 discrete logarithms in this field can be computed
                 significantly faster than with the previous fastest
                 algorithms. Our concrete analysis shows that the
                 supersingular elliptic curve over $ \mathbb
                 {F}_{3^{509}} $ with embedding degree $6$ that had been
                 considered for implementing pairing-based cryptosystems
                 at the 128-bit security level in fact provides only a
                 significantly lower level of security. Our work
                 provides a convenient framework and tools for
                 performing a concrete analysis of the new discrete
                 logarithm algorithms and their variants.",
  acknowledgement = ack-nhfb,
  remark =       "Presented at Crypto 2013 rump session, Santa Barbara,
                 CA, USA, 20 August 2013.",
}

@Article{Agudo:2013:PAC,
  author =       "Isaac Agudo and Ruben Rios and Javier Lopez",
  title =        "A privacy-aware continuous authentication scheme for
                 proximity-based access control",
  journal =      j-COMPUT-SECUR,
  volume =       "39 (part B)",
  number =       "??",
  pages =        "117--126",
  month =        nov,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813000874",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Book{Aid:2013:DIO,
  editor =       "Matthew M. Aid and William Burr and Thomas R.
                 Johnson",
  title =        "``{Disreputable} if Not Outright Illegal'': the
                 {National Security Agency} versus {Martin Luther King,
                 Muhammad Ali, Art Buchwald, Frank Church, et al.}:
                 Newly Declassified History Divulges Names of Prominent
                 {Americans} Targeted by {NSA} during {Vietnam Era}",
  volume =       "441",
  publisher =    "National Security Archive",
  address =      "Washington, DC, USA",
  year =         "2013",
  LCCN =         "JZ5630",
  bibdate =      "Mon Mar 9 12:12:19 MDT 2015",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  series =       "National Security Archive Electronic Briefing Book",
  URL =          "http://www2.gwu.edu/~nsarchiv/NSAEBB/NSAEBB441/",
  acknowledgement = ack-nhfb,
  remark =       "Posted September 25, 2013.",
  subject =      "Military intelligence; History; 20th century;
                 Cryptography; United States; Electronic surveillance;
                 Official secrets; Cold War; Cryptography.; Electronic
                 surveillance.; Military intelligence.; Official
                 secrets.",
}

@Article{Alcaide:2013:AAP,
  author =       "Almudena Alcaide and Esther Palomar and Jos{\'e}
                 Montero-Castillo and Arturo Ribagorda",
  title =        "Anonymous authentication for privacy-preserving {IoT}
                 target-driven applications",
  journal =      j-COMPUT-SECUR,
  volume =       "37",
  number =       "??",
  pages =        "111--123",
  month =        sep,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:33 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813000904",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@TechReport{AlFardan:2013:LTB,
  author =       "Nadhem AlFardan and Kenny Paterson",
  title =        "Lucky Thirteen: Breaking the {TLS} and {DTLS} Record
                 Protocols",
  type =         "Report",
  number =       "??",
  institution =  "Information Security Group, Royal Holloway, University
                 of London",
  address =      "Egham, Surrey TW20 0EX, UK",
  pages =        "18",
  day =          "4",
  month =        feb,
  year =         "2013",
  bibdate =      "Wed Feb 06 11:48:25 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.isg.rhul.ac.uk/tls/;
                 http://www.isg.rhul.ac.uk/tls/TLStiming.pdf",
  abstract =     "The Transport Layer Security (TLS) protocol aims to
                 provide confidentiality and integrity of data in
                 transit across untrusted networks. TLS has become the
                 de facto secure protocol of choice for Internet and
                 mobile applications. DTLS is a variant of TLS that is
                 growing in importance. In this paper, we present
                 distinguishing and plaintext recovery attacks against
                 TLS and DTLS. The attacks are based on a delicate
                 timing analysis of decryption processing in the two
                 protocols. We include experimental results
                 demonstrating the feasibility of the attacks in
                 realistic network environments for several different
                 implementations of TLS and DTLS, including the leading
                 OpenSSL implementations. We provide countermeasures for
                 the attacks. Finally, we discuss the wider implications
                 of our attacks for the cryptographic design used by TLS
                 and DTLS.",
  acknowledgement = ack-nhfb,
  keywords =     "Bouncy-Castle; GnuTLS; HMAC-MD5; HMAC-SHA-1;
                 HMAC-SHA-256; Java; man-in-the-middle attack;
                 MEE-TLS-CBC; OpenJDK; OpenSSL; PolarSSL; RC4; TLS;
                 yaSSL",
  remark =       "The authors describe, and implement in unreleased
                 code, a practical attack against a flaw in the
                 Transport Layer Security (TLS) protocol specification
                 that affects many existing implementations. The attack
                 needs close network proximity to measure small timing
                 differences that eventually lead to complete packet
                 decryption.",
}

@InProceedings{Almeida:2013:CCA,
  author =       "Jos{\'e} Bacelar Almeida and Manuel Barbosa and Gilles
                 Barthe and Fran{\c{c}}ois Dupressoir",
  editor =       "????",
  booktitle =    "{ACM Conference on Computer and Communications
                 Security}",
  title =        "Certified computer-aided cryptography: Efficient
                 provably secure machine code from high-level
                 implementations",
  publisher =    pub-ACM,
  address =      pub-ACM:adr,
  pages =        "1217--1230",
  year =         "2013",
  DOI =          "????",
  ISBN =         "????",
  ISBN-13 =      "????",
  LCCN =         "????",
  bibdate =      "Mon Mar 09 11:18:17 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "????",
  acknowledgement = ack-nhfb,
  remark =       "Cite in \cite[reference 3]{Schneier:2015:SWC}.",
}

@Article{Almulla:2013:CKE,
  author =       "M. Almulla and A. Kanso and M. Ghebleh",
  title =        "A concurrent key exchange protocol based on commuting
                 matrices",
  journal =      j-CCPE,
  volume =       "25",
  number =       "5",
  pages =        "743--751",
  day =          "10",
  month =        apr,
  year =         "2013",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.1802",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Mon Apr 29 18:46:29 MDT 2013",
  bibsource =    "http://www.interscience.wiley.com/jpages/1532-0626;
                 https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Prac\-tice and
                 Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "28 Jul 2011",
}

@Article{Alsulaiman:2013:IVB,
  author =       "Fawaz A. Alsulaiman and Nizar Sakr and Julio J.
                 Vald{\'e}s and Abdulmotaleb {El Saddik}",
  title =        "Identity verification based on handwritten signatures
                 with haptic information using genetic programming",
  journal =      j-TOMCCAP,
  volume =       "9",
  number =       "2",
  pages =        "11:1--11:??",
  month =        may,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2457450.2457453",
  ISSN =         "1551-6857 (print), 1551-6865 (electronic)",
  ISSN-L =       "1551-6857",
  bibdate =      "Thu Mar 13 07:37:48 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tomccap/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tomccap.bib",
  abstract =     "In this article, haptic-based handwritten signature
                 verification using Genetic Programming (GP)
                 classification is presented. A comparison of GP-based
                 classification with classical classifiers including
                 support vector machine, $k$-nearest neighbors,
                 na{\"\i}ve Bayes, and random forest is conducted. In
                 addition, the use of GP in discovering small
                 knowledge-preserving subsets of features in
                 high-dimensional datasets of haptic-based signatures is
                 investigated and several approaches are explored.
                 Subsets of features extracted from GP-generated models
                 (analytic functions) are also exploited to determine
                 the importance and relevance of different haptic data
                 types (e.g., force, position, torque, and orientation)
                 in user identity verification. The results revealed
                 that GP classifiers compare favorably with the
                 classical methods and use a much fewer number of
                 attributes (with simple function sets).",
  acknowledgement = ack-nhfb,
  articleno =    "11",
  fjournal =     "ACM Transactions on Multimedia Computing,
                 Communications, and Applications",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J961",
}

@Article{AlTawy:2013:SOC,
  author =       "Riham AlTawy and Aleksandar Kircanski and Amr
                 Youssef",
  title =        "Second order collision for the 42-step reduced
                 {DHA-256} hash function",
  journal =      j-INFO-PROC-LETT,
  volume =       "113",
  number =       "19--21",
  pages =        "764--770",
  month =        sep # "\slash " # oct,
  year =         "2013",
  CODEN =        "IFPLAT",
  DOI =          "https://doi.org/10.1016/j.ipl.2013.07.015",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Mon Sep 9 07:26:45 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019013002044",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  onlinedate =   "23 July 2013",
}

@Article{Ananth:2013:SFP,
  author =       "Prabhanjan Ananth and Raghav Bhaskar and Vipul Goyal
                 and Vanishree Rao",
  title =        "On the (In)security of {Fischlin}'s Paradigm",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7785",
  pages =        "202--221",
  year =         "2013",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-36594-2_12",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 21 08:32:49 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_12/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-36594-2",
  book-URL =     "http://www.springerlink.com/content/978-3-642-36594-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Anderson:2013:MNF,
  author =       "David Anderson",
  title =        "{Max Newman}: forgotten man of early {British}
                 computing",
  journal =      j-CACM,
  volume =       "56",
  number =       "5",
  pages =        "29--31",
  month =        may,
  year =         "2013",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2447976.2447986",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Apr 30 18:42:49 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cacm2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "Reflections on a significant, yet often overlooked,
                 computing pioneer.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  keywords =     "`Fish' encrypted traffic; Bletchley Park; Colossus;
                 Heath Robinson; Manchester Small Scale Electronic
                 Machine (1948); Newmanry; Tunny code",
}

@Article{Andriotis:2013:JSD,
  author =       "Panagiotis Andriotis and George Oikonomou and Theo
                 Tryfonas",
  title =        "{JPEG} steganography detection with {Benford's Law}",
  journal =      "Digital Investigation",
  volume =       "9",
  number =       "3--4",
  pages =        "246--257",
  year =         "2013",
  DOI =          "https://doi.org/10.1016/j.diin.2013.01.005",
  ISSN =         "1742-2876",
  bibdate =      "Wed Jan 28 10:08:12 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/benfords-law.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1742287613000066",
  abstract =     "In this paper we present a novel approach to the
                 problem of steganography detection in {JPEG} images by
                 applying a statistical attack. The method is based on
                 the empirical Benford's Law and, more specifically, on
                 its generalized form. We prove and extend the validity
                 of the logarithmic rule in colour images and introduce
                 a blind steganographic method which can flag a file as
                 a suspicious stego-carrier. The proposed method
                 achieves very high accuracy and speed and is based on
                 the distributions of the first digits of the quantized
                 Discrete Cosine Transform coefficients present in
                 JPEGs. In order to validate and evaluate our algorithm,
                 we developed steganographic tools which are able to
                 analyse image files and we subsequently applied them on
                 the popular Uncompressed Colour Image Database.
                 Furthermore, we demonstrate that not only can our
                 method detect steganography but, if certain criteria
                 are met, it can also reveal which steganographic
                 algorithm was used to embed data in a {JPEG} file.",
  acknowledgement = ack-nhfb,
  keywords =     "Benford's Law; Data hiding; Generalized Benford's Law;
                 Quantized {DCT} coefficients; Steganalysis;
                 Steganography detection",
}

@Article{Anonymous:2013:CFF,
  author =       "Anonymous",
  title =        "Crypto flaw found in {Android}",
  journal =      j-NETWORK-SECURITY,
  volume =       "2013",
  number =       "7",
  pages =        "2--2",
  month =        jul,
  year =         "2013",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(13)70077-1",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 17:00:56 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485813700771",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:2013:CRR,
  author =       "Anonymous",
  title =        "{CryptoLocker} runs rampant, but drops ransom price",
  journal =      j-NETWORK-SECURITY,
  volume =       "2013",
  number =       "12",
  pages =        "2--2",
  month =        dec,
  year =         "2013",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(13)70130-2",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 17:01:01 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485813701302",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@TechReport{Anonymous:2013:DSS,
  author =       "Anonymous",
  key =          "FIPS-186-4",
  title =        "{Digital Signature Standard (DSS)}",
  type =         "{Federal Information Processing Standards}
                 Publication",
  number =       "FIPS Pub 186-4",
  institution =  pub-NIST,
  address =      pub-NIST:adr,
  pages =        "vii + 121",
  month =        jul,
  year =         "2013",
  DOI =          "https://doi.org/10.6028/NIST.FIPS.186-4",
  bibdate =      "Thu Aug 21 06:15:29 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  URL =          "http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf",
  acknowledgement = ack-nhfb,
  keywords =     "computer security; cryptography; Digital Signature
                 Standard (DSS); Federal Information Processing
                 Standards",
}

@Article{Anonymous:2013:NCI,
  author =       "Anonymous",
  title =        "{NSA} has cracked {Internet} encryption protocols",
  journal =      j-NETWORK-SECURITY,
  volume =       "2013",
  number =       "9",
  pages =        "1--2",
  month =        sep,
  year =         "2013",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(13)70097-7",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 17:00:58 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485813700977",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
  remark =       "From the article: ``The US National Security Agency
                 (NSA) is able to read communications secured with the
                 most common Internet encryption algorithms and it may
                 be able to hack smartphones, according to the
                 continuing revelations arising from the leak of secret
                 documents by ex-NSA contractor Edward Snowden.''",
}

@Article{Anonymous:2013:SIS,
  author =       "Anonymous",
  title =        "Special Issue on {``Security and identity architecture
                 for the future Internet''}",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "57",
  number =       "10",
  pages =        "2215--2217",
  day =          "5",
  month =        jul,
  year =         "2013",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Mon Jul 1 19:17:17 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1389128613001795",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286/",
}

@Article{Anonymous:2013:SSD,
  author =       "Anonymous",
  title =        "Simple Steps to Data Encryption",
  journal =      j-NETWORK-SECURITY,
  volume =       "2013",
  number =       "9",
  pages =        "4--4",
  month =        sep,
  year =         "2013",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(13)70100-4",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 17:00:58 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485813701004",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Appelbaum:2013:SSG,
  author =       "J. Appelbaum and J. Horchert and C. St{\"o}cker",
  title =        "Shopping for Spy Gear: Catalog Advertises {NSA}
                 Toolbox",
  journal =      "{Der Spiegel}",
  volume =       "??",
  number =       "??",
  pages =        "??--??",
  day =          "29",
  month =        dec,
  year =         "2013",
  bibdate =      "Thu Sep 22 18:39:28 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html",
  acknowledgement = ack-nhfb,
}

@Article{Applebaum:2013:GXG,
  author =       "Benny Applebaum",
  title =        "Garbling {XOR} Gates ``For Free'' in the Standard
                 Model",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7785",
  pages =        "162--181",
  year =         "2013",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-36594-2_10",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 21 08:32:49 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_10/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-36594-2",
  book-URL =     "http://www.springerlink.com/content/978-3-642-36594-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Arai:2013:MDH,
  author =       "Kohei Arai",
  title =        "Method for data hiding based on {LeGall} 5/3
                 ({Cohen--Daubechies--Feauveau}: {CDF} 5/3) wavelet with
                 data compression and random scanning of secret imagery
                 data",
  journal =      j-INT-J-WAVELETS-MULTIRESOLUT-INF-PROCESS,
  volume =       "11",
  number =       "4",
  pages =        "1360006, 18",
  year =         "2013",
  CODEN =        "IJWMIP",
  DOI =          "https://doi.org/10.1142/S0219691313600060",
  ISSN =         "0219-6913 (print), 1793-690X (electronic)",
  ISSN-L =       "0219-6913",
  MRclass =      "94A60 (42C40 65T60 94A08 94A62)",
  MRnumber =     "3081432",
  bibdate =      "Wed Mar 7 18:04:36 2018",
  bibsource =    "https://www.math.utah.edu/pub/bibnet/authors/d/daubechies-ingrid.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Wavelets Multiresolut. Inf. Process.",
  fjournal =     "International Journal of Wavelets, Multiresolution and
                 Information Processing",
  journal-URL =  "https://www.worldscientific.com/worldscinet/ijwmip",
}

@Article{Arapinis:2013:PSC,
  author =       "Myrto Arapinis and Sergiu Bursuc and Mark Ryan",
  title =        "Privacy-supporting cloud computing by in-browser key
                 translation",
  journal =      j-J-COMP-SECUR,
  volume =       "21",
  number =       "6",
  pages =        "847--880",
  month =        "????",
  year =         "2013",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130489",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:04 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Armando:2013:AFB,
  author =       "Alessandro Armando and Roberto Carbone and Luca
                 Compagna and Jorge Cu{\'e}llar and Giancarlo Pellegrino
                 and Alessandro Sorniotti",
  title =        "An authentication flaw in browser-based Single Sign-On
                 protocols: Impact and remediations",
  journal =      j-COMPUT-SECUR,
  volume =       "33",
  number =       "??",
  pages =        "41--58",
  month =        mar,
  year =         "2013",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2012.08.007",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:31 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812001356",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Asharov:2013:FCF,
  author =       "Gilad Asharov and Yehuda Lindell and Tal Rabin",
  title =        "A Full Characterization of Functions that Imply Fair
                 Coin Tossing and Ramifications to Fairness",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7785",
  pages =        "243--262",
  year =         "2013",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-36594-2_14",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 21 08:32:49 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_14/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-36594-2",
  book-URL =     "http://www.springerlink.com/content/978-3-642-36594-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Baek:2013:SPK,
  author =       "Joonsang Baek and Quang Hieu Vu and Abdulhadi Shoufan
                 and Andrew Jones and Duncan S. Wong",
  title =        "Stateful Public-Key Encryption Schemes Forward-Secure
                 Against State Exposure",
  journal =      j-COMP-J,
  volume =       "56",
  number =       "4",
  pages =        "497--507",
  month =        apr,
  year =         "2013",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxs151",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Apr 1 08:36:50 MDT 2013",
  bibsource =    "http://comjnl.oxfordjournals.org/content/56/4.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/56/4/497.full.pdf+html",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "November 21, 2012",
}

@Article{Bajaj:2013:CSE,
  author =       "Sumeet Bajaj and Radu Sion",
  title =        "{CorrectDB}: {SQL} engine with practical query
                 authentication",
  journal =      j-PROC-VLDB-ENDOWMENT,
  volume =       "6",
  number =       "7",
  pages =        "529--540",
  month =        may,
  year =         "2013",
  CODEN =        "????",
  ISSN =         "2150-8097",
  bibdate =      "Fri Dec 13 05:56:37 MST 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/vldbe.bib",
  abstract =     "Clients of outsourced databases need Query
                 Authentication (QA) guaranteeing the integrity
                 (correctness and completeness), and authenticity of the
                 query results returned by potentially compromised
                 providers. Existing results provide QA assurances for a
                 limited class of queries by deploying several software
                 cryptographic constructs. Here, we show that, to
                 achieve QA, however, it is significantly cheaper and
                 more practical to deploy server-hosted, tamper-proof
                 co-processors, despite their higher acquisition costs.
                 Further, this provides the ability to handle arbitrary
                 queries. To reach this insight, we extensively survey
                 existing QA work and identify interdependencies and
                 efficiency relationships. We then introduce CorrectDB,
                 a new DBMS with full QA assurances, leveraging
                 server-hosted, tamper-proof, trusted hardware in close
                 proximity to the outsourced data.",
  acknowledgement = ack-nhfb,
  fjournal =     "Proceedings of the VLDB Endowment",
}

@Article{Baldi:2013:ULC,
  author =       "Marco Baldi and Marco Bianchi and Franco Chiaraluce
                 and Joachim Rosenthal and Davide Schipani",
  title =        "Using {LDGM} Codes and Sparse Syndromes to Achieve
                 Digital Signatures",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7932",
  pages =        "1--15",
  year =         "2013",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-38616-9_1",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Mar 21 08:01:29 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-38616-9_1/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-38616-9",
  book-URL =     "http://www.springerlink.com/content/978-3-642-38616-9",
  fjournal =     "Lecture Notes in Computer Science",
}

@TechReport{Barbulescu:2013:QPA,
  author =       "Razvan Barbulescu and Pierrick Gaudry and Antoine Joux
                 and Emmanuel Thom{\'e}",
  title =        "A quasi-polynomial algorithm for discrete logarithm in
                 finite fields of small characteristic",
  type =         "Report",
  institution =  "Inria, CNRS, University of Lorraine; Foundation UPMC
                 --- LIP 6, CNRS UMR 7606; CryptoExperts",
  address =      "Lorraine, France; Paris, France; Paris, France",
  pages =        "16",
  day =          "25",
  month =        nov,
  year =         "2013",
  bibdate =      "Thu Feb 27 06:15:04 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://eprint.iacr.org/2013/400.pdf",
  acknowledgement = ack-nhfb,
}

@Article{Barenghi:2013:FIT,
  author =       "Alessandro Barenghi and Guido M. Bertoni and Luca
                 Breveglieri and Gerardo Pelosi",
  title =        "A fault induction technique based on voltage
                 underfeeding with application to attacks against {AES}
                 and {RSA}",
  journal =      j-J-SYST-SOFTW,
  volume =       "86",
  number =       "7",
  pages =        "1864--1878",
  month =        jul,
  year =         "2013",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Tue May 14 16:09:17 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0164121213000320",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Basin:2013:PRI,
  author =       "David Basin and Cas Cremers and Simon Meier",
  title =        "Provably repairing the {ISO\slash IEC 9798} standard
                 for entity authentication",
  journal =      j-J-COMP-SECUR,
  volume =       "21",
  number =       "6",
  pages =        "817--846",
  month =        "????",
  year =         "2013",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130472",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:04 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@TechReport{Beaulieu:2013:SSF,
  author =       "Ray Beaulieu and Douglas Shors and Jason Smith and
                 Stefan Treatman-Clark and Bryan Weeks and Louis
                 Wingers",
  title =        "The {{\sc Simon}} and {{\sc Speck}} Families of
                 Lightweight Block Ciphers",
  type =         "Report",
  institution =  "National Security Agency",
  address =      "9800 Savage Road, Fort Meade, MD 20755, USA",
  pages =        "45",
  day =          "19",
  month =        jun,
  year =         "2013",
  bibdate =      "Tue May 15 07:49:12 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://eprint.iacr.org/2013/404.pdf;
                 https://www.schneier.com/crypto-gram/archives/2018/0515.html;
                 https://www.wikitribune.com/story/2018/04/20/business/exclusive-nsa-encryption-plan-for-internet-of-things-rejected-by-international-body/67004/",
  abstract =     "In this paper we propose two families of block
                 ciphers, Simon and Speck, each of which comes in a
                 variety of widths and key sizes. While many lightweight
                 block ciphers exist, most were designed to perform well
                 on a single platform and were not meant to provide high
                 performance across a range of devices. The aim of Simon
                 and Speck is to fill the need for secure, flexible, and
                 analyzable lightweight block ciphers. Each offers
                 excellent performance on hardware and software
                 platforms, is flexible enough to admit a variety of
                 implementations on a given platform, and is amenable to
                 analysis using existing techniques. Both perform
                 exceptionally well across the full spectrum of
                 lightweight applications, but Simon is tuned for
                 optimal performance in hardware, and Speck for optimal
                 performance in software.",
  acknowledgement = ack-nhfb,
  remark =       "The ciphers in this report have been rejected by the
                 ISO on the grounds that NSA-provided ciphers may have
                 known, but undisclosed, weaknesses that would allow
                 back-door decryption.",
}

@TechReport{Becker:2013:SDL,
  author =       "Georg T. Becker and Francesco Regazzoni and Christof
                 Paar and Wayne P. Burleson",
  title =        "Stealthy Dopant-Level Hardware Trojans?",
  type =         "Report",
  institution =  "University of Massachusetts (Amherst, USA); TU Delft
                 (The Netherlands); ALaRI (University of Lugano,
                 Switzerland); Horst G{\"o}rtz Institut for IT-Security,
                 Ruhr-Universit{\"a}t Bochum (Bochum, Germany)",
  pages =        "18",
  day =          "7",
  month =        jun,
  year =         "2013",
  bibdate =      "Tue Feb 04 17:23:00 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://people.umass.edu/gbecker/BeckerChes13.pdf",
  abstract =     "In recent years, hardware Trojans have drawn the
                 attention of governments and industry as well as the
                 scientific community. One of the main concerns is that
                 integrated circuits, e.g., for military or
                 critical-infrastructure applications, could be
                 maliciously manipulated during the manufacturing
                 process, which often takes place abroad. However, since
                 there have been no reported hardware Trojans in
                 practice yet, little is known about how such a Trojan
                 would look like, and how difficult it would be in
                 practice to implement one. In this paper we propose an
                 extremely stealthy approach for implementing hardware
                 Trojans below the gate level, and we evaluate their
                 impact on the security of the target device. Instead of
                 adding additional circuitry to the target design, we
                 insert our hardware Trojans by changing the dopant
                 polarity of existing transistors. Since the modified
                 circuit appears legitimate on all wiring layers
                 (including all metal and polysilicon), our family of
                 Trojans is resistant to most detection techniques,
                 including fine-grain optical inspection and checking
                 against `golden chips'. We demonstrate the
                 effectiveness of our approach by inserting Trojans into
                 two designs --- a digital post-processing derived from
                 Intel's cryptographically secure RNG design used in the
                 Ivy Bridge processors and a side-channel resistant SBox
                 implementation --- and by exploring their detectability
                 and their effects on security.",
  acknowledgement = ack-nhfb,
}

@Article{Behnia:2013:IEB,
  author =       "S. Behnia and A. Akhavan and A. Akhshani and A.
                 Samsudin",
  title =        "Image encryption based on the {Jacobian} elliptic
                 maps",
  journal =      j-J-SYST-SOFTW,
  volume =       "86",
  number =       "9",
  pages =        "2429--2438",
  month =        sep,
  year =         "2013",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Tue Sep 3 06:29:11 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0164121213001283",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Ben-Othman:2013:IHN,
  author =       "Jalel Ben-Othman and Yesica I. Saavedra Benitez",
  title =        "{IBC-HWMP}: a novel secure identity-based
                 cryptography-based scheme for {Hybrid Wireless Mesh
                 Protocol} for {IEEE 802.11s}",
  journal =      j-CCPE,
  volume =       "25",
  number =       "5",
  pages =        "686--700",
  day =          "10",
  month =        apr,
  year =         "2013",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.1813",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Mon Apr 29 18:46:29 MDT 2013",
  bibsource =    "http://www.interscience.wiley.com/jpages/1532-0626;
                 https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Prac\-tice and
                 Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "19 Aug 2011",
}

@Article{Berman:2013:HPR,
  author =       "Itay Berman and Iftach Haitner and Ilan Komargodski
                 and Moni Naor",
  title =        "Hardness Preserving Reductions via Cuckoo Hashing",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7785",
  pages =        "40--59",
  year =         "2013",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-36594-2_3",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 21 08:32:49 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_3/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-36594-2",
  book-URL =     "http://www.springerlink.com/content/978-3-642-36594-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Bessani:2013:DDS,
  author =       "Alysson Bessani and Miguel Correia and Bruno Quaresma
                 and Fernando Andr{\'e} and Paulo Sousa",
  title =        "{DepSky}: Dependable and Secure Storage in a
                 Cloud-of-Clouds",
  journal =      j-TOS,
  volume =       "9",
  number =       "4",
  pages =        "12:1--12:??",
  month =        nov,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2535929",
  ISSN =         "1553-3077 (print), 1553-3093 (electronic)",
  ISSN-L =       "1553-3077",
  bibdate =      "Thu Dec 12 18:12:51 MST 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tos/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tos.bib",
  abstract =     "The increasing popularity of cloud storage services
                 has lead companies that handle critical data to think
                 about using these services for their storage needs.
                 Medical record databases, large biomedical datasets,
                 historical information about power systems and
                 financial data are some examples of critical data that
                 could be moved to the cloud. However, the reliability
                 and security of data stored in the cloud still remain
                 major concerns. In this work we present DepSky, a
                 system that improves the availability, integrity, and
                 confidentiality of information stored in the cloud
                 through the encryption, encoding, and replication of
                 the data on diverse clouds that form a cloud-of-clouds.
                 We deployed our system using four commercial clouds and
                 used PlanetLab to run clients accessing the service
                 from different countries. We observed that our
                 protocols improved the perceived availability, and in
                 most cases, the access latency, when compared with
                 cloud providers individually. Moreover, the monetary
                 costs of using DepSky in this scenario is at most twice
                 the cost of using a single cloud, which is optimal and
                 seems to be a reasonable cost, given the benefits.",
  acknowledgement = ack-nhfb,
  articleno =    "12",
  fjournal =     "ACM Transactions on Storage",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J960",
}

@Article{Bhatnagar:2013:BIW,
  author =       "Gaurav Bhatnagar and Q. M. Jonathan Wu",
  title =        "Biometrics inspired watermarking based on a fractional
                 dual tree complex wavelet transform",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "29",
  number =       "1",
  pages =        "182--195",
  month =        jan,
  year =         "2013",
  CODEN =        "FGSEVI",
  DOI =          "https://doi.org/10.1016/j.future.2012.05.021",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Fri Oct 26 06:10:54 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib;
                 http://www.sciencedirect.com/science/journal/0167739X",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X1200129X",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Bhatnagar:2013:SRI,
  author =       "Gaurav Bhatnagar and Q. M. Jonathan Wu and Pradeep K.
                 Atrey",
  title =        "Secure randomized image watermarking based on singular
                 value decomposition",
  journal =      j-TOMCCAP,
  volume =       "10",
  number =       "1",
  pages =        "4:1--4:??",
  month =        dec,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2542205.2542207",
  ISSN =         "1551-6857 (print), 1551-6865 (electronic)",
  ISSN-L =       "1551-6857",
  bibdate =      "Thu Mar 13 07:37:53 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tomccap/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tomccap.bib",
  abstract =     "In this article, a novel logo watermarking scheme is
                 proposed based on wavelet frame transform, singular
                 value decomposition and automatic thresholding. The
                 proposed scheme essentially rectifies the ambiguity
                 problem in the SVD-based watermarking. The core idea is
                 to randomly upscale the size of host image using
                 reversible random extension transform followed by the
                 embedding of logo watermark in the wavelet frame
                 domain. After embedding, a verification phase is casted
                 with the help of a binary watermark and toral
                 automorphism. At the extraction end, the binary
                 watermark is first extracted followed by the
                 verification of watermarked image. The logo watermark
                 is extracted if and only if the watermarked image is
                 verified. The security, attack and comparative analysis
                 confirm high security, efficiency and robustness of the
                 proposed watermarking system.",
  acknowledgement = ack-nhfb,
  articleno =    "4",
  fjournal =     "ACM Transactions on Multimedia Computing,
                 Communications, and Applications",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J961",
}

@Article{Bicakci:2013:LSS,
  author =       "Kemal Bicakci and Bruno Crispo and Gabriele Oligeri",
  title =        "{LAKE}: a Server-Side Authenticated Key-Establishment
                 with Low Computational Workload",
  journal =      j-TOIT,
  volume =       "13",
  number =       "2",
  pages =        "5:1--5:??",
  month =        dec,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2542214.2542216",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Mon Dec 23 18:38:12 MST 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Server-side authenticated key-establishment protocols
                 are characterized by placing a heavy workload on the
                 server. We propose LAKE: a new protocol that enables
                 amortizing servers' workload peaks by moving most of
                 the computational burden to the clients. We provide a
                 formal analysis of the LAKE protocol under the
                 Canetti-Krawczyk model and prove it to be secure. To
                 the best of our knowledge, this is the most
                 computationally efficient authenticated
                 key-establishment ever proposed in the literature.",
  acknowledgement = ack-nhfb,
  articleno =    "5",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Birajdar:2013:DIF,
  author =       "Gajanan K. Birajdar and Vijay H. Mankar",
  title =        "Digital image forgery detection using passive
                 techniques: A survey",
  journal =      "Digital Investigation",
  volume =       "10",
  number =       "3",
  pages =        "226--245",
  year =         "2013",
  DOI =          "https://doi.org/10.1016/j.diin.2013.04.007",
  ISSN =         "1742-2876",
  bibdate =      "Wed Jan 28 10:08:12 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/benfords-law.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1742287613000364",
  abstract =     "Today manipulation of digital images has become easy
                 due to powerful computers, advanced photo-editing
                 software packages and high resolution capturing
                 devices. Verifying the integrity of images and
                 detecting traces of tampering without requiring extra
                 prior knowledge of the image content or any embedded
                 watermarks is an important research field. An attempt
                 is made to survey the recent developments in the field
                 of digital image forgery detection and complete
                 bibliography is presented on blind methods for forgery
                 detection. Blind or passive methods do not need any
                 explicit priori information about the image. First,
                 various image forgery detection techniques are
                 classified and then its generalized structure is
                 developed. An overview of passive image authentication
                 is presented and the existing blind forgery detection
                 techniques are reviewed. The present status of image
                 forgery detection technique is discussed along with a
                 recommendation for future research.",
  acknowledgement = ack-nhfb,
  keywords =     "Benford's Law; Image authentication; Image forensic;
                 Image manipulation detection; Image tampering
                 detection; Passive/blind image forgery detection",
}

@Article{Birrell:2013:FIM,
  author =       "Eleanor Birrell and Fred B. Schneider",
  title =        "Federated Identity Management Systems: A Privacy-Based
                 Characterization",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "5",
  pages =        "36--48",
  month =        sep # "\slash " # oct,
  year =         "2013",
  DOI =          "https://doi.org/10.1109/MSP.2013.114",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Nov 15 07:50:42 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  fjournal =     "IEEE Security \& Privacy",
}

@Article{Bitansky:2013:SNI,
  author =       "Nir Bitansky and Alessandro Chiesa and Yuval Ishai and
                 Omer Paneth and Rafail Ostrovsky",
  title =        "Succinct Non-interactive Arguments via Linear
                 Interactive Proofs",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7785",
  pages =        "315--333",
  year =         "2013",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-36594-2_18",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 21 08:32:49 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_18/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-36594-2",
  book-URL =     "http://www.springerlink.com/content/978-3-642-36594-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Bitansky:2013:WFS,
  author =       "Nir Bitansky and Dana Dachman-Soled and Sanjam Garg
                 and Abhishek Jain and Yael Tauman Kalai and Adriana
                 L{\'o}pez-Alt and Daniel Wichs",
  title =        "Why ``{Fiat--Shamir} for Proofs'' Lacks a Proof",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7785",
  pages =        "182--201",
  year =         "2013",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-36594-2_11",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 21 08:32:49 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_11/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-36594-2",
  book-URL =     "http://www.springerlink.com/content/978-3-642-36594-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Blaner:2013:IPP,
  author =       "B. Blaner and B. Abali and B. M. Bass and S. Chari and
                 R. Kalla and S. Kunkel and K. Lauricella and R. Leavens
                 and J. J. Reilly and P. A. Sandon",
  title =        "{IBM POWER7+} processor on-chip accelerators for
                 cryptography and active memory expansion",
  journal =      j-IBM-JRD,
  volume =       "57",
  number =       "6",
  pages =        "3:1--3:16",
  month =        nov # "--" # dec,
  year =         "2013",
  CODEN =        "IBMJAE",
  DOI =          "https://doi.org/10.1147/JRD.2013.2280090",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  ISSN-L =       "0018-8646",
  bibdate =      "Sat Feb 15 16:52:47 MST 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ibmjrd.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IBM Journal of Research and Development",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5288520",
}

@Article{Bogdanov:2013:SDS,
  author =       "Andrey Bogdanov and Miroslav Knezevic and Gregor
                 Leander and Deniz Toz and Kerem Varici and Ingrid
                 Verbauwhede",
  title =        "{SPONGENT}: The Design Space of Lightweight
                 Cryptographic Hashing",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "62",
  number =       "10",
  pages =        "2041--2053",
  month =        oct,
  year =         "2013",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2012.196",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Fri Nov 15 08:54:34 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Bossuet:2013:AFS,
  author =       "Lilian Bossuet and Michael Grand and Lubos Gaspar and
                 Viktor Fischer and Guy Gogniat",
  title =        "Architectures of flexible symmetric key crypto engines
                 --- a survey: From hardware coprocessor to
                 multi-crypto-processor system on chip",
  journal =      j-COMP-SURV,
  volume =       "45",
  number =       "4",
  pages =        "41:1--41:??",
  month =        aug,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2501654.2501655",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Aug 26 17:21:41 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "Throughput, flexibility, and security form the design
                 trilogy of reconfigurable crypto engines; they must be
                 carefully considered without reducing the major role of
                 classical design constraints, such as surface, power
                 consumption, dependability, and cost. Applications such
                 as network security, Virtual Private Networks (VPN),
                 Digital Rights Management (DRM), and pay per view have
                 drawn attention to these three constraints. For more
                 than ten years, many studies in the field of
                 cryptographic engineering have focused on the design of
                 optimized high-throughput hardware cryptographic cores
                 (e.g., symmetric and asymmetric key block ciphers,
                 stream ciphers, and hash functions). The flexibility of
                 cryptographic systems plays a very important role in
                 their practical application. Reconfigurable hardware
                 systems can evolve with algorithms, face up to new
                 types of attacks, and guarantee interoperability
                 between countries and institutions. The flexibility of
                 reconfigurable crypto processors and crypto
                 coprocessors has reached new levels with the emergence
                 of dynamically reconfigurable hardware architectures
                 and tools. Last but not least, the security of systems
                 that handle confidential information needs to be
                 thoroughly evaluated at the design stage in order to
                 meet security objectives that depend on the importance
                 of the information to be protected and on the cost of
                 protection. Usually, designers tackle security problems
                 at the same time as other design constraints and in
                 many cases target only one security objective, for
                 example, a side-channel attack countermeasures, fault
                 tolerance capability, or the monitoring of the device
                 environment. Only a few authors have addressed all
                 three design constraints at the same time. In
                 particular, key management security (e.g., secure key
                 generation and transmission, the use of a hierarchical
                 key structure composed of session keys and master keys)
                 has frequently been neglected to the benefit of
                 performance and/or flexibility. Nevertheless, a few
                 authors propose original processor architectures based
                 on multi-crypto-processor structures and reconfigurable
                 cryptographic arrays. In this article, we review
                 published works on symmetric key crypto engines and
                 present current trends and design challenges.",
  acknowledgement = ack-nhfb,
  articleno =    "41",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Bothe:2013:EPS,
  author =       "Suvarna Bothe and Panagiotis Karras and Akrivi
                 Vlachou",
  title =        "{eSkyline}: processing skyline queries over encrypted
                 data",
  journal =      j-PROC-VLDB-ENDOWMENT,
  volume =       "6",
  number =       "12",
  pages =        "1338--1341",
  month =        aug,
  year =         "2013",
  CODEN =        "????",
  ISSN =         "2150-8097",
  bibdate =      "Fri Dec 13 05:57:00 MST 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/vldbe.bib",
  abstract =     "The advent of cloud computing redefines the
                 traditional query processing paradigm. Whereas
                 computational overhead and memory constraints become
                 less prohibitive, data privacy, security, and
                 confidentiality concerns become top priorities. In
                 particular, as data owners outsource the management of
                 their data to service providers, query processing over
                 such data has more resources to tap into, yet the data
                 oftentimes has to be encrypted so as to prevent
                 unauthorized access. The challenge that arises in such
                 a setting is to devise an encryption scheme that still
                 allows for query results to be efficiently computed
                 using the encrypted data values. An important type of
                 query that raises unconventional requirements in terms
                 of the operator that has to be evaluated is the skyline
                 query, which returns a set of objects in a dataset
                 whose values are not dominated by any other object
                 therein. In this demonstration, we present eSkyline, a
                 prototype system and query interface that enables the
                 processing of skyline queries over encrypted data, even
                 without preserving the order on each attribute as
                 order-preserving encryption would do. Our system
                 comprises of an encryption scheme that facilitates the
                 evaluation of domination relationships, hence allows
                 for state-of-the-art skyline processing algorithms to
                 be used. The actual data values are reconstructed only
                 at the client side, where the encryption key is known.
                 Our demo visualizes the details of the encryption
                 scheme, allows a user to interact with a server, and
                 showcases the efficiency of computing skyline queries
                 and decrypting the results.",
  acknowledgement = ack-nhfb,
  fjournal =     "Proceedings of the VLDB Endowment",
}

@Article{Boyen:2013:ABF,
  author =       "Xavier Boyen",
  title =        "Attribute-Based Functional Encryption on Lattices",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7785",
  pages =        "122--142",
  year =         "2013",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-36594-2_8",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 21 08:32:49 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_8/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-36594-2",
  book-URL =     "http://www.springerlink.com/content/978-3-642-36594-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Brakerski:2013:WHB,
  author =       "Zvika Brakerski",
  title =        "When Homomorphism Becomes a Liability",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7785",
  pages =        "143--161",
  year =         "2013",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-36594-2_9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 21 08:32:49 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_9/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-36594-2",
  book-URL =     "http://www.springerlink.com/content/978-3-642-36594-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Caldwell:2013:INP,
  author =       "Tracey Caldwell",
  title =        "Identity --- the new perimeter",
  journal =      j-NETWORK-SECURITY,
  volume =       "2013",
  number =       "4",
  pages =        "14--18",
  month =        apr,
  year =         "2013",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(13)70051-5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 17:00:53 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485813700515",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Canetti:2013:PCC,
  author =       "Ran Canetti and Huijia Lin and Omer Paneth",
  title =        "Public-Coin Concurrent Zero-Knowledge in the Global
                 Hash Model",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7785",
  pages =        "80--99",
  year =         "2013",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-36594-2_5",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 21 08:32:49 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_5/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-36594-2",
  book-URL =     "http://www.springerlink.com/content/978-3-642-36594-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Cao:2013:SIPa,
  author =       "Jian Cao and Jie Wang and Haiyan Zhao and Minglu Li",
  title =        "Special Issue Papers: An event view specification
                 approach for {Supporting Service} process
                 collaboration",
  journal =      j-CCPE,
  volume =       "25",
  number =       "13",
  pages =        "1943--1966",
  day =          "10",
  month =        sep,
  year =         "2013",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.2990",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Tue Dec 3 10:37:32 MST 2013",
  bibsource =    "http://www.interscience.wiley.com/jpages/1532-0626;
                 https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "12 Feb 2013",
}

@Article{Carter:2013:SSA,
  author =       "Kyle Carter and Adam Foltzer and Joe Hendrix and Brian
                 Huffman and Aaron Tomb",
  title =        "{SAW}: the software analysis workbench",
  journal =      j-SIGADA-LETTERS,
  volume =       "33",
  number =       "3",
  pages =        "15--18",
  month =        dec,
  year =         "2013",
  CODEN =        "AALEE5",
  DOI =          "https://doi.org/10.1145/2658982.2527277",
  ISSN =         "1094-3641 (print), 1557-9476 (electronic)",
  ISSN-L =       "1094-3641",
  bibdate =      "Wed Sep 3 16:38:30 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigada.bib",
  abstract =     "Galois has developed a suite of symbolic simulation
                 and formal analysis tools, collectively called the
                 Software Analysis Workbench (SAW). SAW provides
                 security analysts and engineers with the ability to
                 generate formal models from C and Java programs and
                 prove properties of those programs using several
                 automated verification tools. SAW is primarily used to
                 verify the correctness of cryptographic
                 implementations, and is able to import specifications
                 written in Cryptol, a language developed by Galois for
                 specifying cryptographic primitives. In this short
                 paper, we describe the main components of SAW. We then
                 given an overview of the cryptographic implementations
                 that have been verified.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGADA Ada Letters",
  journal-URL =  "http://portal.acm.org/citation.cfm?id=J32",
  remark =       "HILT '13 conference proceedings.",
}

@Article{Castro:2013:RAM,
  author =       "P. C. Castro and J. W. Ligman and M. Pistoia and J.
                 Ponzo and G. S. Thomas and U. Topkara",
  title =        "Runtime adaptive multi-factor authentication for
                 mobile devices",
  journal =      j-IBM-JRD,
  volume =       "57",
  number =       "6",
  pages =        "8:1--8:17",
  month =        nov # "--" # dec,
  year =         "2013",
  CODEN =        "IBMJAE",
  DOI =          "https://doi.org/10.1147/JRD.2013.2281123",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  ISSN-L =       "0018-8646",
  bibdate =      "Sat Feb 15 16:52:47 MST 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ibmjrd.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IBM Journal of Research and Development",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5288520",
}

@Article{Centenaro:2013:TBA,
  author =       "Matteo Centenaro and Riccardo Focardi and Flaminia L.
                 Luccio",
  title =        "Type-based analysis of key management in {PKCS\#11}
                 cryptographic devices",
  journal =      j-J-COMP-SECUR,
  volume =       "21",
  number =       "6",
  pages =        "971--1007",
  month =        "????",
  year =         "2013",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130479",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:04 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Chakraborty:2013:EHI,
  author =       "Debrup Chakraborty and Cuauhtemoc Mancillas-Lopez and
                 Francisco Rodriguez-Henriquez and Palash Sarkar",
  title =        "Efficient Hardware Implementations of {BRW}
                 Polynomials and Tweakable Enciphering Schemes",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "62",
  number =       "2",
  pages =        "279--294",
  month =        feb,
  year =         "2013",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2011.227",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Tue Apr 30 12:26:22 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Chan:2013:OCK,
  author =       "Aldar C.-F. Chan",
  title =        "On optimal cryptographic key derivation",
  journal =      j-THEOR-COMP-SCI,
  volume =       "489--490",
  number =       "??",
  pages =        "21--36",
  day =          "10",
  month =        jun,
  year =         "2013",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Mon Jul 8 16:38:39 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2010.bib;
                 http://www.sciencedirect.com/science/journal/03043975",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0304397513002843",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{Chang:2013:MPQ,
  author =       "Mei-Chu Chang",
  title =        "On a matrix product question in cryptography",
  journal =      j-LINEAR-ALGEBRA-APPL,
  volume =       "439",
  number =       "7",
  pages =        "1742--1748",
  day =          "1",
  month =        oct,
  year =         "2013",
  CODEN =        "LAAPAW",
  ISSN =         "0024-3795 (print), 1873-1856 (electronic)",
  ISSN-L =       "0024-3795",
  bibdate =      "Mon Aug 26 14:35:46 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/linala2010.bib;
                 http://www.sciencedirect.com/science/journal/00243795",
  URL =          "http://www.sciencedirect.com/science/article/pii/S002437951300339X",
  acknowledgement = ack-nhfb,
  fjournal =     "Linear Algebra and its Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00243795",
}

@Article{Chappell:2013:PMI,
  author =       "Brian Chappell",
  title =        "Privilege management --- the industry's best kept
                 secret",
  journal =      j-NETWORK-SECURITY,
  volume =       "2013",
  number =       "10",
  pages =        "12--14",
  month =        oct,
  year =         "2013",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(13)70114-4",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 17:00:59 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485813701144",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Chase:2013:SMN,
  author =       "Melissa Chase and Markulf Kohlweiss and Anna
                 Lysyanskaya and Sarah Meiklejohn",
  title =        "Succinct Malleable {NIZKs} and an Application to
                 Compact Shuffles",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7785",
  pages =        "100--119",
  year =         "2013",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-36594-2_6",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 21 08:32:49 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_6/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-36594-2",
  book-URL =     "http://www.springerlink.com/content/978-3-642-36594-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Chen:2013:ATK,
  author =       "Qian Chen and Haibo Hu and Jianliang Xu",
  title =        "Authenticating top-$k$ queries in location-based
                 services with confidentiality",
  journal =      j-PROC-VLDB-ENDOWMENT,
  volume =       "7",
  number =       "1",
  pages =        "49--60",
  month =        sep,
  year =         "2013",
  CODEN =        "????",
  ISSN =         "2150-8097",
  bibdate =      "Wed Feb 4 09:21:56 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/vldbe.bib",
  abstract =     "State-of-the-art location-based services (LBSs)
                 involve data owners, requesting clients, and service
                 providers. As LBSs become new business opportunities,
                 there is an increasing necessity to verify the
                 genuineness of service results. Unfortunately, while
                 traditional query authentication techniques can address
                 this issue, they fail to protect the confidentiality of
                 data, which is sensitive location information when LBSs
                 are concerned. Recent work has studied how to preserve
                 such location privacy in query authentication. However,
                 the prior work is limited to range queries, where
                 private values only appear on one side of the range
                 comparison. In this paper, we address the more
                 challenging authentication problem on top-$k$ queries,
                 where private values appear on both sides of a
                 comparison. To start with, we propose two novel
                 cryptographic building blocks, followed by a
                 comprehensive design of authentication schemes for
                 top-$k$ queries based on R-tree and Power Diagram
                 indexes. Optimizations, security analysis, and
                 experimental results consistently show the
                 effectiveness and robustness of the proposed schemes
                 under various system settings and query workloads.",
  acknowledgement = ack-nhfb,
  fjournal =     "Proceedings of the VLDB Endowment",
  journal-URL =  "http://portal.acm.org/citation.cfm?id=J1174",
}

@Article{Chen:2013:RWM,
  author =       "Xianyi Chen and Xingming Sun and Huiyu Sun and Zhili
                 Zhou and Jianjun Zhang",
  title =        "Reversible watermarking method based on
                 asymmetric-histogram shifting of prediction errors",
  journal =      j-J-SYST-SOFTW,
  volume =       "86",
  number =       "10",
  pages =        "2620--2626",
  month =        oct,
  year =         "2013",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Mon Sep 9 07:54:52 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  URL =          "http://www.sciencedirect.com/science/article/pii/S016412121300126X",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Chen:2013:TSE,
  author =       "Te-Yu Chen and Cheng-Chi Lee and Min-Shiang Hwang and
                 Jinn-Ke Jan",
  title =        "Towards secure and efficient user authentication
                 scheme using smart card for multi-server environments",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "66",
  number =       "2",
  pages =        "1008--1032",
  month =        nov,
  year =         "2013",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-013-0966-z",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Sat Feb 8 11:11:03 MST 2014",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0920-8542&volume=66&issue=2;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  URL =          "http://link.springer.com/article/10.1007/s11227-013-0966-z",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Article{Chen:2013:WSB,
  author =       "Guoming Chen and Qiang Chen and Dong Zhang and Yiqun
                 Chen",
  title =        "A Watermarking Scheme Based on Compressive Sensing and
                 {Bregman} Iteration",
  journal =      j-INT-J-COMPUT-APPL,
  volume =       "35",
  number =       "4",
  pages =        "173--180",
  year =         "2013",
  DOI =          "https://doi.org/10.2316/Journal.202.2013.4.202-3844",
  ISSN =         "1206-212X (print), 1925-7074 (electronic)",
  ISSN-L =       "1206-212X",
  bibdate =      "Sat Apr 21 17:29:01 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijca.bib",
  URL =          "https://www.tandfonline.com/doi/full/10.2316/Journal.202.2013.4.202-3844",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Computer Applications",
  journal-URL =  "https://www.tandfonline.com/loi/tjca20",
  online-date =  "11 Jul 2015",
}

@Article{Cheng:2013:DVB,
  author =       "Yueqiang Cheng and Xuhua Ding and Robert H. Deng",
  title =        "{DriverGuard}: Virtualization-Based Fine-Grained
                 Protection on {I/O} Flows",
  journal =      j-TISSEC,
  volume =       "16",
  number =       "2",
  pages =        "6:1--6:??",
  month =        sep,
  year =         "2013",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/2505123",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Mon Sep 23 17:04:07 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tissec.bib;
                 https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  abstract =     "Most commodity peripheral devices and their drivers
                 are geared to achieve high performance with security
                 functions being opted out. The absence of strong
                 security measures invites attacks on the I/O data and
                 consequently posts threats to those services feeding on
                 them, such as fingerprint-based biometric
                 authentication. In this article, we present a generic
                 solution called DriverGuard, which dynamically protects
                 the secrecy of I/O flows such that the I/O data are not
                 exposed to the malicious kernel. Our design leverages a
                 composite of cryptographic and virtualization
                 techniques to achieve fine-grained protection without
                 using any extra devices and modifications on user
                 applications. We implement the DriverGuard prototype on
                 Xen by adding around 1.7K SLOC. DriverGuard is
                 lightweight as it only needs to protect around 2\% of
                 the driver code's execution. We measure the performance
                 and evaluate the security of DriverGuard with three
                 input devices (keyboard, fingerprint reader and camera)
                 and three output devices (printer, graphic card, and
                 sound card). The experiment results show that
                 DriverGuard induces negligible overhead to the
                 applications.",
  acknowledgement = ack-nhfb,
  articleno =    "6",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@Article{Cheng:2013:EHM,
  author =       "Chi Cheng and Tao Jiang",
  title =        "An Efficient Homomorphic {MAC} with Small Key Size for
                 Authentication in Network Coding",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "62",
  number =       "10",
  pages =        "2096--2100",
  month =        oct,
  year =         "2013",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2012.135",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Fri Nov 15 08:54:34 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  note =         "See comments \cite{Li:2015:CEH,Kim:2015:CEH}.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Cheng:2013:NIB,
  author =       "Xiangguo Cheng and Lifeng Guo and Jia Yu and Huiran Ma
                 and Yuexiu Wu",
  title =        "A New Identity-Based Group Signature Scheme",
  journal =      j-INT-J-COMPUT-APPL,
  volume =       "35",
  number =       "1",
  pages =        "1--5",
  year =         "2013",
  CODEN =        "IJCAFW",
  DOI =          "https://doi.org/10.2316/Journal.202.2013.1.202-3136",
  ISSN =         "1206-212X (print), 1925-7074 (electronic)",
  ISSN-L =       "1206-212X",
  bibdate =      "Sat Apr 21 17:28:32 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijca.bib",
  URL =          "https://www.tandfonline.com/doi/full/10.2316/Journal.202.2013.1.202-3136",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Computer Applications",
  journal-URL =  "https://www.tandfonline.com/loi/tjca20",
  online-date =  "11 Jul 2015",
}

@Article{Cheswick:2013:RP,
  author =       "William Cheswick",
  title =        "Rethinking passwords",
  journal =      j-CACM,
  volume =       "56",
  number =       "2",
  pages =        "40--44",
  month =        feb,
  year =         "2013",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2408776.2408790",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Jan 30 15:28:27 MST 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cacm2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "Our authentication system is lacking. Is improvement
                 possible?",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Chien:2013:CRC,
  author =       "Hung-Yu Chien",
  title =        "Combining {Rabin} cryptosystem and error correction
                 codes to facilitate anonymous authentication with
                 un-traceability for low-end devices",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "57",
  number =       "14",
  pages =        "2705--2717",
  day =          "4",
  month =        oct,
  year =         "2013",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Tue Sep 3 06:24:18 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/13891286",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1389128613001898",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286",
}

@Article{Chin:2013:SMB,
  author =       "Ji-Jian Chin and Syh-Yuan Tan and Swee-Huay Heng and
                 Raphael C.-W. Phan",
  title =        "On the security of a modified {Beth} identity-based
                 identification scheme",
  journal =      j-INFO-PROC-LETT,
  volume =       "113",
  number =       "14--16",
  pages =        "580--583",
  month =        jul # "\slash " # aug,
  year =         "2013",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Mon Jul 1 18:58:11 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019013001324",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Chirgwin:2013:ABB,
  author =       "R. Chirgwin",
  title =        "{Android} Bug Batters {Bitcoin} Wallets",
  journal =      "The Register",
  volume =       "??",
  number =       "??",
  pages =        "??--??",
  month =        "????",
  year =         "2013",
  bibdate =      "Sat Nov 29 13:52:49 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "????",
  acknowledgement = ack-nhfb,
}

@Article{Chong:2013:ASG,
  author =       "Song-Kong Chong and Cheng-Chi Lee and Min-Shiang
                 Hwang",
  title =        "An Authentication Scheme for the Global Mobility
                 Network",
  journal =      j-PARALLEL-PROCESS-LETT,
  volume =       "23",
  number =       "3",
  pages =        "1350009",
  month =        sep,
  year =         "2013",
  CODEN =        "PPLTEE",
  DOI =          "https://doi.org/10.1142/S0129626413500096",
  ISSN =         "0129-6264 (print), 1793-642X (electronic)",
  ISSN-L =       "0129-6264",
  bibdate =      "Sat Mar 15 08:49:31 MDT 2014",
  bibsource =    "http://ejournals.wspc.com.sg/ppl/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/parallelprocesslett.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Parallel Processing Letters",
  journal-URL =  "http://www.worldscientific.com/loi/ppl",
}

@Article{Chou:2013:TIB,
  author =       "Chih-Ho Chou and Kuo-Yu Tsai and Chung-Fu Lu",
  title =        "Two {ID}-based authenticated schemes with key
                 agreement for mobile environments",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "66",
  number =       "2",
  pages =        "973--988",
  month =        nov,
  year =         "2013",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-013-0962-3",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Sat Feb 8 11:11:03 MST 2014",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0920-8542&volume=66&issue=2;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  URL =          "http://link.springer.com/article/10.1007/s11227-013-0962-3",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Article{Chou:2013:UGS,
  author =       "Yao-Hsin Chou and Shuo-Mao Chen and Yu-Ting Lin and
                 Chi-Yuan Chen and Han-Chieh Chao",
  title =        "Using {GHZ}-State for Multiparty Quantum Secret
                 Sharing Without Code Table",
  journal =      j-COMP-J,
  volume =       "56",
  number =       "10",
  pages =        "1167--1175",
  month =        oct,
  year =         "2013",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxs005",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Oct 1 12:09:04 MDT 2013",
  bibsource =    "http://comjnl.oxfordjournals.org/content/56/10.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/56/10/1167.full.pdf+html",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "February 1, 2012",
}

@Article{Claessen:2013:SPN,
  author =       "Koen Claessen and Micha{\l} H. Pa{\l}ka",
  title =        "Splittable pseudorandom number generators using
                 cryptographic hashing",
  journal =      j-SIGPLAN,
  volume =       "48",
  number =       "12",
  pages =        "47--58",
  month =        dec,
  year =         "2013",
  CODEN =        "SINODQ",
  DOI =          "https://doi.org/10.1145/2578854.2503784",
  ISSN =         "0362-1340 (print), 1523-2867 (print), 1558-1160
                 (electronic)",
  ISSN-L =       "0362-1340",
  bibdate =      "Tue Mar 4 17:04:55 MST 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  note =         "Haskell '14 conference proceedings.",
  abstract =     "We propose a new splittable pseudorandom number
                 generator (PRNG) based on a cryptographic hash
                 function. Splittable PRNGs, in contrast to linear
                 PRNGs, allow the creation of two (seemingly)
                 independent generators from a given random number
                 generator. Splittable PRNGs are very useful for
                 structuring purely functional programs, as they avoid
                 the need for threading around state. We show that the
                 currently known and used splittable PRNGs are either
                 not efficient enough, have inherent flaws, or lack
                 formal arguments about their randomness. In contrast,
                 our proposed generator can be implemented efficiently,
                 and comes with a formal statements and proofs that
                 quantify how 'random' the results are that are
                 generated. The provided proofs give strong randomness
                 guarantees under assumptions commonly made in
                 cryptography.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGPLAN Notices",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J706",
}

@Article{Cobb:2013:LMS,
  author =       "William E. Cobb and Rusty O. Baldwin and Eric D.
                 Laspe",
  title =        "Leakage Mapping: a Systematic Methodology for
                 Assessing the Side-Channel Information Leakage of
                 Cryptographic Implementations",
  journal =      j-TISSEC,
  volume =       "16",
  number =       "1",
  pages =        "2:1--2:??",
  month =        jun,
  year =         "2013",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/2487222.2487224",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Fri Jun 14 19:25:26 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tissec.bib",
  abstract =     "We propose a generalized framework to evaluate the
                 side-channel information leakage of symmetric block
                 ciphers. The leakage mapping methodology enables the
                 systematic and efficient identification and mitigation
                 of problematic information leakages by exhaustively
                 considering relevant leakage models. The evaluation
                 procedure bounds the anticipated resistance of an
                 implementation to the general class of univariate
                 differential side-channel analysis techniques. Typical
                 applications are demonstrated using the well-known
                 Hamming weight and Hamming distance leakage models,
                 with recommendations for the incorporation of more
                 accurate models. The evaluation results are empirically
                 validated against correlation-based differential
                 side-channel analysis attacks on two typical
                 unprotected implementations of the Advanced Encryption
                 Standard.",
  acknowledgement = ack-nhfb,
  articleno =    "2",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@InProceedings{Courtois:2013:BRC,
  author =       "N. T. Courtois and D. Hulme and K. Hussain and J. A.
                 Gawinecki and M. Grajek",
  booktitle =    "Proceedings of the IEEE Security and Privacy
                 Workshops",
  title =        "On bad randomness and cloning of contactless payment
                 and building smart cards",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "105--110",
  year =         "2013",
  DOI =          "https://doi.org/10.1109/SPW.2013.29",
  bibdate =      "Fri Jul 29 07:44:51 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
}

@Book{Cozzens:2013:MEE,
  author =       "Margaret B. Cozzens and Steven J. Miller",
  title =        "The mathematics of encryption: an elementary
                 introduction",
  volume =       "29",
  publisher =    pub-AMS,
  address =      pub-AMS:adr,
  pages =        "xvii + 332",
  year =         "2013",
  ISBN =         "0-8218-8321-6 (paperback)",
  ISBN-13 =      "978-0-8218-8321-1 (paperback)",
  LCCN =         "QA268 .C697 2013",
  bibdate =      "Thu Mar 19 08:52:10 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/amermathmonthly2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Mathematical world",
  acknowledgement = ack-nhfb,
  subject =      "Coding theory; Textbooks; Cryptography; Mathematics;
                 History; Data encryption (Computer science); Codage;
                 Cryptographie; Chiffrement (informatique); Coding
                 theory; Cryptography; Mathematics; Data encryption
                 (Computer science); Codage; Manuels d'enseignement
                 sup{\'e}rieur; Cryptographie; Math{\'e}matiques;
                 Histoire; Chiffrement (Informatique)",
  tableofcontents = "Historical introduction \\
                 Classical cryptology : methods \\
                 Enigma and Ultra \\
                 Classical cryptography : attacks I \\
                 Classical cryptography : attacks II \\
                 Modern symmetric encryption \\
                 Introduction to public-channel cryptography \\
                 Public-channel cryptography \\
                 Error detecting and correcting codes \\
                 Modern cryptography \\
                 Primality testing and factorization \\
                 Solutions to selected problems",
}

@Article{Crawford:2013:FCT,
  author =       "Heather Crawford and Karen Renaud and Tim Storer",
  title =        "A framework for continuous, transparent mobile device
                 authentication",
  journal =      j-COMPUT-SECUR,
  volume =       "39 (part B)",
  number =       "??",
  pages =        "127--136",
  month =        nov,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813000886",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Crenne:2013:CMS,
  author =       "J{\'e}r{\'e}mie Crenne and Romain Vaslin and Guy
                 Gogniat and Jean-Philippe Diguet and Russell Tessier
                 and Deepak Unnikrishnan",
  title =        "Configurable memory security in embedded systems",
  journal =      j-TECS,
  volume =       "12",
  number =       "3",
  pages =        "71:1--71:??",
  month =        mar,
  year =         "2013",
  CODEN =        "????",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Tue May 28 17:38:27 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tecs.bib",
  abstract =     "System security is an increasingly important design
                 criterion for many embedded systems. These systems are
                 often portable and more easily attacked than
                 traditional desktop and server computing systems. Key
                 requirements for system security include defenses
                 against physical attacks and lightweight support in
                 terms of area and power consumption. Our new approach
                 to embedded system security focuses on the protection
                 of application loading and secure application
                 execution. During secure application loading, an
                 encrypted application is transferred from on-board
                 flash memory to external double data rate synchronous
                 dynamic random access memory (DDR-SDRAM) via a
                 microprocessor. Following application loading, the
                 core-based security technique provides both
                 confidentiality and authentication for data stored in a
                 microprocessor's system memory. The benefits of our low
                 overhead memory protection approaches are demonstrated
                 using four applications implemented in a
                 field-programmable gate array (FPGA) in an embedded
                 system prototyping platform. Each application requires
                 a collection of tasks with varying memory security
                 requirements. The configurable security core
                 implemented on-chip inside the FPGA with the
                 microprocessor allows for different memory security
                 policies for different application tasks. An average
                 memory saving of 63\% is achieved for the four
                 applications versus a uniform security approach. The
                 lightweight circuitry included to support application
                 loading from flash memory adds about 10\% FPGA area
                 overhead to the processor-based system and main memory
                 security hardware.",
  acknowledgement = ack-nhfb,
  articleno =    "71",
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?&idx=J840",
}

@Article{Cui:2013:OSL,
  author =       "T. Cui and C. Jin and G. Zhang",
  title =        "Observations of Skipjack-like Structure with {SP/SPS}
                 Round Function",
  journal =      j-J-UCS,
  volume =       "19",
  number =       "16",
  pages =        "2453--??",
  month =        "????",
  year =         "2013",
  CODEN =        "????",
  ISSN =         "0948-695X (print), 0948-6968 (electronic)",
  ISSN-L =       "0948-6968",
  bibdate =      "Thu Mar 13 14:26:22 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jucs.bib",
  URL =          "http://www.jucs.org/jucs_19_16/observations_of_skipjack_like",
  acknowledgement = ack-nhfb,
  fjournal =     "J.UCS: Journal of Universal Computer Science",
  journal-URL =  "http://www.jucs.org/jucs",
}

@Article{DaRolt:2013:NDS,
  author =       "Jean {Da Rolt} and Giorgio {Di Natale} and Marie-Lise
                 Flottes and Bruno Rouzeyre",
  title =        "A novel differential scan attack on advanced {DFT}
                 structures",
  journal =      j-TODAES,
  volume =       "18",
  number =       "4",
  pages =        "58:1--58:??",
  month =        oct,
  year =         "2013",
  CODEN =        "ATASFO",
  DOI =          "https://doi.org/10.1145/2505014",
  ISSN =         "1084-4309 (print), 1557-7309 (electronic)",
  ISSN-L =       "1084-4309",
  bibdate =      "Fri Nov 8 11:45:54 MST 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/todaes/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/todaes.bib",
  abstract =     "Scan chains insertion is the most common technique to
                 ensure the testability of digital cores, providing high
                 fault coverage. However, for ICs dealing with secret
                 information, scan chains can be used as back doors for
                 accessing secret data thus becoming a threat to system
                 security. So far, advanced test structures used to
                 reduce test costs (e.g., response compaction) and
                 achieve high fault coverage (e.g., X's masking decoder)
                 have been considered as intrinsic countermeasures
                 against these threats. This work proposes a new generic
                 scan-based attack demonstrating that these test
                 structures are not sufficiently effective to prevent
                 leakage through the test infrastructure. This generic
                 attack can be easily adapted to several cryptographic
                 implementations for both symmetric and public key
                 algorithms. The proposed attack is demonstrated on
                 several ciphers.",
  acknowledgement = ack-nhfb,
  articleno =    "58",
  fjournal =     "ACM Transactions on Design Automation of Electronic
                 Systems (TODAES)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J776",
}

@Article{DePrisco:2013:CVC,
  author =       "Roberto {De Prisco} and Alfredo {De Santis}",
  title =        "Color visual cryptography schemes for black and white
                 secret images",
  journal =      j-THEOR-COMP-SCI,
  volume =       "510",
  number =       "??",
  pages =        "62--86",
  day =          "28",
  month =        oct,
  year =         "2013",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Mon Nov 4 10:04:17 MST 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2010.bib;
                 http://www.sciencedirect.com/science/journal/03043975",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0304397513006750",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{Dini:2013:HHS,
  author =       "Gianluca Dini and Marco Tiloca",
  title =        "{HISS}: a {HIghly Scalable Scheme} for Group
                 Rekeying",
  journal =      j-COMP-J,
  volume =       "56",
  number =       "4",
  pages =        "508--525",
  month =        apr,
  year =         "2013",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxs152",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Apr 1 08:36:50 MDT 2013",
  bibsource =    "http://comjnl.oxfordjournals.org/content/56/4.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/56/4/508.full.pdf+html",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "November 23, 2012",
}

@Article{Dodis:2013:OWE,
  author =       "Yevgeniy Dodis and Yu Yu",
  title =        "Overcoming Weak Expectations",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7785",
  pages =        "1--22",
  year =         "2013",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-36594-2_1",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 21 08:32:49 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_1/;
                 http://link.springer.com/content/pdf/bfm:978-3-642-36594-2/1.pdf",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-36594-2",
  book-URL =     "http://www.springerlink.com/content/978-3-642-36594-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Dong:2013:PRS,
  author =       "Qi Dong and Donggang Liu and Peng Ning",
  title =        "Providing {DoS} resistance for signature-based
                 broadcast authentication in sensor networks",
  journal =      j-TECS,
  volume =       "12",
  number =       "3",
  pages =        "73:1--73:??",
  month =        mar,
  year =         "2013",
  CODEN =        "????",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Tue May 28 17:38:27 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tecs.bib",
  abstract =     "Recent studies have demonstrated that it is feasible
                 to perform public key cryptographic operations on
                 resource-constrained sensor platforms. However, the
                 significant energy consumption introduced by public key
                 operations makes any public key-based protocol an easy
                 target of Denial-of-Service (DoS) attacks. For example,
                 if digital signature schemes such as ECDSA are used
                 directly for broadcast authentication without further
                 protection, an attacker can simply broadcast fake
                 messages and force the receiving nodes to perform a
                 huge number of unnecessary signature verifications,
                 eventually exhausting their battery power. This paper
                 shows how to mitigate such DoS attacks when digital
                 signatures are used for broadcast authentication in
                 sensor networks. Specifically, this paper first
                 presents two filtering techniques, the group-based
                 filter and the key chain-based filter, to handle the
                 DoS attacks against signature verification. Both
                 methods can significantly reduce the number of
                 unnecessary signature verifications when a sensor node
                 is under DoS attacks. This paper then combines these
                 two filters and proposes a hybrid solution to further
                 improve the performance.",
  acknowledgement = ack-nhfb,
  articleno =    "73",
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?&idx=J840",
}

@Article{Driessen:2013:ESA,
  author =       "Benedikt Driessen and Ralf Hund and Carsten Willems
                 and Christof Paar and Thorsten Holz",
  title =        "An experimental security analysis of two satphone
                 standards",
  journal =      j-TISSEC,
  volume =       "16",
  number =       "3",
  pages =        "10:1--10:??",
  month =        nov,
  year =         "2013",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/2535522",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Mon Dec 9 11:22:22 MST 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tissec.bib",
  abstract =     "General-purpose communication systems such as GSM and
                 UMTS have been in the focus of security researchers for
                 over a decade now. Recently also technologies that are
                 only used under more specific circumstances have come
                 into the spotlight of academic research and the hacker
                 scene alike. A striking example of this is recent work
                 [Driessen et al. 2012] that analyzed the security of
                 the over-the-air encryption in the two existing ETSI
                 satphone standards GMR-1 and GMR-2. The firmware of
                 handheld devices was reverse-engineered and the
                 previously unknown stream ciphers A5-GMR-1 and A5-GMR-2
                 were recovered. In a second step, both ciphers were
                 cryptanalized, resulting in a ciphertext-only attack on
                 A5-GMR-1 and a known-plaintext attack on A5-GMR-2. In
                 this work, we extend the aforementioned results in the
                 following ways: First, we improve the proposed attack
                 on A5-GMR-1 and reduce its average-case complexity from
                 $ 2^{32} $ to $ 2^{21} $ steps. Second, we implement a
                 practical attack to successfully record communications
                 in the Thuraya network and show that it can be done
                 with moderate effort for approximately \$5,000. We
                 describe the implementation of our modified attack and
                 the crucial aspects to make it practical. Using our
                 eavesdropping setup, we recorded 30 seconds of our own
                 satellite-to-satphone communication and show that we
                 are able to recover Thuraya session keys in half an
                 hour (on average). We supplement these results with
                 experiments designed to highlight the feasibility of
                 also eavesdropping on the satphone's emanations. The
                 purpose of this article is threefold: Develop and
                 demonstrate more practical attacks on A5-GMR-1,
                 summarize current research results in the field of
                 GMR-1 and GMR-2 security, and shed light on the amount
                 of work and expertise it takes from setting out to
                 analyze a complex system to actually break it in the
                 real world.",
  acknowledgement = ack-nhfb,
  articleno =    "10",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@InProceedings{Egele:2013:ESC,
  author =       "Manuel Egele and David Brumley and Yanick Fratantonio
                 and Christopher Kruegel",
  editor =       "????",
  booktitle =    "{ACM Conference on Computer and Communications
                 Security}",
  title =        "An empirical study of cryptographic misuse in
                 {Android} applications",
  publisher =    pub-ACM,
  address =      pub-ACM:adr,
  pages =        "73--84",
  year =         "2013",
  DOI =          "????",
  ISBN =         "????",
  ISBN-13 =      "????",
  LCCN =         "????",
  bibdate =      "Mon Mar 09 11:57:10 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "????",
  acknowledgement = ack-nhfb,
  remark =       "Cite in \cite[reference 31]{Schneier:2015:SWC}.",
}

@Article{El-Emam:2013:NSA,
  author =       "Nameer N. El-Emam and Rasheed Abdul Shaheed
                 Al-Zubidy",
  title =        "New steganography algorithm to conceal a large amount
                 of secret message using hybrid adaptive neural networks
                 with modified adaptive genetic algorithm",
  journal =      j-J-SYST-SOFTW,
  volume =       "86",
  number =       "6",
  pages =        "1465--1481",
  month =        jun,
  year =         "2013",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Tue May 14 16:09:14 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0164121212003317",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@InProceedings{Engels:2013:NLL,
  author =       "Susanne Engels and Elif Bilge Kavun and Christof Paar
                 and Tolga Yalcin and Hristina Mihajloska",
  title =        "A Non-Linear\slash Linear Instruction Set Extension
                 for Lightweight Ciphers",
  crossref =     "IEEE:2013:PIS",
  pages =        "67--75",
  year =         "2013",
  DOI =          "https://doi.org/10.1109/ARITH.2013.36",
  ISSN =         "1063-6889",
  bibdate =      "Sat Aug 1 09:38:32 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/fparith.bib",
  acknowledgement = ack-nhfb,
  keywords =     "algebraic normal form; ANF; binary matrix
                 multiply-and-add form; bit permutation; Ciphers;
                 cryptographic operation; cryptography; embedded CPU;
                 embedded microcontroller; Hardware; instruction set
                 extension; lightweight cipher; lightweight ciphers;
                 lightweight cryptographic algorithm; linear instruction
                 set extension; linear operation; matrix algebra;
                 microcontrollers; modular architecture; nonlinear
                 instruction set extension; nonlinear operation;
                 Registers; s-box; Silicon; Software; Standards",
  remark =       "ARITH'21 conference paper.",
}

@Article{Fan:2013:CEM,
  author =       "Chun-I Fan and Yi-Hui Lin and Ruei-Hau Hsu",
  title =        "Complete {EAP} Method: User Efficient and Forward
                 Secure Authentication Protocol for {IEEE 802.11}
                 Wireless {LANs}",
  journal =      j-IEEE-TRANS-PAR-DIST-SYS,
  volume =       "24",
  number =       "4",
  pages =        "672--680",
  month =        apr,
  year =         "2013",
  CODEN =        "ITDSEO",
  DOI =          "https://doi.org/10.1109/TPDS.2012.164",
  ISSN =         "1045-9219",
  ISSN-L =       "1045-9219",
  bibdate =      "Wed May 1 08:02:21 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranspardistsys.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Parallel and Distributed
                 Systems",
  journal-URL =  "http://www.computer.org/tpds/archives.htm",
}

@Article{Fan:2013:CPP,
  author =       "Chun-I Fan and Shi-Yuan Huang",
  title =        "Controllable privacy preserving search based on
                 symmetric predicate encryption in cloud storage",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "29",
  number =       "7",
  pages =        "1716--1724",
  month =        sep,
  year =         "2013",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Mon Aug 26 16:08:23 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib;
                 http://www.sciencedirect.com/science/journal/0167739X",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X1200101X",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Fan:2013:KIS,
  author =       "J. Fan and Y. Zheng and X. Tang",
  title =        "Key-Insulated Signcryption",
  journal =      j-J-UCS,
  volume =       "19",
  number =       "10",
  pages =        "1351--??",
  month =        "????",
  year =         "2013",
  CODEN =        "????",
  ISSN =         "0948-695X (print), 0948-6968 (electronic)",
  ISSN-L =       "0948-6968",
  bibdate =      "Fri Sep 13 11:19:11 MDT 2013",
  bibsource =    "http://www.jucs.org/jucs;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jucs.bib",
  URL =          "http://www.jucs.org/jucs_19_10/key_insulated_signcryption",
  acknowledgement = ack-nhfb,
  fjournal =     "J.UCS: Journal of Universal Computer Science",
  journal-URL =  "http://www.jucs.org/jucs",
}

@Article{Fawzi:2013:LDN,
  author =       "Omar Fawzi and Patrick Hayden and Pranab Sen",
  title =        "From Low-Distortion Norm Embeddings to Explicit
                 Uncertainty Relations and Efficient Information
                 Locking",
  journal =      j-J-ACM,
  volume =       "60",
  number =       "6",
  pages =        "44:1--44:??",
  month =        nov,
  year =         "2013",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/2518131",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Tue Dec 3 18:36:06 MST 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "The existence of quantum uncertainty relations is the
                 essential reason that some classically unrealizable
                 cryptographic primitives become realizable when quantum
                 communication is allowed. One operational manifestation
                 of these uncertainty relations is a purely quantum
                 effect referred to as information locking [DiVincenzo
                 et al. 2004]. A locking scheme can be viewed as a
                 cryptographic protocol in which a uniformly random n
                 -bit message is encoded in a quantum system using a
                 classical key of size much smaller than n. Without the
                 key, no measurement of this quantum state can extract
                 more than a negligible amount of information about the
                 message, in which case the message is said to be
                 ``locked''. Furthermore, knowing the key, it is
                 possible to recover, that is ``unlock'', the message.
                 In this article, we make the following contributions by
                 exploiting a connection between uncertainty relations
                 and low-distortion embeddings of Euclidean spaces into
                 slightly larger spaces endowed with the l$_1$ norm. We
                 introduce the notion of a metric uncertainty relation
                 and connect it to low-distortion embeddings of l$_2$
                 into l$_1$. A metric uncertainty relation also implies
                 an entropic uncertainty relation. We prove that random
                 bases satisfy uncertainty relations with a stronger
                 definition and better parameters than previously known.
                 Our proof is also considerably simpler than earlier
                 proofs. We then apply this result to show the existence
                 of locking schemes with key size independent of the
                 message length. Moreover, we give efficient
                 constructions of bases satisfying metric uncertainty
                 relations. The bases defining these metric uncertainty
                 relations are computable by quantum circuits of almost
                 linear size. This leads to the first explicit
                 construction of a strong information locking scheme.
                 These constructions are obtained by adapting an
                 explicit norm embedding due to Indyk [2007] and an
                 extractor construction of Guruswami et al. [2009]. We
                 apply our metric uncertainty relations to exhibit
                 communication protocols that perform equality testing
                 of n -qubit states. We prove that this task can be
                 performed by a single message protocol using O (log$^2$
                 n ) qubits and n bits of communication, where the
                 computation of the sender is efficient.",
  acknowledgement = ack-nhfb,
  articleno =    "44",
  fjournal =     "Journal of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J401",
}

@Article{Fehr:2013:FCC,
  author =       "Serge Fehr and Jonathan Katz and Fang Song and
                 Hong-Sheng Zhou and Vassilis Zikas",
  title =        "Feasibility and Completeness of Cryptographic Tasks in
                 the Quantum World",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7785",
  pages =        "281--296",
  year =         "2013",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-36594-2_16",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 21 08:32:49 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_16/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-36594-2",
  book-URL =     "http://www.springerlink.com/content/978-3-642-36594-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@Misc{Felten:2013:LBA,
  author =       "Edward Felten",
  title =        "The {Linux} backdoor attempt of 2003",
  howpublished = "Web site.",
  year =         "2013",
  bibdate =      "Mon Mar 09 12:00:45 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/linux.bib;
                 https://www.math.utah.edu/pub/tex/bib/unix.bib",
  URL =          "https://freedom-to-tinker.com/blog/felten/the-linux-backdoor-attempt-of-2003/",
  acknowledgement = ack-nhfb,
}

@Article{Feng:2013:ECE,
  author =       "Jun Feng and Xueming Wang and Hong Sun",
  title =        "Efficiently computable endomorphism for genus $3$
                 hyperelliptic curve cryptosystems",
  journal =      j-INFO-PROC-LETT,
  volume =       "113",
  number =       "12",
  pages =        "405--408",
  day =          "30",
  month =        jun,
  year =         "2013",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Tue Apr 16 06:15:28 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019013000914",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Book{Fox:2013:RLQ,
  author =       "Margalit Fox",
  title =        "The Riddle of the Labyrinth: the Quest to Crack an
                 Ancient Code",
  publisher =    pub-HARPERCOLLINS,
  address =      pub-HARPERCOLLINS:adr,
  pages =        "xx + 363",
  year =         "2013",
  ISBN =         "0-06-222883-8",
  ISBN-13 =      "978-0-06-222883-3",
  LCCN =         "P1038 .F69 2013",
  bibdate =      "Fri May 31 20:54:44 MDT 2013",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://en.wikipedia.org/wiki/Linear_B_script",
  abstract =     "An intellectual detective story follows the quest to
                 unlock one of the great secrets of human history ---
                 the decipherment of Linear B, an unknown script from
                 the Aegean Bronze Age.",
  acknowledgement = ack-nhfb,
  subject =      "Kober, Alice; Evans, Sir Arthur; Ventris, Michael;
                 Inscriptions, Linear B; Civilization, Mycenaean; Women
                 linguists; Biography; Archaeologists; Great Britain;
                 Greece",
  subject-dates = "1906--1950 \\
                 1851--1941",
  tableofcontents = "Buried treasure \\
                 The digger \\
                 The record-keepers \\
                 The vanished key \\
                 Love among the ruins \\
                 The detective \\
                 American champollion \\
                 A delightful problem \\
                 Splitting the baby \\
                 The matrix \\
                 ``Hurry up and deciper the thing!'' \\
                 The architect \\
                 The hollow boy \\
                 A leap of faith \\
                 ``I know it, I know it'' \\
                 Solution, dissolution \\
                 Mr. X and Mr. Y",
}

@Article{Frauchiger:2013:TRR,
  author =       "Daniela Frauchiger and Renato Renner and Matthias
                 Troyer",
  title =        "True randomness from realistic quantum devices",
  journal =      "arXiv.org",
  volume =       "??",
  number =       "??",
  pages =        "??--??",
  day =          "13",
  month =        nov,
  year =         "2013",
  bibdate =      "Sat Nov 29 14:26:20 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://arxiv.org/abs/1311.4547",
  abstract =     "Even if the output of a Random Number Generator (RNG)
                 is perfectly uniformly distributed, it may be
                 correlated to pre-existing information and therefore be
                 predictable. Statistical tests are thus not sufficient
                 to guarantee that an RNG is usable for applications,
                 e.g., in cryptography or gambling, where
                 unpredictability is important. To enable such
                 applications a stronger notion of randomness, termed
                 ``true randomness'', is required, which includes
                 independence from prior information. Quantum systems
                 are particularly suitable for true randomness
                 generation, as their unpredictability can be proved
                 based on physical principles. Practical implementations
                 of Quantum RNGs (QRNGs) are however always subject to
                 noise, i.e., influences which are not fully controlled.
                 This reduces the quality of the raw randomness
                 generated by the device, making it necessary to
                 post-process it. Here we provide a framework to analyse
                 realistic QRNGs and to determine the post-processing
                 that is necessary to turn their raw output into true
                 randomness.",
  acknowledgement = ack-nhfb,
  pagecount =    "12",
}

@Article{Fritsch:2013:CPE,
  author =       "Lothar Fritsch",
  title =        "The Clean Privacy Ecosystem of the Future {Internet}",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "1",
  pages =        "34--45",
  day =          "14",
  month =        jan,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5010034",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:49 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/1/34",
  abstract =     "This article speculates on the future of privacy and
                 electronic identities on the Internet. Based on a short
                 review of security models and the development of
                 privacy-enhancing technology, privacy and electronic
                 identities will be discussed as parts of a larger
                 context-an ecosystem of personal information and
                 electronic identities. The article argues for an
                 ecosystem view of personal information and electronic
                 identities, as both personal information and identity
                 information are basic required input for many
                 applications. Therefore, for both application owners
                 and users, a functioning ecosystem of personal
                 information and electronic identification is important.
                 For the future of the Internet, high-quality
                 information and controlled circulation of such
                 information is therefore argued as decisive for the
                 value of future Internet applications.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Privacy in the Future Internet.",
}

@Article{Galindo:2013:NIC,
  author =       "David Galindo",
  title =        "A note on an {IND-CCA2} secure {Paillier}-based
                 cryptosystem",
  journal =      j-INFO-PROC-LETT,
  volume =       "113",
  number =       "22--24",
  pages =        "913--914",
  month =        nov # "\slash " # dec,
  year =         "2013",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Mon Dec 2 11:48:02 MST 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019013002457",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Gao:2013:LCA,
  author =       "Guangyong Gao and Guoping Jiang",
  title =        "A lossless copyright authentication scheme based on
                 {Bessel--Fourier} moment and extreme learning machine
                 in curvature-feature domain",
  journal =      j-J-SYST-SOFTW,
  volume =       "86",
  number =       "1",
  pages =        "222--232",
  month =        jan,
  year =         "2013",
  CODEN =        "JSSODM",
  DOI =          "https://doi.org/10.1016/j.jss.2012.07.070",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Fri Nov 9 12:50:20 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0164121212002270",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@InProceedings{Garmany:2013:PPR,
  author =       "Behrad Garmany and Tilo M{\"u}ller",
  booktitle =    "Proceedings of the 29th Annual Computer Security
                 Applications Conference",
  title =        "{PRIME}: Private {RSA} Infrastructure for Memory-less
                 Encryption",
  publisher =    pub-ACM,
  address =      pub-ACM:adr,
  pages =        "149--158",
  year =         "2013",
  DOI =          "https://doi.org/10.1145/2523649.2523656",
  ISBN =         "1-4503-2015-5",
  ISBN-13 =      "978-1-4503-2015-3",
  bibdate =      "Sat Feb 15 17:21:55 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  series =       "ACSAC '13",
  abstract =     "Cold boot attacks exploit the fact that data in RAM
                 gradually fades away over time, rather than being lost
                 immediately when power is cycled off. An attacker can
                 gain access to all memory contents by a restart or
                 short power-down of the system, a so called cold boot.
                 Consequently, sensitive data in RAM like cryptographic
                 keys are exposed to attackers with physical access.
                 Research in recent years found software-based solutions
                 to the cold boot problem in terms of CPU-bound or
                 memory-less encryption. To date, however, the focus has
                 been set on symmetric ciphers, particularly concerning
                 disk encryption systems. Contrary to that, the work in
                 hand aims to close the gap to asymmetric ciphers. With
                 PRIME, we present a cold boot resistant infrastructure
                 for private RSA operations. All private RSA parameters
                 reside symmetrically encrypted in RAM and are decrypted
                 only within CPU registers. The modular exponentiation
                 algorithm for RSA is implemented entirely on the CPU,
                 such that no sensitive state of RSA ever goes to RAM.",
  acmid =        "2523656",
  keywords =     "CPU-bound encryption, RSA, cold boot attack",
  location =     "New Orleans, Louisiana",
  numpages =     "10",
}

@Article{Gasarch:2013:RBC,
  author =       "William Gasarch",
  title =        "Review of {{\booktitle{Theoretical Computer Science:
                 Introduction to Automata, Computability, Complexity,
                 Algorithmics, Randomization, Communication, and
                 Cryptography}} by Juraj Hromkovic}",
  journal =      j-SIGACT,
  volume =       "44",
  number =       "3",
  pages =        "7--8",
  month =        sep,
  year =         "2013",
  CODEN =        "SIGNDM",
  DOI =          "https://doi.org/10.1145/2527748.2527750",
  ISSN =         "0163-5700 (print), 1943-5827 (electronic)",
  ISSN-L =       "0163-5700",
  bibdate =      "Mon Dec 2 17:43:09 MST 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGACT News",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J697",
}

@Article{Ge:2013:SAP,
  author =       "Aijun Ge and Jiang Zhang and Rui Zhang and Chuangui Ma
                 and Zhenfeng Zhang",
  title =        "Security Analysis of a Privacy-Preserving
                 Decentralized Key-Policy Attribute-Based Encryption
                 Scheme",
  journal =      j-IEEE-TRANS-PAR-DIST-SYS,
  volume =       "24",
  number =       "11",
  pages =        "2319--2321",
  month =        nov,
  year =         "2013",
  CODEN =        "ITDSEO",
  DOI =          "https://doi.org/10.1109/TPDS.2012.328",
  ISSN =         "1045-9219 (print), 1558-2183 (electronic)",
  ISSN-L =       "1045-9219",
  bibdate =      "Fri Nov 15 10:31:20 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranspardistsys.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Parallel and Distributed
                 Systems",
  journal-URL =  "http://www.computer.org/tpds/archives.htm",
}

@Article{Geller:2013:MIS,
  author =       "Tom Geller",
  title =        "Making the {Internet} safe for gadgets",
  journal =      j-CACM,
  volume =       "56",
  number =       "10",
  pages =        "18--20",
  month =        oct,
  year =         "2013",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2507771.2507777",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Sep 30 16:28:43 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cacm2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "Initiatives favor direct connections, named resources,
                 and cryptography.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@TechReport{Genkin:2013:RKE,
  author =       "Daniel Genkin and Adi Shamir and Eran Tromer",
  title =        "{RSA} Key Extraction via Low-Bandwidth Acoustic
                 Cryptanalysis",
  type =         "Technical and Web report",
  institution =  "Technion and Tel Aviv University and Weizmann
                 Institute of Science",
  address =      "Haifa and Tel Aviv, Israel",
  day =          "18",
  month =        dec,
  year =         "2013",
  bibdate =      "Wed Dec 18 09:40:20 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.cs.tau.ac.il/~tromer/acoustic/;
                 http://www.tau.ac.il/~tromer/papers/acoustic-20131218.pdf",
  abstract =     "Many computers emit a high-pitched noise during
                 operation, due to vibration in some of their electronic
                 components. These acoustic emanations are more than a
                 nuisance: they can convey information about the
                 software running on the computer, and in particular
                 leak sensitive information about security-related
                 computations. In a preliminary presentation, we have
                 shown that different RSA keys induce different sound
                 patterns, but it was not clear how to extract
                 individual key bits. The main problem was that the
                 acoustic side channel has a very low bandwidth (under
                 20 kHz using common microphones, and a few hundred kHz
                 using ultrasound microphones), many orders of magnitude
                 below the GHz-scale clock rates of the attacked
                 computers.\par

                 Here, we describe a new acoustic cryptanalysis key
                 extraction attack, applicable to GnuPG's current
                 implementation of RSA. The attack can extract full
                 4096-bit RSA decryption keys from laptop computers (of
                 various models), within an hour, using the sound
                 generated by the computer during the decryption of some
                 chosen ciphertexts. We experimentally demonstrate that
                 such attacks can be carried out, using either a plain
                 mobile phone placed next to the computer, or a more
                 sensitive microphone placed 4 meters away.\par

                 Beyond acoustics, we demonstrate that a similar
                 low-bandwidth attack can be performed by measuring the
                 electric potential of a computer chassis. A
                 suitably-equipped attacker need merely touch the target
                 computer with his bare hand, or get the required
                 leakage information from the ground wires at the remote
                 end of VGA, USB or Ethernet cables.",
  acknowledgement = ack-nhfb,
}

@Misc{Gentry:2013:EIF,
  author =       "Craig B. Gentry and Shai Halevi",
  title =        "Efficient implementation of fully homomorphic
                 encryption",
  howpublished = "US Patent 8,565,435.",
  day =          "22",
  month =        oct,
  year =         "2013",
  bibdate =      "Sat Dec 28 14:09:31 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  note =         "Filed 9 August 2011.",
  acknowledgement = ack-nhfb,
}

@Article{Gentry:2013:EMH,
  author =       "Craig Gentry",
  title =        "Encrypted Messages from the Heights of Cryptomania",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7785",
  pages =        "120--121",
  year =         "2013",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-36594-2_7",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 21 08:32:49 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
  URL =          "http://link.springer.com/accesspage/chapter/10.1007/978-3-642-36594-2_7?coverImageUrl=/static/0.8699/sites/link/images/abstract_cover_placeholder.png",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-36594-2",
  book-URL =     "http://www.springerlink.com/content/978-3-642-36594-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Gentry:2013:FSB,
  author =       "Craig Gentry and Shai Halevi and Chris Peikert and
                 Nigel P. Smart",
  title =        "Field switching in {BGV}-style homomorphic
                 encryption",
  journal =      j-J-COMP-SECUR,
  volume =       "21",
  number =       "5",
  pages =        "663--684",
  month =        "????",
  year =         "2013",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130480",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:59 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Goglin:2013:KGS,
  author =       "Brice Goglin and St{\'e}phanie Moreaud",
  title =        "{KNEM}: a generic and scalable kernel-assisted
                 intra-node {MPI} communication framework",
  journal =      j-J-PAR-DIST-COMP,
  volume =       "73",
  number =       "2",
  pages =        "176--188",
  month =        feb,
  year =         "2013",
  CODEN =        "JPDCER",
  DOI =          "https://doi.org/10.1016/j.jpdc.2012.09.016",
  ISSN =         "0743-7315 (print), 1096-0848 (electronic)",
  ISSN-L =       "0743-7315",
  bibdate =      "Thu Dec 13 20:22:17 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jpardistcomp.bib;
                 https://www.math.utah.edu/pub/tex/bib/pvm.bib;
                 http://www.sciencedirect.com/science/journal/07437315",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0743731512002316",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Parallel and Distributed Computing",
  journal-URL =  "http://www.sciencedirect.com/science/journal/07437315",
}

@Article{Goh:2013:TOT,
  author =       "Weihan Goh and Chai Kiat Yeo",
  title =        "Teaching an Old {TPM} New Tricks: Repurposing for
                 Identity-Based Signatures",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "5",
  pages =        "28--35",
  month =        sep # "\slash " # oct,
  year =         "2013",
  DOI =          "",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Nov 15 07:50:42 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  fjournal =     "IEEE Security \& Privacy",
}

@Book{GomezPardo:2013:ICM,
  author =       "Jos{\'e} Luis {G{\'o}mez Pardo}",
  title =        "Introduction to Cryptography with {Maple}",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xxx + 705",
  year =         "2013",
  DOI =          "https://doi.org/10.1007/978-3-642-32166-5",
  ISBN =         "3-642-32165-8, 3-642-32166-6",
  ISBN-13 =      "978-3-642-32165-8, 978-3-642-32166-5",
  LCCN =         "QA76.9.A25 G66 2013",
  bibdate =      "Sat Aug 9 14:06:33 MDT 2014",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/maple-extract.bib",
  URL =          "http://www.springerlink.com/content/978-3-642-32166-5",
  abstract =     "This introduction to cryptography employs a
                 programming-oriented approach to study the most
                 important cryptographic schemes in current use and the
                 main cryptanalytic attacks against them. Discussion of
                 the theoretical aspects, emphasizing precise security
                 definitions based on methodological tools such as
                 complexity and randomness, and of the mathematical
                 aspects, with emphasis on number-theoretic algorithms
                 and their applications to cryptography and
                 cryptanalysis, is integrated with the programming
                 approach, thus providing implementations of the
                 algorithms and schemes as well as examples of realistic
                 size.\par

                 A distinctive feature of the author's approach is the
                 use of Maple as a programming environment in which not
                 just the cryptographic primitives but also the most
                 important cryptographic schemes are implemented
                 following the recommendations of standards bodies such
                 as NIST, with many of the known cryptanalytic attacks
                 implemented as well. The purpose of the Maple
                 implementations is to let the reader experiment and
                 learn, and for this reason the author includes numerous
                 examples. The book discusses important recent subjects
                 such as homomorphic encryption, identity-based
                 cryptography and elliptic curve cryptography. The
                 algorithms and schemes which are treated in detail and
                 implemented in Maple include AES and modes of
                 operation, CMAC, GCM/GMAC, SHA-256, HMAC, RSA, Rabin,
                 Elgamal, Paillier, Cocks IBE, DSA and ECDSA. In
                 addition, some recently introduced schemes enjoying
                 strong security properties, such as RSA-OAEP,
                 Rabin-SAEP, Cramer--Shoup, and PSS, are also discussed
                 and implemented. On the cryptanalysis side, Maple
                 implementations and examples are used to discuss many
                 important algorithms, including birthday and
                 man-in-the-middle attacks, integer factorization
                 algorithms such as Pollard's rho and the quadratic
                 sieve, and discrete log algorithms such as baby-step
                 giant-step, Pollard's rho, Pohlig--Hellman and the
                 index calculus method.\par

                 This textbook is suitable for advanced undergraduate
                 and graduate students of computer science, engineering
                 and mathematics, satisfying the requirements of various
                 types of courses: a basic introductory course; a
                 theoretically oriented course whose focus is on the
                 precise definition of security concepts and on
                 cryptographic schemes with reductionist security
                 proofs; a practice-oriented course requiring little
                 mathematical background and with an emphasis on
                 applications; or a mathematically advanced course
                 addressed to students with a stronger mathematical
                 background. The main prerequisite is a basic knowledge
                 of linear algebra and elementary calculus, and while
                 some knowledge of probability and abstract algebra
                 would be helpful, it is not essential because the book
                 includes the necessary background from these subjects
                 and, furthermore, explores the number-theoretic
                 material in detail. The book is also a comprehensive
                 reference and is suitable for self-study by
                 practitioners and programmers.",
  acknowledgement = ack-nhfb,
  subject =      "Maple (Computer file); Maple (Computer file); Data
                 encryption (Computer science); Cryptography; Maple.;
                 Kryptoanalyse.; Kryptologie.; Cryptography.; Data
                 encryption (Computer science)",
  tableofcontents = "Classical Ciphers and Their Cryptanalysis \\
                 Basic Concepts from Probability, Complexity, Algebra
                 and Number Theory \\
                 Private-Key Encryption \\
                 Block Ciphers and Modes of Operation \\
                 Message Authentication \\
                 Algorithmic Number Theory for Cryptography and
                 Cryptanalysis: Primality, Factoring and Discrete
                 Logarithms \\
                 Introduction to Public-Key Cryptography: The
                 Diffie--Hellman Protocol \\
                 Public-Key Encryption \\
                 Digital Signatures \\
                 Identity-Based Cryptography \\
                 An Introduction to Elliptic Curve Cryptography",
}

@Article{Gong:2013:NOT,
  author =       "Longyan Gong and Jingxin Pan and Beibei Liu and
                 Shengmei Zhao",
  title =        "A novel one-time password mutual authentication scheme
                 on sharing renewed finite random sub-passwords",
  journal =      j-J-COMP-SYS-SCI,
  volume =       "79",
  number =       "1",
  pages =        "122--130",
  month =        feb,
  year =         "2013",
  CODEN =        "JCSSBM",
  DOI =          "https://doi.org/10.1016/j.jcss.2012.06.002",
  ISSN =         "0022-0000 (print), 1090-2724 (electronic)",
  ISSN-L =       "0022-0000",
  bibdate =      "Tue Jan 29 15:27:21 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsyssci.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0022000012001249",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer and System Sciences",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00220000",
}

@Article{Goyal:2013:CZK,
  author =       "Vipul Goyal and Abhishek Jain and Rafail Ostrovsky and
                 Silas Richelson and Ivan Visconti",
  title =        "Concurrent Zero Knowledge in the Bounded Player
                 Model",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7785",
  pages =        "60--79",
  year =         "2013",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-36594-2_4",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 21 08:32:49 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_4/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-36594-2",
  book-URL =     "http://www.springerlink.com/content/978-3-642-36594-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Gradwohl:2013:SRC,
  author =       "Ronen Gradwohl and Noam Livne and Alon Rosen",
  title =        "Sequential rationality in cryptographic protocols",
  journal =      j-TEAC,
  volume =       "1",
  number =       "1",
  pages =        "2:1--2:??",
  month =        jan,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2399187.2399189",
  ISSN =         "2167-8375 (print), 2167-8383 (electronic)",
  ISSN-L =       "2167-8375",
  bibdate =      "Fri Mar 14 06:10:51 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/teac.bib",
  abstract =     "Much of the literature on rational cryptography
                 focuses on analyzing the strategic properties of
                 cryptographic protocols. However, due to the presence
                 of computationally-bounded players and the asymptotic
                 nature of cryptographic security, a definition of
                 sequential rationality for this setting has thus far
                 eluded researchers. We propose a new framework for
                 overcoming these obstacles, and provide the first
                 definitions of computational solution concepts that
                 guarantee sequential rationality. We argue that natural
                 computational variants of subgame perfection are too
                 strong for cryptographic protocols. As an alternative,
                 we introduce a weakening called threat-free Nash
                 equilibrium that is more permissive but still
                 eliminates the undesirable ``empty threats'' of
                 nonsequential solution concepts. To demonstrate the
                 applicability of our framework, we revisit the problem
                 of implementing a mediator for correlated equilibria
                 [Dodis et al 2000], and propose a variant of their
                 protocol that is sequentially rational for a nontrivial
                 class of correlated equilibria. Our treatment provides
                 a better understanding of the conditions under which
                 mediators in a correlated equilibrium can be replaced
                 by a stable protocol.",
  acknowledgement = ack-nhfb,
  articleno =    "2",
  fjournal =     "ACM Transactions on Economics and Computation",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=2542174",
}

@Article{Grosse:2013:AS,
  author =       "Eric Grosse and Mayank Upadhyay",
  title =        "Authentication at Scale",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "1",
  pages =        "15--22",
  month =        jan # "\slash " # feb,
  year =         "2013",
  DOI =          "https://doi.org/10.1109/MSP.2012.162",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Mar 18 08:56:47 2013",
  bibsource =    "https://www.math.utah.edu/pub/bibnet/authors/g/grosse-eric.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/cms/Computer.org/ComputingNow/pdfs/AuthenticationAtScale.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  keywords =     "authentication; delegation; Google 2sv; OAutho;
                 passwords; phishing attacks; second factor",
  xxURL =        "http://origin-www.computer.org/csdl/mags/sp/preprint/msp2012990123.pdf",
}

@Article{Guo:2013:TVS,
  author =       "Teng Guo and Feng Liu and ChuanKun Wu",
  title =        "Threshold visual secret sharing by random grids with
                 improved contrast",
  journal =      j-J-SYST-SOFTW,
  volume =       "86",
  number =       "8",
  pages =        "2094--2109",
  month =        aug,
  year =         "2013",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Mon Jul 15 15:59:36 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0164121213000745",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Gupta:2013:HPH,
  author =       "Sourav Sen Gupta and A. Chattopadhyay and K. Sinha and
                 S. Maitra and B. P. Sinha",
  title =        "High-Performance Hardware Implementation for {RC4}
                 Stream Cipher",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "62",
  number =       "4",
  pages =        "730--743",
  month =        apr,
  year =         "2013",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2012.19",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Tue Apr 30 12:26:22 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Han:2013:IBD,
  author =       "Jinguang Han and Willy Susilo and Yi Mu",
  title =        "Identity-based data storage in cloud computing",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "29",
  number =       "3",
  pages =        "673--681",
  month =        mar,
  year =         "2013",
  CODEN =        "FGSEVI",
  DOI =          "https://doi.org/10.1016/j.future.2012.07.010",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Fri Nov 30 11:11:37 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib;
                 http://www.sciencedirect.com/science/journal/0167739X",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X12001719",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Han:2013:RMA,
  author =       "Song Han and Tharam Dillon and Vidy Potdar and
                 Elizabeth Chang",
  title =        "{RFID} mutual authentication protocols for tags and
                 readers with and without a server",
  journal =      j-INT-J-COMPUT-SYST-SCI-ENG,
  volume =       "28",
  number =       "2",
  pages =        "??--??",
  month =        "????",
  year =         "2013",
  CODEN =        "CSSEEI",
  ISSN =         "0267-6192",
  ISSN-L =       "0267-6192",
  bibdate =      "Tue Dec 3 12:04:33 MST 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsystscieng.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Computer Systems Science and
                 Engineering",
}

@Article{Harn:2013:GA,
  author =       "Lein Harn",
  title =        "Group Authentication",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "62",
  number =       "9",
  pages =        "1893--1898",
  month =        sep,
  year =         "2013",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2012.251",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Fri Nov 15 08:54:34 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Hayashi:2013:AEI,
  author =       "Y.-I. Hayashi and Y. Hayashi and N. Homma and T.
                 Mizuki and T. Aoki",
  title =        "Analysis of Electromagnetic Information Leakage From
                 Cryptographic Devices With Different Physical
                 Structures",
  journal =      j-IEEE-TRANS-ELECTROMAGN-COMPAT,
  volume =       "??",
  number =       "??",
  pages =        "1--10",
  year =         "2013",
  CODEN =        "IEMCAE",
  DOI =          "https://doi.org/10.1109/TEMC.2012.2227486",
  ISSN =         "0018-9375 (print), 1558-187X (electronic)",
  ISSN-L =       "0018-9375",
  bibdate =      "Thu May 16 18:25:19 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Electromagnetic Compatibility",
  onlinedate =   "19 December 2012",
  remark =       "In press on 16 May 2013, but not yet assigned a volume
                 and issue.",
}

@Article{Hayes:2013:NSA,
  author =       "Adrian Hayes",
  title =        "Network Service Authentication Timing Attacks",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "2",
  pages =        "80--82",
  month =        mar # "\slash " # apr,
  year =         "2013",
  DOI =          "https://doi.org/10.1109/MSP.2013.39",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 1 09:11:38 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
}

@Article{He:2013:GME,
  author =       "Q. Y. He and M. D. Reid",
  title =        "Genuine Multipartite {Einstein--Podolsky--Rosen}
                 Steering",
  journal =      j-PHYS-REV-LET,
  volume =       "111",
  number =       "25",
  pages =        "250403",
  month =        dec,
  year =         "2013",
  CODEN =        "PRLTAO",
  DOI =          "https://doi.org/10.1103/PhysRevLett.111.250403",
  ISSN =         "0031-9007 (print), 1079-7114 (electronic), 1092-0145",
  ISSN-L =       "0031-9007",
  bibdate =      "Wed Mar 26 14:58:12 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/einstein.bib",
  URL =          "http://link.aps.org/doi/10.1103/PhysRevLett.111.250403;
                 http://www.scientificcomputing.com/news/2014/03/einsteins-entanglement-produces-quantum-encryption;
                 http://www.swinburne.edu.au/engineering/caous/news_and_events/mulitipartite%20EPR%20steering%20paper.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "Physical Review Letters",
  journal-URL =  "http://prl.aps.org/browse",
  keywords =     "$N$-partite Einstein-Podolsky-Rosen (EPR) steering;
                 quantum cryptography; quantum secret sharing",
  numpages =     "5",
}

@Article{He:2013:HEH,
  author =       "Daojing He and Jiajun Bu and Sammy Chan and Chun
                 Chen",
  title =        "{Handauth}: Efficient Handover Authentication with
                 Conditional Privacy for Wireless Networks",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "62",
  number =       "3",
  pages =        "616--622",
  month =        mar,
  year =         "2013",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2011.258",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Tue Apr 30 12:26:22 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Henson:2013:MES,
  author =       "Michael Henson and Stephen Taylor",
  title =        "Memory encryption: a survey of existing techniques",
  journal =      j-COMP-SURV,
  volume =       "46",
  number =       "4",
  pages =        "53:1--53:??",
  month =        mar,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2566673",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Fri Mar 21 18:13:35 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "Memory encryption has yet to be used at the core of
                 operating system designs to provide confidentiality of
                 code and data. As a result, numerous vulnerabilities
                 exist at every level of the software stack. Three
                 general approaches have evolved to rectify this
                 problem. The most popular approach is based on complex
                 hardware enhancements; this allows all encryption and
                 decryption to be conducted within a well-defined
                 trusted boundary. Unfortunately, these designs have not
                 been integrated within commodity processors and have
                 primarily been explored through simulation with very
                 few prototypes. An alternative approach has been to
                 augment existing hardware with operating system
                 enhancements for manipulating keys, providing improved
                 trust. This approach has provided insights into the use
                 of encryption but has involved unacceptable overheads
                 and has not been adopted in commercial operating
                 systems. Finally, specialized industrial devices have
                 evolved, potentially adding coprocessors, to increase
                 security of particular operations in specific operating
                 environments. However, this approach lacks generality
                 and has introduced unexpected vulnerabilities of its
                 own. Recently, memory encryption primitives have been
                 integrated within commodity processors such as the
                 Intel i7, AMD bulldozer, and multiple ARM variants.
                 This opens the door for new operating system designs
                 that provide confidentiality across the entire software
                 stack outside the CPU. To date, little practical
                 experimentation has been conducted, and the
                 improvements in security and associated performance
                 degradation has yet to be quantified. This article
                 surveys the current memory encryption literature from
                 the viewpoint of these central issues.",
  acknowledgement = ack-nhfb,
  articleno =    "53",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Hernandez-Ardieta:2013:TSA,
  author =       "Jorge L. Hernandez-Ardieta and Ana I. Gonzalez-Tablas
                 and Jose M. de Fuentes and Benjamin Ramos",
  title =        "A taxonomy and survey of attacks on digital
                 signatures",
  journal =      j-COMPUT-SECUR,
  volume =       "34",
  number =       "??",
  pages =        "67--112",
  month =        may,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:32 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812001794",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Herranz:2013:SMS,
  author =       "Javier Herranz and Alexandre Ruiz and Germ{\'a}n
                 S{\'a}ez",
  title =        "Sharing many secrets with computational provable
                 security",
  journal =      j-INFO-PROC-LETT,
  volume =       "113",
  number =       "14--16",
  pages =        "572--579",
  month =        jul # "\slash " # aug,
  year =         "2013",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Mon Jul 1 18:58:11 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019013001373",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Hocking:2013:COU,
  author =       "C. G. Hocking and S. M. Furnell and N. L. Clarke and
                 P. L. Reynolds",
  title =        "{Co}-operative user identity verification using an
                 Authentication Aura",
  journal =      j-COMPUT-SECUR,
  volume =       "39 (part B)",
  number =       "??",
  pages =        "486--502",
  month =        nov,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813001417",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Houmansadr:2013:BCN,
  author =       "Amir Houmansadr and Nikita Borisov",
  title =        "{BotMosaic}: {Collaborative} network watermark for the
                 detection of {IRC}-based botnets",
  journal =      j-J-SYST-SOFTW,
  volume =       "86",
  number =       "3",
  pages =        "707--715",
  month =        mar,
  year =         "2013",
  CODEN =        "JSSODM",
  DOI =          "https://doi.org/10.1016/j.jss.2012.11.005",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Wed Jan 23 08:33:00 MST 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0164121212003068",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Hulsing:2013:OPX,
  author =       "Andreas H{\"u}lsing and Lea Rausch and Johannes
                 Buchman",
  title =        "Optimal Parameters for {XMSS$^{MT}$}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "8128",
  pages =        "194--208",
  year =         "2013",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-40588-4_14",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 31 16:16:46 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  URL =          "https://link.springer.com/chapter/10.1007/978-3-642-40588-4_14",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
  journal-URL =  "http://link.springer.com/bookseries/558",
  keywords =     "hash-based signature scheme",
  remark =       "Proceedings of the International Conference on
                 Availability, Reliability, and Security (CD-ARES 13).",
}

@Article{Hulsing:2013:WOS,
  author =       "Andreas H{\"u}lsing",
  title =        "{W-OTS+} --- Shorter Signatures for Hash-Based
                 Signature Scheme",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7918",
  pages =        "173--188",
  year =         "2013",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-38553-7_10",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 31 16:10:39 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://link.springer.com/chapter/10.1007/978-3-642-38553-7_10",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
  journal-URL =  "http://link.springer.com/bookseries/558",
  keywords =     "Winternitz type one-time signature scheme (W-OTS)",
  remark =       "Proceedings of the 6th International Conference on
                 Cryptology in Africa (AFRICACRYPT 13).",
}

@Article{Hur:2013:REC,
  author =       "Junbeom Hur and Dongyoung Koo and Seong Oun Hwang and
                 Kyungtae Kang",
  title =        "Removing escrow from ciphertext policy attribute-based
                 encryption",
  journal =      j-COMPUT-MATH-APPL,
  volume =       "65",
  number =       "9",
  pages =        "1310--1317",
  month =        may,
  year =         "2013",
  CODEN =        "CMAPDK",
  ISSN =         "0898-1221 (print), 1873-7668 (electronic)",
  ISSN-L =       "0898-1221",
  bibdate =      "Wed Mar 1 21:51:21 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computmathappl2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0898122112001198",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers and Mathematics with Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/08981221",
}

@Article{IBM:2013:DMP,
  author =       "{IBM}",
  title =        "Daunting Mathematical Puzzle Solved, Enables Unlimited
                 Analysis of Encrypted Data",
  journal =      "Scientific Computing",
  day =          "24",
  month =        dec,
  year =         "2013",
  bibdate =      "Sat Dec 28 14:07:39 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  note =         "See patent \cite{Gentry:2013:EIF}.",
  URL =          "http://www.scientificcomputing.com/news/2013/12/daunting-mathematical-puzzle-solved-enables-unlimited-analysis-encrypted-data",
  acknowledgement = ack-nhfb,
  keywords =     "fully homomorphic encryption",
}

@Misc{IBM:2013:IPC,
  author =       "{IBM}",
  title =        "{IBM PCIe Cryptographic Coprocessor}",
  howpublished = "Web document",
  year =         "2013",
  bibdate =      "Thu Feb 27 08:46:07 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://www-03.ibm.com/security/cryptocards/pciecc/overview.shtml",
  abstract =     "The 4765 Cryptographic Coprocessor is a tamper
                 responding, programmable, cryptographic PCIe card,
                 containing CPU, encryption hardware, RAM, persistent
                 memory, hardware random number generator, time of day
                 clock, infrastructure firmware, and software.
                 Specialized hardware performs AES, DES, TDES, RSA,
                 SHA-1, SHA-224 to SHA-512, and other cryptographic
                 processes, relieving the main processor from these
                 tasks.",
  acknowledgement = ack-nhfb,
}

@Article{Jain:2013:MSD,
  author =       "Ajay Jain and Kusha Chopra",
  title =        "Malware signing detection system",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "5",
  pages =        "1--8",
  month =        sep,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2507288.2507307",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:29 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software malware not only creates financial damages to
                 corporate and individual computer users, but also
                 invades privacy, exploits their devices and induces
                 other significant losses. While efficient tools and
                 technologies that control and limit malware spread
                 across devices in the public domain are being
                 developed, the problem is far from being resolved. We
                 worked on a methodology that uses techniques to detect
                 malware during in-house development and prevents
                 malware from being released in the field. This work
                 helps determine and handle situations where a person,
                 authorized to access an authentic signing certificate
                 [1] signs malware (or set of file(s)) intended to
                 perform harmful operations, such as spreading a virus
                 on a computer using the said certificate, and releases
                 the malicious code publicly or to a community.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Jawad:2013:GAD,
  author =       "Khurram Jawad and Asifullah Khan",
  title =        "Genetic algorithm and difference expansion based
                 reversible watermarking for relational databases",
  journal =      j-J-SYST-SOFTW,
  volume =       "86",
  number =       "11",
  pages =        "2742--2753",
  month =        nov,
  year =         "2013",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Mon Sep 9 07:54:59 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0164121213001428",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Jeffs:2013:CCP,
  author =       "R. Amzi Jeffs and Mike Rosulek",
  title =        "Characterizing the Cryptographic Properties of
                 Reactive $2$-Party Functionalities",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7785",
  pages =        "263--280",
  year =         "2013",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-36594-2_15",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 21 08:32:49 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_15/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-36594-2",
  book-URL =     "http://www.springerlink.com/content/978-3-642-36594-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Jeong:2013:CBC,
  author =       "Kitae Jeong",
  title =        "Cryptanalysis of block cipher {Piccolo} suitable for
                 cloud computing",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "66",
  number =       "2",
  pages =        "829--840",
  month =        nov,
  year =         "2013",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-013-0902-2",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Sat Feb 8 10:21:59 MST 2014",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0920-8542&volume=66&issue=2;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  URL =          "http://link.springer.com/article/10.1007/s11227-013-0902-2",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@TechReport{Joux:2013:NIC,
  author =       "Antoine Joux",
  title =        "A new index calculus algorithm with complexity {$ L(1
                 / 4 + o(1)) $} in very small characteristic",
  type =         "Report",
  number =       "2013/095",
  institution =  "CryptoExperts and Universit{\'e} de Versailles
                 Saint-Quentin-en-Yvelines, Laboratoire PRISM",
  address =      "45 avenue des Etats-Unis, F-78035 Versailles Cedex,
                 France",
  pages =        "23",
  day =          "20",
  month =        feb,
  year =         "2013",
  bibdate =      "Thu Feb 27 06:27:57 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://eprint.iacr.org/2013/095",
  abstract =     "In this paper, we describe a new algorithm for
                 discrete logarithms in small characteristic. This
                 algorithm is based on index calculus and includes two
                 new contributions. The first is a new method for
                 generating multiplicative relations among elements of a
                 small smoothness basis. The second is a new descent
                 strategy that allows us to express the logarithm of an
                 arbitrary finite field element in terms of the
                 logarithm of elements from the smoothness basis. For a
                 small characteristic finite field of size $ Q = p^n $,
                 this algorithm achieves heuristic complexity $ L_Q(1 /
                 4 + o(1)). $ For technical reasons, unless $n$ is
                 already a composite with factors of the right size,
                 this is done by embedding $ \GF {Q} $ in a small
                 extension $ \GF {Q^e} $ with $ e \leq 2 \lceil \log_p n
                 \rceil $.",
  acknowledgement = ack-nhfb,
  keywords =     "discrete logarithm",
  remark =       "Presented at Selected Areas in Cryptography 2013 (SAC
                 2013), Burnaby, British Columbia, Canada, August
                 2013.",
}

@Article{Kamp:2013:MES,
  author =       "Poul-Henning Kamp",
  title =        "More Encryption Is Not the Solution",
  journal =      j-QUEUE,
  volume =       "11",
  number =       "7",
  pages =        "10",
  month =        jul,
  year =         "2013",
  CODEN =        "AQCUAE",
  DOI =          "https://doi.org/10.1145/2508834.2508864",
  ISSN =         "1542-7730 (print), 1542-7749 (electronic)",
  ISSN-L =       "1542-7730",
  bibdate =      "Wed Jul 31 12:23:21 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/queue.bib",
  abstract =     "Cryptography as privacy works only if both ends work
                 at it in good faith.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Queue: Tomorrow's Computing Today",
}

@Article{Kannan:2013:NQF,
  author =       "S. R. Kannan and S. Ramthilagam and R. Devi and
                 Yueh-Min Huang",
  title =        "Novel Quadratic Fuzzy $c$-Means Algorithms for
                 Effective Data Clustering Problems",
  journal =      j-COMP-J,
  volume =       "56",
  number =       "3",
  pages =        "393--406",
  month =        mar,
  year =         "2013",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxs085",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Fri Mar 1 06:18:28 MST 2013",
  bibsource =    "http://comjnl.oxfordjournals.org/content/56/3.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/56/3/393.full.pdf+html",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "June 27, 2012",
}

@Book{Kapera:2013:MRM,
  author =       "Zdzis{\l}aw Jan Kapera",
  title =        "{Marian Rejewski}: the man who defeated ``{Enigma}''",
  volume =       "8",
  publisher =    "The Enigma Press",
  address =      "Krak{\'o}w, Poland",
  pages =        "111",
  year =         "2013",
  ISBN =         "83-86110-72-4",
  ISBN-13 =      "978-83-86110-72-8",
  LCCN =         "????",
  bibdate =      "Sat Jun 6 12:20:23 MDT 2015",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
  series =       "The Enigma bulletin",
  acknowledgement = ack-nhfb,
  author-dates = "1942--",
  subject =      "Rejewski, Marian,; Enigma (Chiffriermaschine); Polen",
  subject-dates = "1905--1980",
}

@Article{Karakoc:2013:BCL,
  author =       "F. Karako{\c{c}} and H. Demirci and A. E. Harmanci",
  title =        "Biclique cryptanalysis of {LBlock} and {TWINE}",
  journal =      j-INFO-PROC-LETT,
  volume =       "113",
  number =       "12",
  pages =        "423--429",
  day =          "30",
  month =        jun,
  year =         "2013",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Tue Apr 16 06:15:28 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019013000884",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Katz:2013:RIB,
  author =       "Jon Katz",
  title =        "Review of {{\booktitle{Identity-based encryption}} by
                 Sanjit Chattarjee and Palash Sarkar}",
  journal =      j-SIGACT,
  volume =       "44",
  number =       "4",
  pages =        "29--31",
  month =        dec,
  year =         "2013",
  CODEN =        "SIGNDM",
  DOI =          "https://doi.org/10.1145/2556663.2556668",
  ISSN =         "0163-5700 (print), 1943-5827 (electronic)",
  bibdate =      "Sat Mar 15 09:22:32 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGACT News",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J697",
}

@Article{Kawai:2013:SHS,
  author =       "Yutaka Kawai and Noboru Kunihiro",
  title =        "Secret handshake scheme with request-based-revealing",
  journal =      j-COMPUT-MATH-APPL,
  volume =       "65",
  number =       "5",
  pages =        "786--798",
  month =        mar,
  year =         "2013",
  CODEN =        "CMAPDK",
  ISSN =         "0898-1221 (print), 1873-7668 (electronic)",
  ISSN-L =       "0898-1221",
  bibdate =      "Wed Mar 1 21:51:19 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computmathappl2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0898122112004919",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers and Mathematics with Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/08981221",
}

@Article{Khakpour:2013:ITA,
  author =       "Amir R. Khakpour and Alex X. Liu",
  title =        "An information-theoretical approach to high-speed flow
                 nature identification",
  journal =      j-IEEE-TRANS-NETWORKING,
  volume =       "21",
  number =       "4",
  pages =        "1076--1089",
  month =        aug,
  year =         "2013",
  CODEN =        "IEANEP",
  DOI =          "https://doi.org/10.1109/TNET.2012.2219591",
  ISSN =         "1063-6692 (print), 1558-2566 (electronic)",
  ISSN-L =       "1063-6692",
  bibdate =      "Mon Sep 9 17:27:57 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
  abstract =     "This paper concerns the fundamental problem of
                 identifying the content nature of a flow--namely text,
                 binary, or encrypted--for the first time. We propose
                 Iustitia, a framework for identifying flow nature on
                 the fly. The key observation behind Iustitia is that
                 text flows have the lowest entropy and encrypted flows
                 have the highest entropy, while the entropy of binary
                 flows stands in between. We further extend Iustitia for
                 the finer-grained classification of binary flows so
                 that we can differentiate different types of binary
                 flows (such as image, video, and executables) and even
                 the file formats (such as JPEG and GIF for images, MPEG
                 and AVI for videos) carried by binary flows. The basic
                 idea of Iustitia is to classify flows using machine
                 learning techniques where a feature is the entropy of
                 every certain number of consecutive bytes. Our
                 experimental results show that the classification can
                 be done with high speed and high accuracy. On average,
                 Iustitia can classify flows with 88.27\% of accuracy
                 using a buffer size of 1 K with a classification time
                 of less than 10\% of packet interarrival time for
                 91.2\% of flows.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE\slash ACM Transactions on Networking",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J771",
}

@Article{Khalil-Hani:2013:BEB,
  author =       "Mohamed Khalil-Hani and Muhammad N. Marsono and Rabia
                 Bakhteri",
  title =        "Biometric encryption based on a fuzzy vault scheme
                 with a fast chaff generation algorithm",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "29",
  number =       "3",
  pages =        "800--810",
  month =        mar,
  year =         "2013",
  CODEN =        "FGSEVI",
  DOI =          "https://doi.org/10.1016/j.future.2012.02.002",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Fri Nov 30 11:11:37 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib;
                 http://www.sciencedirect.com/science/journal/0167739X",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X12000350",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Khan:2013:EDC,
  author =       "Abdul Nasir Khan and M. L. Mat Kiah and Sajjad A.
                 Madani and Atta ur Rehman Khan and Mazhar Ali",
  title =        "Enhanced dynamic credential generation scheme for
                 protection of user identity in mobile-cloud computing",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "66",
  number =       "3",
  pages =        "1687--1706",
  month =        dec,
  year =         "2013",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-013-0967-y",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Sat Feb 8 11:30:58 MST 2014",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0920-8542&volume=66&issue=3;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  URL =          "http://link.springer.com/article/10.1007/s11227-013-0967-y",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Article{Klingler:2013:UPT,
  author =       "Lee Klingler and Rainer Steinwandt and Dominique
                 Unruh",
  title =        "On using probabilistic {Turing} machines to model
                 participants in cryptographic protocols",
  journal =      j-THEOR-COMP-SCI,
  volume =       "501",
  number =       "??",
  pages =        "49--51",
  day =          "27",
  month =        aug,
  year =         "2013",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Mon Aug 26 16:17:46 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2010.bib;
                 http://www.sciencedirect.com/science/journal/03043975",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0304397513003666",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{Kobsa:2013:CJV,
  author =       "Alfred Kobsa and Rishab Nithyanand and Gene Tsudik and
                 Ersin Uzun",
  title =        "Can {Jannie} verify? {Usability} of display-equipped
                 {RFID} tags for security purposes",
  journal =      j-J-COMP-SECUR,
  volume =       "21",
  number =       "3",
  pages =        "347--370",
  month =        "????",
  year =         "2013",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130470",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:52 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Krenn:2013:AWI,
  author =       "Daniel Krenn",
  title =        "Analysis of the width-$w$ non-adjacent form in
                 conjunction with hyperelliptic curve cryptography and
                 with lattices",
  journal =      j-THEOR-COMP-SCI,
  volume =       "491",
  number =       "??",
  pages =        "47--70",
  day =          "17",
  month =        jun,
  year =         "2013",
  CODEN =        "TCSCDI",
  DOI =          "https://doi.org/10.1016/j.tcs.2013.04.006",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Mon Jul 8 16:38:46 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2010.bib;
                 http://www.sciencedirect.com/science/journal/03043975",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0304397513002685",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{Krenn:2013:CCR,
  author =       "Stephan Krenn and Krzysztof Pietrzak and Akshay
                 Wadia",
  title =        "A Counterexample to the Chain Rule for Conditional
                 {HILL} Entropy",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7785",
  pages =        "23--39",
  year =         "2013",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-36594-2_2",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 21 08:32:49 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_2/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-36594-2",
  book-URL =     "http://www.springerlink.com/content/978-3-642-36594-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Kupcu:2013:DTT,
  author =       "Alptekin K{\"u}p{\c{c}}{\"u}",
  title =        "Distributing trusted third parties",
  journal =      j-SIGACT,
  volume =       "44",
  number =       "2",
  pages =        "92--112",
  month =        jun,
  year =         "2013",
  CODEN =        "SIGNDM",
  DOI =          "https://doi.org/10.1145/2491533.2491553",
  ISSN =         "0163-5700 (print), 1943-5827 (electronic)",
  bibdate =      "Mon Dec 2 17:43:04 MST 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib",
  abstract =     "Trusted Third Parties (TTPs) are widely employed in
                 various scenarios for providing fairness guarantees
                 (e.g., in fair exchange or e-commerce protocols,
                 including secure two-party computation), for
                 distributing secrets (e.g., in authentication or
                 secret-sharing protocols, as well as group signatures),
                 and for creating trust (e.g., as certificate
                 authorities). Such wide use of TTPs, as well as the
                 trust requirement that is put on them make them a prime
                 target for distributed systems and cryptography
                 research. There are some well-known and proven
                 solutions to the problem of distributing the trust put
                 on TTPs: Byzantine agreement or secure multi-party
                 computation techniques can be employed to distribute
                 the job of any TTP to multiple parties, tolerating up
                 to half or one-third of those parties being malicious.
                 Such techniques are not widely-employed in practice
                 possibly due to their quadratic complexity or
                 inter-operation requirements. This brings up the
                 question of distributing TTPs in a much more efficient
                 way, possibly via using autonomous agents, who do not
                 directly communicate with each other. In this paper, we
                 present various known techniques for distributing the
                 trust put on TTPs. Then, we concentrate on using
                 multiple autonomous parties, who do not communicate
                 with each other at all, to realize a single TTP. We
                 discuss the role of synchrony in such attempts, and
                 conclude with some open questions.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGACT News",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J697",
}

@Article{Kushner:2013:RSS,
  author =       "David Kushner",
  title =        "The real story of {Stuxnet}",
  journal =      j-IEEE-SPECTRUM,
  volume =       "50",
  number =       "3",
  pages =        "48--53",
  month =        mar,
  year =         "2013",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.2013.6471059",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 07:02:09 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Companies; Computer hacking; Computer security;
                 Computer viruses; Cryptography; invasive software;
                 Iran; Kaspersky Laboratory; Malware; malware;
                 nuclear-fuel enrichment program; stuxnet",
}

@Article{Lai:2013:SAS,
  author =       "Chengzhe Lai and Hui Li and Rongxing Lu and Xuemin
                 (Sherman) Shen",
  title =        "{SE-AKA}: a secure and efficient group authentication
                 and key agreement protocol for {LTE} networks",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "57",
  number =       "17",
  pages =        "3492--3510",
  day =          "9",
  month =        dec,
  year =         "2013",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Mon Nov 4 10:15:54 MST 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/13891286",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1389128613002570",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286",
}

@Article{Lamonica:2013:LDQ,
  author =       "M. Lamonica",
  title =        "Long-distance quantum cryptography [News]",
  journal =      j-IEEE-SPECTRUM,
  volume =       "50",
  number =       "8",
  pages =        "12--13",
  month =        aug,
  year =         "2013",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.2013.6565546",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 07:02:09 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Cryptography; encrypt data; long-distance quantum
                 cryptography; point-to-point connection security;
                 quantum cryptography; Quantum physics",
}

@Misc{Langley:2013:EDC,
  author =       "Adam Langley",
  title =        "Enhancing digital certificate security",
  howpublished = "Web site.",
  year =         "2013",
  bibdate =      "Mon Mar 09 15:48:08 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://googleonlinesecurity.blogspot.com/2013/01/enhancing-digital-certificate-security.html",
  acknowledgement = ack-nhfb,
  remark =       "Cite in \cite[reference 52]{Schneier:2015:SWC}.",
}

@Article{Lasc:2013:DDA,
  author =       "Ioana Lasc and Reiner Dojen and Tom Coffey",
  title =        "On the detection of desynchronisation attacks against
                 security protocols that use dynamic shared secrets",
  journal =      j-COMPUT-SECUR,
  volume =       "32",
  number =       "??",
  pages =        "115--129",
  month =        feb,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:31 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812001678",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lee:2013:CCM,
  author =       "Che-Wei Lee and Wen-Hsiang Tsai",
  title =        "A covert communication method via spreadsheets by
                 secret sharing with a self-authentication capability",
  journal =      j-J-SYST-SOFTW,
  volume =       "86",
  number =       "2",
  pages =        "324--334",
  month =        feb,
  year =         "2013",
  CODEN =        "JSSODM",
  DOI =          "https://doi.org/10.1016/j.jss.2012.08.048",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Sat Jan 5 09:05:59 MST 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0164121212002464",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Lei:2013:RSW,
  author =       "Baiying Lei and Insu Song and Shah Atiqur Rahman",
  title =        "Robust and secure watermarking scheme for breath
                 sound",
  journal =      j-J-SYST-SOFTW,
  volume =       "86",
  number =       "6",
  pages =        "1638--1649",
  month =        jun,
  year =         "2013",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Tue May 14 16:09:14 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0164121213000332",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Lerch-Hostalot:2013:LMS,
  author =       "Daniel Lerch-Hostalot and David Meg{\'\i}as",
  title =        "{LSB} matching steganalysis based on patterns of pixel
                 differences and random embedding",
  journal =      j-COMPUT-SECUR,
  volume =       "32",
  number =       "??",
  pages =        "192--206",
  month =        feb,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:31 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812001745",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Leva:2013:ABN,
  author =       "Tapio Lev{\"a} and Miika Komu and Ari Ker{\"a}nen and
                 Sakari Luukkainen",
  title =        "Adoption barriers of network layer protocols: the case
                 of host identity protocol",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "57",
  number =       "10",
  pages =        "2218--2232",
  day =          "5",
  month =        jul,
  year =         "2013",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Mon Jul 1 19:17:17 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/13891286",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1389128613000480",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286",
}

@Article{Li:2013:EAF,
  author =       "Celia Li and Uyen Trang Nguyen and Hoang Lan Nguyen
                 and Nurul Huda",
  title =        "Efficient authentication for fast handover in wireless
                 mesh networks",
  journal =      j-COMPUT-SECUR,
  volume =       "37",
  number =       "??",
  pages =        "124--142",
  month =        sep,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:33 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813000916",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Li:2013:ESC,
  author =       "Xiong Li and Jianwei Niu and Muhammad Khurram Khan and
                 Junguo Liao",
  title =        "An enhanced smart card based remote user password
                 authentication scheme",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "36",
  number =       "5",
  pages =        "1365--1371",
  month =        sep,
  year =         "2013",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Wed Jan 28 15:44:42 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804513000726",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Netw. Comput. Appl.",
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Li:2013:SSS,
  author =       "Ming Li and Shucheng Yu and Yao Zheng and Kui Ren and
                 Wenjing Lou",
  title =        "Scalable and Secure Sharing of Personal Health Records
                 in Cloud Computing Using Attribute-Based Encryption",
  journal =      j-IEEE-TRANS-PAR-DIST-SYS,
  volume =       "24",
  number =       "1",
  pages =        "131--143",
  month =        jan,
  year =         "2013",
  CODEN =        "ITDSEO",
  DOI =          "https://doi.org/10.1109/TPDS.2012.97",
  ISSN =         "1045-9219",
  ISSN-L =       "1045-9219",
  bibdate =      "Wed May 1 08:02:21 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranspardistsys.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Parallel and Distributed
                 Systems",
  journal-URL =  "http://www.computer.org/tpds/archives.htm",
}

@Article{Liao:2013:NMS,
  author =       "Yi-Pin Liao and Chih-Ming Hsiao",
  title =        "A novel multi-server remote user authentication scheme
                 using self-certified public keys for mobile clients",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "29",
  number =       "3",
  pages =        "886--900",
  month =        mar,
  year =         "2013",
  CODEN =        "FGSEVI",
  DOI =          "https://doi.org/10.1016/j.future.2012.03.017",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Fri Nov 30 11:11:37 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib;
                 http://www.sciencedirect.com/science/journal/0167739X",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X12000829",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Liskiewicz:2013:GBS,
  author =       "Maciej Li{\'s}kiewicz and R{\"u}diger Reischuk and
                 Ulrich W{\"o}lfel",
  title =        "Grey-box steganography",
  journal =      j-THEOR-COMP-SCI,
  volume =       "505",
  number =       "??",
  pages =        "27--41",
  day =          "23",
  month =        sep,
  year =         "2013",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Mon Oct 7 09:23:18 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2010.bib;
                 http://www.sciencedirect.com/science/journal/03043975",
  URL =          "http://www.sciencedirect.com/science/article/pii/S030439751200309X",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{Liu:2013:GPB,
  author =       "Hong Liu and Huansheng Ning and Yan Zhang and Daojing
                 He and Qingxu Xiong and Laurence T. Yang",
  title =        "Grouping-Proofs-Based Authentication Protocol for
                 Distributed {RFID} Systems",
  journal =      j-IEEE-TRANS-PAR-DIST-SYS,
  volume =       "24",
  number =       "7",
  pages =        "1321--1330",
  month =        jul,
  year =         "2013",
  CODEN =        "ITDSEO",
  DOI =          "https://doi.org/10.1109/TPDS.2012.218",
  ISSN =         "1045-9219",
  ISSN-L =       "1045-9219",
  bibdate =      "Fri Jun 21 08:51:27 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranspardistsys.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Parallel and Distributed
                 Systems",
  journal-URL =  "http://www.computer.org/tpds/archives.htm",
}

@Article{Liu:2013:IAG,
  author =       "Yining Liu and Chi Cheng and Jianyu Cao and Tao
                 Jiang",
  title =        "An Improved Authenticated Group Key Transfer Protocol
                 Based on Secret Sharing",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "62",
  number =       "11",
  pages =        "2335--2336",
  month =        nov,
  year =         "2013",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2012.216",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Fri Nov 15 08:54:34 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Liu:2013:PAE,
  author =       "Bin Liu and Bevan M. Baas",
  title =        "Parallel {AES} Encryption Engines for Many-Core
                 Processor Arrays",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "62",
  number =       "3",
  pages =        "536--547",
  month =        mar,
  year =         "2013",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2011.251",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Tue Apr 30 12:26:22 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Liu:2013:SIP,
  author =       "Dongxi Liu and Shenlu Wang",
  title =        "Special Issue Papers: Nonlinear order preserving index
                 for encrypted database query in service cloud
                 environments",
  journal =      j-CCPE,
  volume =       "25",
  number =       "13",
  pages =        "1967--1984",
  day =          "10",
  month =        sep,
  year =         "2013",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.2992",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Tue Dec 3 10:37:32 MST 2013",
  bibsource =    "http://www.interscience.wiley.com/jpages/1532-0626;
                 https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "25 Jan 2013",
}

@Article{Liu:2013:TIE,
  author =       "Hongjun Liu and Xingyuan Wang",
  title =        "Triple-image encryption scheme based on one-time key
                 stream generated by chaos and plain images",
  journal =      j-J-SYST-SOFTW,
  volume =       "86",
  number =       "3",
  pages =        "826--834",
  month =        mar,
  year =         "2013",
  CODEN =        "JSSODM",
  DOI =          "https://doi.org/10.1016/j.jss.2012.11.026",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Wed Jan 23 08:33:00 MST 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0164121212003196",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Louchene:2013:WMR,
  author =       "Ahmed Louchene and Ammar Dahmani",
  title =        "Watermarking Method Resilient to {RST} and Compression
                 Based on {DWT}, {LPM} and Phase Correlation",
  journal =      j-INT-J-COMPUT-APPL,
  volume =       "35",
  number =       "1",
  pages =        "36--43",
  year =         "2013",
  DOI =          "https://doi.org/10.2316/Journal.202.2013.1.202-3503",
  ISSN =         "1206-212X (print), 1925-7074 (electronic)",
  ISSN-L =       "1206-212X",
  bibdate =      "Sat Apr 21 17:28:32 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijca.bib",
  URL =          "https://www.tandfonline.com/doi/full/10.2316/Journal.202.2013.1.202-3503",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Computer Applications",
  journal-URL =  "https://www.tandfonline.com/loi/tjca20",
  online-date =  "11 Jul 2015",
}

@Article{Lu:2013:CSA,
  author =       "Linzhen Lu and Shaozhen Chen",
  title =        "A compress slide attack on the full {GOST} block
                 cipher",
  journal =      j-INFO-PROC-LETT,
  volume =       "113",
  number =       "17",
  pages =        "634--639",
  day =          "30",
  month =        aug,
  year =         "2013",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Mon Jul 1 18:58:27 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019013001543",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Lui:2013:CBS,
  author =       "Oi-Yan Lui and Kwok-Wo Wong",
  title =        "Chaos-based selective encryption for {H.264\slash
                 AVC}",
  journal =      j-J-SYST-SOFTW,
  volume =       "86",
  number =       "12",
  pages =        "3183--3192",
  month =        dec,
  year =         "2013",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Mon Nov 4 10:35:56 MST 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0164121213001994",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Lv:2013:NTP,
  author =       "Chao Lv and Maode Ma and Hui Li and Jianfeng Ma and
                 Yaoyu Zhang",
  title =        "An novel three-party authenticated key exchange
                 protocol using one-time key",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "36",
  number =       "1",
  pages =        "498--503",
  month =        jan,
  year =         "2013",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Wed Jan 28 15:44:29 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804512000999",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Netw. Comput. Appl.",
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Ma:2013:PVP,
  author =       "Chris Y. T. Ma and David K. Y. Yau and Nung Kwan Yip
                 and Nageswara S. V. Rao",
  title =        "Privacy vulnerability of published anonymous mobility
                 traces",
  journal =      j-IEEE-TRANS-NETWORKING,
  volume =       "21",
  number =       "3",
  pages =        "720--733",
  month =        jun,
  year =         "2013",
  CODEN =        "IEANEP",
  DOI =          "https://doi.org/10.1109/TNET.2012.2208983",
  ISSN =         "1063-6692 (print), 1558-2566 (electronic)",
  ISSN-L =       "1063-6692",
  bibdate =      "Fri Feb 7 19:18:15 MST 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
  abstract =     "Mobility traces of people and vehicles have been
                 collected and published to assist the design and
                 evaluation of mobile networks, such as large-scale
                 urban sensing networks. Although the published traces
                 are often made anonymous in that the true identities of
                 nodes are replaced by random identifiers, the privacy
                 concern remains. This is because in real life, nodes
                 are open to observations in public spaces, or they may
                 voluntarily or inadvertently disclose partial knowledge
                 of their whereabouts. Thus, snapshots of nodes'
                 location information can be learned by interested third
                 parties, e.g., directly through chance/engineered
                 meetings between the nodes and their observers, or
                 indirectly through casual conversations or other
                 information sources about people. In this paper, we
                 investigate how an adversary, when equipped with a
                 small amount of the snapshot information termed as side
                 information, can infer an extended view of the
                 whereabouts of a victim node appearing in an anonymous
                 trace. Our results quantify the loss of victim nodes'
                 privacy as a function of the nodal mobility, the
                 inference strategies of adversaries, and any noise that
                 may appear in the trace or the side information.
                 Generally, our results indicate that the privacy
                 concern is significant in that a relatively small
                 amount of side information is sufficient for the
                 adversary to infer the true identity (either uniquely
                 or with high probability) of a victim in a set of
                 anonymous traces. For instance, an adversary is able to
                 identify the trace of 30\%-50\% of the victims when she
                 has collected 10 pieces of side information about a
                 victim.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE\slash ACM Transactions on Networking",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J771",
}

@Article{Mahmoody:2013:LEZ,
  author =       "Mohammad Mahmoody and David Xiao",
  title =        "Languages with Efficient Zero-Knowledge {PCPs} are in
                 {SZK}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7785",
  pages =        "297--314",
  year =         "2013",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-36594-2_17",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 21 08:32:49 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_17/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-36594-2",
  book-URL =     "http://www.springerlink.com/content/978-3-642-36594-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Maitra:2013:DSM,
  author =       "Subhashis Maitra and Amitabha Sinha",
  title =        "Design and simulation of {MAC} unit using
                 combinational circuit and adder",
  journal =      j-COMP-ARCH-NEWS,
  volume =       "41",
  number =       "5",
  pages =        "25--33",
  month =        dec,
  year =         "2013",
  CODEN =        "CANED2",
  DOI =          "https://doi.org/10.1145/2641361.2641365",
  ISSN =         "0163-5964 (print), 1943-5851 (electronic)",
  ISSN-L =       "0163-5964",
  bibdate =      "Mon Aug 18 17:12:43 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/fparith.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigarch.bib",
  abstract =     "Hardware and timing complexities of MAC unit to
                 perform arithmetic operation like addition or
                 multiplication especially in the field of Digital
                 Signal Processing (DSP) or Elliptic Curve Cryptography
                 (ECC) are the major issues to the designer. The
                 multiplication operation is essential and abundant in
                 DSP Applications. In order to achieve maximum
                 implementation efficiency and timing performance,
                 designing a DSP systems is critical and frequently
                 presents a significant challenge to hardware engineers.
                 There are certain multipliers that simplify this
                 challenge by abstracting away FPGA device specifics,
                 while maintaining the required maximum performance and
                 resource efficiency. These multipliers are able to
                 perform parallel multiplication and hence constant
                 coefficient multiplication, both with differing
                 implementation styles. Again with the aid of
                 instantaneous resource estimation, hardware engineers
                 can rapidly select the optimal solution for their
                 system. The latest additions to the IP provide fine
                 control over the latency using the concept of
                 pipelining of the multipliers that are purely
                 combinatorial to be fully pipelined. Here a new
                 compensation method that reduces both the hardware and
                 timing complexities of the multiplier used for DSP
                 application or ECC application has been proposed. The
                 design of the MAC unit based on the proposed
                 compensation method has been dealt here properly using
                 Xilinx 13.2 and compared with array multiplier, Booth
                 multiplier and Vedic multiplier to show its novelty
                 over them. The hardware complexity is reduced to about
                 60\% of the original multiplier. Design results show
                 that the proposed architecture has lower hardware
                 overhead, lower error and fast operating speed as
                 compared with array, Booth and Vedic multiplier.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGARCH Computer Architecture News",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J89",
}

@Article{Maitra:2013:HEM,
  author =       "Subhashis Maitra and Amitabha Sinha",
  title =        "High efficiency {MAC} unit used in digital signal
                 processing and elliptic curve cryptography",
  journal =      j-COMP-ARCH-NEWS,
  volume =       "41",
  number =       "4",
  pages =        "1--7",
  month =        sep,
  year =         "2013",
  CODEN =        "CANED2",
  DOI =          "https://doi.org/10.1145/2560488.2560490",
  ISSN =         "0163-5964 (print), 1943-5851 (electronic)",
  ISSN-L =       "0163-5964",
  bibdate =      "Thu Jan 2 17:25:55 MST 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigarch.bib",
  abstract =     "Computational complexities of different Algorithms to
                 enhance the speed of response of digital signal
                 processor and different cryptographic analysis are the
                 important issues for the current researcher.
                 Computational complexities means hardware complexities
                 and timing complexities. Both the complexities depend
                 on the design of the software and hardware. Arithmetic
                 computation like addition and multiplication are the
                 major parts in designing processor that helps to
                 improve the efficiency and to reduce complexities.
                 Hence the design of a multiplier unit is the major
                 issue to the current researchers. There are different
                 multiplication algorithms discussed in different
                 research materials. In this paper, a new algorithm for
                 multiplication has been proposed to enhance the speed
                 of operation and to reduce hardware complexities. Also
                 a comparative study of the proposed algorithm over
                 different existing algorithms has been explained here
                 along with VHDL model of the proposed architecture.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGARCH Computer Architecture News",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J89",
}

@Article{Maitra:2013:HPM,
  author =       "Subhashis Maitra and Amitabha Sinha",
  title =        "High performance {MAC} unit for {DSP} and
                 cryptographic applications",
  journal =      j-COMP-ARCH-NEWS,
  volume =       "41",
  number =       "2",
  pages =        "47--55",
  month =        may,
  year =         "2013",
  CODEN =        "CANED2",
  DOI =          "https://doi.org/10.1145/2490302.2490311",
  ISSN =         "0163-5964 (print), 1943-5851 (electronic)",
  ISSN-L =       "0163-5964",
  bibdate =      "Sat Jun 1 11:00:26 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigarch.bib",
  abstract =     "Multiplication and addition are the basic arithmetic
                 operation used in Digital Signal Processing (DSP) for
                 coefficient multiplication, scalar point multiplication
                 in Elliptic Curve Cryptography (ECC) and in other
                 fields. Multiplications are basically a shift and add
                 operation. However, there are many different variations
                 on how to do it. Some are more suitable to implement on
                 FPGA than others. However time complexities and
                 hardware complexities are the major issues in designing
                 a multiplier unit. There are different multiplication
                 algorithms in current technology. Hardware complexities
                 in some design are more than time complexities whereas
                 in some other design time complexities are more.
                 However there must be a tradeoff between these two
                 types of methodology. This paper will discuss a brief
                 idea how a tradeoff can be achieved. Experimental
                 results that have discussed here and the architecture
                 based on the proposed algorithm shows it's novelty.
                 Applications of the proposed algorithm on DSP and ECC
                 have been dealt here clearly.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGARCH Computer Architecture News",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J89",
}

@Article{Maity:2013:CRS,
  author =       "Santi P. Maity and Seba Maity and Jaya Sil and Claude
                 Delpha",
  title =        "Collusion resilient spread spectrum watermarking in
                 {$M$}-band wavelets using {GA}-fuzzy hybridization",
  journal =      j-J-SYST-SOFTW,
  volume =       "86",
  number =       "1",
  pages =        "47--59",
  month =        jan,
  year =         "2013",
  CODEN =        "JSSODM",
  DOI =          "https://doi.org/10.1016/j.jss.2012.06.057",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Fri Nov 9 12:50:20 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0164121212001938",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Malkin:2013:SCB,
  author =       "Tal Malkin",
  title =        "Secure Computation for Big Data",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7785",
  pages =        "355--355",
  year =         "2013",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-36594-2_20",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 21 08:32:49 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
  URL =          "http://link.springer.com/accesspage/chapter/10.1007/978-3-642-36594-2_20?coverImageUrl=/static/0.8699/sites/link/images/abstract_cover_placeholder.png",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-36594-2",
  book-URL =     "http://www.springerlink.com/content/978-3-642-36594-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Malone:2013:MOD,
  author =       "C. V. Malone and E. J. Barkie and B. L. Fletcher and
                 N. Wei and A. Keren and A. Wyskida",
  title =        "{Mobile Optimized Digital Identity (MODI)}: A
                 framework for easier digital certificate use",
  journal =      j-IBM-JRD,
  volume =       "57",
  number =       "6",
  pages =        "9:1--9:11",
  month =        nov # "--" # dec,
  year =         "2013",
  CODEN =        "IBMJAE",
  DOI =          "https://doi.org/10.1147/JRD.2013.2283755",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  ISSN-L =       "0018-8646",
  bibdate =      "Sat Feb 15 16:52:47 MST 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ibmjrd.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IBM Journal of Research and Development",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5288520",
}

@Article{Mangard:2013:KSL,
  author =       "Stefan Mangard",
  title =        "Keeping Secrets on Low-Cost Chips",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "4",
  pages =        "75--77",
  year =         "2013",
  DOI =          "https://doi.org/10.1109/MSP.2013.88",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 12 11:34:33 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
}

@Article{Manshaei:2013:GTM,
  author =       "Mohammad Hossein Manshaei and Quanyan Zhu and Tansu
                 Alpcan and Tamer Bacsar and Jean-Pierre Hubaux",
  title =        "Game theory meets network security and privacy",
  journal =      j-COMP-SURV,
  volume =       "45",
  number =       "3",
  pages =        "25:1--25:??",
  month =        jun,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2480741.2480742",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jul 1 18:21:14 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "This survey provides a structured and comprehensive
                 overview of research on security and privacy in
                 computer and communication networks that use
                 game-theoretic approaches. We present a selected set of
                 works to highlight the application of game theory in
                 addressing different forms of security and privacy
                 problems in computer networks and mobile applications.
                 We organize the presented works in six main categories:
                 security of the physical and MAC layers, security of
                 self-organizing networks, intrusion detection systems,
                 anonymity and privacy, economics of network security,
                 and cryptography. In each category, we identify
                 security problems, players, and game models. We
                 summarize the main results of selected works, such as
                 equilibrium analysis and security mechanism designs. In
                 addition, we provide a discussion on the advantages,
                 drawbacks, and future direction of using game theory in
                 this field. In this survey, our goal is to instill in
                 the reader an enhanced understanding of different
                 research approaches in applying game-theoretic methods
                 to network security. This survey can also help
                 researchers from various fields develop game-theoretic
                 solutions to current and emerging security problems in
                 computer networking.",
  acknowledgement = ack-nhfb,
  articleno =    "25",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Marconato:2013:VLC,
  author =       "G. Vache Marconato and M. Ka{\^a}niche and V.
                 Nicomette",
  title =        "A Vulnerability Life Cycle-Based Security Modeling and
                 Evaluation Approach",
  journal =      j-COMP-J,
  volume =       "56",
  number =       "4",
  pages =        "422--439",
  month =        apr,
  year =         "2013",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxs112",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Apr 1 08:36:50 MDT 2013",
  bibsource =    "http://comjnl.oxfordjournals.org/content/56/4.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/56/4/422.full.pdf+html",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "September 3, 2012",
}

@Article{Martinez-Julia:2013:BSI,
  author =       "Pedro Martinez-Julia and Antonio F. Skarmeta",
  title =        "Beyond the separation of identifier and locator:
                 Building an identity-based overlay network architecture
                 for the {Future Internet}",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "57",
  number =       "10",
  pages =        "2280--2300",
  day =          "5",
  month =        jul,
  year =         "2013",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Mon Jul 1 19:17:17 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.sciencedirect.com/science/journal/13891286",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1389128613000066",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286",
}

@Article{Mazurczyk:2013:FWS,
  author =       "W. Mazurczyk and K. Szczypiorski and J. Lubacz",
  title =        "Four ways to smuggle messages through {Internet}
                 services",
  journal =      j-IEEE-SPECTRUM,
  volume =       "50",
  number =       "11",
  pages =        "42--45",
  month =        nov,
  year =         "2013",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.2013.6655839",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 07:02:09 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Cryptography; custom-made software; Digital audio
                 players; dispatch decoding; dispatch encoding;
                 government policies; IEEE 802.11 Standards; Information
                 analysis; Internet; Internet services; message
                 authentication; message smuggling; national security;
                 Protocols; public Websites; Russian Foreign
                 Intelligence Service; secret agents; spies; US
                 Department of Justice; US policies; US programs; US
                 residents; Web sites",
}

@Article{Mazurczyk:2013:VSD,
  author =       "Wojciech Mazurczyk",
  title =        "{VoIP} steganography and its detection --- a survey",
  journal =      j-COMP-SURV,
  volume =       "46",
  number =       "2",
  pages =        "20:1--20:??",
  month =        nov,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2543581.2543587",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Feb 6 07:35:29 MST 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "Steganography is an ancient art that encompasses
                 various techniques of information hiding, the aim of
                 which is to embed secret information into a carrier
                 message. Steganographic methods are usually aimed at
                 hiding the very existence of the communication. Due to
                 the rise in popularity of IP telephony, together with
                 the large volume of data and variety of protocols
                 involved, it is currently attracting the attention of
                 the research community as a perfect carrier for
                 steganographic purposes. This article is a first survey
                 of the existing Voice over IP (VoIP) steganography
                 methods and their countermeasures.",
  acknowledgement = ack-nhfb,
  articleno =    "20",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@TechReport{Menezes:2013:IPB,
  author =       "Alfred Menezes",
  title =        "An Introduction to Pairing-Based Cryptography",
  type =         "Report",
  institution =  "Department of Mathematics, University of Waterloo",
  address =      "Waterloo, ON, Canada",
  pages =        "19",
  day =          "27",
  month =        oct,
  year =         "2013",
  bibdate =      "Fri Feb 15 10:45:20 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.math.uwaterloo.ca/~ajmeneze/publications/pairings.pdf",
  abstract =     "Bilinear pairings have been used to design ingenious
                 protocols for such tasks as one-round three-party key
                 agreement, identity-based encryption, and aggregate
                 signatures. Suitable bilinear pairings can be
                 constructed from the Tate pairing for specially chosen
                 elliptic curves. This article gives an introduction to
                 the protocols, Tate pairing computation, and curve
                 selection.",
  acknowledgement = ack-nhfb,
}

@Misc{Menn:2013:ESC,
  author =       "Joseph Menn",
  title =        "Exclusive: Secret contract tied {NSA} and security
                 industry pioneer",
  howpublished = "Reuters",
  day =          "13",
  month =        dec,
  year =         "2013",
  bibdate =      "Mon Mar 09 15:52:09 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  remark =       "Cite in \cite[reference 56]{Schneier:2015:SWC}.",
}

@Article{Meshram:2013:IBC,
  author =       "Chandrashekhar Meshram and Suchitra A. Meshram",
  title =        "An identity-based cryptographic model for discrete
                 logarithm and integer factoring based cryptosystem",
  journal =      j-INFO-PROC-LETT,
  volume =       "113",
  number =       "10--11",
  pages =        "375--380",
  month =        may # "\slash " # jun,
  year =         "2013",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Tue Apr 16 06:15:25 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019013000550",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Mone:2013:FPE,
  author =       "Gregory Mone",
  title =        "Future-proof encryption",
  journal =      j-CACM,
  volume =       "56",
  number =       "11",
  pages =        "12--14",
  month =        nov,
  year =         "2013",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2524713.2524718",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Dec 2 16:21:27 MST 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cacm2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "Researchers are relying on quantum mechanics to
                 generate unhackable methods of communication.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Moreno:2013:NIP,
  author =       "Carlos Moreno and Sebastian Fischmeister and M. Anwar
                 Hasan",
  title =        "Non-intrusive program tracing and debugging of
                 deployed embedded systems through side-channel
                 analysis",
  journal =      j-SIGPLAN,
  volume =       "48",
  number =       "5",
  pages =        "77--88",
  month =        may,
  year =         "2013",
  CODEN =        "SINODQ",
  DOI =          "https://doi.org/10.1145/2499369.2465570",
  ISSN =         "0362-1340 (print), 1523-2867 (print), 1558-1160
                 (electronic)",
  ISSN-L =       "0362-1340",
  bibdate =      "Mon Jul 1 17:15:32 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigplan2010.bib",
  abstract =     "One of the hardest aspects of embedded software
                 development is that of debugging, especially when
                 faulty behavior is observed at the production or
                 deployment stage. Non-intrusive observation of the
                 system's behavior is often insufficient to infer the
                 cause of the problem and identify and fix the bug. In
                 this work, we present a novel approach for
                 non-intrusive program tracing aimed at assisting
                 developers in the task of debugging embedded systems at
                 deployment or production stage, where standard
                 debugging tools are usually no longer available. The
                 technique is rooted in cryptography, in particular the
                 area of side-channel attacks. Our proposed technique
                 expands the scope of these cryptographic techniques so
                 that we recover the sequence of operations from power
                 consumption observations (power traces). To this end,
                 we use digital signal processing techniques (in
                 particular, spectral analysis) combined with pattern
                 recognition techniques to determine blocks of source
                 code being executed given the observed power trace. One
                 of the important highlights of our contribution is the
                 fact that the system works on a standard PC, capturing
                 the power traces through the recording input of the
                 sound card. Experimental results are presented and
                 confirm that the approach is viable.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGPLAN Notices",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J706",
  remark =       "GPCE '12 conference proceedings.",
}

@Article{Mosca:2013:QKD,
  author =       "Michele Mosca and Douglas Stebila and Berkant
                 Ustao{\u{g}}lu",
  title =        "Quantum Key Distribution in the Classical
                 Authenticated Key Exchange Framework",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7932",
  pages =        "136--154",
  year =         "2013",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-38616-9_9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Mar 21 08:01:29 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-38616-9_9/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-38616-9",
  book-URL =     "http://www.springerlink.com/content/978-3-642-38616-9",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Mou:2013:CBC,
  author =       "Luntian Mou and Tiejun Huang and Yonghong Tian and
                 Menglin Jiang and Wen Gao",
  title =        "Content-based copy detection through multimodal
                 feature representation and temporal pyramid matching",
  journal =      j-TOMCCAP,
  volume =       "10",
  number =       "1",
  pages =        "5:1--5:??",
  month =        dec,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2542205.2542208",
  ISSN =         "1551-6857 (print), 1551-6865 (electronic)",
  ISSN-L =       "1551-6857",
  bibdate =      "Thu Mar 13 07:37:53 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tomccap/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/tomccap.bib",
  abstract =     "Content-based copy detection (CBCD) is drawing
                 increasing attention as an alternative technology to
                 watermarking for video identification and copyright
                 protection. In this article, we present a comprehensive
                 method to detect copies that are subjected to
                 complicated transformations. A multimodal feature
                 representation scheme is designed to exploit the
                 complementarity of audio features, global and local
                 visual features so that optimal overall robustness to a
                 wide range of complicated modifications can be
                 achieved. Meanwhile, a temporal pyramid matching
                 algorithm is proposed to assemble frame-level
                 similarity search results into sequence-level matching
                 results through similarity evaluation over multiple
                 temporal granularities. Additionally, inverted indexing
                 and locality sensitive hashing (LSH) are also adopted
                 to speed up similarity search. Experimental results
                 over benchmarking datasets of TRECVID 2010 and 2009
                 demonstrate that the proposed method outperforms other
                 methods for most transformations in terms of copy
                 detection accuracy. The evaluation results also suggest
                 that our method can achieve competitive copy
                 localization preciseness.",
  acknowledgement = ack-nhfb,
  articleno =    "5",
  fjournal =     "ACM Transactions on Multimedia Computing,
                 Communications, and Applications",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J961",
}

@Article{Myers:2013:BBC,
  author =       "Steven Myers and Mona Sergi and abhi shelat",
  title =        "Black-box construction of a more than non-malleable
                 {CCA1} encryption scheme from plaintext awareness",
  journal =      j-J-COMP-SECUR,
  volume =       "21",
  number =       "5",
  pages =        "721--748",
  month =        "????",
  year =         "2013",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130485",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:59 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Naranjo:2013:FDA,
  author =       "J. A. M. Naranjo and F. Cores and L. G. Casado and F.
                 Guirado",
  title =        "Fully distributed authentication with locality
                 exploitation for the {CoDiP2P} peer-to-peer computing
                 platform",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "65",
  number =       "3",
  pages =        "1037--1049",
  month =        sep,
  year =         "2013",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-012-0842-2",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Sat Feb 8 10:21:44 MST 2014",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0920-8542&volume=65&issue=3;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  URL =          "http://link.springer.com/article/10.1007/s11227-012-0842-2",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Article{Narasimhan:2013:HTD,
  author =       "Seetharam Narasimhan and Dongdong Du and Rajat Subhra
                 Chakraborty and Somnath Paul and Francis G. Wolff and
                 Christos A. Papachristou and Kaushik Roy and Swarup
                 Bhunia",
  title =        "Hardware {Trojan} Detection by Multiple-Parameter
                 Side-Channel Analysis",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "62",
  number =       "11",
  pages =        "2183--2195",
  month =        nov,
  year =         "2013",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2012.200",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Fri Nov 15 08:54:34 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Naskar:2013:GTL,
  author =       "Ruchira Naskar and Rajat Subhra Chakraborty",
  title =        "A generalized tamper localization approach for
                 reversible watermarking algorithms",
  journal =      j-TOMCCAP,
  volume =       "9",
  number =       "3",
  pages =        "19:1--19:??",
  month =        jun,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2487268.2487272",
  ISSN =         "1551-6857 (print), 1551-6865 (electronic)",
  ISSN-L =       "1551-6857",
  bibdate =      "Thu Mar 13 07:37:50 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tomccap/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tomccap.bib",
  abstract =     "In general reversible watermarking algorithms, the
                 convention is to reject the entire cover image at the
                 receiver end if it fails authentication, since there is
                 no way to detect the exact locations of tampering. This
                 feature may be exploited by an adversary to bring about
                 a form of DoS attack. Here we provide a solution to
                 this problem in form of a tamper localization mechanism
                 for reversible watermarking algorithms, which allows
                 selective rejection of distorted cover image regions in
                 case of authentication failure, thus avoiding rejection
                 of the complete image. Additionally it minimizes the
                 bandwidth requirement of the communication channel.",
  acknowledgement = ack-nhfb,
  articleno =    "19",
  fjournal =     "ACM Transactions on Multimedia Computing,
                 Communications, and Applications",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J961",
}

@Article{Newell:2013:PCD,
  author =       "Andrew Newell and Jing Dong and Cristina Nita-Rotaru",
  title =        "On the practicality of cryptographic defences against
                 pollution attacks in wireless network coding",
  journal =      j-COMP-SURV,
  volume =       "45",
  number =       "3",
  pages =        "39:1--39:??",
  month =        jun,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2480741.2480756",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jul 1 18:21:14 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "Numerous practical systems based on network coding
                 have been proposed in recent years demonstrating the
                 wide range of benefits of network coding, such as
                 increased throughput, reliability, and energy
                 efficiency. However, network coding systems are
                 inherently vulnerable to a severe attack, known as
                 packet pollution, which presents a key obstacle to the
                 deployment of such systems. Several cryptographic
                 schemes have been proposed to defend against pollution
                 attacks. We conduct a detailed analysis and an
                 experimental evaluation in a realistic wireless network
                 coding setting of a set of representative cryptographic
                 defenses against pollution attacks. Our analysis
                 identifies severe limitations of asymmetric-based
                 schemes, which impose high communication overhead by
                 placing constraints on the basic network coding
                 parameters and high computation overhead by relying on
                 numerous operations over large fields. Our analysis
                 also shows that symmetric cryptographic schemes, while
                 having better performance than asymmetric
                 cryptographic-based schemes, impose prohibitive
                 overhead in the presence of multiple byzantine
                 adversaries. We further evaluate these schemes by using
                 a set of typical network coding system parameters on a
                 realistic topology. Our experimental evaluation shows
                 that all the schemes we compare induce a throughput
                 degradation that negates the performance benefits of
                 network coding in the presence of multiple colluding
                 adversaries.",
  acknowledgement = ack-nhfb,
  articleno =    "39",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Ni:2013:EIB,
  author =       "Liang Ni and Gongliang Chen and Jianhua Li",
  title =        "Escrowable identity-based authenticated key agreement
                 protocol with strong security",
  journal =      j-COMPUT-MATH-APPL,
  volume =       "65",
  number =       "9",
  pages =        "1339--1349",
  month =        may,
  year =         "2013",
  CODEN =        "CMAPDK",
  ISSN =         "0898-1221 (print), 1873-7668 (electronic)",
  ISSN-L =       "0898-1221",
  bibdate =      "Wed Mar 1 21:51:21 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computmathappl2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S089812211200051X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers and Mathematics with Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/08981221",
}

@Article{Nie:2013:CHB,
  author =       "Xuyun Nie and Zhaohu Xu and Johannes Buchmann",
  title =        "Cryptanalysis of Hash-Based Tamed Transformation and
                 Minus Signature Scheme",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7932",
  pages =        "155--164",
  year =         "2013",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-38616-9_10",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Mar 21 08:01:29 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-38616-9_10/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-38616-9",
  book-URL =     "http://www.springerlink.com/content/978-3-642-38616-9",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Nieto:2013:PVC,
  author =       "Juan Gonz{\'a}lez Nieto and Mark Manulis and Bertram
                 Poettering and Jothi Rangasamy and Douglas Stebila",
  title =        "Publicly verifiable ciphertexts",
  journal =      j-J-COMP-SECUR,
  volume =       "21",
  number =       "5",
  pages =        "749--778",
  month =        "????",
  year =         "2013",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130473",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:59 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Misc{NIST:2013:CSS,
  author =       "{NIST}",
  title =        "Cryptographic standards statement",
  howpublished = "National Institute of Standards and Technology",
  month =        sep,
  year =         "2013",
  bibdate =      "Mon Mar 09 15:56:53 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  remark =       "Cite in \cite[reference 61]{Schneier:2015:SWC}.",
}

@Article{Noureddine:2013:AMT,
  author =       "M. Noureddine and R. Bashroush",
  title =        "An authentication model towards cloud federation in
                 the enterprise",
  journal =      j-J-SYST-SOFTW,
  volume =       "86",
  number =       "9",
  pages =        "2269--2275",
  month =        sep,
  year =         "2013",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Tue Sep 3 06:29:11 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0164121212003408",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Pande:2013:SMC,
  author =       "Amit Pande and Prasant Mohapatra and Joseph Zambreno",
  title =        "Securing Multimedia Content Using Joint Compression
                 and Encryption",
  journal =      j-IEEE-MULTIMEDIA,
  volume =       "20",
  number =       "4",
  pages =        "50--61",
  month =        oct # "\slash " # dec,
  year =         "2013",
  CODEN =        "IEMUE4",
  DOI =          "https://doi.org/10.1109/MMUL.2012.29",
  ISSN =         "1070-986X (print), 1941-0166 (electronic)",
  ISSN-L =       "1070-986X",
  bibdate =      "Mon Aug 25 06:43:49 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/datacompression.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeemultimedia.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE MultiMedia",
}

@Article{Pang:2013:IMA,
  author =       "Liaojun Pang and Huixian Li and Qingqi Pei and Yumin
                 Wang",
  title =        "Improvement on {Meshram} et al.'s {ID}-based
                 cryptographic mechanism",
  journal =      j-INFO-PROC-LETT,
  volume =       "113",
  number =       "19--21",
  pages =        "789--792",
  month =        sep # "\slash " # oct,
  year =         "2013",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Mon Sep 9 07:26:45 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019013002081",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Papamanthou:2013:SCC,
  author =       "Charalampos Papamanthou and Elaine Shi and Roberto
                 Tamassia",
  title =        "Signatures of Correct Computation",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7785",
  pages =        "222--242",
  year =         "2013",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-36594-2_13",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 21 08:32:49 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_13/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-36594-2",
  book-URL =     "http://www.springerlink.com/content/978-3-642-36594-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Park:2013:PPM,
  author =       "Y. Park and C. Sur and S. Shin and K.-H. Rhee and C.
                 Seo",
  title =        "A Privacy Preserving Message Delivery Protocol Using
                 Identity-Hidden Index in {VDTNs}",
  journal =      j-J-UCS,
  volume =       "19",
  number =       "16",
  pages =        "2385--??",
  month =        "????",
  year =         "2013",
  CODEN =        "????",
  ISSN =         "0948-695X (print), 0948-6968 (electronic)",
  ISSN-L =       "0948-6968",
  bibdate =      "Thu Mar 13 14:26:22 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jucs.bib",
  URL =          "http://www.jucs.org/jucs_19_16/a_privacy_preserving_message",
  acknowledgement = ack-nhfb,
  fjournal =     "J.UCS: Journal of Universal Computer Science",
  journal-URL =  "http://www.jucs.org/jucs",
}

@Article{Pass:2013:USP,
  author =       "Rafael Pass",
  title =        "Unprovable Security of Perfect {NIZK} and
                 Non-interactive Non-malleable Commitments",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7785",
  pages =        "334--354",
  year =         "2013",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-36594-2_19",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 21 08:32:49 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_19/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-36594-2",
  book-URL =     "http://www.springerlink.com/content/978-3-642-36594-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Pei:2013:ARW,
  author =       "Qingqi Pei and Xiang Wang and Yuan Li and Hui Li",
  title =        "Adaptive reversible watermarking with improved
                 embedding capacity",
  journal =      j-J-SYST-SOFTW,
  volume =       "86",
  number =       "11",
  pages =        "2841--2848",
  month =        nov,
  year =         "2013",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Mon Sep 9 07:54:59 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0164121213001623",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Pereira:2013:SLC,
  author =       "Geovandro C. C. F. Pereira and Mateus A. S. Santos and
                 Bruno T. de Oliveira and Marcos A. {Simplicio, Jr.} and
                 Paulo S. L. M. Barreto and C{\'\i}ntia B. Margi and
                 Wilson V. Ruggiero",
  title =        "{SMSCrypto}: a lightweight cryptographic framework for
                 secure {SMS} transmission",
  journal =      j-J-SYST-SOFTW,
  volume =       "86",
  number =       "3",
  pages =        "698--706",
  month =        mar,
  year =         "2013",
  CODEN =        "JSSODM",
  DOI =          "https://doi.org/10.1016/j.jss.2012.11.004",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Wed Jan 23 08:33:00 MST 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0164121212003056",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Persichetti:2013:SAH,
  author =       "Edoardo Persichetti",
  title =        "Secure and Anonymous Hybrid Encryption from Coding
                 Theory",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7932",
  pages =        "174--187",
  year =         "2013",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-38616-9_12",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Mar 21 08:01:29 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-38616-9_12/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-38616-9",
  book-URL =     "http://www.springerlink.com/content/978-3-642-38616-9",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Phatak:2013:SIN,
  author =       "Dhananjay Phatak and Alan T. Sherman and Nikhil Joshi
                 and Bhushan Sonawane and Vivek G. Relan and Amol
                 Dawalbhakta",
  title =        "Spread Identity: A new dynamic address remapping
                 mechanism for anonymity and {DDoS} defense",
  journal =      j-J-COMP-SECUR,
  volume =       "21",
  number =       "2",
  pages =        "233--281",
  month =        "????",
  year =         "2013",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-2012-0463",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:25:48 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Philippaerts:2013:CMC,
  author =       "Pieter Philippaerts and Yves Younan and Stijn Muylle
                 and Frank Piessens and Sven Lachmund and Thomas
                 Walter",
  title =        "{CPM}: Masking Code Pointers to Prevent Code Injection
                 Attacks",
  journal =      j-TISSEC,
  volume =       "16",
  number =       "1",
  pages =        "1:1--1:??",
  month =        jun,
  year =         "2013",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/2487222.2487223",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Fri Jun 14 19:25:26 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tissec.bib",
  abstract =     "Code Pointer Masking (CPM) is a novel countermeasure
                 against code injection attacks on native code. By
                 enforcing the correct semantics of code pointers, CPM
                 thwarts attacks that modify code pointers to divert the
                 application's control flow. It does not rely on secret
                 values such as stack canaries and protects against
                 attacks that are not addressed by state-of-the-art
                 countermeasures of similar performance. This article
                 reports on two prototype implementations on very
                 distinct processor architectures, showing that the idea
                 behind CPM is portable. The evaluation also shows that
                 the overhead of using our countermeasure is very small
                 and the security benefits are substantial.",
  acknowledgement = ack-nhfb,
  articleno =    "1",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@Article{Picazo-Sanchez:2013:CRS,
  author =       "Pablo Picazo-Sanchez and Lara Ortiz-Martin and Pedro
                 Peris-Lopez",
  title =        "Cryptanalysis of the {RNTS} system",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "65",
  number =       "2",
  pages =        "949--960",
  month =        aug,
  year =         "2013",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-013-0873-3",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Sat Feb 8 11:02:54 MST 2014",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0920-8542&volume=65&issue=2;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  URL =          "http://link.springer.com/article/10.1007/s11227-013-0873-3",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Article{Pongaliur:2013:SNS,
  author =       "Kanthakumar Pongaliur and Li Xiao",
  title =        "Sensor node source privacy and packet recovery under
                 eavesdropping and node compromise attacks",
  journal =      j-TOSN,
  volume =       "9",
  number =       "4",
  pages =        "50:1--50:??",
  month =        jul,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2489253.2489267",
  ISSN =         "1550-4859 (print), 1550-4867 (electronic)",
  ISSN-L =       "1550-4859",
  bibdate =      "Thu Mar 13 07:56:26 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tosn.bib",
  abstract =     "Securing a sensor network poses a variety of problems.
                 Of those, an important one is of providing privacy to
                 the event-detecting sensor node and integrity to the
                 data gathered by the node. Compromised source privacy
                 can inadvertently leak event location. Safeguarding the
                 privacy of the source node is important, as sensor
                 networks hold critical roles in military application,
                 tracking endangered species, etc. Existing techniques
                 in sensor networks use either random walk path or
                 generate fake event packets to make it hard for an
                 adversary to trace back to the source, since encryption
                 alone may not help prevent a traffic analysis attack.
                 In this work, without using traditional
                 overhead-intensive methods, we present a scheme for
                 hiding source information using cryptographic
                 techniques incurring lower overhead. The packet is
                 modified en route by dynamically selected nodes to make
                 it difficult for a malicious entity to trace back the
                 packet to a source node and also to prevent packet
                 spoofing. This is important because the adversary model
                 considers a super-local eavesdropper having the ability
                 to compromise sensor nodes. Additionally, we provide a
                 method for the base station to recover corrupted
                 packets and identify the location of the compromised
                 node. We analyze the ability of our proposed scheme to
                 withstand different attacks and demonstrate its
                 efficiency in terms of overhead and functionality when
                 compared to existing work.",
  acknowledgement = ack-nhfb,
  articleno =    "50",
  fjournal =     "ACM Transactions on Sensor Networks (TOSN)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J981",
}

@Article{Pranata:2013:MDR,
  author =       "Ilung Pranata and Rukshan Athauda and Geoff Skinner",
  title =        "Modeling Decentralized Reputation-Based Trust for
                 Initial Transactions in Digital Environments",
  journal =      j-TOIT,
  volume =       "12",
  number =       "3",
  pages =        "8:1--8:??",
  month =        may,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2461321.2461323",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat May 25 16:26:39 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "The advent of digital environments has generated
                 significant benefits for businesses, organizations,
                 governments, academia and societies in general. Today,
                 over millions of transactions take place on the
                 Internet. Although the widespread use of digital
                 environments has generally provided opportunities for
                 societies, a number of threats have limited their
                 adoption. The de-facto standard today is for
                 certification authorities to authenticate the identity
                 of service providers while trust on the provided
                 services is implied. This approach has certain
                 shortcomings, for example, single point of failure,
                 implied trust rather than explicit trust and others.
                 One approach for minimizing such threats is to
                 introduce an effective and resilient trust mechanism
                 that is capable of determining the trustworthiness of
                 service providers in providing their services.
                 Determining the trustworthiness of services reduces
                 invalid transactions in digital environments and
                 further encourages collaborations. Evaluating
                 trustworthiness of a service provider without any prior
                 historical transactions (i.e. the initial transaction)
                 pose a number of challenging issues. This article
                 presents TIDE --- a decentralized reputation trust
                 mechanism that determines the initial trustworthiness
                 of entities in digital environments. TIDE improves the
                 precision of trust computation by considering raters'
                 feedback, number of transactions, credibility,
                 incentive to encourage raters' participation, strategy
                 for updating raters' category, and safeguards against
                 dynamic personalities. Furthermore, TIDE classifies
                 raters into three categories and promotes the
                 flexibility and customization through its parameters.
                 Evaluation of TIDE against several attack vectors
                 demonstrates its accuracy, robustness and resilience.",
  acknowledgement = ack-nhfb,
  articleno =    "8",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Qu:2013:DPA,
  author =       "Bo Qu and Dawu Gu and Zheng Guo and Junrong Liu",
  title =        "Differential power analysis of stream ciphers with
                 {LFSRs}",
  journal =      j-COMPUT-MATH-APPL,
  volume =       "65",
  number =       "9",
  pages =        "1291--1299",
  month =        may,
  year =         "2013",
  CODEN =        "CMAPDK",
  ISSN =         "0898-1221 (print), 1873-7668 (electronic)",
  ISSN-L =       "0898-1221",
  bibdate =      "Wed Mar 1 21:51:21 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computmathappl2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0898122112001381",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers and Mathematics with Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/08981221",
}

@Article{Ren:2013:DSE,
  author =       "Ling Ren and Xiangyao Yu and Christopher W. Fletcher
                 and Marten van Dijk and Srinivas Devadas",
  title =        "Design space exploration and optimization of path
                 oblivious {RAM} in secure processors",
  journal =      j-COMP-ARCH-NEWS,
  volume =       "41",
  number =       "3",
  pages =        "571--582",
  month =        jun,
  year =         "2013",
  DOI =          "https://doi.org/10.1145/2508148.2485971",
  bibdate =      "Sat Jul 27 06:58:55 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigarch.bib",
  note =         "ICSA '13 conference proceedings.",
  abstract =     "Keeping user data private is a huge problem both in
                 cloud computing and computation outsourcing. One
                 paradigm to achieve data privacy is to use
                 tamper-resistant processors, inside which users'
                 private data is decrypted and computed upon. These
                 processors need to interact with untrusted external
                 memory. Even if we encrypt all data that leaves the
                 trusted processor, however, the address sequence that
                 goes off-chip may still leak information. To prevent
                 this address leakage, the security community has
                 proposed ORAM (Oblivious RAM). ORAM has mainly been
                 explored in server/file settings which assume a vastly
                 different computation model than secure processors. Not
                 surprisingly, na{\"\i}vely applying ORAM to a secure
                 processor setting incurs large performance overheads.
                 In this paper, a recent proposal called Path ORAM is
                 studied. We demonstrate techniques to make Path ORAM
                 practical in a secure processor setting. We introduce
                 background eviction schemes to prevent Path ORAM
                 failure and allow for a performance-driven design space
                 exploration. We propose a concept called super blocks
                 to further improve Path ORAM's performance, and also
                 show an efficient integrity verification scheme for
                 Path ORAM. With our optimizations, Path ORAM overhead
                 drops by 41.8\%, and SPEC benchmark execution time
                 improves by 52.4\% in relation to a baseline
                 configuration. Our work can be used to improve the
                 security level of previous secure processors.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGARCH Computer Architecture News",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J89",
}

@Article{Ren:2013:PPK,
  author =       "Yanli Ren and Shuozhong Wang and Xinpeng Zhang",
  title =        "Practical parallel key-insulated encryption with
                 multiple helper keys",
  journal =      j-COMPUT-MATH-APPL,
  volume =       "65",
  number =       "9",
  pages =        "1403--1412",
  month =        may,
  year =         "2013",
  CODEN =        "CMAPDK",
  ISSN =         "0898-1221 (print), 1873-7668 (electronic)",
  ISSN-L =       "0898-1221",
  bibdate =      "Wed Mar 1 21:51:21 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computmathappl2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0898122112000429",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers and Mathematics with Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/08981221",
}

@Article{Savage:2013:NSL,
  author =       "Neil Savage",
  title =        "News: Stopping the leaks",
  journal =      j-CACM,
  volume =       "56",
  number =       "1",
  pages =        "19--21",
  month =        jan,
  year =         "2013",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2398356.2398363",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Dec 27 19:03:03 MST 2012",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cacm2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "Side channels give out information that can be used to
                 crack secrets, but researchers are identifying the
                 holes and trying to close them.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Savage:2013:PP,
  author =       "Neil Savage",
  title =        "Proofs probable",
  journal =      j-CACM,
  volume =       "56",
  number =       "6",
  pages =        "22--24",
  month =        jun,
  year =         "2013",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2461256.2461265",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Jun 18 16:08:03 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/acm-turing-awards.bib;
                 https://www.math.utah.edu/pub/tex/bib/cacm2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "Shafi Goldwasser and Silvio Micali laid the
                 foundations for modern cryptography, with contributions
                 including interactive and zero-knowledge proofs.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  keywords =     "A. M. Turing Award recipients; Shafi Goldwasser;
                 Silvio Micali",
}

@Misc{Schneier:2013:HDD,
  author =       "Bruce Schneier",
  title =        "How to Design --- And Defend Against --- The Perfect
                 Security Backdoor",
  howpublished = "Web site.",
  year =         "2013",
  bibdate =      "Mon Mar 09 16:03:22 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.schneier.com/essays/archives/2013/10/how_to_design_and_de.html",
  acknowledgement = ack-nhfb,
  remark =       "Cite in \cite[reference 68]{Schneier:2015:SWC}.",
}

@Article{Sendrier:2013:HCE,
  author =       "Nicolas Sendrier and Dimitris E. Simos",
  title =        "The Hardness of Code Equivalence over {$ \mathbb {F}_q
                 $} and Its Application to Code-Based Cryptography",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7932",
  pages =        "203--216",
  year =         "2013",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-38616-9_14",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Mar 21 08:01:29 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-38616-9_14/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-38616-9",
  book-URL =     "http://www.springerlink.com/content/978-3-642-38616-9",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Seo:2013:PIC,
  author =       "Jae Woo Seo and Dae Hyun Yum and Pil Joong Lee",
  title =        "Proxy-invisible {CCA}-secure type-based proxy
                 re-encryption without random oracles",
  journal =      j-THEOR-COMP-SCI,
  volume =       "491",
  number =       "??",
  pages =        "83--93",
  day =          "17",
  month =        jun,
  year =         "2013",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Mon Jul 8 16:38:46 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2010.bib;
                 http://www.sciencedirect.com/science/journal/03043975",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0304397512010560",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{Serwadda:2013:ELK,
  author =       "Abdul Serwadda and Vir V. Phoha",
  title =        "Examining a Large Keystroke Biometrics Dataset for
                 Statistical-Attack Openings",
  journal =      j-TISSEC,
  volume =       "16",
  number =       "2",
  pages =        "8:1--8:??",
  month =        sep,
  year =         "2013",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/2516960",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Mon Sep 23 17:04:07 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tissec.bib",
  abstract =     "Research on keystroke-based authentication has
                 traditionally assumed human impostors who generate
                 forgeries by physically typing on the keyboard. With
                 bots now well understood to have the capacity to
                 originate precisely timed keystroke sequences, this
                 model of attack is likely to underestimate the threat
                 facing a keystroke-based system in practice. In this
                 work, we investigate how a keystroke-based
                 authentication system would perform if it were
                 subjected to synthetic attacks designed to mimic the
                 typical user. To implement the attacks, we perform a
                 rigorous statistical analysis on keystroke biometrics
                 data collected over a 2-year period from more than 3000
                 users, and then use the observed statistical traits to
                 design and launch algorithmic attacks against three
                 state-of-the-art password-based keystroke verification
                 systems. Relative to the zero-effort attacks typically
                 used to test the performance of keystroke biometric
                 systems, we show that our algorithmic attack increases
                 the mean Equal Error Rates (EERs) of three high
                 performance keystroke verifiers by between 28.6\% and
                 84.4\%. We also find that the impact of the attack is
                 more pronounced when the keystroke profiles subjected
                 to the attack are based on shorter strings, and that
                 some users see considerably greater performance
                 degradation under the attack than others. This article
                 calls for a shift from the traditional zero-effort
                 approach of testing the performance of password-based
                 keystroke verifiers, to a more rigorous algorithmic
                 approach that captures the threat posed by today's
                 bots.",
  acknowledgement = ack-nhfb,
  articleno =    "8",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@Article{Shaw:2013:DE,
  author =       "John Shaw",
  title =        "Dealing with encryption",
  journal =      j-NETWORK-SECURITY,
  volume =       "2013",
  number =       "11",
  pages =        "8--11",
  month =        nov,
  year =         "2013",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(13)70120-X",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 17:01:00 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S135348581370120X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Shi:2013:REA,
  author =       "Qi Shi and Ning Zhang and Madjid Merabti and Kashif
                 Kifayat",
  title =        "Resource-efficient authentic key establishment in
                 heterogeneous wireless sensor networks",
  journal =      j-J-PAR-DIST-COMP,
  volume =       "73",
  number =       "2",
  pages =        "235--249",
  month =        feb,
  year =         "2013",
  CODEN =        "JPDCER",
  DOI =          "https://doi.org/10.1016/j.jpdc.2012.10.004",
  ISSN =         "0743-7315 (print), 1096-0848 (electronic)",
  ISSN-L =       "0743-7315",
  bibdate =      "Thu Dec 13 20:22:17 MST 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jpardistcomp.bib;
                 http://www.sciencedirect.com/science/journal/07437315",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0743731512002547",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Parallel and Distributed Computing",
  journal-URL =  "http://www.sciencedirect.com/science/journal/07437315",
}

@Article{Singh:2013:QBF,
  author =       "Durgesh Singh and Shivendra Shivani and Suneeta
                 Agarwal",
  title =        "Quantization-Based Fragile Watermarking Using
                 Block-Wise Authentication and Pixel-Wise Recovery
                 Scheme for Tampered Image",
  journal =      j-INT-J-IMAGE-GRAPHICS,
  volume =       "13",
  number =       "2",
  pages =        "",
  month =        apr,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1142/S0219467813400020",
  ISSN =         "0219-4678",
  ISSN-L =       "0219-4678",
  bibdate =      "Tue Aug 6 10:37:51 MDT 2013",
  bibsource =    "http://ejournals.wspc.com.sg/ijig/ijig.shtml;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijig.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Image and Graphics (IJIG)",
  journal-URL =  "http://www.worldscientific.com/worldscinet/ijig",
}

@Article{Soderstrom:2013:DDY,
  author =       "Sylvia S{\"o}derstr{\"o}m",
  title =        "Digital Differentiation in Young People's {Internet}
                 Use --- Eliminating or Reproducing Disability
                 Stereotypes",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "2",
  pages =        "190--204",
  day =          "07",
  month =        may,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5020190",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:50 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/2/190",
  abstract =     "Norwegian authorities' policy aims at securing an
                 information society for all, emphasizing the importance
                 of accessible and usable Information and Communication
                 Technology (ICT) for everyone. While the body of
                 research on young people's use of ICT is quite
                 comprehensive, research addressing digital
                 differentiation in young people with disabilities' use
                 of ICT is still in its early days. This article
                 investigates how young people with disabilities' use,
                 or non-use, of assistive ICT creates digital
                 differentiations. The investigation elaborates on how
                 the anticipations and stereotypes of disability
                 establish an authoritative definition of assistive ICT,
                 and the consequence this creates for the use of the Web
                 by young people with disabilities. The object of the
                 article is to provide enhanced insight into the field
                 of technology and disability by illuminating how
                 assistive ICT sometimes eliminates and sometimes
                 reproduces stereotypes and digital differentiations.
                 The investigation draws on a qualitative interview
                 study with 23 young Norwegians with disabilities, aged
                 15-20 years. I draw on a theoretical perspective to
                 analyze the findings of the study, which employs the
                 concept of identity multiplicity. The article's closing
                 discussion expands on technology's significance in
                 young people's negotiations of impairment and of
                 perceptions of disability.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Inequality in the Digital Environment.",
}

@Article{Staff:2013:ITD,
  author =       "S. Staff",
  title =        "Inside {TAO}: Documents Reveal Top {NSA} Hacking
                 Unit",
  journal =      "{Der Spiegel}",
  volume =       "??",
  number =       "??",
  pages =        "??--??",
  day =          "29",
  month =        dec,
  year =         "2013",
  bibdate =      "Thu Sep 22 19:02:15 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.spiegel.de/international/world/the-nsa-uses-powerful-toolbox-in-effort-to-spy-on-global-networks-a-940969-3.html",
  acknowledgement = ack-nhfb,
}

@Article{Strydis:2013:SAP,
  author =       "Christos Strydis and Robert M. Seepers and Pedro
                 Peris-Lopez and Dimitrios Siskos and Ioannis Sourdis",
  title =        "A system architecture, processor, and communication
                 protocol for secure implants",
  journal =      j-TACO,
  volume =       "10",
  number =       "4",
  pages =        "57:1--57:??",
  month =        dec,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2541228.2555313",
  ISSN =         "1544-3566 (print), 1544-3973 (electronic)",
  ISSN-L =       "1544-3566",
  bibdate =      "Thu Jan 9 10:42:35 MST 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/taco.bib",
  abstract =     "Secure and energy-efficient communication between
                 Implantable Medical Devices (IMDs) and authorized
                 external users is attracting increasing attention these
                 days. However, there currently exists no systematic
                 approach to the problem, while solutions from
                 neighboring fields, such as wireless sensor networks,
                 are not directly transferable due to the peculiarities
                 of the IMD domain. This work describes an original,
                 efficient solution for secure IMD communication. A new
                 implant system architecture is proposed, where security
                 and main-implant functionality are made completely
                 decoupled by running the tasks onto two separate cores.
                 Wireless communication goes through a custom security
                 ASIP, called SISC (Smart-Implant Security Core), which
                 runs an energy-efficient security protocol. The
                 security core is powered by RF-harvested energy until
                 it performs external-reader authentication, providing
                 an elegant defense mechanism against battery
                 Denial-of-Service (DoS) and other, more common attacks.
                 The system has been evaluated based on a realistic case
                 study involving an artificial pancreas implant. When
                 synthesized for a UMC 90nm CMOS ASIC technology, our
                 system architecture achieves defense against
                 unauthorized accesses having zero energy cost, running
                 entity authentication through harvesting only 7.45 $
                 \mu $J of RF energy from the requesting entity. In all
                 other successfully authenticated accesses, our
                 architecture achieves secure data exchange without
                 affecting the performance of the main IMD
                 functionality, adding less than 1o/oo (1.3 mJ ) to the
                 daily energy consumption of a typical implant. Compared
                 to a singe-core, secure reference IMD, which would
                 still be more vulnerable to some types of attacks, our
                 secure system on chip (SoC) achieves high security
                 levels at 56\% energy savings and at an area overhead
                 of less than 15\%.",
  acknowledgement = ack-nhfb,
  articleno =    "57",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J924",
}

@Article{Sun:2013:IUP,
  author =       "San-Tsai Sun and Eric Pospisil and Ildar Muslukhov and
                 Nuray Dindar and Kirstie Hawkey and Konstantin
                 Beznosov",
  title =        "Investigating Users' Perspectives of {Web} Single
                 Sign-On: Conceptual Gaps and Acceptance Model",
  journal =      j-TOIT,
  volume =       "13",
  number =       "1",
  pages =        "2:1--2:??",
  month =        nov,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2532639",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Tue Dec 3 18:44:00 MST 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "OpenID and OAuth are open and simple Web SSO protocols
                 that have been adopted by major service providers, and
                 millions of supporting Web sites. However, the average
                 user's perception of Web SSO is still poorly
                 understood. Through several user studies, this work
                 investigates users' perceptions and concerns when using
                 Web SSO for authentication. We found that our
                 participants had several misconceptions and concerns
                 that impeded their adoption. This ranged from their
                 inadequate mental models of Web SSO, to their concerns
                 about personal data exposure, and a reduction in
                 perceived Web SSO value due to the employment of
                 password management practices. Informed by our
                 findings, we offer a Web SSO technology acceptance
                 model, and suggest design improvements.",
  acknowledgement = ack-nhfb,
  articleno =    "2",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Tao:2013:SMS,
  author =       "Chengdong Tao and Adama Diene and Shaohua Tang and
                 Jintai Ding",
  title =        "Simple Matrix Scheme for Encryption",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7932",
  pages =        "231--242",
  year =         "2013",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-38616-9_16",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Mar 21 08:01:29 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-38616-9_16/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-38616-9",
  book-URL =     "http://www.springerlink.com/content/978-3-642-38616-9",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Tetali:2013:MSA,
  author =       "Sai Deep Tetali and Mohsen Lesani and Rupak Majumdar
                 and Todd Millstein",
  title =        "{MrCrypt}: static analysis for secure cloud
                 computations",
  journal =      j-SIGPLAN,
  volume =       "48",
  number =       "10",
  pages =        "271--286",
  month =        oct,
  year =         "2013",
  CODEN =        "SINODQ",
  DOI =          "https://doi.org/10.1145/2544173.2509554",
  ISSN =         "0362-1340 (print), 1523-2867 (print), 1558-1160
                 (electronic)",
  ISSN-L =       "0362-1340",
  bibdate =      "Mon Dec 9 09:19:33 MST 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigplan2010.bib",
  note =         "OOPSLA '13 conference proceedings.",
  abstract =     "In a common use case for cloud computing, clients
                 upload data and computation to servers that are managed
                 by a third-party infrastructure provider. We describe
                 MrCrypt, a system that provides data confidentiality in
                 this setting by executing client computations on
                 encrypted data. MrCrypt statically analyzes a program
                 to identify the set of operations on each input data
                 column, in order to select an appropriate homomorphic
                 encryption scheme for that column, and then transforms
                 the program to operate over encrypted data. The
                 encrypted data and transformed program are uploaded to
                 the server and executed as usual, and the result of the
                 computation is decrypted on the client side. We have
                 implemented MrCrypt for Java and illustrate its
                 practicality on three standard benchmark suites for the
                 Hadoop MapReduce framework. We have also formalized the
                 approach and proven several soundness and security
                 guarantees.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGPLAN Notices",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J706",
}

@Article{Toledo:2013:DFS,
  author =       "Nerea Toledo and Marivi Higuero and Jasone Astorga and
                 Marina Aguado and Jean Marie Bonnin",
  title =        "Design and formal security evaluation of {NeMHIP}: a
                 new secure and efficient network mobility management
                 protocol based on the Host Identity Protocol",
  journal =      j-COMPUT-SECUR,
  volume =       "32",
  number =       "??",
  pages =        "1--18",
  month =        feb,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:31 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812001599",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Tormo:2013:IMP,
  author =       "Gines Dolera Tormo and Felix Gomez Marmol and Joao
                 Girao and Gregorio Martinez Perez",
  title =        "Identity Management --- In Privacy We Trust: Bridging
                 the Trust Gap in {eHealth} Environments",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "6",
  pages =        "34--41",
  month =        nov # "\slash " # dec,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.80",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Dec 18 18:41:55 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
}

@Article{Tsai:2013:ZWS,
  author =       "Hung-Hsu Tsai and Yen-Shou Lai and Shih-Che Lo",
  title =        "A zero-watermark scheme with geometrical invariants
                 using {SVM} and {PSO} against geometrical attacks for
                 image protection",
  journal =      j-J-SYST-SOFTW,
  volume =       "86",
  number =       "2",
  pages =        "335--348",
  month =        feb,
  year =         "2013",
  CODEN =        "JSSODM",
  DOI =          "https://doi.org/10.1016/j.jss.2012.08.040",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Sat Jan 5 09:05:59 MST 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0164121212002440",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Tso:2013:SAI,
  author =       "Raylin Tso",
  title =        "Security analysis and improvements of a
                 communication-efficient three-party password
                 authenticated key exchange protocol",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "66",
  number =       "2",
  pages =        "863--874",
  month =        nov,
  year =         "2013",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-013-0917-8",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Sat Feb 8 10:21:59 MST 2014",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0920-8542&volume=66&issue=2;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  URL =          "http://link.springer.com/article/10.1007/s11227-013-0917-8",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Article{Tu:2013:PAQ,
  author =       "Stephen Tu and M. Frans Kaashoek and Samuel Madden and
                 Nickolai Zeldovich",
  title =        "Processing analytical queries over encrypted data",
  journal =      j-PROC-VLDB-ENDOWMENT,
  volume =       "6",
  number =       "5",
  pages =        "289--300",
  month =        mar,
  year =         "2013",
  CODEN =        "????",
  ISSN =         "2150-8097",
  bibdate =      "Fri Dec 13 05:56:27 MST 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/vldbe.bib",
  abstract =     "MONOMI is a system for securely executing analytical
                 workloads over sensitive data on an untrusted database
                 server. MONOMI works by encrypting the entire database
                 and running queries over the encrypted data. MONOMI
                 introduces split client/server query execution, which
                 can execute arbitrarily complex queries over encrypted
                 data, as well as several techniques that improve
                 performance for such workloads, including per-row
                 precomputation, space-efficient encryption, grouped
                 homomorphic addition, and pre-filtering. Since these
                 optimizations are good for some queries but not others,
                 MONOMI introduces a designer for choosing an efficient
                 physical design at the server for a given workload, and
                 a planner to choose an efficient execution plan for a
                 given query at runtime. A prototype of MONOMI running
                 on top of Postgres can execute most of the queries from
                 the TPC-H benchmark with a median overhead of only $
                 1.24 \times $ (ranging from $ 1.03 \times $ to $ 2.33
                 \times $ ) compared to an un-encrypted Postgres
                 database where a compromised server would reveal all
                 data.",
  acknowledgement = ack-nhfb,
  fjournal =     "Proceedings of the VLDB Endowment",
}

@Article{Ulutas:2013:ISI,
  author =       "Mustafa Ulutas and G{\"u}zin Ulutas and Vasif V.
                 Nabiyev",
  title =        "Invertible secret image sharing for gray level and
                 dithered cover images",
  journal =      j-J-SYST-SOFTW,
  volume =       "86",
  number =       "2",
  pages =        "485--500",
  month =        feb,
  year =         "2013",
  CODEN =        "JSSODM",
  DOI =          "https://doi.org/10.1016/j.jss.2012.09.027",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Sat Jan 5 09:05:59 MST 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0164121212002701",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Uto:2013:MRI,
  author =       "Nelson Uto",
  title =        "A Methodology for Retrieving Information from Malware
                 Encrypted Output Files: {Brazilian} Case Studies",
  journal =      j-FUTURE-INTERNET,
  volume =       "5",
  number =       "2",
  pages =        "140--167",
  day =          "25",
  month =        apr,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi5020140",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:50 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/5/2/140",
  abstract =     "This article presents and explains a methodology based
                 on cryptanalytic and reverse engineering techniques
                 that can be employed to quickly recover information
                 from encrypted files generated by malware. The
                 objective of the methodology is to minimize the effort
                 with static and dynamic analysis, by using
                 cryptanalysis and related knowledge as much as
                 possible. In order to illustrate how it works, we
                 present three case studies, taken from a big Brazilian
                 company that was victimized by directed attacks focused
                 on stealing information from a special purpose hardware
                 they use in their environment.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Security of Systems and Software
                 Resiliency.",
}

@Article{Wang:2013:BSB,
  author =       "Xiangyang Wang and Hongying Yang and Jing Wang and
                 Lili Chen and Panpan Niu",
  title =        "{Bayesian} Segmentation Based Local Geometrically
                 Invariant Image Watermarking",
  journal =      j-FUND-INFO,
  volume =       "128",
  number =       "4",
  pages =        "475--501",
  month =        oct,
  year =         "2013",
  CODEN =        "FUMAAJ",
  DOI =          "https://doi.org/10.3233/FI-2013-954",
  ISSN =         "0169-2968 (print), 1875-8681 (electronic)",
  ISSN-L =       "0169-2968",
  bibdate =      "Sat Mar 5 17:17:55 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/fundinfo2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Fundamenta Informaticae",
  journal-URL =  "http://content.iospress.com/journals/fundamenta-informaticae",
}

@Article{Wang:2013:CRA,
  author =       "Honggang Wang",
  title =        "Communication-resource-aware adaptive watermarking for
                 multimedia authentication in wireless multimedia sensor
                 networks",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "64",
  number =       "3",
  pages =        "883--897",
  month =        jun,
  year =         "2013",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-010-0500-5",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Sat Feb 8 10:21:22 MST 2014",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0920-8542&volume=64&issue=3;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  URL =          "http://link.springer.com/article/10.1007/s11227-010-0500-5",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Article{Wang:2013:HCL,
  author =       "Kan Wang and Zhe-Ming Lu and Yong-Jian Hu",
  title =        "A high capacity lossless data hiding scheme for {JPEG}
                 images",
  journal =      j-J-SYST-SOFTW,
  volume =       "86",
  number =       "7",
  pages =        "1965--1975",
  month =        jul,
  year =         "2013",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Tue May 14 16:09:17 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0164121213000812",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Wang:2013:NMC,
  author =       "Qichun Wang and Chik How Tan",
  title =        "A new method to construct {Boolean} functions with
                 good cryptographic properties",
  journal =      j-INFO-PROC-LETT,
  volume =       "113",
  number =       "14--16",
  pages =        "567--571",
  month =        jul # "\slash " # aug,
  year =         "2013",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Mon Jul 1 18:58:11 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019013001348",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Wang:2013:NSW,
  author =       "Xiaogang Wang and Ming Yang and Junzhou Luo",
  title =        "A novel sequential watermark detection model for
                 efficient traceback of secret network attack flows",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "36",
  number =       "6",
  pages =        "1660--1670",
  month =        nov,
  year =         "2013",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Wed Jan 28 15:44:44 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804513000246",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Netw. Comput. Appl.",
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Wang:2013:RBC,
  author =       "Xiang-yang Wang and Chun-peng Wang and Hong-ying Yang
                 and Pan-pan Niu",
  title =        "A robust blind color image watermarking in quaternion
                 {Fourier} transform domain",
  journal =      j-J-SYST-SOFTW,
  volume =       "86",
  number =       "2",
  pages =        "255--277",
  month =        feb,
  year =         "2013",
  CODEN =        "JSSODM",
  DOI =          "https://doi.org/10.1016/j.jss.2012.08.015",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Sat Jan 5 09:05:59 MST 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib;
                 http://www.sciencedirect.com/science/journal/01641212",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0164121212002312",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Wang:2013:SES,
  author =       "Guojun Wang and Qiushuang Du and Wei Zhou and Qin
                 Liu",
  title =        "A scalable encryption scheme for multi-privileged
                 group communications",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "64",
  number =       "3",
  pages =        "1075--1091",
  month =        jun,
  year =         "2013",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-011-0683-4",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Sat Feb 8 11:30:45 MST 2014",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0920-8542&volume=64&issue=3;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  URL =          "http://link.springer.com/article/10.1007/s11227-011-0683-4",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Article{Weng:2013:VWI,
  author =       "Chi-Yao Weng and Yu Hong Zhang and Li Chun Lin and
                 Shiuh-Jeng Wang",
  title =        "Visible watermarking images in high quality of data
                 hiding",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "66",
  number =       "2",
  pages =        "1033--1048",
  month =        nov,
  year =         "2013",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-013-0969-9",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Sat Feb 8 11:11:03 MST 2014",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0920-8542&volume=66&issue=2;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  URL =          "http://link.springer.com/article/10.1007/s11227-013-0969-9",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Article{Williams:2013:APC,
  author =       "Peter Williams and Radu Sion",
  title =        "Access privacy and correctness on untrusted storage",
  journal =      j-TISSEC,
  volume =       "16",
  number =       "3",
  pages =        "12:1--12:??",
  month =        nov,
  year =         "2013",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/2535524",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Mon Dec 9 11:22:22 MST 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tissec.bib",
  abstract =     "We introduce a new practical mechanism for remote data
                 storage with access pattern privacy and correctness. A
                 storage client can deploy this mechanism to issue
                 encrypted reads, writes, and inserts to a potentially
                 curious and malicious storage service provider, without
                 revealing information or access patterns. The provider
                 is unable to establish any correlation between
                 successive accesses, or even to distinguish between a
                 read and a write. Moreover, the client is provided with
                 strong correctness assurances for its operations ---
                 illicit provider behavior does not go undetected. We
                 describe a practical system that can execute an
                 unprecedented several queries per second on
                 terabyte-plus databases while maintaining full
                 computational privacy and correctness.",
  acknowledgement = ack-nhfb,
  articleno =    "12",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@Article{Willis:2013:IFI,
  author =       "Karl D. D. Willis and Andrew D. Wilson",
  title =        "{InfraStructs}: fabricating information inside
                 physical objects for imaging in the terahertz region",
  journal =      j-TOG,
  volume =       "32",
  number =       "4",
  pages =        "138:1--138:??",
  month =        jul,
  year =         "2013",
  CODEN =        "ATGRDF",
  DOI =          "https://doi.org/10.1145/2461912.2461936",
  ISSN =         "0730-0301 (print), 1557-7368 (electronic)",
  ISSN-L =       "0730-0301",
  bibdate =      "Sat Jul 13 11:43:20 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tog/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tog.bib",
  abstract =     "We introduce InfraStructs, material-based tags that
                 embed information inside digitally fabricated objects
                 for imaging in the Terahertz region. Terahertz imaging
                 can safely penetrate many common materials, opening up
                 new possibilities for encoding hidden information as
                 part of the fabrication process. We outline the design,
                 fabrication, imaging, and data processing steps to
                 fabricate information inside physical objects.
                 Prototype tag designs are presented for location
                 encoding, pose estimation, object identification, data
                 storage, and authentication. We provide detailed
                 analysis of the constraints and performance
                 considerations for designing InfraStruct tags. Future
                 application scenarios range from production line
                 inventory, to customized game accessories, to mobile
                 robotics.",
  acknowledgement = ack-nhfb,
  articleno =    "138",
  fjournal =     "ACM Transactions on Graphics",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J778",
}

@Article{Wu:2013:FTR,
  author =       "Qianhong Wu and Bo Qin and Lei Zhang and Josep
                 Domingo-Ferrer and Jes{\'u}s A. Manj{\'o}n",
  title =        "Fast transmission to remote cooperative groups: a new
                 key management paradigm",
  journal =      j-IEEE-TRANS-NETWORKING,
  volume =       "21",
  number =       "2",
  pages =        "621--633",
  month =        apr,
  year =         "2013",
  CODEN =        "IEANEP",
  DOI =          "https://doi.org/10.1109/TNET.2012.2208201",
  ISSN =         "1063-6692 (print), 1558-2566 (electronic)",
  ISSN-L =       "1063-6692",
  bibdate =      "Sat Jul 13 11:32:23 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
  abstract =     "The problem of efficiently and securely broadcasting
                 to a remote cooperative group occurs in many newly
                 emerging networks. A major challenge in devising such
                 systems is to overcome the obstacles of the potentially
                 limited communication from the group to the sender, the
                 unavailability of a fully trusted key generation
                 center, and the dynamics of the sender. The existing
                 key management paradigms cannot deal with these
                 challenges effectively. In this paper, we circumvent
                 these obstacles and close this gap by proposing a novel
                 key management paradigm. The new paradigm is a hybrid
                 of traditional broadcast encryption and group key
                 agreement. In such a system, each member maintains a
                 single public/secret key pair. Upon seeing the public
                 keys of the members, a remote sender can securely
                 broadcast to any intended subgroup chosen in an ad hoc
                 way. Following this model, we instantiate a scheme that
                 is proven secure in the standard model. Even if all the
                 nonintended members collude, they cannot extract any
                 useful information from the transmitted messages. After
                 the public group encryption key is extracted, both the
                 computation overhead and the communication cost are
                 independent of the group size. Furthermore, our scheme
                 facilitates simple yet efficient member deletion/
                 addition and flexible rekeying strategies. Its strong
                 security against collusion, its constant overhead, and
                 its implementation friendliness without relying on a
                 fully trusted authority render our protocol a very
                 promising solution to many applications.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE\slash ACM Transactions on Networking",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J771",
}

@Article{Xie:2013:ECP,
  author =       "X. Xie and H. Ma and J. Li and X. Chen",
  title =        "An Efficient Ciphertext-Policy Attribute-Based Access
                 Control towards Revocation in Cloud Computing",
  journal =      j-J-UCS,
  volume =       "19",
  number =       "16",
  pages =        "2349--??",
  month =        "????",
  year =         "2013",
  CODEN =        "????",
  ISSN =         "0948-695X (print), 0948-6968 (electronic)",
  ISSN-L =       "0948-6968",
  bibdate =      "Thu Mar 13 14:26:22 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jucs.bib",
  URL =          "http://www.jucs.org/jucs_19_16/an_efficient_ciphertext_policy",
  acknowledgement = ack-nhfb,
  fjournal =     "J.UCS: Journal of Universal Computer Science",
  journal-URL =  "http://www.jucs.org/jucs",
}

@Article{Xie:2013:SIP,
  author =       "Yongming Xie and Guojun Wang",
  title =        "Special Issue Papers: Practical distributed secret key
                 generation for delay tolerant networks",
  journal =      j-CCPE,
  volume =       "25",
  number =       "14",
  pages =        "2067--2079",
  day =          "25",
  month =        sep,
  year =         "2013",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.2885",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Tue Dec 3 10:37:36 MST 2013",
  bibsource =    "http://www.interscience.wiley.com/jpages/1532-0626;
                 https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "8 Jul 2012",
}

@Article{Xiong:2013:NIB,
  author =       "Hu Xiong and Zhong Chen and Fagen Li",
  title =        "New identity-based three-party authenticated key
                 agreement protocol with provable security",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "36",
  number =       "2",
  pages =        "927--932",
  month =        mar,
  year =         "2013",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Wed Jan 28 15:44:34 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804512002184",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Netw. Comput. Appl.",
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Xu:2013:PKE,
  author =       "Peng Xu and Hai Jin and Qianhong Wu and Wei Wang",
  title =        "Public-Key Encryption with Fuzzy Keyword Search: A
                 Provably Secure Scheme under Keyword Guessing Attack",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "62",
  number =       "11",
  pages =        "2266--2277",
  month =        nov,
  year =         "2013",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2012.215",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Fri Nov 15 08:54:34 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Xue:2013:TCB,
  author =       "Kaiping Xue and Changsha Ma and Peilin Hong and Rong
                 Ding",
  title =        "A temporal-credential-based mutual authentication and
                 key agreement scheme for wireless sensor networks",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "36",
  number =       "1",
  pages =        "316--323",
  month =        jan,
  year =         "2013",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Wed Jan 28 15:44:29 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804512001403",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Netw. Comput. Appl.",
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Yang:2013:ECS,
  author =       "Xiao-yuan Yang and Li-qiang Wu and Min-qing Zhang and
                 Xiao-Feng Chen",
  title =        "An efficient {CCA}-secure cryptosystem over ideal
                 lattices from identity-based encryption",
  journal =      j-COMPUT-MATH-APPL,
  volume =       "65",
  number =       "9",
  pages =        "1254--1263",
  month =        may,
  year =         "2013",
  CODEN =        "CMAPDK",
  ISSN =         "0898-1221 (print), 1873-7668 (electronic)",
  ISSN-L =       "0898-1221",
  bibdate =      "Wed Mar 1 21:51:21 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computmathappl2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0898122112001447",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers and Mathematics with Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/08981221",
}

@Article{Yi:2013:ETS,
  author =       "Xun Yi and San Ling and Huaxiong Wang",
  title =        "Efficient Two-Server Password-Only Authenticated Key
                 Exchange",
  journal =      j-IEEE-TRANS-PAR-DIST-SYS,
  volume =       "24",
  number =       "9",
  pages =        "1773--1782",
  year =         "2013",
  CODEN =        "ITDSEO",
  DOI =          "https://doi.org/10.1109/TPDS.2012.282",
  ISSN =         "1045-9219 (print), 1558-2183 (electronic)",
  ISSN-L =       "1045-9219",
  bibdate =      "Mon Aug 12 11:23:25 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranspardistsys.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Parallel and Distributed
                 Systems",
  journal-URL =  "http://www.computer.org/tpds/archives.htm",
}

@Article{Ying:2013:PPB,
  author =       "Bidi Ying and Dimitrios Makrakis and Hussein T.
                 Mouftah",
  title =        "Privacy preserving broadcast message authentication
                 protocol for {VANETs}",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "36",
  number =       "5",
  pages =        "1352--1364",
  month =        sep,
  year =         "2013",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Wed Jan 28 15:44:42 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804512001439",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Netw. Comput. Appl.",
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Yoon:2013:RBB,
  author =       "Eun-Jun Yoon and Kee-Young Yoo",
  title =        "Robust biometrics-based multi-server authentication
                 with key agreement scheme for smart cards on elliptic
                 curve cryptosystem",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "63",
  number =       "1",
  pages =        "235--255",
  month =        jan,
  year =         "2013",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-010-0512-1",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Mon Apr 1 14:50:43 MDT 2013",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0920-8542&volume=63&issue=1;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  URL =          "http://link.springer.com/article/10.1007/s11227-010-0512-1",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Article{Young:2013:TPC,
  author =       "Maxwell Young and Aniket Kate and Ian Goldberg and
                 Martin Karsten",
  title =        "Towards practical communication in
                 {Byzantine}-resistant {DHTs}",
  journal =      j-IEEE-TRANS-NETWORKING,
  volume =       "21",
  number =       "1",
  pages =        "190--203",
  month =        feb,
  year =         "2013",
  CODEN =        "IEANEP",
  DOI =          "https://doi.org/10.1109/TNET.2012.2195729",
  ISSN =         "1063-6692 (print), 1558-2566 (electronic)",
  ISSN-L =       "1063-6692",
  bibdate =      "Sat Jul 13 11:32:17 MDT 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
  abstract =     "There are several analytical results on distributed
                 hash tables (DHTs) that can tolerate Byzantine faults.
                 Unfortunately, in such systems, operations such as data
                 retrieval and message sending incur significant
                 communication costs. For example, a simple scheme used
                 in many Byzantine fault-tolerant DHT constructions of n
                 nodes requires O (log$^3$ n ) messages; this is likely
                 impractical for real-world applications. The previous
                 best known message complexity is O (log$^2$ n ) in
                 expectation. However, the corresponding protocol
                 suffers from prohibitive costs owing to hidden
                 constants in the asymptotic notation and setup costs.
                 In this paper, we focus on reducing the communication
                 costs against a computationally bounded adversary. We
                 employ threshold cryptography and distributed key
                 generation to define two protocols, both of which are
                 more efficient than existing solutions. In comparison,
                 our first protocol is deterministic with O (log$^2$ n )
                 message complexity, and our second protocol is
                 randomized with expected O (log n ) message complexity.
                 Furthermore, both the hidden constants and setup costs
                 for our protocols are small, and no trusted third party
                 is required. Finally, we present results from
                 microbenchmarks conducted over PlanetLab showing that
                 our protocols are practical for deployment under
                 significant levels of churn and adversarial behavior.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE\slash ACM Transactions on Networking",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J771",
}

@Article{Yuan:2013:PVQ,
  author =       "Lihua Yuan and Chao-Chih Chen and Prasant Mohapatra
                 and Chen-Nee Chuah and Krishna Kant",
  title =        "A Proxy View of Quality of {Domain Name Service},
                 Poisoning Attacks and Survival Strategies",
  journal =      j-TOIT,
  volume =       "12",
  number =       "3",
  pages =        "9:1--9:??",
  month =        may,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2461321.2461324",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat May 25 16:26:39 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "The Domain Name System (DNS) provides a critical
                 service for the Internet --- mapping of user-friendly
                 domain names to their respective IP addresses. Yet,
                 there is no standard set of metrics quantifying the
                 Quality of Domain Name Service (QoDNS), let alone a
                 thorough evaluation of it. This article attempts to
                 fill this gap from the perspective of a DNS
                 proxy/cache, which is the bridge between clients and
                 authoritative servers. We present an analytical model
                 of DNS proxy operations that offers insights into the
                 design trade-offs of DNS infrastructure and the
                 selection of critical DNS parameters. Due to the
                 critical role DNS proxies play in QoDNS, they are the
                 focus of attacks including cache poisoning attack. We
                 extend the analytical model to study DNS cache
                 poisoning attacks and their impact on QoDNS metrics.
                 This analytical study prompts us to present Domain Name
                 Cross-Referencing (DoX), a peer-to-peer systems for DNS
                 proxies to cooperatively defend cache poisoning
                 attacks. Based on QoDNS, we compare DoX with the
                 cryptography-based DNS Security Extension (DNSSEC) to
                 understand their relative merits.",
  acknowledgement = ack-nhfb,
  articleno =    "9",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Yuen:2013:ELT,
  author =       "Tsz Hon Yuen and Joseph K. Liu and Man Ho Au and Willy
                 Susilo and Jianying Zhou",
  title =        "Efficient Linkable and\slash or Threshold Ring
                 Signature Without Random Oracles",
  journal =      j-COMP-J,
  volume =       "56",
  number =       "4",
  pages =        "407--421",
  month =        apr,
  year =         "2013",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxs115",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Apr 1 08:36:50 MDT 2013",
  bibsource =    "http://comjnl.oxfordjournals.org/content/56/4.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/56/4/407.full.pdf+html",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "August 24, 2012",
}

@Article{Zhang:2013:BLR,
  author =       "Mingwu Zhang and Bo Yang and Tsuyoshi Takagi",
  title =        "Bounded Leakage-Resilient Functional Encryption with
                 Hidden Vector Predicate",
  journal =      j-COMP-J,
  volume =       "56",
  number =       "4",
  pages =        "464--477",
  month =        apr,
  year =         "2013",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxs133",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Apr 1 08:36:50 MDT 2013",
  bibsource =    "http://comjnl.oxfordjournals.org/content/56/4.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/56/4/464.full.pdf+html",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "September 22, 2012",
}

@Article{Zhang:2013:LPP,
  author =       "Ye Zhang and Wai-Kit Wong and S. M. Yiu and Nikos
                 Mamoulis and David W. Cheung",
  title =        "Lightweight privacy-preserving peer-to-peer data
                 integration",
  journal =      j-PROC-VLDB-ENDOWMENT,
  volume =       "6",
  number =       "3",
  pages =        "157--168",
  month =        jan,
  year =         "2013",
  CODEN =        "????",
  ISSN =         "2150-8097",
  bibdate =      "Fri Dec 13 05:56:18 MST 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/vldbe.bib",
  abstract =     "Peer Data Management Systems (PDMS) are an attractive
                 solution for managing distributed heterogeneous
                 information. When a peer (client) requests data from
                 another peer (server) with a different schema,
                 translations of the query and its answer are done by a
                 sequence of intermediate peers (translators). There are
                 two privacy issues in this P2P data integration
                 process: (i) answer privacy: no unauthorized parties
                 (including the translators) should learn the query
                 result; (ii) mapping privacy: the schema and the value
                 mappings used by the translators to perform the
                 translation should not be revealed to other peers.
                 Elmeleegy and Ouzzani proposed the PPP protocol that is
                 the first to support privacy-preserving querying in
                 PDMS. However, PPP suffers from several shortcomings.
                 First, PPP does not satisfy the requirement of answer
                 privacy, because it is based on commutative encryption;
                 we show that this issue can be fixed by adopting
                 another cryptographic technique called oblivious
                 transfer. Second, PPP adopts a weaker notion for
                 mapping privacy, which allows the client peer to
                 observe certain mappings done by translators. In this
                 paper, we develop a lightweight protocol, which
                 satisfies mapping privacy and extend it to a more
                 complex one that facilitates parallel translation by
                 peers. Furthermore, we consider a stronger adversary
                 model where there may be collusions among peers and
                 propose an efficient protocol that guards against
                 collusions. We conduct an experimental study on the
                 performance of the proposed protocols using both real
                 and synthetic data. The results show that the proposed
                 protocols not only achieve a better privacy guarantee
                 than PPP, but they are also more efficient.",
  acknowledgement = ack-nhfb,
  fjournal =     "Proceedings of the VLDB Endowment",
}

@Article{Zhang:2013:RMS,
  author =       "En Zhang and Yongquan Cai",
  title =        "Rational Multi-Secret Sharing Scheme in Standard
                 Point-To-Point Communication Networks",
  journal =      j-INT-J-FOUND-COMP-SCI,
  volume =       "24",
  number =       "6",
  pages =        "879--??",
  month =        sep,
  year =         "2013",
  CODEN =        "IFCSEN",
  DOI =          "https://doi.org/10.1142/S012905411350024X",
  ISSN =         "0129-0541",
  ISSN-L =       "0129-0541",
  bibdate =      "Thu Feb 27 13:49:53 MST 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijfcs.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Foundations of Computer
                 Science (IJFCS)",
  journal-URL =  "http://www.worldscientific.com/loi/ijfcs",
}

@Article{Zhu:2013:TSC,
  author =       "Wen Tao Zhu",
  title =        "Towards secure and communication-efficient broadcast
                 encryption systems",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "36",
  number =       "1",
  pages =        "178--186",
  month =        jan,
  year =         "2013",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Wed Jan 28 15:44:29 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804512002159",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Netw. Comput. Appl.",
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Zilberberg:2013:PCM,
  author =       "Omer Zilberberg and Shlomo Weiss and Sivan Toledo",
  title =        "Phase-change memory: an architectural perspective",
  journal =      j-COMP-SURV,
  volume =       "45",
  number =       "3",
  pages =        "29:1--29:33",
  month =        jun,
  year =         "2013",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2480741.2480746",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jul 1 18:21:14 MDT 2013",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "This article surveys the current state of phase-change
                 memory (PCM) as a nonvolatile memory technology set to
                 replace flash and DRAM in modern computerized systems.
                 It has been researched and developed in the last
                 decade, with researchers providing better architectural
                 designs which address the technology's main
                 challenges-its limited write endurance, potential long
                 latency, high energy writes, power dissipation, and
                 some concerns for memory privacy. Some physical
                 properties of the technology are also discussed,
                 providing a basis for architectural discussions. Also
                 briefly shown are other architectural alternatives,
                 such as FeRAM and MRAM. The designs surveyed in this
                 article include read before write, wear leveling, write
                 cancellation, write pausing, some encryption schemes,
                 and buffer organizations. These allow PCM to stand on
                 its own as a replacement for DRAM as main memory.
                 Designs for hybrid memory systems with both PCM and
                 DRAM are also shown and some designs for SSDs
                 incorporating PCM.",
  acknowledgement = ack-nhfb,
  articleno =    "29",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Adj:2014:SRC,
  author =       "G. Adj and F. Rodriguez-Henriquez",
  title =        "Square Root Computation over Even Extension Fields",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "63",
  number =       "11",
  pages =        "2829--2841",
  month =        nov,
  year =         "2014",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2013.145",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Thu Nov 06 07:39:04 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
  keywords =     "Algorithm design and analysis; Complexity theory;
                 Computational efficiency; Computer science; Elliptic
                 curve cryptography; Elliptic curves; even extension
                 fields; finite extension fields; finite field
                 arithmetic; Modular square root; number theoretical
                 problem; number theory; square root computation;
                 Taxonomy",
}

@Article{Ahmad:2014:RTN,
  author =       "Tahir Ahmad and Usman Younis",
  title =        "Randomness testing of non-cryptographic hash functions
                 for real-time hash table based storage and look-up of
                 {URLs}",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "41",
  number =       "??",
  pages =        "197--205",
  month =        may,
  year =         "2014",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Wed Jan 28 15:45:00 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804513002853",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Netw. Comput. Appl.",
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Ak:2014:ICS,
  author =       "Murat Ak and Turgut Hanoymak and Ali Aydin
                 Sel{\c{c}}uk",
  title =        "{IND-CCA} secure encryption based on a
                 {Zheng--Seberry} scheme",
  journal =      j-J-COMPUT-APPL-MATH,
  volume =       "259 (part B)",
  number =       "??",
  pages =        "529--535",
  day =          "15",
  month =        mar,
  year =         "2014",
  CODEN =        "JCAMDI",
  ISSN =         "0377-0427 (print), 1879-1778 (electronic)",
  ISSN-L =       "0377-0427",
  bibdate =      "Sat Feb 25 13:34:02 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcomputapplmath2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0377042713003403",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computational and Applied Mathematics",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03770427",
}

@Article{Akinyele:2014:MGA,
  author =       "Joseph A. Akinyele and Matthew Green and Susan
                 Hohenberger and Matthew Pagano",
  title =        "Machine-generated algorithms, proofs and software for
                 the batch verification of digital signature schemes",
  journal =      j-J-COMP-SECUR,
  volume =       "22",
  number =       "6",
  pages =        "867--912",
  month =        "????",
  year =         "2014",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-140507",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:28 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Akyildiz:2014:OTB,
  author =       "Ersan Akyildiz and Muhammad Ashraf",
  title =        "An overview of trace based public key cryptography
                 over finite fields",
  journal =      j-J-COMPUT-APPL-MATH,
  volume =       "259 (part B)",
  number =       "??",
  pages =        "599--621",
  day =          "15",
  month =        mar,
  year =         "2014",
  CODEN =        "JCAMDI",
  ISSN =         "0377-0427 (print), 1879-1778 (electronic)",
  ISSN-L =       "0377-0427",
  bibdate =      "Sat Feb 25 13:34:02 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcomputapplmath2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0377042713005669",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computational and Applied Mathematics",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03770427",
}

@Article{Alavi:2014:RQE,
  author =       "Zohreh Alavi and Lu Zhou and James Powers and Keke
                 Chen",
  title =        "{RASP-QS}: efficient and confidential query services
                 in the cloud",
  journal =      j-PROC-VLDB-ENDOWMENT,
  volume =       "7",
  number =       "13",
  pages =        "1685--1688",
  month =        aug,
  year =         "2014",
  CODEN =        "????",
  ISSN =         "2150-8097",
  bibdate =      "Wed Feb 4 17:20:31 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/vldbe.bib",
  abstract =     "Hosting data query services in public clouds is an
                 attractive solution for its great scalability and
                 significant cost savings. However, data owners also
                 have concerns on data privacy due to the lost control
                 of the infrastructure. This demonstration shows a
                 prototype for efficient and confidential range/kNN
                 query services built on top of the random space
                 perturbation (RASP) method. The RASP approach provides
                 a privacy guarantee practical to the setting of
                 cloud-based computing, while enabling much faster query
                 processing compared to the encryption-based approach.
                 This demonstration will allow users to more intuitively
                 understand the technical merits of the RASP approach
                 via interactive exploration of the visual interface.",
  acknowledgement = ack-nhfb,
  fjournal =     "Proceedings of the VLDB Endowment",
  journal-URL =  "http://portal.acm.org/citation.cfm?id=J1174",
}

@InProceedings{Albertini:2014:MHE,
  author =       "Ange Albertini and Jean-Philippe Aumasson and Maria
                 Eichlseder and Florian Mendel and Martin
                 Schl{\"a}ffer",
  title =        "Malicious Hashing: {Eve}'s Variant of {SHA-1}",
  crossref =     "Joux:2014:SAC",
  pages =        "1--19",
  day =          "29",
  month =        nov,
  year =         "2014",
  DOI =          "https://doi.org/10.1007/978-3-319-13051-4_1",
  bibdate =      "Mon Mar 09 11:15:46 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  series =       ser-LNCS,
  URL =          "http://eprint.iacr.org/2014/694;
                 http://link.springer.com/chapter/10.1007/978-3-319-13051-4_1;
                 https://malicioussha1.github.io/",
  abstract =     "We present collisions for a version of SHA-1 with
                 modified constants, where the colliding payloads are
                 valid binary files. Examples are given of colliding
                 executables, archives, and images. Our malicious SHA-1
                 instances have round constants that differ from the
                 original ones in only 40 bits (on average). Modified
                 versions of cryptographic standards are typically used
                 on closed systems (e.g., in pay-TV, media and gaming
                 platforms) and aim to differentiate cryptographic
                 components across customers or services. Our
                 proof-of-concept thus demonstrates the exploitability
                 of custom SHA-1 versions for malicious purposes, such
                 as the injection of user surveillance features. To
                 encourage further research on such malicious hash
                 functions, we propose definitions of malicious hash
                 functions and of associated security notions.",
  acknowledgement = ack-nhfb,
  book-URL =     "http://link.springer.com/chapter/10.1007/978-3-319-13051-4",
  keywords =     "cryptanalysis; hash functions; malicious cryptography,
                 backdoors; secret-key cryptography; SHA-1",
  remark =       "Cite in \cite[reference 2]{Schneier:2015:SWC}.",
}

@Article{Ali:2014:ALD,
  author =       "Syed Taha Ali and Vijay Sivaraman and Diethelm Ostry",
  title =        "Authentication of lossy data in body-sensor networks
                 for cloud-based healthcare monitoring",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "35",
  number =       "??",
  pages =        "80--90",
  month =        jun,
  year =         "2014",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Fri Feb 28 07:31:07 MST 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X13001866",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X/",
}

@Article{Alleaume:2014:UQK,
  author =       "R. All{\'e}aume and C. Branciard and J. Bouda and T.
                 Debuisschert and M. Dianati and N. Gisin and M. Godfrey
                 and P. Grangier and T. L{\"a}nger and N. L{\"u}tkenhaus
                 and C. Monyk and P. Painchault and M. Peev and A. Poppe
                 and T. Pornin and J. Rarity and R. Renner and G.
                 Ribordy and M. Riguidel and L. Salvail and A. Shields
                 and H. Weinfurter and A. Zeilinger",
  title =        "Using quantum key distribution for cryptographic
                 purposes: a survey",
  journal =      j-THEOR-COMP-SCI,
  volume =       "560 (part 1)",
  number =       "??",
  pages =        "62--81",
  day =          "4",
  month =        dec,
  year =         "2014",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Tue Dec 2 19:05:23 MST 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0304397514006963",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975/",
}

@Article{Almeida:2014:COS,
  author =       "Jos{\'e} Bacelar Almeida and Manuel Barbosa and
                 Jean-Christophe Filli{\^a}tre and Jorge Sousa Pinto and
                 B{\'a}rbara Vieira",
  title =        "{CAOVerif}: an open-source deductive verification
                 platform for cryptographic software implementations",
  journal =      j-SCI-COMPUT-PROGRAM,
  volume =       "91 (part B)",
  number =       "??",
  pages =        "216--233",
  day =          "1",
  month =        oct,
  year =         "2014",
  CODEN =        "SCPGD4",
  ISSN =         "0167-6423 (print), 1872-7964 (electronic)",
  ISSN-L =       "0167-6423",
  bibdate =      "Sat Aug 16 11:32:54 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/scicomputprogram.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S016764231200189X",
  acknowledgement = ack-nhfb,
  fjournal =     "Science of Computer Programming",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01676423/",
}

@Article{AlTawy:2014:IDR,
  author =       "Riham AlTawy and Amr M. Youssef",
  title =        "Integral distinguishers for reduced-round {Stribog}",
  journal =      j-INFO-PROC-LETT,
  volume =       "114",
  number =       "8",
  pages =        "426--431",
  month =        aug,
  year =         "2014",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Fri May 9 17:24:54 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019014000428",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190/",
  keywords =     "Cryptography; GOST R 34.11-2012; Hash functions;
                 Integral distinguisher; Stribog",
  remark =       "From the abstract: ``In January 2013, the Stribog hash
                 function officially replaced GOST R 34.11-94 as the new
                 Russian cryptographic hash standard GOST R
                 34.11-2012.''",
}

@Article{Anawis:2014:ARR,
  author =       "Mark Anawis",
  title =        "Applications for Randomness: Random numbers have been
                 shown to be valuable in sampling, simulations,
                 modeling, data encryption, gambling and even musical
                 composition",
  journal =      j-SCI-COMPUT,
  volume =       "31",
  number =       "11",
  pages =        "28--30",
  month =        nov,
  year =         "2014",
  CODEN =        "SCHRCU",
  ISSN =         "1930-5753 (print), 1930-6156 (electronic)",
  ISSN-L =       "1930-5753",
  bibdate =      "Thu Nov 20 14:33:47 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  note =         "Special issue for Supercomputing 2014 (SC14), defining
                 the market: 30 years of high-performance computing
                 (1984--2014).",
  URL =          "http://digital.scientificcomputing.com/scientificcomputing/hpc_source_sc14_special_edition",
  acknowledgement = ack-nhfb,
  ajournal =     "Sci. Comput. (Rockaway, NJ, USA)",
  fjournal =     "Scientific Computing (Rockaway, NJ, USA)",
  journal-URL =  "http://digital.scientificcomputing.com/scientificcomputing/",
}

@Article{Anonymous:2014:CSL,
  author =       "Anonymous",
  title =        "{CryptoLocker} success leads to more malware",
  journal =      j-NETWORK-SECURITY,
  volume =       "2014",
  number =       "1",
  pages =        "20--20",
  month =        jan,
  year =         "2014",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(14)70012-1",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 17:01:03 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485814700121",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:2014:ERE,
  author =       "Anonymous",
  title =        "Encryption on the rise, but not enough",
  journal =      j-NETWORK-SECURITY,
  volume =       "2014",
  number =       "2",
  pages =        "1--2",
  month =        feb,
  year =         "2014",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(14)70014-5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 17:01:04 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485814700145",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:2014:TPC,
  author =       "Anonymous",
  title =        "{TrueCrypt} project cancelled by its developers",
  journal =      j-NETWORK-SECURITY,
  volume =       "2014",
  number =       "6",
  pages =        "1--2",
  month =        jun,
  year =         "2014",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(14)70054-6",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 17:01:08 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485814700546",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anthes:2014:FTI,
  author =       "Gary Anthes",
  title =        "{French} team invents faster code-breaking algorithm",
  journal =      j-CACM,
  volume =       "57",
  number =       "1",
  pages =        "21--23",
  month =        jan,
  year =         "2014",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2555807",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sat Feb 15 18:20:01 MST 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cacm2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "New method can crack certain cryptosystems far faster
                 than earlier alternatives. \ldots{} In a certain class
                 of problem, the new algorithm is able to efficiently
                 solve the discrete logarithm problem that underlies
                 several important types of modern cryptosystems.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  keywords =     "discrete logarithm; L(0) complexity; L(1/4)
                 complexity",
}

@Book{Applebaum:2014:CCP,
  author =       "Benny Applebaum",
  title =        "Cryptography in Constant Parallel Time",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xvi + 193 + 3",
  year =         "2014",
  DOI =          "https://doi.org/10.1007/978-3-642-17367-7",
  ISBN =         "3-642-17366-7, 3-642-17367-5 (e-book)",
  ISBN-13 =      "978-3-642-17366-0, 978-3-642-17367-7 (e-book)",
  ISSN =         "1619-7100 (print), 2197-845X (electronic)",
  ISSN-L =       "1619-7100",
  LCCN =         "QA76.9.M35; TK5102.94 QA76.9.A25",
  bibdate =      "Sat Jun 10 08:35:15 MDT 2017",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  series =       "Information Security and Cryptography",
  abstract =     "Locally computable (NC0) functions are ``simple''
                 functions for which every bit of the output can be
                 computed by reading a small number of bits of their
                 input. The study of locally computable cryptography
                 attempts to construct cryptographic functions that
                 achieve this strong notion of simplicity and
                 simultaneously provide a high level of security. Such
                 constructions are highly parallelizable and they can be
                 realized by Boolean circuits of constant depth. This
                 book establishes, for the first time, the possibility
                 of local implementations for many basic cryptographic
                 primitives such as one-way functions, pseudorandom
                 generators, encryption schemes and digital signatures.
                 It also extends these results to other stronger notions
                 of locality, and addresses a wide variety of
                 fundamental questions about local cryptography. The
                 author's related thesis was honorably mentioned
                 (runner-up) for the ACM Dissertation Award in 2007, and
                 this book includes some expanded sections and proofs,
                 and notes on recent developments. The book assumes only
                 a minimal background in computational complexity and
                 cryptography and is therefore suitable for graduate
                 students or researchers in related areas who are
                 interested in parallel cryptography. It also introduces
                 general techniques and tools which are likely to
                 interest experts in the area.",
  acknowledgement = ack-nhfb,
  subject =      "Berechnungskomplexit{\"a}t; Kryptologie.",
  tableofcontents = "1. Introduction \\
                 2. Preliminaries and definitions \\
                 3. Randomized encoding of functions \\
                 4. Cryptography in NC0 \\
                 5. Computationally private randomizing polynomials and
                 their applications \\
                 6. One-way functions with optimal output locality \\
                 7. On pseudorandom generators with linear stretch in
                 NC0 \\
                 8. Cryptography with constant input locality \\
                 App. A, On Collections of Cryptographic Primitives",
}

@Article{Applebaum:2014:HGA,
  author =       "Benny Applebaum and Yuval Ishai and Eyal Kushilevitz",
  title =        "How to Garble Arithmetic Circuits",
  journal =      j-SIAM-J-COMPUT,
  volume =       "43",
  number =       "2",
  pages =        "905--929",
  month =        "????",
  year =         "2014",
  CODEN =        "SMJCAT",
  DOI =          "https://doi.org/10.1137/120875193",
  ISSN =         "0097-5397 (print), 1095-7111 (electronic)",
  ISSN-L =       "0097-5397",
  bibdate =      "Sat Sep 13 11:18:32 MDT 2014",
  bibsource =    "http://epubs.siam.org/sam-bin/dbq/toclist/SICOMP/43/2;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/siamjcomput.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "SIAM Journal on Computing",
  journal-URL =  "http://epubs.siam.org/sicomp",
  onlinedate =   "January 2014",
}

@Article{Asharov:2014:TCC,
  author =       "Gilad Asharov",
  title =        "Towards Characterizing Complete Fairness in Secure
                 Two-Party Computation",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "8349",
  pages =        "291--316",
  year =         "2014",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-54242-8_13",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 21 08:39:11 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2014a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-54242-8_13/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-54242-8",
  book-URL =     "http://www.springerlink.com/content/978-3-642-54242-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Ashraf:2014:MTG,
  author =       "Muhammad Ashraf and Baris B{\"u}lent Kirlar",
  title =        "Message transmission for {GH}-public key
                 cryptosystem",
  journal =      j-J-COMPUT-APPL-MATH,
  volume =       "259 (part B)",
  number =       "??",
  pages =        "578--585",
  day =          "15",
  month =        mar,
  year =         "2014",
  CODEN =        "JCAMDI",
  ISSN =         "0377-0427 (print), 1879-1778 (electronic)",
  ISSN-L =       "0377-0427",
  bibdate =      "Sat Feb 25 13:34:02 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcomputapplmath2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0377042713005499",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computational and Applied Mathematics",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03770427",
}

@Article{Au:2014:SMV,
  author =       "Man Ho Au and Guomin Yang and Willy Susilo and Yunmei
                 Zhang",
  title =        "({Strong}) multidesignated verifiers signatures secure
                 against rogue key attack",
  journal =      j-CCPE,
  volume =       "26",
  number =       "8",
  pages =        "1574--1592",
  day =          "10",
  month =        jun,
  year =         "2014",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.3094",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Fri May 30 08:55:43 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "5 Jul 2013",
}

@Book{Aumasson:2014:HFB,
  author =       "Jean-Philippe Aumasson and Willi Meier and Raphael
                 C.-W. Phan and Luca Henzen",
  title =        "The Hash Function {BLAKE}",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xviii + 228 + 18",
  year =         "2014",
  DOI =          "https://doi.org/10.1007/978-3-662-44757-4",
  ISBN =         "3-662-44756-8 (print), 3-662-44757-6 (e-book)",
  ISBN-13 =      "978-3-662-44756-7 (print), 978-3-662-44757-4
                 (e-book)",
  ISSN =         "1619-7100 (print), 2197-845X (electronic)",
  ISSN-L =       "1619-7100",
  LCCN =         "QA76.9.H36 A96 2014",
  bibdate =      "Sat Jun 10 08:35:22 MDT 2017",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  series =       "Information Security and Cryptography",
  abstract =     "This is a comprehensive description of the
                 cryptographic hash function BLAKE, one of the five
                 final contenders in the NIST SHA3 competition, and of
                 BLAKE2, an improved version popular among developers.
                 It describes how BLAKE was designed and why BLAKE2 was
                 developed, and it offers guidelines on implementing and
                 using BLAKE, with a focus on software implementation.
                 In the first two chapters, the authors offer a short
                 introduction to cryptographic hashing, the SHA3
                 competition, and BLAKE. They review applications of
                 cryptographic hashing, they describe some basic notions
                 such as security definitions and state-of-the-art
                 collision search methods, and they present SHA1, SHA2,
                 and the SHA3 finalists. In the chapters that follow,
                 the authors give a complete description of the four
                 instances BLAKE-256, BLAKE-512, BLAKE-224, and
                 BLAKE-384; they describe applications of BLAKE,
                 including simple hashing with or without a salt, and
                 HMAC and PBKDF2 constructions; they review
                 implementation techniques, from portable C and Python
                 to AVR assembly and vectorized code using SIMD CPU
                 instructions; they describe BLAKE's properties with
                 respect to hardware design for implementation in ASICs
                 or FPGAs; they explain BLAKE's design rationale in
                 detail, from NIST's requirements to the choice of
                 internal parameters; they summarize the known security
                 properties of BLAKE and describe the best attacks on
                 reduced or modified variants; and they present BLAKE2,
                 the successor of BLAKE, starting with motivations and
                 also covering its performance and security aspects. The
                 book concludes with detailed test vectors, a reference
                 portable C implementation of BLAKE, and a list of
                 third-party software implementations of BLAKE and
                 BLAKE2. The book is oriented towards practice -
                 engineering and craftsmanship - rather than theory. It
                 is suitable for developers, engineers, and security
                 professionals engaged with BLAKE and cryptographic
                 hashing in general, and for applied cryptography
                 researchers and students who need a consolidated
                 reference and a detailed description of the design
                 process, or guidelines on how to design a cryptographic
                 algorithm.",
  acknowledgement = ack-nhfb,
  shorttableofcontents = "Introduction \\
                 Preliminaries \\
                 Specification of BLAKE \\
                 Using BLAKE \\
                 BLAKE in Software \\
                 BLAKE in Hardware \\
                 Design Rationale \\
                 Security of BLAKE \\
                 BLAKE2 \\
                 Conclusion \\
                 References \\
                 App. A, Test Vectors \\
                 App. B, Reference C Code \\
                 App. C, Third-Party Software \\
                 Index",
  subject =      "BLAKE",
  tableofcontents = "Introduction / 1 \\
                 1.1 Cryptographic Hashing / 1 \\
                 1.2 The SHA3 Competition / 2 \\
                 1.3 BLAKE, in a Nutshell / 5 \\
                 1.4 Conventions / 6 \\
                 2 Preliminaries / 9 \\
                 2.1 Applications / 9 \\
                 2.1.1 Modification Detection / 9 \\
                 2.1.2 Message Authentication / 10 \\
                 2.1.3 Digital Signatures / 11 \\
                 2.1.4 Pseudorandom Functions / 12 \\
                 2.1.5 Entropy Extraction and Key Derivation / 13 \\
                 2.1.6 Password Hashing / 13 \\
                 2.1.7 Data Identification / 14 \\
                 2.1.8 Key Update / 14 \\
                 2.1.9 Proof-of-Work Systems / 14 \\
                 2.1.10 Timestamping / 15 \\
                 2.2 Security Notions / 15 \\
                 2.2.1 Security Models / 15 \\
                 2.2.2 Classical Security Definitions / 17 \\
                 2.2.3 General Security Definition / 19 \\
                 2.3 Black-Box Collision Search / 20 \\
                 2.3.1 Cycles and Tails / 20 \\
                 2.3.2 Cycle Detection / 21 \\
                 2.3.3 Parallel Collision Search / 22 \\
                 2.3.4 Application to Meet-in-the-Middle / 22 \\
                 2.3.5 Quantum Collision Search / 23 \\
                 2.4 Constructing Hash Functions / 24 \\
                 2.4.1 Merkle-Damgard / 24 \\
                 2.4.2 HAIFA / 27 \\
                 2.4.3 Wide-Pipe / 27 \\
                 2.4.4 Sponge Functions / 27 \\
                 2.4.5 Compression Functions / 28 \\
                 2.5 The SHA Family / 31 \\
                 2.5.1 SHA1 / 31 \\
                 2.5.2 SHA2 / 32 \\
                 2.5.3 SHA3 Finalists / 34 \\
                 3 Specification of BLAKE / 37 \\
                 3.1 BLAKE-256 / 37 \\
                 3.1.1 Constant Parameters / 37 \\
                 3.1.2 Compression Function / 38 \\
                 3.1.3 Iteration Mode / 40 \\
                 3.2 BLAKE-512 / 41 \\
                 3.2.1 Constant Parameters / 41 \\
                 3.2.2 Compression Function / 42 \\
                 3.2.3 Iteration Mode / 42 \\
                 3.3 BLAKE-224 / 43 \\
                 3.4 BLAKE-384 / 43 \\
                 3.5 Toy Versions / 44 \\
                 4 Using BLAKE / 45 \\
                 4.1 Simple Hashing / 45 \\
                 4.1.1 Description / 45 \\
                 4.1.2 Hashing a Large File with BLAKE-256 / 46 \\
                 4.1.3 Hashing a Bit with BLAKE-512 / 48 \\
                 4.1.4 Hashing the Empty String with BLAKE-512 / 49 \\
                 4.2 Hashing with a Salt / 49 \\
                 4.2.1 Description / 49 \\
                 4.2.2 Hashing a Bit with BLAKE-512 and a Salt / 49 \\
                 4.3 Message Authentication with HMAC / 50 \\
                 4.3.1 Description / 50 \\
                 4.3.2 Authenticating a File with HMAC-BLAKE-512 / 50
                 \\
                 4.4 Password-Based Key Derivation with PBKDF2 / 53 \\
                 4.4.1 Basic Description / 53 \\
                 4.4.2 Generating a Key with PBKDF2-HMAC-BLAKE-224 / 53
                 \\
                 5 BLAKE in Software / 55 \\
                 5.1 Straightforward Implementation / 55 \\
                 5.1.1 Portable C / 55 \\
                 5.1.2 Other Languages / 58 \\
                 5.2 Embedded Systems / 60 \\
                 5.2.1 8-Bit AVR / 60 \\
                 5.2.2 32-Bit ARM / 62 \\
                 5.3 Vectorized Implementation Principle / 64 \\
                 5.4 Vectorized Implementation with SSE Extensions / 64
                 \\
                 5.4.1 Streaming SIMD Extensions 2 (SSE2) / 64 \\
                 5.4.2 Implementing BLAKE-256 with SSE2 / 65 \\
                 5.4.3 Implementing BLAKE-512 with SSE2 / 66 \\
                 5.4.4 Implementations with SSSE3 and SSE4.1 / 70 \\
                 5.5 Vectorized Implementation with AVX2 Extensions / 70
                 \\
                 5.5.1 Relevant AVX2 Instructions / 71 \\
                 5.5.2 Implementing BLAKE-512 with AVX2 / 73 \\
                 5.5.3 Implementing BLAKE-256 with AVX2 / 77 \\
                 5.6 Vectorized Implementation with XOP Extensions / 79
                 \\
                 5.6.1 Relevant XOP Instructions / 80 \\
                 5.6.2 Implementing BLAKE with XOP / 80 \\
                 5.7 Vectorized Implementation with NEON Extensions / 83
                 \\
                 5.7.1 Relevant NEON Instructions / 83 \\
                 5.7.2 Implementing BLAKE-256 with NEON / 84 \\
                 5.7.3 Implementing BLAKE-512 with NEON / 86 \\
                 5.8 Performance / 88 \\
                 5.8.1 Speed Summary / 89 \\
                 5.8.2 8-Bit AVR / 90 \\
                 5.8.3 ARM Platforms / 91 \\
                 5.8.4 x86 Platforms (32-bit) / 91 \\
                 5.8.5 amd64 Platforms (64-bit) / 92 \\
                 5.8.6 Other Platforms / 93 \\
                 6 BLAKE in Hardware / 97 \\
                 6.1 RTL Design / 97 \\
                 6.2 ASIC Implementation / 98 \\
                 6.2.1 High-Speed Design / 98 \\
                 6.2.2 Compact Design / 100 \\
                 6.3 FPGA Design / 100 \\
                 6.4 Performance / 101 \\
                 6.4.1 ASIC / 102 \\
                 6.4.2 FPGA / 102 \\
                 6.4.3 Discussion / 105 \\
                 7 Design Rationale / 107 \\
                 7.1 NIST Call for Submissions / 107 \\
                 7.1.1 General Requirements / 107 \\
                 7.1.2 Technical and Security Requirements / 109 \\
                 7.1.3 Could SHA2 Be SHA3? / 110 \\
                 7.2 Needs Analysis Ill 7.2.1 Ease of Implementation /
                 112 \\
                 7.2.2 Performance / 113 \\
                 7.2.3 Security / 113 \\
                 7.2.4 Extra Features / 114 \\
                 7.3 Design Philosophy / 114 \\
                 7.3.1 Minimalism / 115 \\
                 7.3.2 Robustness / 119 \\
                 7.3.3 Versatility / 120 \\
                 7.4 Design Choices / 120 \\
                 7.4.1 General Choices / 121 \\
                 7.4.2 Iteration Mode / 122 \\
                 7.4.3 Core Algorithm / 122 \\
                 7.4.4 Rotation Counts / 125 \\
                 7.4.5 Permutations / 126 \\
                 7.4.6 Number of Rounds / 128 \\
                 7.4.7 Constants / 128 \\
                 8 Security of BLAKE / 131 \\
                 8.1 Differential Cryptanalysis / 131 \\
                 8.1.1 Differences and Differentials / 132 \\
                 8.1.2 Finding Good Differentials / 133 \\
                 8.2 Properties of BLAKE's G Function / 133 \\
                 8.2.1 Basic Properties / 134 \\
                 8.2.2 Differential Properties of G / 136 \\
                 8.3 Properties of the Round Function / 141 \\
                 8.3.1 Bijectivity / 141 \\
                 8.3.2 Diffusion and Low-Weight Differences / 142 \\
                 8.3.3 Invertibility / 145 \\
                 8.3.4 Impossible Differentials / 147 \\
                 8.4 Properties of the Compression Function / 151 \\
                 8.4.1 Finalization / 151 \\
                 8.4.2 Local Collisions / 152 \\
                 8.4.3 Fixed Points / 152 \\
                 8.4.4 Fixed Point Collisions / 153 \\
                 8.4.5 Pseudorandomness / 153 \\
                 8.5 Security Against Generic Attacks / 154 \\
                 8.5.1 Indifferentiability / 154 \\
                 8.5.2 Length Extension / 155 \\
                 8.5.3 Collision Multiplication / 155 \\
                 8.5.4 Multicollisions / 156 \\
                 8.5.5 Second Preimages / 157 \\
                 8.6 Attacks on Reduced BLAKE / 158 \\
                 8.6.1 Preimage Attacks / 158 \\
                 8.6.2 Near-Collision Attack / 159 \\
                 8.6.3 Boomerang Distinguisher / 160 \\
                 8.6.4 Iterative Characteristics / 161 \\
                 8.6.5 Breaking BLOKE / 163 \\
                 8.6.6 Attack on a Variant with Identical Constants /
                 163 \\
                 9 BLAKE2 / 165 \\
                 9.1 Motivations / 165 \\
                 9.2 Differences with BLAKE / 166 \\
                 9.2.1 Fewer Rounds / 167 \\
                 9.2.2 Rotations Optimized for Speed / 167 \\
                 9.2.3 Minimal Padding / 168 \\
                 9.2.4 Finalization Flags / 168 \\
                 9.2.5 Fewer Constants '68 9.2.6 Little-Endianness / 169
                 \\
                 9.2.7 Counter in Bytes / 170 \\
                 9.2.8 Salt Processing / 170 \\
                 9.2.9 Parameter Block / 170 \\
                 9.3 Keyed Hashing (MAC and PRF) / 172 \\
                 9.4 Tree Hashing / 172 \\
                 9.4.1 Basic Mechanism / 173 \\
                 9.4.2 Message Parsing / 174 \\
                 9.4.3 Special Cases / 174 \\
                 9.4.4 Generic Tree Parameters / 175 \\
                 9.4.5 Updatable Hashing Example / 175 \\
                 9.5 Parallel Hashing: BLAKE2sp and BLAKE2bp / 176 \\
                 9.6 Performance / 177 \\
                 9.6.1 Why BLAKE2 Is Fast in Software / 177 \\
                 9.6.2 64-bit Platforms / 178 \\
                 9.6.3 Low-End Platforms / 179 \\
                 9.6.4 Hardware / 180 \\
                 9.7 Security / 180 \\
                 9.7.1 BLAKE Legacy / 180 \\
                 9.7.2 Implications of BLAKE2 Tweaks / 181 \\
                 9.7.3 Third-Party Cryptanalysis / 181 \\
                 10 Conclusion / 185 \\
                 References / 187 \\
                 A Test Vectors / 195 \\
                 A.1 BLAKE-256 / 195 \\
                 A.1.1 One-Block Message / 195 \\
                 A.1.2 Two-Block Message / 196 \\
                 A.2 BLAKE-224 / 198 \\
                 A.2.1 One-Block Message / 198 \\
                 A.2.2 Two-Block Message / 199 \\
                 A.3 BLAKE-512 / 201 \\
                 A.3.1 One-Block Message / 201 \\
                 A.3.2 Two-Block Message / 202 \\
                 A.4 BLAKE-384 / 205 \\
                 A.4.1 One-Block Message / 205 \\
                 A.4.2 Two-Block Message / 206 \\
                 B Reference C Code / 209 \\
                 B.1 blake.h / 209 \\
                 B.2 blake224.c / 211 \\
                 B.3 blake256.c / 214 \\
                 B.4 blake384.c / 217 \\
                 B.5 blake512.c / 220 \\
                 C Third-Party Software / 225 \\
                 C.1 BLAKE / 225 \\
                 C.2 BLAKE2 / 226 \\
                 Index / 227",
}

@Article{Azarderakhsh:2014:NDP,
  author =       "R. Azarderakhsh and K. Karabina",
  title =        "A New Double Point Multiplication Algorithm and Its
                 Application to Binary Elliptic Curves with
                 Endomorphisms",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "63",
  number =       "10",
  pages =        "2614--2619",
  month =        oct,
  year =         "2014",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2013.112",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Thu Nov 06 07:29:34 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
  keywords =     "binary elliptic curves; computable endomorphisms;
                 differential addition chains; double point
                 multiplication; double point multiplication algorithm;
                 Elliptic curve cryptosystems; endomorphism; hardware
                 implementation; parallel multipliers; public key
                 cryptography; side channel analysis attacks; single
                 point multiplication",
}

@Article{Babamir:2014:AKP,
  author =       "Faezeh Sadat Babamir and Ali Norouzi",
  title =        "Achieving Key Privacy and Invisibility for Unattended
                 Wireless Sensor Networks in Healthcare",
  journal =      j-COMP-J,
  volume =       "57",
  number =       "4",
  pages =        "624--635",
  month =        apr,
  year =         "2014",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxt046",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Wed Mar 26 15:06:42 MDT 2014",
  bibsource =    "http://comjnl.oxfordjournals.org/content/57/3.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/57/4/624.full.pdf+html",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "May 8, 2013",
}

@Article{Bailey:2014:UIA,
  author =       "Kyle O. Bailey and James S. Okolica and Gilbert L.
                 Peterson",
  title =        "User identification and authentication using
                 multi-modal behavioral biometrics",
  journal =      j-COMPUT-SECUR,
  volume =       "43",
  number =       "??",
  pages =        "77--89",
  month =        jun,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000340",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Barak:2014:OEF,
  author =       "Boaz Barak and Nir Bitansky and Ran Canetti and Yael
                 Tauman Kalai and Omer Paneth and Amit Sahai",
  title =        "Obfuscation for Evasive Functions",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "8349",
  pages =        "26--51",
  year =         "2014",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-54242-8_2",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 21 08:39:11 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2014a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-54242-8_2/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-54242-8",
  book-URL =     "http://www.springerlink.com/content/978-3-642-54242-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Barbulescu:2014:HQP,
  author =       "Razvan Barbulescu and Pierrick Gaudry and Antoine Joux
                 and Emmanuel Thom{\'e}",
  title =        "A Heuristic Quasi-Polynomial Algorithm for Discrete
                 Logarithm in Finite Fields of Small Characteristic",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "8441",
  pages =        "1--16",
  year =         "2014",
  DOI =          "https://doi.org/10.1007/978-3-642-55220-5_1",
  bibdate =      "Wed May 21 10:08:33 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  remark =       "See also press release about the significance of this
                 work \cite{CNRS:2014:NAS}.",
}

@Article{Barthe:2014:PRV,
  author =       "Gilles Barthe and C{\'e}dric Fournet and Benjamin
                 Gr{\'e}goire and Pierre-Yves Strub and Nikhil Swamy and
                 Santiago Zanella-B{\'e}guelin",
  title =        "Probabilistic relational verification for
                 cryptographic implementations",
  journal =      j-SIGPLAN,
  volume =       "49",
  number =       "1",
  pages =        "193--205",
  month =        jan,
  year =         "2014",
  CODEN =        "SINODQ",
  DOI =          "https://doi.org/10.1145/2578855.2535847",
  ISSN =         "0362-1340 (print), 1523-2867 (print), 1558-1160
                 (electronic)",
  ISSN-L =       "0362-1340",
  bibdate =      "Tue Mar 4 17:04:57 MST 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigplan2010.bib",
  note =         "POPL '14 conference proceedings.",
  abstract =     "Relational program logics have been used for
                 mechanizing formal proofs of various cryptographic
                 constructions. With an eye towards scaling these
                 successes towards end-to-end security proofs for
                 implementations of distributed systems, we present RF*,
                 a relational extension of F*, a general-purpose
                 higher-order stateful programming language with a
                 verification system based on refinement types. The
                 distinguishing feature of F* is a relational Hoare
                 logic for a higher-order, stateful, probabilistic
                 language. Through careful language design, we adapt the
                 F* typechecker to generate both classic and relational
                 verification conditions, and to automatically discharge
                 their proofs using an SMT solver. Thus, we are able to
                 benefit from the existing features of F*, including its
                 abstraction facilities for modular reasoning about
                 program fragments. We evaluate RF* experimentally by
                 programming a series of cryptographic constructions and
                 protocols, and by verifying their security properties,
                 ranging from information flow to unlinkability,
                 integrity, and privacy. Moreover, we validate the
                 design of RF* by formalizing in Coq a core
                 probabilistic \lambda calculus and a relational
                 refinement type system and proving the soundness of the
                 latter against a denotational semantics of the
                 probabilistic lambda \lambda calculus.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGPLAN Notices",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J706",
}

@Article{Basin:2014:KYE,
  author =       "David Basin and Cas Cremers",
  title =        "Know Your Enemy: Compromising Adversaries in Protocol
                 Analysis",
  journal =      j-TISSEC,
  volume =       "17",
  number =       "2",
  pages =        "7:1--7:??",
  month =        nov,
  year =         "2014",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/2658996",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Wed Nov 19 12:26:42 MST 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tissec.bib",
  abstract =     "We present a symbolic framework, based on a modular
                 operational semantics, for formalizing different
                 notions of compromise relevant for the design and
                 analysis of cryptographic protocols. The framework's
                 rules can be combined to specify different adversary
                 capabilities, capturing different practically-relevant
                 notions of key and state compromise. The resulting
                 adversary models generalize the models currently used
                 in different domains, such as security models for
                 authenticated key exchange. We extend an existing
                 security-protocol analysis tool, Scyther, with our
                 adversary models. This extension systematically
                 supports notions such as weak perfect forward secrecy,
                 key compromise impersonation, and adversaries capable
                 of state-reveal queries. Furthermore, we introduce the
                 concept of a protocol-security hierarchy, which
                 classifies the relative strength of protocols against
                 different adversaries. In case studies, we use Scyther
                 to analyse protocols and automatically construct
                 protocol-security hierarchies in the context of our
                 adversary models. Our analysis confirms known results
                 and uncovers new attacks. Additionally, our hierarchies
                 refine and correct relationships between protocols
                 previously reported in the cryptographic literature.",
  acknowledgement = ack-nhfb,
  articleno =    "7",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@TechReport{Bax:2014:PPD,
  author =       "Stephen Bax",
  title =        "A proposed partial decoding of the {Voynich} script",
  type =         "Web report",
  institution =  "Centre for Research in English Language Learning and
                 Assessment (CRELLA), University of Bedfordshire",
  address =      "Luton, Bedfordshire, UK, LU1 3JU",
  pages =        "62",
  month =        jan,
  year =         "2014",
  bibdate =      "Sat Mar 15 11:30:03 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://stephenbax.net/wp-content/uploads/2014/01/Voynich-a-provisional-partial-decoding-BAX.pdf",
  acknowledgement = ack-nhfb,
}

@Article{Beimel:2014:CCW,
  author =       "Amos Beimel and Yuval Ishai and Ranjit Kumaresan and
                 Eyal Kushilevitz",
  title =        "On the Cryptographic Complexity of the Worst
                 Functions",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "8349",
  pages =        "317--342",
  year =         "2014",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-54242-8_14",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 21 08:39:11 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2014a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-54242-8_14/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-54242-8",
  book-URL =     "http://www.springerlink.com/content/978-3-642-54242-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Beimel:2014:MLS,
  author =       "Amos Beimel and Aner Ben-Efraim and Carles Padr{\'o}
                 and Ilya Tyomkin",
  title =        "Multi-linear Secret-Sharing Schemes",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "8349",
  pages =        "394--418",
  year =         "2014",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-54242-8_17",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 21 08:39:11 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2014a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-54242-8_17/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-54242-8",
  book-URL =     "http://www.springerlink.com/content/978-3-642-54242-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Belkacem:2014:DCM,
  author =       "Samia Belkacem and Zohir Dibi and Ahmed Bouridane",
  title =        "{DCT} Coefficients Modelling for Image Watermarking",
  journal =      j-INT-J-COMPUT-APPL,
  volume =       "36",
  number =       "4",
  pages =        "155--163",
  year =         "2014",
  DOI =          "https://doi.org/10.2316/Journal.202.2014.4.202-4017",
  ISSN =         "1206-212X (print), 1925-7074 (electronic)",
  ISSN-L =       "1206-212X",
  bibdate =      "Sat Apr 21 17:29:40 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijca.bib",
  URL =          "https://www.tandfonline.com/doi/full/10.2316/Journal.202.2014.4.202-4017",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Computer Applications",
  journal-URL =  "https://www.tandfonline.com/loi/tjca20",
  online-date =  "10 Jul 2015",
}

@TechReport{Bellare:2014:SSEa,
  author =       "Mihir Bellare and Kenneth Paterson and Phillip
                 Rogaway",
  title =        "Security of Symmetric Encryption against Mass
                 Surveillance",
  type =         "Cryptology {ePrint} Archive report",
  number =       "2014/438",
  institution =  "Department of Computer Science and Engineering,
                 University of California San Diego",
  address =      "San Diego, CA, USA",
  year =         "2014",
  bibdate =      "Wed Jul 16 11:27:21 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://eprint.iacr.org",
  abstract =     "Motivated by revelations concerning population-wide
                 surveillance of encrypted communications, we formalize
                 and investigate the resistance of symmetric encryption
                 schemes to mass surveillance. The focus is on
                 algorithm-substitution attacks (ASAs), where a
                 subverted encryption algorithm replaces the real one.
                 We assume that the goal of `big brother' is
                 undetectable subversion, meaning that ciphertexts
                 produced by the subverted encryption algorithm should
                 reveal plaintexts to big brother yet be
                 indistinguishable to users from those produced by the
                 real encryption scheme. We formalize security notions
                 to capture this goal and then offer both attacks and
                 defenses. In the first category we show that successful
                 (from the point of view of big brother) ASAs may be
                 mounted on a large class of common symmetric encryption
                 schemes. In the second category we show how to design
                 symmetric encryption schemes that avoid such attacks
                 and meet our notion of security. The lesson that
                 emerges is the danger of choice: randomized, stateless
                 schemes are subject to attack while deterministic,
                 stateful ones are not.",
  acknowledgement = ack-nhfb,
  keywords =     "algorithm-substitution attack (ASA); kleptography",
}

@InProceedings{Bellare:2014:SSEb,
  author =       "Mihir Bellare and Kenneth Paterson and Phillip
                 Rogaway",
  editor =       "????",
  booktitle =    "Advances in Cryptology -- {CRYPTO 2014}",
  title =        "Security of Symmetric Encryption against Mass
                 Surveillance",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "1--19",
  year =         "2014",
  DOI =          "????",
  ISBN =         "????",
  ISBN-13 =      "????",
  LCCN =         "????",
  bibdate =      "Mon Mar 09 11:24:22 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "????",
  acknowledgement = ack-nhfb,
  remark =       "Cite in \cite[reference 6]{Schneier:2015:SWC}.",
}

@Article{Bennett:2014:QCP,
  author =       "Charles H. Bennett and Gilles Brassard",
  title =        "Quantum cryptography: Public key distribution and coin
                 tossing",
  journal =      j-THEOR-COMP-SCI,
  volume =       "560 (part 1)",
  number =       "??",
  pages =        "7--11",
  day =          "4",
  month =        dec,
  year =         "2014",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Thu Mar 19 06:15:48 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2015.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0304397514004241",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975/",
}

@Article{Bera:2014:QC,
  author =       "Subhendu Bera",
  title =        "Quantum cryptography",
  journal =      j-LINUX-J,
  volume =       "2014",
  number =       "237",
  pages =        "1:1--1:??",
  month =        jan,
  year =         "2014",
  CODEN =        "LIJOFX",
  ISSN =         "1075-3583 (print), 1938-3827 (electronic)",
  ISSN-L =       "1075-3583",
  bibdate =      "Thu Feb 6 07:16:21 MST 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/linux-journal.bib",
  abstract =     "Classical cryptography may not be good enough in
                 providing security in the near future.",
  acknowledgement = ack-nhfb,
  articleno =    "1",
  fjournal =     "Linux Journal",
  journal-URL =  "http://portal.acm.org/citation.cfm?id=J508",
}

@TechReport{Bernstein:2014:CKR,
  author =       "Daniel J. Bernstein and Chitchanok Chuengsatiansup and
                 Tanja Lange",
  title =        "{Curve41417}: {Karatsuba} revisited",
  type =         "Report",
  institution =  "Department of Computer Science, University of Illinois
                 at Chicago, and Department of Mathematics and Computer
                 Science, Technische Universiteit Eindhoven",
  address =      "Chicago, IL 60607-7045, USA and P.O. Box 513, 5600 MB
                 Eindhoven, The Netherlands",
  pages =        "19",
  day =          "6",
  month =        jul,
  year =         "2014",
  bibdate =      "Mon Oct 06 15:45:44 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://cr.yp.to/ecdh/curve41417-20140706.pdf",
  abstract =     "This paper introduces constant-time ARM Cortex-A8 ECDH
                 software that (1) is faster than the fastest ECDH
                 option in the latest version of OpenSSL but (2)
                 achieves a security level above $ 2^{200} $ using a
                 prime above $ 2^{400} $. For comparison, this OpenSSL
                 ECDH option is not constant-time and has a security
                 level of only $ 2^{80} $. The new speeds are achieved
                 in a quite different way from typical prime-field ECC
                 software: they rely on a synergy between Karatsuba's
                 method and choices of radix smaller than the CPU word
                 size.",
  acknowledgement = ack-nhfb,
  keywords =     "Curve41417; Edwards curves; elliptic curve
                 cryptography; Karatsuba; performance; radix choices;
                 reduced refined Karatsuba; refined Karatsuba;
                 vectorization",
}

@Article{Bernstein:2014:HEC,
  author =       "Daniel J. Bernstein and Tanja Lange",
  title =        "Hyper-and-elliptic-curve cryptography",
  journal =      j-LMS-J-COMPUT-MATH,
  volume =       "17",
  number =       "A",
  pages =        "181--202",
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1112/S1461157014000394",
  ISSN =         "1461-1570",
  bibdate =      "Tue Sep 9 12:34:13 MDT 2014",
  bibsource =    "http://journals.cambridge.org/action/displayJournal?jid=JCM;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lms-j-comput-math.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "LMS J. Comput. Math.",
  fjournal =     "LMS Journal of Computation and Mathematics",
  onlinedate =   "05 August 2014",
  remark =       "Algorithmic Number Theory Symposium XI.",
}

@Article{Bhattacherjee:2014:CAT,
  author =       "Sanjay Bhattacherjee and Palash Sarkar",
  title =        "Concrete Analysis and Trade-Offs for the (Complete
                 Tree) Layered Subset Difference Broadcast Encryption
                 Scheme",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "63",
  number =       "7",
  pages =        "1709--1722",
  month =        jul,
  year =         "2014",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2013.68",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Mon Aug 25 08:24:32 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Bhuyan:2014:DDD,
  author =       "Monowar H. Bhuyan and H. J. Kashyap and D. K.
                 Bhattacharyya and J. K. Kalita",
  title =        "Detecting Distributed Denial of Service Attacks:
                 Methods, Tools and Future Directions",
  journal =      j-COMP-J,
  volume =       "57",
  number =       "4",
  pages =        "537--556",
  month =        apr,
  year =         "2014",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxt031",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Wed Mar 26 15:06:42 MDT 2014",
  bibsource =    "http://comjnl.oxfordjournals.org/content/57/3.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/57/4/537.full.pdf+html",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "March 28, 2013",
}

@Article{Biryukov:2014:DEA,
  author =       "Alex Biryukov and Jorge {Nakahara, Jr.} and Hamdi
                 Murat Yildirim",
  title =        "Differential entropy analysis of the {IDEA} block
                 cipher",
  journal =      j-J-COMPUT-APPL-MATH,
  volume =       "259 (part B)",
  number =       "??",
  pages =        "561--570",
  day =          "15",
  month =        mar,
  year =         "2014",
  CODEN =        "JCAMDI",
  ISSN =         "0377-0427 (print), 1879-1778 (electronic)",
  ISSN-L =       "0377-0427",
  bibdate =      "Sat Feb 25 13:34:02 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcomputapplmath2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0377042713003981",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computational and Applied Mathematics",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03770427",
}

@Article{Bojinov:2014:NMC,
  author =       "Hristo Bojinov and Daniel Sanchez and Paul Reber and
                 Dan Boneh and Patrick Lincoln",
  title =        "Neuroscience meets cryptography: crypto primitives
                 secure against rubber hose attacks",
  journal =      j-CACM,
  volume =       "57",
  number =       "5",
  pages =        "110--118",
  month =        may,
  year =         "2014",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2594445",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 21 10:20:12 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cacm2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "Cryptographic systems often rely on the secrecy of
                 cryptographic keys given to users. Many schemes,
                 however, cannot resist coercion attacks where the user
                 is forcibly asked by an attacker to reveal the key.
                 These attacks, known as rubber hose cryptanalysis, are
                 often the easiest way to defeat cryptography. We
                 present a defense against coercion attacks using the
                 concept of implicit learning from cognitive psychology.
                 Implicit learning refers to learning of patterns
                 without any conscious knowledge of the learned pattern.
                 We use a carefully crafted computer game to allow a
                 user to implicitly learn a secret password without them
                 having any explicit or conscious knowledge of the
                 trained password. While the trained secret can be used
                 for authentication, participants cannot be coerced into
                 revealing it since they have no conscious knowledge of
                 it. We performed a number of user studies using
                 Amazon's Mechanical Turk to verify that participants
                 can successfully re-authenticate over time and that
                 they are unable to reconstruct or even robustly
                 recognize the trained secret.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Boldyreva:2014:MEW,
  author =       "Alexandra Boldyreva and Paul Grubbs",
  title =        "Making encryption work in the cloud",
  journal =      j-NETWORK-SECURITY,
  volume =       "2014",
  number =       "10",
  pages =        "8--10",
  month =        oct,
  year =         "2014",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(14)70101-1",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 17:01:12 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485814701011",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Bosch:2014:SPS,
  author =       "Christoph B{\"o}sch and Pieter Hartel and Willem
                 Jonker and Andreas Peter",
  title =        "A Survey of Provably Secure Searchable Encryption",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "2",
  pages =        "18:1--18:??",
  month =        nov,
  year =         "2014",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2636328",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Nov 15 15:22:35 MST 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "We survey the notion of provably secure searchable
                 encryption (SE) by giving a complete and comprehensive
                 overview of the two main SE techniques: searchable
                 symmetric encryption (SSE) and public key encryption
                 with keyword search (PEKS). Since the pioneering work
                 of Song, Wagner, and Perrig (IEEE S{\&}P '00), the
                 field of provably secure SE has expanded to the point
                 where we felt that taking stock would provide benefit
                 to the community. The survey has been written primarily
                 for the nonspecialist who has a basic information
                 security background. Thus, we sacrifice full details
                 and proofs of individual constructions in favor of an
                 overview of the underlying key techniques. We
                 categorize and compare the different SE schemes in
                 terms of their security, efficiency, and functionality.
                 For the experienced researcher, we point out
                 connections between the many approaches to SE and
                 identify open research problems. Two major conclusions
                 can be drawn from our work. While the so-called
                 IND-CKA2 security notion becomes prevalent in the
                 literature and efficient (sublinear) SE schemes meeting
                 this notion exist in the symmetric setting, achieving
                 this strong form of security efficiently in the
                 asymmetric setting remains an open problem. We observe
                 that in multirecipient SE schemes, regardless of their
                 efficiency drawbacks, there is a noticeable lack of
                 query expressiveness that hinders deployment in
                 practice.",
  acknowledgement = ack-nhfb,
  articleno =    "18",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Botta:2014:PCI,
  author =       "Marco Botta and Davide Cavagnino and Victor Pomponiu",
  title =        "Protecting the Content Integrity of Digital Imagery
                 with Fidelity Preservation: An Improved Version",
  journal =      j-TOMCCAP,
  volume =       "10",
  number =       "3",
  pages =        "29:1--29:??",
  month =        apr,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2568224",
  ISSN =         "1551-6857 (print), 1551-6865 (electronic)",
  ISSN-L =       "1551-6857",
  bibdate =      "Tue Apr 15 12:20:53 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tomccap/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tomccap.bib",
  abstract =     "Fragile watermarking has attracted a lot of attention
                 in the last decade. An interesting approach, presented
                 in 2011 by Lin et al., results in very high quality of
                 the watermarked images. However, after a thorough
                 examination of the paper, a few improvements are
                 proposed in our revised version of the algorithm in
                 order to overcome some shortcomings. In particular,
                 changes to the pseudocode and modifications to deal
                 with pixel saturation are suggested, along with a way
                 to improve the scheme security. Finally, a deeper
                 analysis of the security is presented.",
  acknowledgement = ack-nhfb,
  articleno =    "29",
  fjournal =     "ACM Transactions on Multimedia Computing,
                 Communications, and Applications",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J961",
}

@Article{Boyle:2014:EO,
  author =       "Elette Boyle and Kai-Min Chung and Rafael Pass",
  title =        "On Extractability Obfuscation",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "8349",
  pages =        "52--73",
  year =         "2014",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-54242-8_3",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 21 08:39:11 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2014a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-54242-8_3/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-54242-8",
  book-URL =     "http://www.springerlink.com/content/978-3-642-54242-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Brakerski:2014:EFH,
  author =       "Zvika Brakerski and Vinod Vaikuntanathan",
  title =        "Efficient Fully Homomorphic Encryption from (Standard)
                 {$ \mathsf {LWE} $}",
  journal =      j-SIAM-J-COMPUT,
  volume =       "43",
  number =       "2",
  pages =        "831--871",
  month =        "????",
  year =         "2014",
  CODEN =        "SMJCAT",
  DOI =          "https://doi.org/10.1137/120868669",
  ISSN =         "0097-5397 (print), 1095-7111 (electronic)",
  ISSN-L =       "0097-5397",
  bibdate =      "Sat Sep 13 11:18:32 MDT 2014",
  bibsource =    "http://epubs.siam.org/sam-bin/dbq/toclist/SICOMP/43/2;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/siamjcomput.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "SIAM Journal on Computing",
  journal-URL =  "http://epubs.siam.org/sicomp",
  onlinedate =   "January 2014",
}

@Article{Brakerski:2014:LFH,
  author =       "Zvika Brakerski and Craig Gentry and Vinod
                 Vaikuntanathan",
  title =        "(Leveled) Fully Homomorphic Encryption without
                 Bootstrapping",
  journal =      j-TOCT,
  volume =       "6",
  number =       "3",
  pages =        "13:1--13:??",
  month =        jul,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2633600",
  ISSN =         "1942-3454 (print), 1942-3462 (electronic)",
  ISSN-L =       "1942-3454",
  bibdate =      "Thu Oct 1 16:40:04 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toct/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/toct.bib",
  abstract =     "We present a novel approach to fully homomorphic
                 encryption (FHE) that dramatically improves performance
                 and bases security on weaker assumptions. A central
                 conceptual contribution in our work is a new way of
                 constructing leveled, fully homomorphic encryption
                 schemes (capable of evaluating arbitrary
                 polynomial-size circuits of a-priori bounded depth),
                 without Gentry's bootstrapping procedure. Specifically,
                 we offer a choice of FHE schemes based on the learning
                 with error (LWE) or Ring LWE (RLWE) problems that have
                 2 \lambda security against known attacks. We construct
                 the following. (1) A leveled FHE scheme that can
                 evaluate depth-$L$ arithmetic circuits (composed of
                 fan-in 2 gates) using $ O(\lambda . L 3)$ per-gate
                 computation, quasilinear in the security parameter.
                 Security is based on RLWE for an approximation factor
                 exponential in $L$. This construction does not use the
                 bootstrapping procedure. (2) A leveled FHE scheme that
                 can evaluate depth-$L$ arithmetic circuits (composed of
                 fan-in 2 gates) using $ O (\lambda 2)$ per-gate
                 computation, which is independent of $L$. Security is
                 based on RLWE for quasipolynomial factors. This
                 construction uses bootstrapping as an optimization. We
                 obtain similar results for LWE, but with worse
                 performance. All previous (leveled) FHE schemes
                 required a per-gate computation of \Omega (\lambda
                 3.5), and all of them relied on subexponential hardness
                 assumptions. We introduce a number of further
                 optimizations to our scheme based on the Ring LWE
                 assumption. As an example, for circuits of large width
                 (e.g., where a constant fraction of levels have width $
                 \Omega (\lambda)$), we can reduce the per-gate
                 computation of the bootstrapped version to $ O
                 (\lambda)$, independent of $L$, by batching the
                 bootstrapping operation. At the core of our
                 construction is a new approach for managing the noise
                 in lattice-based ciphertexts, significantly extending
                 the techniques of Brakerski and Vaikuntanathan
                 [2011b].",
  acknowledgement = ack-nhfb,
  articleno =    "13",
  fjournal =     "ACM Transactions on Computation Theory",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1190",
  remark =       "Special issue on innovations in theoretical computer
                 science 2012 --- Part II.",
}

@Article{Brakerski:2014:VBB,
  author =       "Zvika Brakerski and Guy N. Rothblum",
  title =        "Virtual Black-Box Obfuscation for All Circuits via
                 Generic Graded Encoding",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "8349",
  pages =        "1--25",
  year =         "2014",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-54242-8_1",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 21 08:39:11 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2014a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-54242-8_1/;
                 http://link.springer.com/content/pdf/bfm:978-3-642-54242-8/1.pdf",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-54242-8",
  book-URL =     "http://www.springerlink.com/content/978-3-642-54242-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@InProceedings{Brubaker:2014:UFA,
  author =       "Chad Brubaker and Suman Jana and Baishakhi Ray and
                 Sarfraz Khurshid and Vitaly Shmatikov",
  editor =       "????",
  booktitle =    "IEEE Symposium on Security and Privacy",
  title =        "Using frankencerts for automated adversarial testing
                 of certificate validation in {SSL\slash TLS}
                 implementations",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "??--??",
  year =         "2014",
  DOI =          "????",
  ISBN =         "????",
  ISBN-13 =      "????",
  LCCN =         "????",
  bibdate =      "Mon Mar 09 11:36:28 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "????",
  acknowledgement = ack-nhfb,
  remark =       "Cite in \cite[reference 15]{Schneier:2015:SWC}.",
}

@Article{Buhrman:2014:PBQ,
  author =       "Harry Buhrman and Nishanth Chandran and Serge Fehr and
                 Ran Gelles and Vipul Goyal and Rafail Ostrovsky and
                 Christian Schaffner",
  title =        "Position-Based Quantum Cryptography: Impossibility and
                 Constructions",
  journal =      j-SIAM-J-COMPUT,
  volume =       "43",
  number =       "1",
  pages =        "150--178",
  month =        "????",
  year =         "2014",
  CODEN =        "SMJCAT",
  DOI =          "https://doi.org/10.1137/130913687",
  ISSN =         "0097-5397 (print), 1095-7111 (electronic)",
  ISSN-L =       "0097-5397",
  bibdate =      "Sat Sep 13 11:18:29 MDT 2014",
  bibsource =    "http://epubs.siam.org/sam-bin/dbq/toclist/SICOMP/43/1;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/siamjcomput.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "SIAM Journal on Computing",
  journal-URL =  "http://epubs.siam.org/sicomp",
  onlinedate =   "January 2014",
}

@InProceedings{Calmon:2014:ITM,
  author =       "Flavio P. Calmon and Mayank Varia and Muriel
                 M{\'e}dard",
  editor =       "????",
  booktitle =    "Proceedings of the 52nd Annual Allerton Conference on
                 Communication, Control, and Computing, 2014",
  title =        "On Information-Theoretic Metrics for Symmetric-Key
                 Encryption and Privacy",
  publisher =    "????",
  address =      "????",
  pages =        "??--??",
  year =         "2014",
  DOI =          "",
  ISBN =         "",
  ISBN-13 =      "",
  LCCN =         "",
  bibdate =      "Wed Nov 05 11:12:36 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.mit.edu/~flavio/Documents/Calmon_Allerton13.pdf",
  acknowledgement = ack-nhfb,
  pagecount =    "6",
}

@Article{Cao:2014:PPM,
  author =       "Ning Cao and Cong Wang and Ming Li and Kui Ren and
                 Wenjing Lou",
  title =        "Privacy-Preserving Multi-Keyword Ranked Search over
                 Encrypted Cloud Data",
  journal =      j-IEEE-TRANS-PAR-DIST-SYS,
  volume =       "25",
  number =       "1",
  pages =        "222--233",
  month =        jan,
  year =         "2014",
  CODEN =        "ITDSEO",
  DOI =          "https://doi.org/10.1109/TPDS.2013.45",
  ISSN =         "1045-9219 (print), 1558-2183 (electronic)",
  ISSN-L =       "1045-9219",
  bibdate =      "Mon Aug 25 07:12:16 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranspardistsys.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Parallel and Distributed
                 Systems",
  journal-URL =  "http://www.computer.org/tpds/archives.htm",
}

@Article{Cao:2014:SCI,
  author =       "Yan-Pei Cao and Tao Ju and Zhao Fu and Shi-Min Hu",
  title =        "Shapes and Cryptography: Interactive Image-Guided
                 Modeling of Extruded Shapes",
  journal =      j-CGF,
  volume =       "33",
  number =       "7",
  pages =        "101--110",
  month =        oct,
  year =         "2014",
  CODEN =        "CGFODY",
  DOI =          "https://doi.org/10.1111/cgf.12478",
  ISSN =         "0167-7055 (print), 1467-8659 (electronic)",
  ISSN-L =       "0167-7055",
  bibdate =      "Fri Feb 13 14:27:08 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cgf.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Graphics World",
  journal-URL =  "http://onlinelibrary.wiley.com/journal/10.1111/(ISSN)1467-8659/",
  onlinedate =   "28 Oct 2014",
}

@Article{Ceruzzi:2014:HFT,
  author =       "P. E. Ceruzzi",
  title =        "Are Historians Failing to Tell the Real Story about
                 the History of Computing?",
  journal =      j-IEEE-ANN-HIST-COMPUT,
  volume =       "36",
  number =       "3",
  pages =        "94--95",
  month =        jul,
  year =         "2014",
  CODEN =        "IAHCEX",
  DOI =          "https://doi.org/10.1109/MAHC.2014.33",
  ISSN =         "1058-6180 (print), 1934-1547 (electronic)",
  ISSN-L =       "1058-6180",
  bibdate =      "Thu Jan 8 07:26:10 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeeannhistcomput.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Annals of the History of Computing",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=85",
  keywords =     "Computer industry; computing history; critical
                 document declassification; cryptography; cryptologic
                 history; document handling; history; History; history
                 of computing; National Security Agency; NSA agencies;
                 secrecy culture; SIGABA; SIGSALY; vocorder",
}

@Article{Chadwick:2014:AFI,
  author =       "David W. Chadwick and Kristy Siu and Craig Lee and
                 Yann Fouillat and Damien Germonville",
  title =        "Adding Federated Identity Management to {OpenStack}",
  journal =      j-J-GRID-COMP,
  volume =       "12",
  number =       "1",
  pages =        "3--27",
  month =        mar,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10723-013-9283-2",
  ISSN =         "1570-7873 (print), 1572-9184 (electronic)",
  ISSN-L =       "1570-7873",
  bibdate =      "Tue Sep 9 17:50:58 MDT 2014",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=1570-7873&volume=12&issue=1;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jgridcomp.bib",
  URL =          "http://link.springer.com/article/10.1007/s10723-013-9283-2;
                 http://link.springer.com/content/pdf/10.1007/s10723-013-9283-2.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Grid Computing",
  journal-URL =  "http://link.springer.com/journal/10723",
}

@Article{Chandran:2014:PBC,
  author =       "Nishanth Chandran and Vipul Goyal and Ryan Moriarty
                 and Rafail Ostrovsky",
  title =        "Position-Based Cryptography",
  journal =      j-SIAM-J-COMPUT,
  volume =       "43",
  number =       "4",
  pages =        "1291--1341",
  month =        "????",
  year =         "2014",
  CODEN =        "SMJCAT",
  DOI =          "https://doi.org/10.1137/100805005",
  ISSN =         "0097-5397 (print), 1095-7111 (electronic)",
  ISSN-L =       "0097-5397",
  bibdate =      "Sat Sep 13 11:18:37 MDT 2014",
  bibsource =    "http://epubs.siam.org/sam-bin/dbq/toclist/SICOMP/43/1;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/siamjcomput.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "SIAM Journal on Computing",
  journal-URL =  "http://epubs.siam.org/sicomp",
  onlinedate =   "January 2014",
}

@Article{Chang:2014:RRT,
  author =       "Chin-Chen Chang and Ting-Fang Cheng",
  title =        "A Reliable Real-time Multicast Authentication Protocol
                 with Provable Accuracy",
  journal =      j-FUND-INFO,
  volume =       "131",
  number =       "2",
  pages =        "167--186",
  month =        apr,
  year =         "2014",
  CODEN =        "FUMAAJ",
  DOI =          "https://doi.org/10.3233/FI-2014-1008",
  ISSN =         "0169-2968 (print), 1875-8681 (electronic)",
  ISSN-L =       "0169-2968",
  bibdate =      "Sat Mar 5 17:18:41 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/fundinfo2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Fundamenta Informaticae",
  journal-URL =  "http://content.iospress.com/journals/fundamenta-informaticae",
}

@Article{Chapin:2014:SRP,
  author =       "Peter Chapin and Christian Skalka",
  title =        "{SpartanRPC}: Remote Procedure Call Authorization in
                 Wireless Sensor Networks",
  journal =      j-TISSEC,
  volume =       "17",
  number =       "2",
  pages =        "5:1--5:??",
  month =        nov,
  year =         "2014",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/2644809",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Wed Nov 19 12:26:42 MST 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tissec.bib",
  abstract =     "We describe SpartanRPC, a secure middleware technology
                 that supports cooperation between distinct security
                 domains in wireless sensor networks. SpartanRPC extends
                 nesC to provide a link-layer remote procedure call
                 (RPC) mechanism, along with an enhancement of
                 configuration wirings that allow specification of
                 remote, dynamic endpoints. RPC invocation is secured
                 via an authorization logic that enables servers to
                 specify access policies and requires clients to prove
                 authorization. This mechanism is implemented using a
                 combination of symmetric and public key cryptography.
                 We report on benchmark testing of a prototype
                 implementation and on an application of the framework
                 that supports secure collaborative use and
                 administration of an existing WSN data-gathering
                 system.",
  acknowledgement = ack-nhfb,
  articleno =    "5",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@InProceedings{Checkoway:2014:PED,
  author =       "Stephen Checkoway and Matthew Fredrikson and Ruben
                 Niederhagen and Matthew Green and Tanja Lange and
                 Thomas Ristenpart and Daniel J. Bernstein and Jake
                 Maskiewicz and Hovav Schacham",
  editor =       "????",
  booktitle =    "USENIX Security Symposium",
  title =        "On the practical exploitability of {Dual EC} in {TLS}
                 implementations",
  publisher =    pub-USENIX,
  address =      pub-USENIX:adr,
  pages =        "??--??",
  year =         "2014",
  DOI =          "????",
  ISBN =         "????",
  ISBN-13 =      "????",
  LCCN =         "????",
  bibdate =      "Mon Mar 09 11:37:52 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "????",
  acknowledgement = ack-nhfb,
  remark =       "Cite in \cite[reference 16]{Schneier:2015:SWC}.",
}

@Article{Chen:2014:CDP,
  author =       "Liqun Chen and Hoon Wei Lim and Guomin Yang",
  title =        "Cross-Domain Password-Based Authenticated Key Exchange
                 Revisited",
  journal =      j-TISSEC,
  volume =       "16",
  number =       "4",
  pages =        "15:1--15:??",
  month =        apr,
  year =         "2014",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/2584681",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Mon May 5 18:00:10 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tissec.bib",
  abstract =     "We revisit the problem of secure cross-domain
                 communication between two users belonging to different
                 security domains within an open and distributed
                 environment. Existing approaches presuppose that either
                 the users are in possession of public key certificates
                 issued by a trusted certificate authority (CA), or the
                 associated domain authentication servers share a
                 long-term secret key. In this article, we propose a
                 generic framework for designing four-party
                 password-based authenticated key exchange (4PAKE)
                 protocols. Our framework takes a different approach
                 from previous work. The users are not required to have
                 public key certificates, but they simply reuse their
                 login passwords, which they share with their respective
                 domain authentication servers. On the other hand, the
                 authentication servers, assumed to be part of a
                 standard PKI, act as ephemeral CAs that certify some
                 key materials that the users can subsequently use to
                 exchange and agree on as a session key. Moreover, we
                 adopt a compositional approach. That is, by treating
                 any secure two-party password-based key exchange
                 (2PAKE) protocol and two-party
                 asymmetric-key/symmetric-key-based key exchange
                 (2A/SAKE) protocol as black boxes, we combine them to
                 obtain generic and provably secure 4PAKE protocols.",
  acknowledgement = ack-nhfb,
  articleno =    "15",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@Article{Chen:2014:CSI,
  author =       "Yu Chen and Zongyang Zhang and Dongdai Lin and Zhenfu
                 Cao",
  title =        "{CCA}-Secure {IB--KEM} from Identity-Based Extractable
                 Hash Proof System",
  journal =      j-COMP-J,
  volume =       "57",
  number =       "10",
  pages =        "1537--1556",
  month =        oct,
  year =         "2014",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxt090",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Sat Sep 27 12:06:41 MDT 2014",
  bibsource =    "http://comjnl.oxfordjournals.org/content/57/10.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/57/10/1537",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "August 13, 2013",
}

@Article{Chen:2014:DSE,
  author =       "Jie Chen and Hoeteck Wee",
  title =        "Doubly spatial encryption from {DBDH}",
  journal =      j-THEOR-COMP-SCI,
  volume =       "543",
  number =       "??",
  pages =        "79--89",
  day =          "10",
  month =        jul,
  year =         "2014",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Sat Aug 16 09:03:15 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0304397514004277",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975/",
}

@Article{Chen:2014:MLC,
  author =       "Long Chen and Zhao Zhang",
  title =        "{MemGuard}: a low cost and energy efficient design to
                 support and enhance memory system reliability",
  journal =      j-COMP-ARCH-NEWS,
  volume =       "42",
  number =       "3",
  pages =        "49--60",
  month =        jun,
  year =         "2014",
  CODEN =        "CANED2",
  DOI =          "https://doi.org/10.1145/2678373.2665683",
  ISSN =         "0163-5964 (print), 1943-5851 (electronic)",
  ISSN-L =       "0163-5964",
  bibdate =      "Wed Dec 3 16:18:50 MST 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigarch.bib",
  abstract =     "Memory system reliability is increasingly a concern as
                 memory cell density and capacity continue to grow. The
                 conventional approach is to use redundant memory bits
                 for error detection and correction, with significant
                 storage, cost and power overheads. In this paper, we
                 propose a novel, system-level scheme called MemGuard
                 for memory error detection. With OS-based
                 checkpointing, it is also able to recover program
                 execution from memory errors. The memory error
                 detection of MemGuard is motivated by memory integrity
                 verification using log hashes. It is much stronger than
                 SECDED in error detection, incurs negligible hardware
                 cost and energy overhead and no storage overhead, and
                 is compatible with various memory organizations. It may
                 play the role of ECC memory in consumer-level computers
                 and mobile devices, without the shortcomings of ECC
                 memory. In server computers, it may complement SECDED
                 ECC or Chipkill Correct by providing even stronger
                 error detection. We have comprehensively investigated
                 and evaluated the feasibility and reliability of
                 MemGuard. We show that using an incremental multiset
                 hash function and a non-cryptographic hash function,
                 the performance and energy overheads of MemGuard are
                 negligible. We use the mathematical deduction and
                 synthetic simulation to prove that MemGuard is robust
                 and reliable.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGARCH Computer Architecture News",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J89",
  remark =       "ISCA '14 conference proceedings.",
}

@Article{Chen:2014:SBB,
  author =       "Chien-Chang Chen and Wei-Jie Wu",
  title =        "A secure {Boolean}-based multi-secret image sharing
                 scheme",
  journal =      j-J-SYST-SOFTW,
  volume =       "92",
  number =       "??",
  pages =        "107--114",
  month =        jun,
  year =         "2014",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Wed May 21 08:06:07 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0164121214000181",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212/",
}

@Article{Cheraghchi:2014:NMC,
  author =       "Mahdi Cheraghchi and Venkatesan Guruswami",
  title =        "Non-malleable Coding against Bit-Wise and Split-State
                 Tampering",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "8349",
  pages =        "440--464",
  year =         "2014",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-54242-8_19",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 21 08:39:11 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2014a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-54242-8_19/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-54242-8",
  book-URL =     "http://www.springerlink.com/content/978-3-642-54242-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Cho:2014:DGA,
  author =       "Michael Cheng Yi Cho and Pokai Chen and Shiuhpyng
                 Winston Shieh",
  title =        "{Dmail}: A Globally Authenticated Email Service",
  journal =      j-COMPUTER,
  volume =       "47",
  number =       "5",
  pages =        "88--91",
  month =        may,
  year =         "2014",
  CODEN =        "CPTRB4",
  DOI =          "https://doi.org/10.1109/MC.2014.119",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Tue Sep 9 18:53:40 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computer2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
}

@Article{Chou:2014:EMA,
  author =       "Jue-Sam Chou",
  title =        "An efficient mutual authentication {RFID} scheme based
                 on elliptic curve cryptography",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "70",
  number =       "1",
  pages =        "75--94",
  month =        oct,
  year =         "2014",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-013-1073-x",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Fri Feb 13 12:32:14 MST 2015",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0920-8542&volume=70&issue=1;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  URL =          "http://link.springer.com/article/10.1007/s11227-013-1073-x",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Article{Chu:2014:KAC,
  author =       "Cheng-Kang Chu and Sherman S. M. Chow and Wen-Guey
                 Tzeng and Jianying Zhou and Robert H. Deng",
  title =        "Key-Aggregate Cryptosystem for Scalable Data Sharing
                 in Cloud Storage",
  journal =      j-IEEE-TRANS-PAR-DIST-SYS,
  volume =       "25",
  number =       "2",
  pages =        "468--477",
  month =        feb,
  year =         "2014",
  CODEN =        "ITDSEO",
  DOI =          "https://doi.org/10.1109/TPDS.2013.112",
  ISSN =         "1045-9219 (print), 1558-2183 (electronic)",
  ISSN-L =       "1045-9219",
  bibdate =      "Mon Aug 25 07:12:16 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranspardistsys.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Parallel and Distributed
                 Systems",
  journal-URL =  "http://www.computer.org/tpds/archives.htm",
}

@Article{Chung:2014:RRS,
  author =       "Kai-Min Chung and Rafail Ostrovsky and Rafael Pass and
                 Muthuramakrishnan Venkitasubramaniam and Ivan
                 Visconti",
  title =        "$4$-Round Resettably-Sound Zero Knowledge",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "8349",
  pages =        "192--216",
  year =         "2014",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-54242-8_9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 21 08:39:11 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2014a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-54242-8_9/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-54242-8",
  book-URL =     "http://www.springerlink.com/content/978-3-642-54242-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{CNRS:2014:NAS,
  author =       "{CNRS}",
  title =        "New Algorithm Shakes Up Cryptography",
  journal =      "Scientific Computing",
  day =          "15",
  month =        may,
  year =         "2014",
  bibdate =      "Wed May 21 10:05:51 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  note =         "See \cite{Barbulescu:2014:HQP}.",
  URL =          "http://www.scientificcomputing.com/news/2014/05/new-algorithm-shakes-cryptography",
  abstract =     "From the first paragraph: ``Researchers have solved
                 one aspect of the discrete logarithm problem. This is
                 considered to be one of the 'holy grails' of
                 algorithmic number theory, on which the security of
                 many cryptographic systems used today is based. The
                 team at the Laboratoire Lorrain de Recherches en
                 Informatique et ses Applications (CNRS/Universit{\'e}
                 de Lorraine/Inria) and the Laboratoire d'Informatique
                 de Paris 6 (CNRS/UPMC) has devised a new algorithm (1)
                 that calls into question the security of one variant of
                 this problem, which has been closely studied since
                 1976. This result, published on the site of the
                 International Association of Cryptologic Research and
                 on the HAL open access archive, was presented at the
                 international conference Eurocrypt 2014 held in
                 Copenhagen on 11--15 May 2014 and published in Advances
                 in cryptology. It discredits several cryptographic
                 systems that until now were assumed to provide
                 sufficient security safeguards. Although this work is
                 still theoretical, it is likely to have repercussions
                 especially on the cryptographic applications of smart
                 cards, RFID chips (2), etc.''",
  acknowledgement = ack-nhfb,
}

@Article{Cordova:2014:EBS,
  author =       "Tim Cordova",
  title =        "Encrypted backup solution: {Home Paranoia Edition}",
  journal =      j-LINUX-J,
  volume =       "2014",
  number =       "237",
  pages =        "3:1--3:??",
  month =        jan,
  year =         "2014",
  CODEN =        "LIJOFX",
  ISSN =         "1075-3583 (print), 1938-3827 (electronic)",
  ISSN-L =       "1075-3583",
  bibdate =      "Thu Feb 6 07:16:21 MST 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/linux-journal.bib",
  abstract =     "A solution for safeguarding your personal
                 information.",
  acknowledgement = ack-nhfb,
  articleno =    "3",
  fjournal =     "Linux Journal",
  journal-URL =  "http://portal.acm.org/citation.cfm?id=J508",
}

@Article{Corrigan-Gibbs:2014:KS,
  author =       "Henry Corrigan-Gibbs",
  title =        "Keeping Secrets",
  journal =      "Stanford Magazine",
  volume =       "??",
  number =       "??",
  pages =        "??--??",
  month =        nov # "\slash " # dec,
  year =         "2014",
  bibdate =      "Sun Mar 12 13:55:13 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://alumni.stanford.edu/get/page/magazine/article/?article_id=74801",
  abstract =     "Four decades ago, university researchers figured out
                 the key to computer privacy, sparking a battle with the
                 National Security Agency that continues today.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://alumni.stanford.edu/get/page/magazine/back-issues/",
  remark =       "This article is a readable account of some of the
                 history of public-key cryptography, and government
                 attempts to control or suppress it.",
}

@Article{Corthesy:2014:SSD,
  author =       "S{\'e}bastien Corth{\'e}sy",
  title =        "Smartphones Set Out to Decipher Cryptographic System",
  journal =      "Scientific Computing",
  day =          "25",
  month =        aug,
  year =         "2014",
  bibdate =      "Tue Aug 26 11:24:19 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  note =         "The article describes use of thousands of mobile
                 phones to attempt a parallel brute-force attack on
                 elliptic-curve and RSA algorithms, in a research
                 project by Ramasany Gowthami and Arjen Lenstra at the
                 LACAL laboratory at EPFL, Lausanne, Switzerland.",
  URL =          "http://www.scientificcomputing.com/news/2014/08/smartphones-set-out-decipher-cryptographic-system",
  acknowledgement = ack-nhfb,
}

@Article{Costello:2014:CAS,
  author =       "Craig Costello and Alyson Deines-Schartz and Kristin
                 Lauter and Tonghai Yang",
  title =        "Constructing abelian surfaces for cryptography via
                 {Rosenhain} invariants",
  journal =      j-LMS-J-COMPUT-MATH,
  volume =       "17",
  number =       "A",
  pages =        "157--180",
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1112/S1461157014000370",
  ISSN =         "1461-1570",
  bibdate =      "Tue Sep 9 12:34:13 MDT 2014",
  bibsource =    "http://journals.cambridge.org/action/displayJournal?jid=JCM;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lms-j-comput-math.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "LMS J. Comput. Math.",
  fjournal =     "LMS Journal of Computation and Mathematics",
  onlinedate =   "05 August 2014",
  remark =       "Algorithmic Number Theory Symposium XI.",
}

@Misc{Craver:2014:UCC,
  author =       "Scott Craver",
  title =        "The underhanded {C} contest",
  howpublished = "Web site",
  year =         "2014",
  bibdate =      "Mon Mar 09 11:42:38 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://underhanded.xcott.com/",
  abstract =     "From the Web site: ``The goal of the contest is to
                 write code that is as readable, clear, innocent and
                 straightforward as possible, and yet it must fail to
                 perform at its apparent function. To be more specific,
                 it should do something subtly evil. Every year, we will
                 propose a challenge to coders to solve a simple data
                 processing problem, but with covert malicious behavior.
                 Examples include miscounting votes, shaving money from
                 financial transactions, or leaking information to an
                 eavesdropper. The main goal, however, is to write
                 source code that easily passes visual inspection by
                 other programmers.''",
  acknowledgement = ack-nhfb,
}

@Article{Criswell:2014:VGP,
  author =       "John Criswell and Nathan Dautenhahn and Vikram Adve",
  title =        "{Virtual Ghost}: protecting applications from hostile
                 operating systems",
  journal =      j-COMP-ARCH-NEWS,
  volume =       "42",
  number =       "1",
  pages =        "81--96",
  month =        mar,
  year =         "2014",
  CODEN =        "CANED2",
  DOI =          "https://doi.org/10.1145/2654822.2541986",
  ISSN =         "0163-5964 (print), 1943-5851 (electronic)",
  ISSN-L =       "0163-5964",
  bibdate =      "Mon Aug 18 17:12:47 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigarch.bib",
  abstract =     "Applications that process sensitive data can be
                 carefully designed and validated to be difficult to
                 attack, but they are usually run on monolithic,
                 commodity operating systems, which may be less secure.
                 An OS compromise gives the attacker complete access to
                 all of an application's data, regardless of how well
                 the application is built. We propose a new system,
                 Virtual Ghost, that protects applications from a
                 compromised or even hostile OS. Virtual Ghost is the
                 first system to do so by combining compiler
                 instrumentation and run-time checks on operating system
                 code, which it uses to create ghost memory that the
                 operating system cannot read or write. Virtual Ghost
                 interposes a thin hardware abstraction layer between
                 the kernel and the hardware that provides a set of
                 operations that the kernel must use to manipulate
                 hardware, and provides a few trusted services for
                 secure applications such as ghost memory management,
                 encryption and signing services, and key management.
                 Unlike previous solutions, Virtual Ghost does not use a
                 higher privilege level than the kernel. Virtual Ghost
                 performs well compared to previous approaches; it
                 outperforms InkTag on five out of seven of the LMBench
                 microbenchmarks with improvements between 1.3x and
                 14.3x. For network downloads, Virtual Ghost experiences
                 a 45\% reduction in bandwidth at most for small files
                 and nearly no reduction in bandwidth for large files
                 and web traffic. An application we modified to use
                 ghost memory shows a maximum additional overhead of 5\%
                 due to the Virtual Ghost protections. We also
                 demonstrate Virtual Ghost's efficacy by showing how it
                 defeats sophisticated rootkit attacks.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGARCH Computer Architecture News",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J89",
  remark =       "ASPLOS '14 conference proceedings.",
}

@Article{Cui:2014:SSA,
  author =       "Hui Cui and Yi Mu and Man Ho Au",
  title =        "Signcryption Secure Against Linear Related-Key
                 Attacks",
  journal =      j-COMP-J,
  volume =       "57",
  number =       "10",
  pages =        "1472--1483",
  month =        oct,
  year =         "2014",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxt076",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Sat Sep 27 12:06:41 MDT 2014",
  bibsource =    "http://comjnl.oxfordjournals.org/content/57/10.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/57/10/1472",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "August 4, 2013",
}

@Article{Dachman-Soled:2014:COF,
  author =       "Dana Dachman-Soled and Mohammad Mahmoody and Tal
                 Malkin",
  title =        "Can Optimally-Fair Coin Tossing Be Based on One-Way
                 Functions?",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "8349",
  pages =        "217--239",
  year =         "2014",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-54242-8_10",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 21 08:39:11 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2014a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-54242-8_10/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-54242-8",
  book-URL =     "http://www.springerlink.com/content/978-3-642-54242-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{DArco:2014:MIC,
  author =       "P. D'Arco and R. {De Prisco} and A. {De Santis}",
  title =        "Measure-independent characterization of contrast
                 optimal visual cryptography schemes",
  journal =      j-J-SYST-SOFTW,
  volume =       "95",
  number =       "??",
  pages =        "89--99",
  month =        sep,
  year =         "2014",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Mon Sep 1 11:30:59 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0164121214000995",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212/",
}

@Article{Deng:2014:CCC,
  author =       "Robert H. Deng and Yang Xiang and Man Ho Au",
  title =        "Cryptography in Cloud Computing",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "30",
  number =       "??",
  pages =        "90--90",
  month =        jan,
  year =         "2014",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Mon Dec 2 16:57:46 MST 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib;
                 http://www.sciencedirect.com/science/journal/0167739X",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X13002197",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Deng:2014:TNI,
  author =       "Lunzhi Deng and Jiwen Zeng",
  title =        "Two new identity-based threshold ring signature
                 schemes",
  journal =      j-THEOR-COMP-SCI,
  volume =       "535",
  number =       "??",
  pages =        "38--45",
  day =          "22",
  month =        may,
  year =         "2014",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Wed May 7 19:04:23 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0304397514002692",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975/",
}

@TechReport{Dodis:2014:HEY,
  author =       "Yevgeniy Dodis and Adi Shamir and Noah
                 Stephens-Davidowitz and Daniel Wichs",
  title =        "How to Eat Your Entropy and Have it Too --- Optimal
                 Recovery Strategies for Compromised {RNGs}",
  type =         "Report",
  institution =  "Dept. of Computer Science, New York University; Dept.
                 of Computer Science and Applied Mathematics, Weizmann
                 Institute; Dept. of Computer Science, Northeastern
                 University",
  address =      "New York, NY, USA; Tel Aviv, Israel; Boston, MA, USA",
  pages =        "27",
  day =          "3",
  month =        mar,
  year =         "2014",
  bibdate =      "Sat Mar 15 11:39:28 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://eprint.iacr.org/2014/167;
                 https://www.schneier.com/fortuna.html",
  acknowledgement = ack-nhfb,
  keywords =     "entropy accumulation; Fortuna random-number generator
                 algorithm; PRG; RNG with input",
}

@Article{Donovan:2014:ATM,
  author =       "Peter W. Donovan",
  title =        "{Alan Turing}, {Marshall Hall}, and the Alignment of
                 {WW2 Japanese Naval} Intercepts",
  journal =      j-NAMS,
  volume =       "61",
  number =       "3",
  pages =        "258--264",
  month =        mar,
  year =         "2014",
  CODEN =        "AMNOAN",
  ISSN =         "0002-9920 (print), 1088-9477 (electronic)",
  ISSN-L =       "0002-9920",
  bibdate =      "Thu Mar 06 11:24:00 2014",
  bibsource =    "https://www.math.utah.edu/pub/bibnet/authors/t/turing-alan-mathison.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.ams.org/notices/201403/rnoti-p258.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Notices of the American Mathematical Society",
  journal-URL =  "http://www.ams.org/notices/",
}

@Article{Dupressoir:2014:GGP,
  author =       "Fran{\c{c}}ois Dupressoir and Andrew D. Gordon and Jan
                 J{\"u}rjens and David A. Naumann",
  title =        "Guiding a general-purpose {C} verifier to prove
                 cryptographic protocols",
  journal =      j-J-COMP-SECUR,
  volume =       "22",
  number =       "5",
  pages =        "823--866",
  month =        "????",
  year =         "2014",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-140508",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:24 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@InProceedings{Durumeric:2014:MH,
  author =       "Zakir Durumeric and James Kasten and David Adrian and
                 J. Alex Halderman and Michael Bailey and Frank Li and
                 Nicholas Weaver and Johanna Amann and Jethro Beekman
                 and Mathias Payer and others",
  editor =       "????",
  booktitle =    "{ACM Internet Measurement Conference}",
  title =        "The matter of {Heartbleed}",
  publisher =    pub-ACM,
  address =      pub-ACM:adr,
  pages =        "??--??",
  year =         "2014",
  DOI =          "????",
  ISBN =         "????",
  ISBN-13 =      "????",
  LCCN =         "????",
  bibdate =      "Mon Mar 09 11:55:34 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "????",
  acknowledgement = ack-nhfb,
  remark =       "Cite in \cite[reference 30]{Schneier:2015:SWC}.",
}

@Article{Edwards:2014:NRP,
  author =       "Chris Edwards",
  title =        "News: Researchers probe security through obscurity",
  journal =      j-CACM,
  volume =       "57",
  number =       "8",
  pages =        "11--13",
  month =        aug,
  year =         "2014",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2632038",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sat Aug 9 08:01:51 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cacm2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "Obfuscation protects code by making it so impenetrable
                 that access to it won't help a hacker understand how it
                 works.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  keywords =     "cryptography; encryption; obfuscation",
}

@Article{Eldib:2014:FVS,
  author =       "Hassan Eldib and Chao Wang and Patrick Schaumont",
  title =        "Formal Verification of Software Countermeasures
                 against Side-Channel Attacks",
  journal =      j-TOSEM,
  volume =       "24",
  number =       "2",
  pages =        "11:1--11:??",
  month =        dec,
  year =         "2014",
  CODEN =        "ATSMER",
  DOI =          "https://doi.org/10.1145/2685616",
  ISSN =         "1049-331X (print), 1557-7392 (electronic)",
  ISSN-L =       "1049-331X",
  bibdate =      "Wed Jan 7 15:27:31 MST 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tosem/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tosem.bib",
  abstract =     "A common strategy for designing countermeasures
                 against power-analysis-based side-channel attacks is
                 using random masking techniques to remove the
                 statistical dependency between sensitive data and
                 side-channel emissions. However, this process is both
                 labor intensive and error prone and, currently, there
                 is a lack of automated tools to formally assess how
                 secure a countermeasure really is. We propose the first
                 SMT-solver-based method for formally verifying the
                 security of a masking countermeasure against such
                 attacks. In addition to checking whether the sensitive
                 data are masked by random variables, we also check
                 whether they are perfectly masked, that is, whether the
                 intermediate computation results in the implementation
                 of a cryptographic algorithm are independent of the
                 secret key. We encode this verification problem using a
                 series of quantifier-free first-order logic formulas,
                 whose satisfiability can be decided by an off-the-shelf
                 SMT solver. We have implemented the proposed method in
                 a software verification tool based on the LLVM compiler
                 frontend and the Yices SMT solver. Our experiments on a
                 set of recently proposed masking countermeasures for
                 cryptographic algorithms such as AES and MAC-Keccak
                 show the method is both effective in detecting power
                 side-channel leaks and scalable for practical use.",
  acknowledgement = ack-nhfb,
  articleno =    "11",
  fjournal =     "ACM Transactions on Software Engineering and
                 Methodology",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J790",
}

@InProceedings{Embar:2014:PWO,
  author =       "Maya Embar and Louis F. {McHugh IV} and William R.
                 Wesselman",
  booktitle =    "Proceedings of the 3rd Annual Conference on Research
                 in Information Technology",
  title =        "Printer Watermark Obfuscation",
  publisher =    pub-ACM,
  address =      pub-ACM:adr,
  pages =        "15--20",
  year =         "2014",
  DOI =          "https://doi.org/10.1145/2656434.2656437",
  ISBN =         "1-4503-2711-7",
  ISBN-13 =      "978-1-4503-2711-4",
  bibdate =      "Sat Nov 15 08:53:29 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  series =       "RIIT '14",
  acknowledgement = ack-nhfb,
  acmid =        "2656437",
  keywords =     "firmware; obfuscation; printer; steganography;
                 template; tracking; watermark; yellow dots",
  location =     "Atlanta, Georgia, USA",
  numpages =     "6",
}

@Article{Estebanez:2014:PMC,
  author =       "C{\'e}sar Est{\'e}banez and Yago Saez and Gustavo
                 Recio and Pedro Isasi",
  title =        "Performance of the most common non-cryptographic hash
                 functions",
  journal =      j-SPE,
  volume =       "44",
  number =       "6",
  pages =        "681--698",
  month =        jun,
  year =         "2014",
  CODEN =        "SPEXBL",
  DOI =          "https://doi.org/10.1002/spe.2179",
  ISSN =         "0038-0644 (print), 1097-024X (electronic)",
  ISSN-L =       "0038-0644",
  bibdate =      "Wed Sep 10 05:57:34 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/spe.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Software --- Practice and Experience",
  journal-URL =  "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1097-024X",
  onlinedate =   "28 Jan 2013",
}

@Article{Faigl:2014:PEC,
  author =       "Zolt{\'a}n Faigl and Jani Pellikka and L{\'a}szl{\'o}
                 Bokor and Andrei Gurtov",
  title =        "Performance evaluation of current and emerging
                 authentication schemes for future {3GPP} network
                 architectures",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "60",
  number =       "??",
  pages =        "60--74",
  day =          "26",
  month =        feb,
  year =         "2014",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Fri Feb 28 07:06:34 MST 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1389128613004180",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286/",
}

@Article{Fan:2014:ASA,
  author =       "Chun-I Fan and Vincent Shi-Ming Huang and He-Ming
                 Ruan",
  title =        "Arbitrary-State Attribute-Based Encryption with
                 Dynamic Membership",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "63",
  number =       "8",
  pages =        "1951--1961",
  month =        aug,
  year =         "2014",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2013.83",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Mon Aug 25 08:24:32 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Fan:2014:NCI,
  author =       "Jia Fan and Yuliang Zheng and Xiaohu Tang",
  title =        "A New Construction of Identity-Based Signcryption
                 Without Random Oracles",
  journal =      j-INT-J-FOUND-COMP-SCI,
  volume =       "25",
  number =       "1",
  pages =        "1--??",
  month =        jan,
  year =         "2014",
  CODEN =        "IFCSEN",
  DOI =          "https://doi.org/10.1142/S0129054114500014",
  ISSN =         "0129-0541",
  ISSN-L =       "0129-0541",
  bibdate =      "Tue Apr 29 07:15:43 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijfcs.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Foundations of Computer
                 Science (IJFCS)",
  journal-URL =  "http://www.worldscientific.com/loi/ijfcs",
}

@Article{Fan:2014:RRS,
  author =       "Kai Fan and Jie Li and Hui Li and Xiaohui Liang and
                 Xuemin (Sherman) Shen and Yintang Yang",
  title =        "{RSEL}: revocable secure efficient lightweight {RFID}
                 authentication scheme",
  journal =      j-CCPE,
  volume =       "26",
  number =       "5",
  pages =        "1084--1096",
  day =          "10",
  month =        apr,
  year =         "2014",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.3065",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Fri May 30 08:55:33 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "10 Jul 2013",
}

@Article{Farash:2014:CIE,
  author =       "Mohammad Sabzinejad Farash",
  title =        "Cryptanalysis and improvement of an efficient mutual
                 authentication {RFID} scheme based on elliptic curve
                 cryptography",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "70",
  number =       "2",
  pages =        "987--1001",
  month =        nov,
  year =         "2014",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-014-1272-0",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Fri Feb 13 12:13:17 MST 2015",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0920-8542&volume=70&issue=2;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  URL =          "http://link.springer.com/article/10.1007/s11227-014-1272-0",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Article{Farash:2014:ECC,
  author =       "Mohammad Sabzinejad Farash and Mahmoud Ahmadian
                 Attari",
  title =        "An efficient client--client password-based
                 authentication scheme with provable security",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "70",
  number =       "2",
  pages =        "1002--1022",
  month =        nov,
  year =         "2014",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-014-1273-z",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Fri Feb 13 12:13:17 MST 2015",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0920-8542&volume=70&issue=2;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  URL =          "http://link.springer.com/article/10.1007/s11227-014-1273-z",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Article{Farash:2014:SEI,
  author =       "Mohammad Sabzinejad Farash and Mahmoud Ahmadian
                 Attari",
  title =        "A secure and efficient identity-based authenticated
                 key exchange protocol for mobile client-server
                 networks",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "69",
  number =       "1",
  pages =        "395--411",
  month =        jul,
  year =         "2014",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-014-1170-5",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Wed Sep 10 06:45:04 MDT 2014",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0920-8542&volume=69&issue=1;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  URL =          "http://link.springer.com/article/10.1007/s11227-014-1170-5",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Article{Faugere:2014:MCA,
  author =       "Jean-Charles Faug{\`e}re and Domingo
                 G{\'o}mez-P{\'e}rez and Jaime Gutierrez and Ludovic
                 Perret",
  title =        "Mathematical and computer algebra techniques in
                 cryptology",
  journal =      j-J-SYMBOLIC-COMP,
  volume =       "64",
  number =       "??",
  pages =        "1--2",
  month =        aug,
  year =         "2014",
  CODEN =        "JSYCEH",
  ISSN =         "0747-7171 (print), 1095-855X (electronic)",
  ISSN-L =       "0747-7171",
  bibdate =      "Fri Feb 28 07:39:29 MST 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsymcomp.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0747717113001673",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Symbolic Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/07477171/",
}

@Article{Faust:2014:CNM,
  author =       "Sebastian Faust and Pratyay Mukherjee and Jesper Buus
                 Nielsen and Daniele Venturi",
  title =        "Continuous Non-malleable Codes",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "8349",
  pages =        "465--488",
  year =         "2014",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-54242-8_20",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 21 08:39:11 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2014a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-54242-8_20/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-54242-8",
  book-URL =     "http://www.springerlink.com/content/978-3-642-54242-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Ferretti:2014:DCI,
  author =       "Luca Ferretti and Michele Colajanni and Mirco
                 Marchetti",
  title =        "Distributed, Concurrent, and Independent Access to
                 Encrypted Cloud Databases",
  journal =      j-IEEE-TRANS-PAR-DIST-SYS,
  volume =       "25",
  number =       "2",
  pages =        "437--446",
  month =        feb,
  year =         "2014",
  CODEN =        "ITDSEO",
  DOI =          "https://doi.org/10.1109/TPDS.2013.154",
  ISSN =         "1045-9219 (print), 1558-2183 (electronic)",
  ISSN-L =       "1045-9219",
  bibdate =      "Mon Aug 25 07:12:16 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranspardistsys.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Parallel and Distributed
                 Systems",
  journal-URL =  "http://www.computer.org/tpds/archives.htm",
}

@Article{Galindo:2014:LCL,
  author =       "David Galindo and Srinivas Vivek",
  title =        "Limits of a conjecture on a leakage-resilient
                 cryptosystem",
  journal =      j-INFO-PROC-LETT,
  volume =       "114",
  number =       "4",
  pages =        "192--196",
  month =        apr,
  year =         "2014",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Tue Jan 28 08:23:02 MST 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019013002949",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190/",
}

@Article{Gao:2014:URA,
  author =       "Lijun Gao and Maode Ma and Yantai Shu and Yuhua Wei",
  title =        "An ultralightweight {RFID} authentication protocol
                 with {CRC} and permutation",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "41",
  number =       "??",
  pages =        "37--46",
  month =        may,
  year =         "2014",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Wed Jan 28 15:45:00 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804513002269",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Netw. Comput. Appl.",
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Garg:2014:TRS,
  author =       "Sanjam Garg and Craig Gentry and Shai Halevi and
                 Mariana Raykova",
  title =        "Two-Round Secure {MPC} from Indistinguishability
                 Obfuscation",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "8349",
  pages =        "74--94",
  year =         "2014",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-54242-8_4",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 21 08:39:11 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2014a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-54242-8_4/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-54242-8",
  book-URL =     "http://www.springerlink.com/content/978-3-642-54242-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@TechReport{Genkin:2014:GYH,
  author =       "Daniel Genkin and Itamar Pipman and Eran Tromer",
  title =        "Get Your Hands Off My Laptop: Physical Side-Channel
                 Key-Extraction Attacks on {PCs}",
  type =         "Report",
  institution =  "Technion and Tel Aviv University",
  address =      "Tel Aviv, Israel",
  pages =        "25",
  day =          "31",
  month =        jul,
  year =         "2014",
  bibdate =      "Fri Aug 08 12:04:13 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.cs.tau.ac.il/~tromer/handsoff/",
  abstract =     "We demonstrate physical side-channel attacks on a
                 popular software implementation of RSA and ElGamal,
                 running on laptop computers. Our attacks use novel side
                 channels, based on the observation that the `ground'
                 electric potential, in many computers, fluctuates in a
                 computation-dependent way. An attacker can measure this
                 signal by touching exposed metal on the computer's
                 chassis with a plain wire, or even with a bare hand.
                 The signal can also be measured at the remote end of
                 Ethernet, VGA or USB cables.\par

                 Through suitable cryptanalysis and signal processing,
                 we have extracted 4096-bit RSA keys and 3072-bit
                 ElGamal keys from laptops, via each of these channels,
                 as well as via power analysis and electromagnetic
                 probing. Despite the GHz-scale clock rate of the
                 laptops and numerous noise sources, the full attacks
                 require a few seconds of measurements using Medium
                 Frequency signals (around 2 MHz), or one hour using Low
                 Frequency signals (up to 40 kHz).",
  acknowledgement = ack-nhfb,
}

@Article{Ghosh:2014:BBB,
  author =       "Santosh Ghosh and Ingrid Verbauwhede",
  title =        "{BLAKE-512}-Based 128-Bit {CCA2} Secure Timing Attack
                 Resistant {McEliece} Cryptoprocessor",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "63",
  number =       "5",
  pages =        "1124--1133",
  month =        may,
  year =         "2014",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2012.271",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Mon Aug 25 08:24:32 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Gilad:2014:PHI,
  author =       "Yossi Gilad and Amir Herzberg and Haya Shulman",
  title =        "Off-Path Hacking: The Illusion of Challenge--Response
                 Authentication",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "5",
  pages =        "68--77",
  month =        sep # "\slash " # oct,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.130",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:12 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/05/msp2014050068-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/05/msp2014050068-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
}

@Article{Gotzfried:2014:MAT,
  author =       "Johannes G{\"o}tzfried and Tilo M{\"u}ller",
  title =        "Mutual Authentication and Trust Bootstrapping towards
                 Secure Disk Encryption",
  journal =      j-TISSEC,
  volume =       "17",
  number =       "2",
  pages =        "6:1--6:??",
  month =        nov,
  year =         "2014",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/2663348",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Wed Nov 19 12:26:42 MST 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tissec.bib",
  abstract =     "The weakest link in software-based full disk
                 encryption is the authentication procedure. Since the
                 master boot record must be present unencrypted in order
                 to launch the decryption of remaining system parts, it
                 can easily be manipulated and infiltrated by bootkits
                 that perform keystroke logging; consequently,
                 password-based authentication schemes become
                 attackable. The current technological response, as
                 enforced by BitLocker, verifies the integrity of the
                 boot process by use of the trusted platform module.
                 But, as we show, this countermeasure is insufficient in
                 practice. We present STARK, the first tamperproof
                 authentication scheme that mutually authenticates the
                 computer and the user in order to resist keylogging
                 during boot. To achieve this, STARK implements trust
                 bootstrapping from a secure token to the whole PC. The
                 secure token is an active USB drive that verifies the
                 integrity of the PC and indicates the verification
                 status by an LED to the user. This way, users can
                 ensure the authenticity of the PC before entering their
                 passwords.",
  acknowledgement = ack-nhfb,
  articleno =    "6",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@Book{Greenberg:2014:GWB,
  author =       "Joel Greenberg and Rosamond Welchman",
  title =        "{Gordon Welchman}: {Bletchley Park}'s architect of
                 ultra intelligence",
  publisher =    "Frontline Books",
  address =      "Barnsley, UK",
  pages =        "xvi + 286 + 16",
  year =         "2014",
  ISBN =         "1-84832-752-8 (hardcover), 1-4738-3463-5 (e-book)",
  ISBN-13 =      "978-1-84832-752-8 (hardcover), 978-1-4738-3463-7
                 (e-book)",
  LCCN =         "TK5102.94 .G744 2014xeb",
  bibdate =      "Mon Dec 19 12:33:04 MST 2016",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/bibnet/authors/t/turing-alan-mathison.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://lib.myilibrary.com?id=943722",
  acknowledgement = ack-nhfb,
  author-dates = "1946--",
  subject =      "Welchman, Gordon; Welchman, Gordon; Cryptographers;
                 Great Britain; Biography; Mathematicians; World War,
                 1939-1945; Cryptography; Cryptographers; Cryptography;
                 Mathematicians; BIOGRAPHY and AUTOBIOGRAPHY / Science
                 and Technology; MATHEMATICS / Essays; MATHEMATICS /
                 Pre-Calculus; MATHEMATICS / Reference",
}

@Article{Guo:2014:SAS,
  author =       "Fuchun Guo and Yi Mu and Willy Susilo and Vijay
                 Varadharajan",
  title =        "Server-Aided Signature Verification for Lightweight
                 Devices",
  journal =      j-COMP-J,
  volume =       "57",
  number =       "4",
  pages =        "481--493",
  month =        apr,
  year =         "2014",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxt003",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Wed Mar 26 15:06:42 MDT 2014",
  bibsource =    "http://comjnl.oxfordjournals.org/content/57/3.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/57/4/481.full.pdf+html",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "January 30, 2013",
}

@Article{Han:2014:ATS,
  author =       "Tao Han and Weiming Zhang and Chao Wang and Nenghai Yu
                 and Yuefei Zhu",
  title =        "Adaptive $ \pm 1 $ Steganography in Extended Noisy
                 Region",
  journal =      j-COMP-J,
  volume =       "57",
  number =       "4",
  pages =        "557--566",
  month =        apr,
  year =         "2014",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxt035",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Wed Mar 26 15:06:42 MDT 2014",
  bibsource =    "http://comjnl.oxfordjournals.org/content/57/3.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/57/4/557.full.pdf+html",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "April 17, 2013",
}

@Article{Han:2014:ERI,
  author =       "Qi Han and Yinghui Zhang and Xiaofeng Chen and Hui Li
                 and Jiaxiang Quan",
  title =        "Efficient and robust identity-based handoff
                 authentication for {EAP-based} wireless networks",
  journal =      j-CCPE,
  volume =       "26",
  number =       "8",
  pages =        "1561--1573",
  day =          "10",
  month =        jun,
  year =         "2014",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.3024",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Fri May 30 08:55:43 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "11 Apr 2013",
}

@Article{Han:2014:GTK,
  author =       "Fei Han and Jing Qin and Huawei Zhao and Jiankun Hu",
  title =        "A general transformation from {KP-ABE} to searchable
                 encryption",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "30",
  number =       "??",
  pages =        "107--115",
  month =        jan,
  year =         "2014",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Mon Dec 2 16:57:46 MST 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib;
                 http://www.sciencedirect.com/science/journal/0167739X",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X13001921",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Han:2014:IBS,
  author =       "Jinguang Han and Willy Susilo and Yu Mu",
  title =        "Identity-Based Secure Distributed Data Storage
                 Schemes",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "63",
  number =       "4",
  pages =        "941--953",
  month =        apr,
  year =         "2014",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2013.26",
  ISSN =         "0018-9340",
  ISSN-L =       "0018-9340",
  bibdate =      "Sat Apr 19 10:40:35 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Harn:2014:MTS,
  author =       "Lein Harn and Miao Fuyou",
  title =        "Multilevel threshold secret sharing based on the
                 {Chinese Remainder Theorem}",
  journal =      j-INFO-PROC-LETT,
  volume =       "114",
  number =       "9",
  pages =        "504--509",
  month =        sep,
  year =         "2014",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Wed May 21 07:45:08 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019014000659",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190/",
}

@Book{Harrington:2014:GEF,
  author =       "Surya Michael Harrington",
  title =        "{Google Earth} forensics: using {Google Earth}
                 geo-location in digital forensic investigations",
  publisher =    pub-ELSEVIER,
  address =      pub-ELSEVIER:adr,
  pages =        "vii + 113",
  year =         "2014",
  ISBN =         "0-12-800216-6",
  ISBN-13 =      "978-0-12-800216-2",
  LCCN =         "????",
  bibdate =      "Sat Dec 9 11:40:51 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 z3950.loc.gov:7090/Voyager",
  abstract =     "This book explains how to use Google Earth in digital
                 forensic investigations. This book teaches you how to
                 leverage Google's free tool to craft compelling
                 location-based evidence for use in investigations and
                 in the courtroom. It shows how to extract
                 location-based data that can be used to display
                 evidence in compelling audiovisual manners that explain
                 and inform the data in contextual, meaningful, and
                 easy-to-understand ways. You will learn how to extract
                 location-based evidence using the Google Earth program
                 or app on computers and mobile devices. The book covers
                 the basics of GPS systems, the usage of Google Earth,
                 and helps sort through data imported from external
                 evidence sources and includes tips on presenting
                 evidence in compelling, easy-to-understand formats.",
  acknowledgement = ack-nhfb,
  tableofcontents = "\\
                 Biography \\
                 1: Google Earth Basics \\
                 Abstract \\
                 What is Google Earth? \\
                 Google Earth for Forensics \\
                 Flavors of Google Earth \\
                 Installing Google Earth on Your Computer \\
                 2: Using Google Earth \\
                 Abstract \\
                 Using Google Earth \\
                 The Google Earth UI \\
                 Navigation \\
                 Views \\
                 Tours \\
                 Configuration \\
                 3: GPS, GIS, and Google Earth \\
                 Abstract \\
                 Understanding GPS \\
                 Understanding GIS \\
                 Geo-Location Information in Pictures \\
                 4: KML/XML/HTML \\
                 Abstract \\
                 Markup Languages and Google Earth \\
                 Using HTML in Google Earth \\
                 What is KML? \\
                 XML \\
                 KML revisited \\
                 Learning more about markup languages \\
                 5: Digital Forensics 101 \\
                 Abstract \\
                 What is Digital Forensics? \\
                 Tools for Recovering Evidence \\
                 Do you really want to do this? \\
                 Organizing your case \\
                 Understanding what you are looking AT \\
                 6: Working a Case \\
                 Abstract \\
                 The practical application of Google Earth forensics \\
                 Acquiring from a GPS Unit \\
                 Annotating a crime scene \\
                 Views and camera angles \\
                 Legends, logos, and banners \\
                 Creating a tour of the crime scene \\
                 Distributing your work in Google Earth \\
                 Index",
}

@Article{Hasan:2014:TFL,
  author =       "O. Hasan and S. A. Khayam",
  title =        "Towards Formal Linear Cryptanalysis using {HOL4}",
  journal =      j-J-UCS,
  volume =       "20",
  number =       "2",
  pages =        "193--??",
  month =        "????",
  year =         "2014",
  CODEN =        "????",
  ISSN =         "0948-695X (print), 0948-6968 (electronic)",
  ISSN-L =       "0948-6968",
  bibdate =      "Tue Sep 9 18:31:47 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jucs.bib",
  URL =          "http://www.jucs.org/jucs_20_2/towards_formal_linear_cryptanalysis",
  acknowledgement = ack-nhfb,
  fjournal =     "J.UCS: Journal of Universal Computer Science",
  journal-URL =  "http://www.jucs.org/jucs",
}

@Article{Hazay:2014:OSA,
  author =       "Carmit Hazay and Arpita Patra",
  title =        "One-Sided Adaptively Secure Two-Party Computation",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "8349",
  pages =        "368--393",
  year =         "2014",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-54242-8_16",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 21 08:39:11 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2014a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-54242-8_16/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-54242-8",
  book-URL =     "http://www.springerlink.com/content/978-3-642-54242-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Heather:2014:CPE,
  author =       "James Heather and Steve Schneider and Vanessa Teague",
  title =        "Cryptographic protocols with everyday objects",
  journal =      j-FORM-ASP-COMPUT,
  volume =       "26",
  number =       "1",
  pages =        "37--62",
  month =        jan,
  year =         "2014",
  CODEN =        "FACME5",
  DOI =          "https://doi.org/10.1007/s00165-013-0274-7",
  ISSN =         "0934-5043 (print), 1433-299X (electronic)",
  ISSN-L =       "0934-5043",
  bibdate =      "Tue Mar 17 20:58:46 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/formaspcomput.bib",
  URL =          "http://link.springer.com/article/10.1007/s00165-013-0274-7",
  acknowledgement = ack-nhfb,
  fjournal =     "Formal Aspects of Computing",
  journal-URL =  "http://link.springer.com/journal/165",
}

@Article{Heil:2014:APH,
  author =       "Timothy Heil and Anil Krishna and Nicholas Lindberg
                 and Farnaz Toussi and Steven Vanderwiel",
  title =        "Architecture and Performance of the Hardware
                 Accelerators in {IBM}'s {PowerEN} Processor",
  journal =      j-TOPC,
  volume =       "1",
  number =       "1",
  pages =        "5:1--5:??",
  month =        sep,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2588888",
  ISSN =         "2329-4949 (print), 2329-4957 (electronic)",
  ISSN-L =       "2329-4949",
  bibdate =      "Fri Oct 17 12:28:03 MDT 2014",
  bibsource =    "http://topc.acm.org/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/topc.bib",
  abstract =     "Computation at the edge of a datacenter has unique
                 characteristics. It deals with streaming data from
                 multiple sources, going to multiple destinations, often
                 requiring repeated application of one or more of
                 several standard algorithmic kernels. These kernels,
                 related to encryption, compression, XML Parsing and
                 regular expression searching on the data, demand a high
                 data processing rate and power efficiency. This
                 suggests the use of hardware acceleration for key
                 functions. However, robust general purpose processing
                 support is necessary to orchestrate the flow of data
                 between accelerators, as well as perform tasks that are
                 not suited to acceleration. Further, these accelerators
                 must be tightly integrated with the general purpose
                 computation in order to keep invocation overhead and
                 latency low. The accelerators must be easy for software
                 to use, and the system must be flexible enough to
                 support evolving networking standards. In this article,
                 we describe and evaluate the architecture of IBM's
                 PowerEN processor, with a focus on PowerEN's
                 architectural enhancements and its on-chip hardware
                 accelerators. PowerEN unites the throughput of
                 application-specific accelerators with the
                 programmability of general purpose cores on a single
                 coherent memory architecture. Hardware acceleration
                 improves throughput by orders of magnitude in some
                 cases compared to equivalent computation on the general
                 purpose cores. By offloading work to the accelerators,
                 general purpose cores are freed to simultaneously work
                 on computation less suited to acceleration.",
  acknowledgement = ack-nhfb,
  articleno =    "5",
  fjournal =     "ACM Transactions on Parallel Computing",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=2632163",
}

@Article{Herranz:2014:ABS,
  author =       "Javier Herranz",
  title =        "Attribute-based signatures from {RSA}",
  journal =      j-THEOR-COMP-SCI,
  volume =       "527",
  number =       "??",
  pages =        "73--82",
  day =          "27",
  month =        mar,
  year =         "2014",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Sat Mar 8 16:44:11 MST 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0304397514000772",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975/",
}

@Article{Hirt:2014:BA,
  author =       "Martin Hirt and Ueli Maurer and Pavel Raykov",
  title =        "Broadcast Amplification",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "8349",
  pages =        "419--439",
  year =         "2014",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-54242-8_18",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 21 08:39:11 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2014a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-54242-8_18/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-54242-8",
  book-URL =     "http://www.springerlink.com/content/978-3-642-54242-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Hoang:2014:IMD,
  author =       "Anh-Tuan Hoang and Takeshi Fujino",
  title =        "Intra-Masking Dual-Rail Memory on {LUT} Implementation
                 for {SCA}-Resistant {AES} on {FPGA}",
  journal =      j-TRETS,
  volume =       "7",
  number =       "2",
  pages =        "10:1--10:??",
  month =        jun,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2617595",
  ISSN =         "1936-7406 (print), 1936-7414 (electronic)",
  ISSN-L =       "1936-7406",
  bibdate =      "Mon Jun 30 18:26:23 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/trets.bib",
  abstract =     "In current countermeasure design trends against
                 differential power analysis (DPA), security at gate
                 level is required in addition to the security
                 algorithm. Several dual-rail pre-charge logics (DPL)
                 have been proposed to achieve this goal. Designs using
                 ASIC can attain this goal owing to its backend design
                 restrictions on placement and routing. However,
                 implementing these designs on field programmable gate
                 arrays (FPGA) without information leakage is still a
                 problem because of the difficulty involved in the
                 restrictions on placement and routing on FPGA. This
                 article describes our novel masked dual-rail
                 pre-charged memory approach, called `intra-masking
                 dual-rail memory (IMDRM) on LUT', and its
                 implementation on FPGA for Side-Channel
                 Attack-resistant (SCA-resistant) AES. In the proposed
                 design, all unsafe nodes, such as unmasking and
                 masking, and parts of dual-rail memory with unsafe
                 buses (buses that are not masked) are packed into a
                 single LUT. This makes them balanced and independent of
                 the placement and routing tools. Inputs and outputs of
                 all LUTs are masked, and so can be considered safe
                 signals. Several LUTs can be combined to create a safe
                 SBox. The design is independent of the cryptographic
                 algorithm, and hence, it can be applied to available
                 cryptographic standards such as DES or AES as well as
                 future standards. It requires no special placement or
                 route constraints in its implementation. A correlation
                 power analysis (CPA) attack on 1,000,000 traces of AES
                 implementation on FPGA showed that the secret
                 information is well protected against first-order
                 side-channel attacks. Even though the number of LUTs
                 used for memory in this implementation is seven times
                 greater than that of the conventional unprotected
                 single-rail memory table-lookup AES and three times
                 greater than the implementation based on a composite
                 field, it requires a smaller number of LUTs than all
                 other advanced SCA-resistant implementations such as
                 the wave dynamic differential logic, masked dual-rail
                 pre-charge logic, and threshold.",
  acknowledgement = ack-nhfb,
  articleno =    "10",
  fjournal =     "ACM Transactions on Reconfigurable Technology and
                 Systems (TRETS)",
  journal-URL =  "http://portal.acm.org/toc.cfm?id=J1151",
}

@Article{Homma:2014:TFD,
  author =       "N. Homma and K. Saito and T. Aoki",
  title =        "Toward Formal Design of Practical Cryptographic
                 Hardware Based on {Galois} Field Arithmetic",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "63",
  number =       "10",
  pages =        "2604--2613",
  month =        oct,
  year =         "2014",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2013.131",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Thu Nov 06 07:29:34 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
  keywords =     "128-bit AES datapath; advanced encryption standard;
                 AES processors; arithmetic circuits; computer algebra;
                 computer-aided design; cryptographic hardware;
                 cryptographic processors; Cryptographic processors;
                 cryptography; formal method; formal verification;
                 Galois field; Galois fields; Galois-field arithmetic;
                 GF arithmetic circuits; graph representation; graph
                 theory; Grobner basis; hierarchical graph structures;
                 multiplicative inversion circuits; polynomial
                 reduction; symbol manipulation; symbolic computation
                 techniques",
}

@Article{Houmansadr:2014:NBW,
  author =       "Amir Houmansadr and Negar Kiyavash and Nikita
                 Borisov",
  title =        "Non-blind watermarking of network flows",
  journal =      j-IEEE-TRANS-NETWORKING,
  volume =       "22",
  number =       "4",
  pages =        "1232--1244",
  month =        aug,
  year =         "2014",
  CODEN =        "IEANEP",
  DOI =          "https://doi.org/10.1109/TNET.2013.2272740",
  ISSN =         "1063-6692 (print), 1558-2566 (electronic)",
  ISSN-L =       "1063-6692",
  bibdate =      "Thu Feb 12 18:29:29 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
  abstract =     "Linking network flows is an important problem in
                 intrusion detection as well as anonymity. Passive
                 traffic analysis can link flows, but requires long
                 periods of observation to reduce errors. Active traffic
                 analysis, also known as flow watermarking, allows for
                 better precision and is more scalable. Previous flow
                 watermarks introduce significant delays to the traffic
                 flow as a side effect of using a blind detection
                 scheme; this enables attacks that detect and remove the
                 watermark, while at the same time slowing down
                 legitimate traffic. We propose the first non-blind
                 approach for flow watermarking, called RAINBOW, that
                 improves watermark invisibility by inserting delays
                 hundreds of times smaller than previous blind
                 watermarks, hence reduces the watermark interference on
                 network flows. We derive and analyze the optimum
                 detectors for RAINBOW as well as the passive traffic
                 analysis under different traffic models by using
                 hypothesis testing. Comparing the detection performance
                 of RAINBOW and the passive approach, we observe that
                 both RAINBOW and passive traffic analysis perform
                 similarly good in the case of uncorrelated traffic,
                 however the RAINBOW detector drastically outperforms
                 the optimum passive detector in the case of correlated
                 network flows. This justifies the use of non-blind
                 watermarks over passive traffic analysis even though
                 both approaches have similar scalability constraints.
                 We confirm our analysis by simulating the detectors and
                 testing them against large traces of real network
                 flows.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE\slash ACM Transactions on Networking",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J771",
}

@Article{Hsieh:2014:AMU,
  author =       "Wen-Bin Hsieh and Jenq-Shiou Leu",
  title =        "An anonymous mobile user authentication protocol using
                 self-certified public keys based on multi-server
                 architectures",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "70",
  number =       "1",
  pages =        "133--148",
  month =        oct,
  year =         "2014",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-014-1135-8",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Fri Feb 13 12:32:14 MST 2015",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0920-8542&volume=70&issue=1;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  URL =          "http://link.springer.com/article/10.1007/s11227-014-1135-8",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Article{Hsu:2014:VWR,
  author =       "Fu-Hau Hsu and Min-Hao Wu and Cheng-Hsing Yang and
                 Shiuh-Jeng Wang",
  title =        "Visible watermarking with reversibility of multimedia
                 images for ownership declarations",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "70",
  number =       "1",
  pages =        "247--268",
  month =        oct,
  year =         "2014",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-014-1258-y",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Fri Feb 13 12:32:14 MST 2015",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0920-8542&volume=70&issue=1;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  URL =          "http://link.springer.com/article/10.1007/s11227-014-1258-y",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@InProceedings{Huang:2014:AFS,
  author =       "Lin-Shung Huang and Alex Rice and Erling Ellingsen and
                 Collin Jackson",
  editor =       "????",
  booktitle =    "{IEEE Symposium on Security and Privacy}",
  title =        "Analyzing forged {SSL} certificates in the wild",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "??--??",
  year =         "2014",
  DOI =          "????",
  ISBN =         "????",
  ISBN-13 =      "????",
  LCCN =         "????",
  bibdate =      "Mon Mar 09 12:09:56 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "????",
  acknowledgement = ack-nhfb,
  remark =       "Cite in \cite[reference 43]{Schneier:2015:SWC}.",
}

@Article{Huang:2014:FOS,
  author =       "Xinyi Huang and Xiaofeng Chen and Jin Li and Yang
                 Xiang and Li Xu",
  title =        "Further Observations on Smart-Card-Based
                 Password-Authenticated Key Agreement in Distributed
                 Systems",
  journal =      j-IEEE-TRANS-PAR-DIST-SYS,
  volume =       "25",
  number =       "7",
  pages =        "1767--1775",
  month =        jul,
  year =         "2014",
  CODEN =        "ITDSEO",
  DOI =          "https://doi.org/10.1109/TPDS.2013.230",
  ISSN =         "1045-9219 (print), 1558-2183 (electronic)",
  ISSN-L =       "1045-9219",
  bibdate =      "Mon Aug 25 07:12:16 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranspardistsys.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Parallel and Distributed
                 Systems",
  journal-URL =  "http://www.computer.org/tpds/archives.htm",
}

@Article{Huang:2014:SWC,
  author =       "Yi-Li Huang and Fang-Yie Leu and Ilsun You and Yao-Kuo
                 Sun",
  title =        "A secure wireless communication system integrating
                 {RSA}, {Diffie--Hellman} {PKDS}, intelligent
                 protection-key chains and a {Data Connection Core} in a
                 {$4$G} environment",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "67",
  number =       "3",
  pages =        "635--652",
  month =        mar,
  year =         "2014",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-013-0958-z",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Sat Mar 8 14:59:14 MST 2014",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0920-8542&volume=67&issue=3;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  URL =          "http://link.springer.com/article/10.1007/s11227-013-0958-z",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Article{Huber:2014:TPW,
  author =       "Stefan Huber and Martin Held and Peter Meerwald and
                 Roland Kwitt",
  title =        "Topology-Preserving Watermarking of Vector Graphics",
  journal =      j-INT-J-COMPUT-GEOM-APPL,
  volume =       "24",
  number =       "1",
  pages =        "61--??",
  month =        mar,
  year =         "2014",
  CODEN =        "IJCAEV",
  DOI =          "https://doi.org/10.1142/S0218195914500034",
  ISSN =         "0218-1959",
  ISSN-L =       "0218-1959",
  bibdate =      "Wed Oct 29 06:39:33 MDT 2014",
  bibsource =    "http://ejournals.wspc.com.sg/ijcga/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijcga.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Computational Geometry and
                 Applications (IJCGA)",
  journal-URL =  "http://www.worldscientific.com/loi/ijcga",
}

@Article{Hur:2014:SDR,
  author =       "Junbeom Hur and Kyungtae Kang",
  title =        "Secure Data Retrieval for Decentralized
                 Disruption-Tolerant Military Networks",
  journal =      j-IEEE-TRANS-NETWORKING,
  volume =       "22",
  number =       "1",
  pages =        "16--26",
  month =        feb,
  year =         "2014",
  CODEN =        "IEANEP",
  DOI =          "https://doi.org/10.1109/TNET.2012.2210729",
  ISSN =         "1063-6692 (print), 1558-2566 (electronic)",
  ISSN-L =       "1063-6692",
  bibdate =      "Tue Mar 4 18:22:52 MST 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
  abstract =     "Mobile nodes in military environments such as a
                 battlefield or a hostile region are likely to suffer
                 from intermittent network connectivity and frequent
                 partitions. Disruption-tolerant network (DTN)
                 technologies are becoming successful solutions that
                 allow wireless devices carried by soldiers to
                 communicate with each other and access the confidential
                 information or command reliably by exploiting external
                 storage nodes. Some of the most challenging issues in
                 this scenario are the enforcement of authorization
                 policies and the policies update for secure data
                 retrieval. Ciphertext-policy attribute-based encryption
                 (CP-ABE) is a promising cryptographic solution to the
                 access control issues. However, the problem of applying
                 CP-ABE in decentralized DTNs introduces several
                 security and privacy challenges with regard to the
                 attribute revocation, key escrow, and coordination of
                 attributes issued from different authorities. In this
                 paper, we propose a secure data retrieval scheme using
                 CP-ABE for decentralized DTNs where multiple key
                 authorities manage their attributes independently. We
                 demonstrate how to apply the proposed mechanism to
                 securely and efficiently manage the confidential data
                 distributed in the disruption-tolerant military
                 network.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE\slash ACM Transactions on Networking",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J771",
}

@Article{Hurlburt:2014:BBC,
  author =       "G. F. Hurlburt and I. Bojanova",
  title =        "{Bitcoin}: Benefit or Curse?",
  journal =      j-IT-PRO,
  volume =       "16",
  number =       "3",
  pages =        "10--15",
  month =        may,
  year =         "2014",
  CODEN =        "IPMAFM",
  DOI =          "https://doi.org/10.1109/MITP.2014.28",
  ISSN =         "1520-9202 (print), 1941-045x (electronic)",
  ISSN-L =       "1520-9202",
  bibdate =      "Thu Nov 30 15:24:52 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "{IT} Professional",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6294",
  keywords =     "bitcoin crypto-currency model; bitcoin technology;
                 cloud; cryptocurrency; Cryptography; Data mining;
                 financial data processing; foreign exchange trading;
                 information technology; Internet of Anything; Internet
                 of Things; Internet/Web technologies; Market research;
                 mobile; mobile commerce; Mobile communication; mobile
                 devices; Online banking; virtual currency;
                 Virtualization",
}

@Article{Ioannou:2014:PKC,
  author =       "Lawrence M. Ioannou and Michele Mosca",
  title =        "Public-key cryptography based on bounded quantum
                 reference frames",
  journal =      j-THEOR-COMP-SCI,
  volume =       "560 (part 1)",
  number =       "??",
  pages =        "33--45",
  day =          "4",
  month =        dec,
  year =         "2014",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Tue Dec 2 19:05:23 MST 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S030439751400694X",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975/",
}

@Article{Ishai:2014:PCP,
  author =       "Yuval Ishai and Mor Weiss",
  title =        "Probabilistically Checkable Proofs of Proximity with
                 Zero-Knowledge",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "8349",
  pages =        "121--145",
  year =         "2014",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-54242-8_6",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 21 08:39:11 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2014a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-54242-8_6/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-54242-8",
  book-URL =     "http://www.springerlink.com/content/978-3-642-54242-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Jiang:2014:TEA,
  author =       "Shaoquan Jiang",
  title =        "Timed encryption with application to deniable key
                 exchange",
  journal =      j-THEOR-COMP-SCI,
  volume =       "560 (part 2)",
  number =       "??",
  pages =        "172--189",
  day =          "4",
  month =        dec,
  year =         "2014",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Tue Dec 2 19:05:26 MST 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S030439751400098X",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975/",
}

@Article{Jiang:2014:UIS,
  author =       "Shaoquan Jiang",
  title =        "On Unconditional $ \mu $-Security of Private Key
                 Encryption",
  journal =      j-COMP-J,
  volume =       "57",
  number =       "10",
  pages =        "1570--1579",
  month =        oct,
  year =         "2014",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxt097",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Sat Sep 27 12:06:41 MDT 2014",
  bibsource =    "http://comjnl.oxfordjournals.org/content/57/10.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/57/10/1570",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "August 26, 2013",
}

@Article{Jo:2014:ODE,
  author =       "Heeseung Jo and Seung-Tae Hong and Jae-Woo Chang and
                 Dong Hoon Choi",
  title =        "Offloading data encryption to {GPU} in database
                 systems",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "69",
  number =       "1",
  pages =        "375--394",
  month =        jul,
  year =         "2014",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-014-1159-0",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Wed Sep 10 06:45:04 MDT 2014",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0920-8542&volume=69&issue=1;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  URL =          "http://link.springer.com/article/10.1007/s11227-014-1159-0",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Article{Juels:2014:HEE,
  author =       "Ari Juels and Thomas Ristenpart",
  title =        "Honey Encryption: Encryption beyond the Brute-Force
                 Barrier",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "4",
  pages =        "59--62",
  month =        jul # "\slash " # aug,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.67",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:11 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/04/msp2014040059-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/04/msp2014040059-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
}

@Article{Juels:2014:INC,
  author =       "Ari Juels and Bonnie Wong",
  title =        "The interplay of neuroscience and cryptography:
                 technical perspective",
  journal =      j-CACM,
  volume =       "57",
  number =       "5",
  pages =        "109--109",
  month =        may,
  year =         "2014",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2594446",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 21 10:20:12 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cacm2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Kai:2014:FSD,
  author =       "Hiroshi Kai and Keita Ueda",
  title =        "Fake Shares Detection on a Visual Secret Sharing
                 Scheme by Rational Interpolation",
  journal =      j-ACM-COMM-COMP-ALGEBRA,
  volume =       "48",
  number =       "3/4",
  pages =        "124--126",
  month =        sep,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2733693.2733707",
  ISSN =         "1932-2232 (print), 1932-2240 (electronic)",
  ISSN-L =       "1932-2232",
  bibdate =      "Thu Feb 5 17:11:08 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigsam.bib",
  abstract =     "In the visual secret sharing scheme based on
                 polynomial interpolation, e.g. Lin and Tsai's scheme,
                 fake share images may give incorrect secret
                 information. We propose a method to identify or detect
                 them using a technique by rational interpolation.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Communications in Computer Algebra",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1000",
}

@Article{Karpovsky:2014:DSS,
  author =       "M. Karpovsky and Zhen Wang",
  title =        "Design of Strongly Secure Communication and
                 Computation Channels by Nonlinear Error Detecting
                 Codes",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "63",
  number =       "11",
  pages =        "2716--2728",
  month =        nov,
  year =         "2014",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2013.146",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Thu Nov 06 07:39:04 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
  keywords =     "channel coding; computation channels; computational
                 systems; Cryptography; decoding; decoding method;
                 device-under-attack; Encoding; encoding method; error
                 detection codes; error patterns; fault injection
                 attacks; Hamming distance; multivariate Horner scheme;
                 Nonlinear codes; nonlinear codes; nonlinear encoding
                 functions; nonlinear error detecting codes; Orbits;
                 reed-muller codes; Robustness; secret sharing; secure
                 communication; secure cryptographic devices; secure
                 hardware; telecommunication security; Vectors",
}

@Article{Khalil:2014:CIM,
  author =       "Issa Khalil and Abdallah Khreishah and Muhammad
                 Azeem",
  title =        "{Consolidated Identity Management System} for secure
                 mobile cloud computing",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "65",
  number =       "??",
  pages =        "99--110",
  day =          "2",
  month =        jun,
  year =         "2014",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Mon Apr 28 15:51:30 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1389128614001194",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286/",
}

@Article{Khan:2014:IPR,
  author =       "Abdul Nasir Khan and M. L. Mat Kiah and Sajjad A.
                 Madani and Mazhar Ali and Atta ur Rehman Khan and
                 Shahaboddin Shamshirband",
  title =        "Incremental proxy re-encryption scheme for mobile
                 cloud computing environment",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "68",
  number =       "2",
  pages =        "624--651",
  month =        may,
  year =         "2014",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-013-1055-z",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Wed Sep 10 06:44:57 MDT 2014",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0920-8542&volume=68&issue=2;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  URL =          "http://link.springer.com/article/10.1007/s11227-013-1055-z",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Article{Khan:2014:MEK,
  author =       "Muhammad Khurram Khan and Saru Kumari and Mridul K.
                 Gupta",
  title =        "More efficient key-hash based fingerprint remote
                 authentication scheme using mobile device",
  journal =      j-COMPUTING,
  volume =       "96",
  number =       "9",
  pages =        "793--816",
  month =        sep,
  year =         "2014",
  CODEN =        "CMPTA2",
  DOI =          "https://doi.org/10.1007/s00607-013-0308-2",
  ISSN =         "0010-485X (print), 1436-5057 (electronic)",
  ISSN-L =       "0010-485X",
  bibdate =      "Wed Feb 11 07:42:25 MST 2015",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0010-485X&volume=96&issue=9;
                 https://www.math.utah.edu/pub/tex/bib/computing.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://link.springer.com/article/10.1007/s00607-013-0308-2",
  acknowledgement = ack-nhfb,
  fjournal =     "Computing",
  journal-URL =  "http://link.springer.com/journal/607",
}

@Article{Kheiri:2014:CCV,
  author =       "Ahmed Kheiri and Ender {\"O}zcan",
  title =        "Constructing Constrained-Version of Magic Squares
                 Using Selection Hyper-heuristics",
  journal =      j-COMP-J,
  volume =       "57",
  number =       "3",
  pages =        "469--479",
  month =        mar,
  year =         "2014",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxt130",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Thu Feb 27 14:02:47 MST 2014",
  bibsource =    "http://comjnl.oxfordjournals.org/content/57/3.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  note =         "See correction \cite{Kheiri:2015:CCC}.",
  URL =          "http://comjnl.oxfordjournals.org/content/57/3/469.full.pdf+html",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "November 11, 2013",
}

@Article{Kifer:2014:PFM,
  author =       "Daniel Kifer and Ashwin Machanavajjhala",
  title =        "{Pufferfish}: a framework for mathematical privacy
                 definitions",
  journal =      j-TODS,
  volume =       "39",
  number =       "1",
  pages =        "3:1--3:??",
  month =        jan,
  year =         "2014",
  CODEN =        "ATDSD3",
  DOI =          "https://doi.org/10.1145/2514689",
  ISSN =         "0362-5915 (print), 1557-4644 (electronic)",
  ISSN-L =       "0362-5915",
  bibdate =      "Wed Feb 5 11:31:16 MST 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tods/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tods.bib",
  abstract =     "In this article, we introduce a new and general
                 privacy framework called Pufferfish. The Pufferfish
                 framework can be used to create new privacy definitions
                 that are customized to the needs of a given
                 application. The goal of Pufferfish is to allow experts
                 in an application domain, who frequently do not have
                 expertise in privacy, to develop rigorous privacy
                 definitions for their data sharing needs. In addition
                 to this, the Pufferfish framework can also be used to
                 study existing privacy definitions. We illustrate the
                 benefits with several applications of this privacy
                 framework: we use it to analyze differential privacy
                 and formalize a connection to attackers who believe
                 that the data records are independent; we use it to
                 create a privacy definition called hedging privacy,
                 which can be used to rule out attackers whose prior
                 beliefs are inconsistent with the data; we use the
                 framework to define and study the notion of composition
                 in a broader context than before; we show how to apply
                 the framework to protect unbounded continuous
                 attributes and aggregate information; and we show how
                 to use the framework to rigorously account for prior
                 data releases.",
  acknowledgement = ack-nhfb,
  articleno =    "3",
  fjournal =     "ACM Transactions on Database Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J777",
}

@Article{Kim:2014:MBM,
  author =       "Heeseok Kim and Dong-Guk Han and Seokhie Hong and
                 Jaecheol Ha",
  title =        "Message blinding method requiring no multiplicative
                 inversion for {RSA}",
  journal =      j-TECS,
  volume =       "13",
  number =       "4",
  pages =        "80:1--80:??",
  month =        feb,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2560020",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Tue Mar 11 18:33:06 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tecs.bib",
  abstract =     "This article proposes a new message blinding methods
                 requiring no multiplicative inversion for RSA. Most
                 existing message blinding methods for RSA additionally
                 require the multiplicative inversion, even though
                 computational complexity of this operation is $ O(n^3)
                 $ which is equal to that of the exponentiation. Thus,
                 this additional operation is known to be the main
                 drawback of the existing message blinding methods for
                 RSA. In addition to requiring no additional
                 multiplicative inversion, our new countermeasure
                 provides the security against various power analysis
                 attacks as well as general differential power
                 analysis.",
  acknowledgement = ack-nhfb,
  articleno =    "80",
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?&idx=J840",
}

@Article{Kiyoshima:2014:CRB,
  author =       "Susumu Kiyoshima and Yoshifumi Manabe and Tatsuaki
                 Okamoto",
  title =        "Constant-Round Black-Box Construction of Composable
                 Multi-Party Computation Protocol",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "8349",
  pages =        "343--367",
  year =         "2014",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-54242-8_15",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 21 08:39:11 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2014a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-54242-8_15/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-54242-8",
  book-URL =     "http://www.springerlink.com/content/978-3-642-54242-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Lago-Fernandez:2014:NAA,
  author =       "J. Lago-Fern{\'a}ndez and F. Gil-Casti{\~n}eira and F.
                 J. Gonz{\'a}lez-Casta{\~n}o and A.
                 Rom{\'a}n-Portabales",
  title =        "A new approach to authenticating and encrypting {Voice
                 over Internet Protocol} communications",
  journal =      j-SPE,
  volume =       "44",
  number =       "5",
  pages =        "593--619",
  month =        may,
  year =         "2014",
  CODEN =        "SPEXBL",
  DOI =          "https://doi.org/10.1002/spe.2175",
  ISSN =         "0038-0644 (print), 1097-024X (electronic)",
  ISSN-L =       "0038-0644",
  bibdate =      "Wed Sep 10 05:57:32 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/spe.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Software --- Practice and Experience",
  journal-URL =  "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1097-024X",
  onlinedate =   "12 Dec 2012",
}

@Article{Lallie:2014:PCM,
  author =       "Harjinder Singh Lallie",
  title =        "The Problems and Challenges of Managing Crowd Sourced
                 Audio-Visual Evidence",
  journal =      j-FUTURE-INTERNET,
  volume =       "6",
  number =       "2",
  pages =        "190--202",
  day =          "01",
  month =        apr,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi6020190",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:51 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/6/2/190",
  abstract =     "A number of recent incidents, such as the Stanley Cup
                 Riots, the uprisings in the Middle East and the London
                 riots have demonstrated the value of crowd sourced
                 audio-visual evidence wherein citizens submit
                 audio-visual footage captured on mobile phones and
                 other devices to aid governmental institutions,
                 responder agencies and law enforcement authorities to
                 confirm the authenticity of incidents and, in the case
                 of criminal activity, to identify perpetrators. The use
                 of such evidence can present a significant logistical
                 challenge to investigators, particularly because of the
                 potential size of data gathered through such mechanisms
                 and the added problems of time-lining disparate sources
                 of evidence and, subsequently, investigating the
                 incident(s). In this paper we explore this problem and,
                 in particular, outline the pressure points for an
                 investigator. We identify and explore a number of
                 particular problems related to the secure receipt of
                 the evidence, imaging, tagging and then time-lining the
                 evidence, and the problem of identifying duplicate and
                 near duplicate items of audio-visual evidence.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Contemporary and Future Digital
                 Forensics.",
}

@Article{Laszka:2014:STC,
  author =       "Aron Laszka and Benjamin Johnson and Pascal
                 Sch{\"o}ttle and Jens Grossklags and Rainer B{\"o}hme",
  title =        "Secure Team Composition to Thwart Insider Threats and
                 Cyber-Espionage",
  journal =      j-TOIT,
  volume =       "14",
  number =       "2--3",
  pages =        "19:1--19:??",
  month =        oct,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2663499",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Tue Oct 28 17:00:43 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "We develop a formal nondeterministic game model for
                 secure team composition to counter cyber-espionage and
                 to protect organizational secrets against an attacker
                 who tries to sidestep technical security mechanisms by
                 offering a bribe to a project team member. The game
                 captures the adversarial interaction between the
                 attacker and the project manager who has a secret she
                 wants to protect but must share with a team of
                 individuals selected from within her organization. Our
                 interdisciplinary work is important in the face of the
                 multipronged approaches utilized by well-motivated
                 attackers to circumvent the fortifications of otherwise
                 well-defended targets.",
  acknowledgement = ack-nhfb,
  articleno =    "19",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Le:2014:IMX,
  author =       "Duc-Phong Le and Chik How Tan",
  title =        "Improved {Miller}'s Algorithm for Computing Pairings
                 on {Edwards} Curves",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "63",
  number =       "10",
  pages =        "2626--2632",
  month =        oct,
  year =         "2014",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2013.125",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Thu Nov 06 07:29:34 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
  keywords =     "curve pairing computation; Edwards curves; elliptic
                 curve cryptography; embedding degree; group law
                 operation; Miller algorithm; Miller's algorithm;
                 pairing computation; pairing-based cryptography;
                 pairing-based cryptosystems; pairing-friendly elliptic
                 curves; public key cryptography; scalar
                 multiplications; Tate pairings; Weierstrass curve; Weil
                 pairings; Weil/Tate pairings",
}

@Article{Lee:2014:NDH,
  author =       "Ya-Lin Lee and Wen-Hsiang Tsai",
  title =        "A new data hiding method via revision history records
                 on collaborative writing platforms",
  journal =      j-TOMCCAP,
  volume =       "10",
  number =       "2",
  pages =        "20:1--20:??",
  month =        feb,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2534408",
  ISSN =         "1551-6857 (print), 1551-6865 (electronic)",
  ISSN-L =       "1551-6857",
  bibdate =      "Thu Mar 13 07:37:57 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tomccap/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tomccap.bib",
  abstract =     "A new data hiding method via collaboratively-written
                 articles with forged revision history records on
                 collaborative writing platforms is proposed. The hidden
                 message is camouflaged as a stego-document consisting
                 of a stego-article and a revision history created
                 through a simulated process of collaborative writing.
                 The revisions are forged using a database constructed
                 by mining word sequences used in real cases from an
                 English Wikipedia XML dump. Four characteristics of
                 article revisions are identified and utilized to embed
                 secret messages, including the author of each revision,
                 the number of corrected word sequences, the content of
                 the corrected word sequences, and the word sequences
                 replacing the corrected ones. Related problems arising
                 in utilizing these characteristics for data hiding are
                 identified and solved skillfully, resulting in an
                 effective multiway method for hiding secret messages
                 into the revision history. To create more realistic
                 revisions, Huffman coding based on the word sequence
                 frequencies collected from Wikipedia is applied to
                 encode the word sequences. Good experimental results
                 show the feasibility of the proposed method.",
  acknowledgement = ack-nhfb,
  articleno =    "20",
  fjournal =     "ACM Transactions on Multimedia Computing,
                 Communications, and Applications",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J961",
}

@Article{Lee:2014:SPB,
  author =       "Jooyoung Lee and Daesung Kwon",
  title =        "Security of permutation-based compression function
                 {\tt lp231}",
  journal =      j-INFO-PROC-LETT,
  volume =       "114",
  number =       "7",
  pages =        "372--381",
  month =        jul,
  year =         "2014",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Fri Mar 21 18:32:23 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019014000325",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190/",
}

@Article{Li:2014:ARM,
  author =       "Cai Li and Jiankun Hu",
  title =        "Attacks via record multiplicity on cancelable
                 biometrics templates",
  journal =      j-CCPE,
  volume =       "26",
  number =       "8",
  pages =        "1593--1605",
  day =          "10",
  month =        jun,
  year =         "2014",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.3042",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Fri May 30 08:55:43 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "30 Apr 2013",
}

@Article{Li:2014:EMK,
  author =       "Ruixuan Li and Zhiyong Xu and Wanshang Kang and Kin
                 Choong Yow and Cheng-Zhong Xu",
  title =        "Efficient multi-keyword ranked query over encrypted
                 data in cloud computing",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "30",
  number =       "??",
  pages =        "179--190",
  month =        jan,
  year =         "2014",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Mon Dec 2 16:57:46 MST 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib;
                 http://www.sciencedirect.com/science/journal/0167739X",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X1300143X",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Li:2014:IBD,
  author =       "Fagen Li and Pan Xiong and Chunhua Jin",
  title =        "Identity-based deniable authentication for ad hoc
                 networks",
  journal =      j-COMPUTING,
  volume =       "96",
  number =       "9",
  pages =        "843--853",
  month =        sep,
  year =         "2014",
  CODEN =        "CMPTA2",
  DOI =          "https://doi.org/10.1007/s00607-013-0321-5",
  ISSN =         "0010-485X (print), 1436-5057 (electronic)",
  ISSN-L =       "0010-485X",
  bibdate =      "Wed Feb 11 07:42:25 MST 2015",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0010-485X&volume=96&issue=9;
                 https://www.math.utah.edu/pub/tex/bib/computing.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://link.springer.com/article/10.1007/s00607-013-0321-5",
  acknowledgement = ack-nhfb,
  fjournal =     "Computing",
  journal-URL =  "http://link.springer.com/journal/607",
}

@Article{Li:2014:PSC,
  author =       "Jiguo Li and Haiting Du and Yichen Zhang and Tao Li
                 and Yuexin Zhang",
  title =        "Provably secure certificate-based key-insulated
                 signature scheme",
  journal =      j-CCPE,
  volume =       "26",
  number =       "8",
  pages =        "1546--1560",
  day =          "10",
  month =        jun,
  year =         "2014",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.3019",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Fri May 30 08:55:43 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "8 Apr 2013",
}

@Article{Li:2014:SCA,
  author =       "Peng Li and Debin Gao and Michael K. Reiter",
  title =        "{StopWatch}: a Cloud Architecture for Timing Channel
                 Mitigation",
  journal =      j-TISSEC,
  volume =       "17",
  number =       "2",
  pages =        "8:1--8:??",
  month =        nov,
  year =         "2014",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/2670940",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Wed Nov 19 12:26:42 MST 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tissec.bib;
                 https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  abstract =     "This article presents StopWatch, a system that defends
                 against timing-based side-channel attacks that arise
                 from coresidency of victims and attackers in
                 infrastructure-as-a-service clouds. StopWatch
                 triplicates each cloud-resident guest virtual machine
                 (VM) and places replicas so that the three replicas of
                 a guest VM are coresident with nonoverlapping sets of
                 (replicas of) other VMs. StopWatch uses the timing of
                 I/O events at a VM's replicas collectively to determine
                 the timings observed by each one or by an external
                 observer, so that observable timing behaviors are
                 similarly likely in the absence of any other
                 individual, coresident VMs. We detail the design and
                 implementation of StopWatch in Xen, evaluate the
                 factors that influence its performance, demonstrate its
                 advantages relative to alternative defenses against
                 timing side channels with commodity hardware, and
                 address the problem of placing VM replicas in a cloud
                 under the constraints of StopWatch so as to still
                 enable adequate cloud utilization.",
  acknowledgement = ack-nhfb,
  articleno =    "8",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@Article{Li:2014:SOA,
  author =       "Jin Li and Xinyi Huang and Jingwei Li and Xiaofeng
                 Chen and Yang Xiang",
  title =        "Securely Outsourcing Attribute-Based Encryption with
                 Checkability",
  journal =      j-IEEE-TRANS-PAR-DIST-SYS,
  volume =       "25",
  number =       "8",
  pages =        "2201--2210",
  month =        aug,
  year =         "2014",
  CODEN =        "ITDSEO",
  DOI =          "https://doi.org/10.1109/TPDS.2013.271",
  ISSN =         "1045-9219 (print), 1558-2183 (electronic)",
  ISSN-L =       "1045-9219",
  bibdate =      "Mon Aug 25 07:12:16 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranspardistsys.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Parallel and Distributed
                 Systems",
  journal-URL =  "http://www.computer.org/tpds/archives.htm",
}

@Article{Lian:2014:SSA,
  author =       "Yanling Lian and Xinyi Huang and Yi Mu",
  title =        "{SA$^3$}: Self-adaptive anonymous authentication for
                 dynamic authentication policies",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "30",
  number =       "??",
  pages =        "133--139",
  month =        jan,
  year =         "2014",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Mon Dec 2 16:57:46 MST 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X13001210",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X/",
}

@Article{Liang:2014:CCS,
  author =       "Kaitai Liang and Cheng-Kang Chu and Xiao Tan and
                 Duncan S. Wong and Chunming Tang and Jianying Zhou",
  title =        "Chosen-ciphertext secure multi-hop identity-based
                 conditional proxy re-encryption with constant-size
                 ciphertexts",
  journal =      j-THEOR-COMP-SCI,
  volume =       "539",
  number =       "??",
  pages =        "87--105",
  day =          "19",
  month =        jun,
  year =         "2014",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Sat Jun 28 08:55:49 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0304397514003326",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975/",
}

@Article{Lin:2014:IVW,
  author =       "Pei-Yu Lin",
  title =        "Imperceptible visible watermarking based on postcamera
                 histogram operation",
  journal =      j-J-SYST-SOFTW,
  volume =       "95",
  number =       "??",
  pages =        "194--208",
  month =        sep,
  year =         "2014",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Mon Sep 1 11:30:59 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0164121214001071",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212/",
}

@Article{Litton:2014:TFA,
  author =       "James Litton",
  title =        "Two-factor authentication system for {Apache} and
                 {SSH}",
  journal =      j-LINUX-J,
  volume =       "2014",
  number =       "239",
  pages =        "4:1--4:??",
  month =        mar,
  year =         "2014",
  CODEN =        "LIJOFX",
  ISSN =         "1075-3583 (print), 1938-3827 (electronic)",
  ISSN-L =       "1075-3583",
  bibdate =      "Tue Apr 1 05:49:35 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/linux-journal.bib",
  abstract =     "Implementing a two-factor solution doesn't have to be
                 hard. With a little bit of ingenuity, you can implement
                 a simple, self-contained solution in just a few
                 minutes.",
  acknowledgement = ack-nhfb,
  articleno =    "4",
  fjournal =     "Linux Journal",
  journal-URL =  "http://portal.acm.org/citation.cfm?id=J508",
}

@Article{Liu:2014:CRA,
  author =       "Jingwei Liu and Zonghua Zhang and Xiaofeng Chen and
                 Kyung Sup Kwak",
  title =        "Certificateless Remote Anonymous Authentication
                 Schemes for Wireless Body Area Networks",
  journal =      j-IEEE-TRANS-PAR-DIST-SYS,
  volume =       "25",
  number =       "2",
  pages =        "332--342",
  month =        feb,
  year =         "2014",
  CODEN =        "ITDSEO",
  DOI =          "https://doi.org/10.1109/TPDS.2013.145",
  ISSN =         "1045-9219 (print), 1558-2183 (electronic)",
  ISSN-L =       "1045-9219",
  bibdate =      "Mon Aug 25 07:12:16 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranspardistsys.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Parallel and Distributed
                 Systems",
  journal-URL =  "http://www.computer.org/tpds/archives.htm",
}

@Article{Liu:2014:DAF,
  author =       "Hongbo Liu and Hui Wang and Yingying Chen and Dayong
                 Jia",
  title =        "Defending against Frequency-Based Attacks on
                 Distributed Data Storage in Wireless Networks",
  journal =      j-TOSN,
  volume =       "10",
  number =       "3",
  pages =        "49:1--49:??",
  month =        apr,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2594774",
  ISSN =         "1550-4859 (print), 1550-4867 (electronic)",
  ISSN-L =       "1550-4859",
  bibdate =      "Wed May 21 09:27:49 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tosn.bib",
  abstract =     "As wireless networks become more pervasive, the amount
                 of the wireless data is rapidly increasing. One of the
                 biggest challenges of wide adoption of distributed data
                 storage is how to store these data securely. In this
                 work, we study the frequency-based attack, a type of
                 attack that is different from previously well-studied
                 ones, that exploits additional adversary knowledge of
                 domain values and/or their exact/approximate
                 frequencies to crack the encrypted data. To cope with
                 frequency-based attacks, the straightforward 1-to-1
                 substitution encryption functions are not sufficient.
                 We propose a data encryption strategy based on 1-to- n
                 substitution via dividing and emulating techniques to
                 defend against the frequency-based attack, while
                 enabling efficient query evaluation over encrypted
                 data. We further develop two frameworks, incremental
                 collection and clustered collection, which are used to
                 defend against the global frequency-based attack when
                 the knowledge of the global frequency in the network is
                 not available. Built upon our basic encryption schemes,
                 we derive two mechanisms, direct emulating and dual
                 encryption, to handle updates on the data storage for
                 energy-constrained sensor nodes and wireless devices.
                 Our preliminary experiments with sensor nodes and
                 extensive simulation results show that our data
                 encryption strategy can achieve high security guarantee
                 with low overhead.",
  acknowledgement = ack-nhfb,
  articleno =    "49",
  fjournal =     "ACM Transactions on Sensor Networks (TOSN)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J981",
}

@Article{Liu:2014:PKE,
  author =       "Shengli Liu and Fangguo Zhang and Kefei Chen",
  title =        "Public-key encryption scheme with selective opening
                 chosen-ciphertext security based on the {Decisional
                 Diffie--Hellman} assumption",
  journal =      j-CCPE,
  volume =       "26",
  number =       "8",
  pages =        "1506--1519",
  day =          "10",
  month =        jun,
  year =         "2014",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.3021",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Fri May 30 08:55:43 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "18 Apr 2013",
}

@Article{Liu:2014:SCS,
  author =       "Bin Liu and Ralph R. Martin and Ji-Wu Huang and
                 Shi-Min Hu",
  title =        "Shapes and Cryptography: Structure Aware Visual
                 Cryptography",
  journal =      j-CGF,
  volume =       "33",
  number =       "7",
  pages =        "141--150",
  month =        oct,
  year =         "2014",
  CODEN =        "CGFODY",
  DOI =          "https://doi.org/10.1111/cgf.12482",
  ISSN =         "0167-7055 (print), 1467-8659 (electronic)",
  ISSN-L =       "0167-7055",
  bibdate =      "Fri Feb 13 14:27:08 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cgf.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Graphics World",
  journal-URL =  "http://onlinelibrary.wiley.com/journal/10.1111/(ISSN)1467-8659/",
  onlinedate =   "28 Oct 2014",
}

@Article{Lopez-Garcia:2014:PBB,
  author =       "Lourdes L{\'o}pez-Garc{\'\i}a and Luis J. Dominguez
                 Perez and Francisco Rodr{\'\i}guez-Henr{\'\i}quez",
  title =        "A Pairing-Based Blind Signature E-Voting Scheme",
  journal =      j-COMP-J,
  volume =       "57",
  number =       "10",
  pages =        "1460--1471",
  month =        oct,
  year =         "2014",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxt069",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Sat Sep 27 12:06:41 MDT 2014",
  bibsource =    "http://comjnl.oxfordjournals.org/content/57/10.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/57/10/1460",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "July 16, 2013",
}

@Article{Lu:2014:DAN,
  author =       "Jiqiang Lu and Wun-She Yap and Matt Henricksen and
                 Swee-Huay Heng",
  title =        "Differential attack on nine rounds of the {SEED} block
                 cipher",
  journal =      j-INFO-PROC-LETT,
  volume =       "114",
  number =       "3",
  pages =        "116--123",
  month =        mar,
  year =         "2014",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Mon Dec 9 09:33:47 MST 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  URL =          "http://www.sciencedirect.com/science/article/pii/S002001901300272X",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Lu:2014:HOM,
  author =       "Jiqiang Lu and Yongzhuang Wei and Jongsung Kim and
                 Enes Pasalic",
  title =        "The higher-order meet-in-the-middle attack and its
                 application to the {Camellia} block cipher",
  journal =      j-THEOR-COMP-SCI,
  volume =       "527",
  number =       "??",
  pages =        "102--122",
  day =          "27",
  month =        mar,
  year =         "2014",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Sat Mar 8 16:44:11 MST 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0304397514000802",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975/",
}

@Article{Lucamarini:2014:QKD,
  author =       "Marco Lucamarini and Stefano Mancini",
  title =        "Quantum key distribution using a two-way quantum
                 channel",
  journal =      j-THEOR-COMP-SCI,
  volume =       "560 (part 1)",
  number =       "??",
  pages =        "46--61",
  day =          "4",
  month =        dec,
  year =         "2014",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Tue Dec 2 19:05:23 MST 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0304397514006951",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975/",
}

@Article{Lukowiak:2014:CEB,
  author =       "Marcin Lukowiak and Stanislaw Radziszowski and James
                 Vallino and Christopher Wood",
  title =        "Cybersecurity Education: Bridging the Gap Between
                 Hardware and Software Domains",
  journal =      j-TOCE,
  volume =       "14",
  number =       "1",
  pages =        "2:1--2:??",
  month =        mar,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2538029",
  ISSN =         "1946-6226",
  bibdate =      "Tue Apr 1 06:15:14 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/toce;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/toce.bib",
  abstract =     "With the continuous growth of cyberinfrastructure
                 throughout modern society, the need for secure
                 computing and communication is more important than ever
                 before. As a result, there is also an increasing need
                 for entry-level developers who are capable of designing
                 and building practical solutions for systems with
                 stringent security requirements. This calls for careful
                 attention to algorithm choice and implementation
                 method, as well as trade-offs between hardware and
                 software implementations. This article describes
                 motivation and efforts taken by three departments at
                 Rochester Institute of Technology (Computer
                 Engineering, Computer Science, and Software
                 Engineering) that were focused on creating a
                 multidisciplinary course that integrates the
                 algorithmic, engineering, and practical aspects of
                 security as exemplified by applied cryptography. In
                 particular, the article presents the structure of this
                 new course, topics covered, lab tools and results from
                 the first two spring quarter offerings in 2011 and
                 2012.",
  acknowledgement = ack-nhfb,
  articleno =    "2",
  fjournal =     "ACM Transactions on Computing Education",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1193",
}

@Article{Luo:2014:ARP,
  author =       "Jia Ning Luo and Ming Hour Yang",
  title =        "An anonymous e-rental protocol based on {ID}-based
                 cryptography and {NFC}",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "70",
  number =       "1",
  pages =        "31--53",
  month =        oct,
  year =         "2014",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-013-1051-3",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Fri Feb 13 12:32:14 MST 2015",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0920-8542&volume=70&issue=1;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  URL =          "http://link.springer.com/article/10.1007/s11227-013-1051-3",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Book{Macrakis:2014:PLS,
  author =       "Kristie Macrakis",
  title =        "Prisoners, lovers, and spies: the story of invisible
                 ink from {Herodotus} to {al-Qaeda}",
  publisher =    pub-YALE,
  address =      pub-YALE:adr,
  pages =        "xiv + 377",
  year =         "2014",
  ISBN =         "0-300-17925-1 (hardcover)",
  ISBN-13 =      "978-0-300-17925-5 (hardcover)",
  LCCN =         "Z104.5 .M33 2014",
  bibdate =      "Fri Nov 13 05:44:21 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/isis2010.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  subject =      "Writing, Invisible; History; Invisible inks;
                 Confidential communications; Espionage; Equipment and
                 supplies",
  tableofcontents = "The art of love and war \\
                 Intrigue and inquisition \\
                 Confessing secrets \\
                 Invisible landscapes \\
                 Revolutionary ink \\
                 Magic \\
                 The secret-ink war \\
                 The United States enters the secret-ink war \\
                 Visible Nazis \\
                 The mystery of the microdot \\
                 Invisible spy catchers \\
                 Out in the cold \\
                 Hiding in porn sites",
}

@Article{Mahmoody:2014:PPK,
  author =       "Mohammad Mahmoody and Hemanta K. Maji and Manoj
                 Prabhakaran",
  title =        "On the Power of Public-Key Encryption in Secure
                 Computation",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "8349",
  pages =        "240--264",
  year =         "2014",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-54242-8_11",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 21 08:39:11 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2014a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-54242-8_11/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-54242-8",
  book-URL =     "http://www.springerlink.com/content/978-3-642-54242-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Maimut:2014:AET,
  author =       "Diana Maimut and Reza Reyhanitabar",
  title =        "Authenticated Encryption: Toward Next-Generation
                 Algorithms",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "2",
  pages =        "70--72",
  month =        mar # "\slash " # apr,
  year =         "2014",
  DOI =          "https://doi.org/10.1109/MSP.2014.19",
  ISSN =         "1540-7993",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 21 17:20:35 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
}

@Article{Maity:2014:FIR,
  author =       "Hirak Kumar Maity and Santi P. Maity",
  title =        "{FPGA} implementation of reversible watermarking in
                 digital images using reversible contrast mapping",
  journal =      j-J-SYST-SOFTW,
  volume =       "96",
  number =       "??",
  pages =        "93--104",
  month =        oct,
  year =         "2014",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Mon Sep 1 11:31:01 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0164121214001393",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212/",
}

@Article{Marasco:2014:SAS,
  author =       "Emanuela Marasco and Arun Ross",
  title =        "A Survey on Antispoofing Schemes for Fingerprint
                 Recognition Systems",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "2",
  pages =        "28:1--28:??",
  month =        nov,
  year =         "2014",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2617756",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Nov 15 15:22:35 MST 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "Several issues related to the vulnerability of
                 fingerprint recognition systems to attacks have been
                 highlighted in the biometrics literature. One such
                 vulnerability involves the use of artificial fingers,
                 where materials such as Play-Doh, silicone, and gelatin
                 are inscribed with fingerprint ridges. Researchers have
                 demonstrated that some commercial fingerprint
                 recognition systems can be deceived when these
                 artificial fingers are placed on the sensor; that is,
                 the system successfully processes the ensuing
                 fingerprint images, thereby allowing an adversary to
                 spoof the fingerprints of another individual. However,
                 at the same time, several countermeasures that
                 discriminate between live fingerprints and spoof
                 artifacts have been proposed. While some of these
                 antispoofing schemes are hardware based, several
                 software-based approaches have been proposed as well.
                 In this article, we review the literature and present
                 the state of the art in fingerprint antispoofing.",
  acknowledgement = ack-nhfb,
  articleno =    "28",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Matsuda:2014:CCS,
  author =       "Takahiro Matsuda and Goichiro Hanaoka",
  title =        "Chosen Ciphertext Security via Point Obfuscation",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "8349",
  pages =        "95--120",
  year =         "2014",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-54242-8_5",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 21 08:39:11 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2014a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-54242-8_5/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-54242-8",
  book-URL =     "http://www.springerlink.com/content/978-3-642-54242-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Matsuda:2014:IBP,
  author =       "Takahiro Matsuda",
  title =        "On the Impossibility of Basing Public-Coin One-Way
                 Permutations on Trapdoor Permutations",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "8349",
  pages =        "265--290",
  year =         "2014",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-54242-8_12",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 21 08:39:11 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2014a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-54242-8_12/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-54242-8",
  book-URL =     "http://www.springerlink.com/content/978-3-642-54242-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Micali:2014:CMS,
  author =       "Silvio Micali and Michael O. Rabin",
  title =        "Cryptography miracles, secure auctions, matching
                 problem verification",
  journal =      j-CACM,
  volume =       "57",
  number =       "2",
  pages =        "85--93",
  month =        feb,
  year =         "2014",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2574871",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sat Feb 15 18:20:04 MST 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cacm2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "A solution to the persistent problem of preventing
                 collusion in Vickrey auctions.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Miller:2014:ADS,
  author =       "Andrew Miller and Michael Hicks and Jonathan Katz and
                 Elaine Shi",
  title =        "Authenticated data structures, generically",
  journal =      j-SIGPLAN,
  volume =       "49",
  number =       "1",
  pages =        "411--423",
  month =        jan,
  year =         "2014",
  CODEN =        "SINODQ",
  DOI =          "https://doi.org/10.1145/2578855.2535851",
  ISSN =         "0362-1340 (print), 1523-2867 (print), 1558-1160
                 (electronic)",
  ISSN-L =       "0362-1340",
  bibdate =      "Tue Mar 4 17:04:57 MST 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigplan2010.bib",
  note =         "POPL '14 conference proceedings.",
  abstract =     "An authenticated data structure (ADS) is a data
                 structure whose operations can be carried out by an
                 untrusted prover, the results of which a verifier can
                 efficiently check as authentic. This is done by having
                 the prover produce a compact proof that the verifier
                 can check along with each operation's result. ADSs thus
                 support outsourcing data maintenance and processing
                 tasks to untrusted servers without loss of integrity.
                 Past work on ADSs has focused on particular data
                 structures (or limited classes of data structures), one
                 at a time, often with support only for particular
                 operations. This paper presents a generic method, using
                 a simple extension to a ML-like functional programming
                 language we call \lambda o (lambda-auth), with which
                 one can program authenticated operations over any data
                 structure defined by standard type constructors,
                 including recursive types, sums, and products. The
                 programmer writes the data structure largely as usual
                 and it is compiled to code to be run by the prover and
                 verifier. Using a formalization of \lambda o we prove
                 that all well-typed \lambda o programs result in code
                 that is secure under the standard cryptographic
                 assumption of collision-resistant hash functions. We
                 have implemented \lambda o as an extension to the OCaml
                 compiler, and have used it to produce authenticated
                 versions of many interesting data structures including
                 binary search trees, red-black+ trees, skip lists, and
                 more. Performance experiments show that our approach is
                 efficient, giving up little compared to the
                 hand-optimized data structures developed previously.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGPLAN Notices",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J706",
}

@Article{Minamoto:2014:BDI,
  author =       "Teruya Minamoto and Ryuji Ohura",
  title =        "A blind digital image watermarking method based on the
                 dyadic wavelet transform and interval arithmetic",
  journal =      j-APPL-MATH-COMP,
  volume =       "226",
  number =       "??",
  pages =        "306--319",
  day =          "1",
  month =        jan,
  year =         "2014",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Mon Dec 23 09:52:23 MST 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/applmathcomput2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0096300313010850",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003/",
}

@Article{Mondal:2014:DSM,
  author =       "Subijit Mondal and Subhashis Maitra",
  title =        "Data security-modified {AES} algorithm and its
                 applications",
  journal =      j-COMP-ARCH-NEWS,
  volume =       "42",
  number =       "2",
  pages =        "1--8",
  month =        may,
  year =         "2014",
  CODEN =        "CANED2",
  DOI =          "https://doi.org/10.1145/2669594.2669596",
  ISSN =         "0163-5964 (print), 1943-5851 (electronic)",
  ISSN-L =       "0163-5964",
  bibdate =      "Mon Sep 15 16:43:20 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigarch.bib",
  abstract =     "Now a days with the rapid development of multimedia
                 technologies, research on safety and security are
                 becoming more important. Multimedia data are generated
                 and transmitted through the communication channels and
                 the wireless media. The efficiencies of encryption
                 based on different existing algorithms are not up to
                 the satisfactory limit. Hence researchers are trying to
                 modify the existing algorithm or even develop new
                 algorithms that help to increase security with a little
                 encryption time. Here in this paper, we have furnished
                 a new technology to modify the AES algorithm which
                 gives more security with a little encryption time and
                 which can be used to encrypt using 128-bit key.
                 Theoretical analysis on the proposed algorithm with the
                 existing reveals the novelty of our work. Here we have
                 proposed a technique to randomize the key and hidden
                 the key data into an encrypted digital image using the
                 basics concept of cryptography and also using the
                 concept of digital watermarking, the concept of
                 key-hide has also been encrypted. We have also proposed
                 a new technique to reposition the pixels to break the
                 correlation between them. So, the proposed scheme
                 offers a more secure and cost effective mechanism for
                 encryption.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGARCH Computer Architecture News",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J89",
}

@Article{Moody:2014:DMW,
  author =       "Oliver Moody",
  title =        "Death of man who cracked {Hitler}'s code",
  journal =      "{The Times [London]}",
  day =          "27",
  month =        mar,
  year =         "2014",
  bibdate =      "Sat Sep 20 10:37:04 2014",
  bibsource =    "https://www.math.utah.edu/pub/bibnet/authors/t/turing-alan-mathison.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.thetimes.co.uk/tto/news/uk/defence/article4046291.ece",
  acknowledgement = ack-nhfb,
  keywords =     "Alan Turing; Enigma cipher machine; Lorenz cipher
                 machine",
  remark =       "The story begins: ``Raymond `Jerry' Roberts, the last
                 remaining codebreaker from a Bletchley Park team that
                 deciphered Hitler's messages, has died at the age of
                 93.''",
}

@Article{Mukhopadhyay:2014:EMP,
  author =       "Debapriyay Mukhopadhyay and Subhas C. Nandy",
  title =        "Efficient multiple-precision integer division
                 algorithm",
  journal =      j-INFO-PROC-LETT,
  volume =       "114",
  number =       "3",
  pages =        "152--157",
  month =        mar,
  year =         "2014",
  CODEN =        "IFPLAT",
  DOI =          "https://doi.org/10.1016/j.ipl.2013.10.005",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Mon Dec 9 09:33:47 MST 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/fparith.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  note =         "This paper provides a correction to the algorithm
                 presented in \cite{Huang:2005:EMP}, and also supplies a
                 complicated correctness proof.",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019013002627",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
  keywords =     "computational arithmetic; cryptography; division
                 algorithm; normalization",
}

@Article{Naeem:2014:EIC,
  author =       "Ensherah A. Naeem and Mustafa M. Abd Elnaby and Naglaa
                 F. Soliman and Alaa M. Abbas and Osama S. Faragallah
                 and Noura Semary and Mohiy M. Hadhoud and Saleh A.
                 Alshebeili and Fathi E. Abd El-Samie",
  title =        "Efficient implementation of chaotic image encryption
                 in transform domains",
  journal =      j-J-SYST-SOFTW,
  volume =       "97",
  number =       "??",
  pages =        "118--127",
  month =        nov,
  year =         "2014",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Mon Sep 22 07:57:58 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0164121214001575",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212/",
}

@Article{Newell:2014:NCR,
  author =       "Andrew Newell and Hongyi Yao and Alex Ryker and Tracey
                 Ho and Cristina Nita-Rotaru",
  title =        "Node-Capture Resilient Key Establishment in Sensor
                 Networks: Design Space and New Protocols",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "2",
  pages =        "24:1--24:??",
  month =        nov,
  year =         "2014",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2636344",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Nov 15 15:22:35 MST 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "Key management is required for basic security services
                 of confidentiality, integrity, and data source
                 authentication. Wireless sensor networks (WSNs) are a
                 challenging environment to provide such services due to
                 the resource constraints and the increased likelihood
                 of nodes to be captured. Various key management
                 techniques were proposed that trade off resilience to
                 node capture and overhead in terms of communication and
                 memory. We identify the main factors influencing the
                 design space of key management protocols for sensor
                 networks and describe representative protocols that
                 trade off the number of links established,
                 communication overhead, and resilience to node capture.
                 These trade-offs are due to using direct, pathbased, or
                 multipath-based communication to establish secure
                 links. We propose a new multipath protocol relying on
                 an encoding scheme tailored for WSNs and analyze the
                 effects of key pre-distribution on multipath key
                 establishment. We provide extensive simulations to
                 understand the trade-offs between resilience to node
                 compromise and communication overhead under numerous
                 network scenarios. This comparison highlights the
                 trade-offs between these vastly different key
                 management schemes. For the newer class of key
                 management schemes-multipath based-we quantify
                 experimentally the additional communication overhead
                 required for extra paths and the improvement in
                 resilience from using these paths.",
  acknowledgement = ack-nhfb,
  articleno =    "24",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Nguyen:2014:DDI,
  author =       "Thanhvu Nguyen and Deepak Kapur and Westley Weimer and
                 Stephanie Forrest",
  title =        "{DIG}: a Dynamic Invariant Generator for Polynomial
                 and Array Invariants",
  journal =      j-TOSEM,
  volume =       "23",
  number =       "4",
  pages =        "30:1--30:??",
  month =        aug,
  year =         "2014",
  CODEN =        "ATSMER",
  DOI =          "https://doi.org/10.1145/2556782",
  ISSN =         "1049-331X (print), 1557-7392 (electronic)",
  ISSN-L =       "1049-331X",
  bibdate =      "Tue Oct 7 19:00:54 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tosem/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tosem.bib",
  abstract =     "This article describes and evaluates DIG, a dynamic
                 invariant generator that infers invariants from
                 observed program traces, focusing on numerical and
                 array variables. For numerical invariants, DIG supports
                 both nonlinear equalities and inequalities of arbitrary
                 degree defined over numerical program variables. For
                 array invariants, DIG generates nested relations among
                 multidimensional array variables. These properties are
                 nontrivial and challenging for current static and
                 dynamic invariant analysis methods. The key difference
                 between DIG and existing dynamic methods is its
                 generative technique, which infers invariants directly
                 from traces, instead of using traces to filter out
                 predefined templates. To generate accurate invariants,
                 DIG employs ideas and tools from the mathematical and
                 formal methods domains, including equation solving,
                 polyhedra construction, and theorem proving; for
                 example, DIG represents and reasons about polynomial
                 invariants using geometric shapes. Experimental results
                 on 27 mathematical algorithms and an implementation of
                 AES encryption provide evidence that DIG is effective
                 at generating invariants for these programs.",
  acknowledgement = ack-nhfb,
  articleno =    "30",
  fjournal =     "ACM Transactions on Software Engineering and
                 Methodology",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J790",
}

@InProceedings{Nichols:2014:CSS,
  author =       "Tyler Nichols and Joe Pletcher and Braden Hollembaek
                 and Adam Bates and Dave Tian and Abdulrahman Alkhelaifi
                 and Kevin Butler",
  editor =       "????",
  booktitle =    "{ACM Conference on Computer and Communications
                 Security}",
  title =        "{CertShim}: Securing {SSL} certificate verification
                 through dynamic linking",
  publisher =    pub-ACM,
  address =      pub-ACM:adr,
  pages =        "??--??",
  year =         "2014",
  DOI =          "????",
  ISBN =         "????",
  ISBN-13 =      "????",
  LCCN =         "????",
  bibdate =      "Mon Mar 09 15:55:28 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "????",
  acknowledgement = ack-nhfb,
  remark =       "Cite in \cite[reference 60]{Schneier:2015:SWC}.",
}

@Article{Nieto:2014:FSH,
  author =       "Juan Manuel Gonz{\'a}lez Nieto and Mark Manulis and
                 Dongdong Sun",
  title =        "Forward-Secure Hierarchical Predicate Encryption",
  journal =      j-COMP-J,
  volume =       "57",
  number =       "4",
  pages =        "510--536",
  month =        apr,
  year =         "2014",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxt029",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Wed Mar 26 15:06:42 MDT 2014",
  bibsource =    "http://comjnl.oxfordjournals.org/content/57/3.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/57/4/510.full.pdf+html",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "April 7, 2013",
}

@Article{Nikiforakis:2014:BYO,
  author =       "N. Nikiforakis and G. Acar",
  title =        "Browse at your own risk",
  journal =      j-IEEE-SPECTRUM,
  volume =       "51",
  number =       "8",
  pages =        "30--35",
  month =        aug,
  year =         "2014",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.2014.6866435",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 07:02:09 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Access control; advertising data processing;
                 Authentication; browser fingerprinting; Browsers;
                 cookies; Fingerprint recognition; Internet; online
                 advertising network; online front-ends; Privacy;
                 security of data; third-party tracking",
}

@Article{Niksefat:2014:ZPP,
  author =       "Salman Niksefat and Babak Sadeghiyan and Payman
                 Mohassel and Saeed Sadeghian",
  title =        "{ZIDS}: a Privacy-Preserving Intrusion Detection
                 System Using Secure Two-Party Computation Protocols",
  journal =      j-COMP-J,
  volume =       "57",
  number =       "4",
  pages =        "494--509",
  month =        apr,
  year =         "2014",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxt019",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Wed Mar 26 15:06:42 MDT 2014",
  bibsource =    "http://comjnl.oxfordjournals.org/content/57/3.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/57/4/494.full.pdf+html",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "March 12, 2013",
}

@Article{Niu:2014:RDW,
  author =       "Pan-pan Niu and Xiang-yang Wang and Hong-ying Yang and
                 Pei Wang and Ai-long Wang",
  title =        "A Robust Digital Watermarking Based on Local Complex
                 Angular Radial Transform",
  journal =      j-FUND-INFO,
  volume =       "135",
  number =       "3",
  pages =        "243--268",
  month =        jul,
  year =         "2014",
  CODEN =        "FUMAAJ",
  DOI =          "https://doi.org/10.3233/FI-2014-1121",
  ISSN =         "0169-2968 (print), 1875-8681 (electronic)",
  ISSN-L =       "0169-2968",
  bibdate =      "Sat Mar 5 17:19:56 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/fundinfo2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Fundamenta Informaticae",
  journal-URL =  "http://content.iospress.com/journals/fundamenta-informaticae",
}

@Article{Nose:2014:SWS,
  author =       "Peter Nose",
  title =        "Security weaknesses of a signature scheme and
                 authenticated key agreement protocols",
  journal =      j-INFO-PROC-LETT,
  volume =       "114",
  number =       "3",
  pages =        "107--115",
  month =        mar,
  year =         "2014",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Mon Dec 9 09:33:47 MST 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib;
                 http://www.sciencedirect.com/science/journal/00200190",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019013002731",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Misc{Orejel:2014:E,
  author =       "Jorge Luis Orejel",
  title =        "{ENIGMA}",
  howpublished = "Web posting adapted from chapter of unpublished
                 textbook, \booktitle{Applied Algorithms and Data
                 Structures}.",
  day =          "20",
  month =        oct,
  year =         "2014",
  bibdate =      "Sat Nov 15 08:47:58 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.codeproject.com/Articles/831015/ENIGMA",
  acknowledgement = ack-nhfb,
  remark =       "This article includes a software implementation of the
                 ENIGMA machine.",
}

@Article{Orlandi:2014:SCN,
  author =       "Claudio Orlandi and Rafail Ostrovsky and Vanishree Rao
                 and Amit Sahai and Ivan Visconti",
  title =        "Statistical Concurrent Non-malleable Zero Knowledge",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "8349",
  pages =        "167--191",
  year =         "2014",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-54242-8_8",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 21 08:39:11 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2014a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-54242-8_8/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-54242-8",
  book-URL =     "http://www.springerlink.com/content/978-3-642-54242-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Ortiz-Yepes:2014:BSA,
  author =       "D. A. Ortiz-Yepes and R. J. Hermann and H. Steinauer
                 and P. Buhler",
  title =        "Bringing strong authentication and transaction
                 security to the realm of mobile devices",
  journal =      j-IBM-JRD,
  volume =       "58",
  number =       "1",
  pages =        "4:1--4:11",
  month =        jan # "--" # feb,
  year =         "2014",
  CODEN =        "IBMJAE",
  DOI =          "https://doi.org/10.1147/JRD.2013.2287810",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  ISSN-L =       "0018-8646",
  bibdate =      "Sat Feb 15 16:52:52 MST 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ibmjrd.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IBM Journal of Research and Development",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5288520",
}

@Article{Orumiehchiha:2014:PAN,
  author =       "Mohammad Ali Orumiehchiha and Josef Pieprzyk and Ron
                 Steinfeld",
  title =        "Practical attack on {NLM--MAC} scheme",
  journal =      j-INFO-PROC-LETT,
  volume =       "114",
  number =       "10",
  pages =        "547--550",
  month =        oct,
  year =         "2014",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Sat Jun 28 08:47:36 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019014000696",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190/",
}

@Article{Pandey:2014:ACR,
  author =       "Omkant Pandey",
  title =        "Achieving Constant Round Leakage-Resilient
                 Zero-Knowledge",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "8349",
  pages =        "146--166",
  year =         "2014",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-54242-8_7",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 21 08:39:11 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2014a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-54242-8_7/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-54242-8",
  book-URL =     "http://www.springerlink.com/content/978-3-642-54242-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Pang:2014:PPA,
  author =       "Hweehwa Pang and Xuhua Ding",
  title =        "Privacy-Preserving Ad-Hoc Equi-Join on Outsourced
                 Data",
  journal =      j-TODS,
  volume =       "39",
  number =       "3",
  pages =        "23:1--23:??",
  month =        sep,
  year =         "2014",
  CODEN =        "ATDSD3",
  DOI =          "https://doi.org/10.1145/2629501",
  ISSN =         "0362-5915 (print), 1557-4644 (electronic)",
  ISSN-L =       "0362-5915",
  bibdate =      "Tue Oct 7 18:54:33 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tods/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tods.bib",
  abstract =     "In IT outsourcing, a user may delegate the data
                 storage and query processing functions to a third-party
                 server that is not completely trusted. This gives rise
                 to the need to safeguard the privacy of the database as
                 well as the user queries over it. In this article, we
                 address the problem of running ad hoc equi-join queries
                 directly on encrypted data in such a setting. Our
                 contribution is the first solution that achieves
                 constant complexity per pair of records that are
                 evaluated for the join. After formalizing the privacy
                 requirements pertaining to the database and user
                 queries, we introduce a cryptographic construct for
                 securely joining records across relations. The
                 construct protects the database with a strong
                 encryption scheme. Moreover, information disclosure
                 after executing an equi-join is kept to the
                 minimum-that two input records combine to form an
                 output record if and only if they share common join
                 attribute values. There is no disclosure on records
                 that are not part of the join result. Building on this
                 construct, we then present join algorithms that
                 optimize the join execution by eliminating the need to
                 match every record pair from the input relations. We
                 provide a detailed analysis of the cost of the
                 algorithms and confirm the analysis through extensive
                 experiments with both synthetic and benchmark
                 workloads. Through this evaluation, we tease out useful
                 insights on how to configure the join algorithms to
                 deliver acceptable execution time in practice.",
  acknowledgement = ack-nhfb,
  articleno =    "23",
  fjournal =     "ACM Transactions on Database Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J777",
}

@Article{Papadopoulos:2014:LQA,
  author =       "Stavros Papadopoulos and Graham Cormode and Antonios
                 Deligiannakis and Minos Garofalakis",
  title =        "Lightweight Query Authentication on Streams",
  journal =      j-TODS,
  volume =       "39",
  number =       "4",
  pages =        "30:1--30:??",
  month =        dec,
  year =         "2014",
  CODEN =        "ATDSD3",
  DOI =          "https://doi.org/10.1145/2656336",
  ISSN =         "0362-5915 (print), 1557-4644 (electronic)",
  ISSN-L =       "0362-5915",
  bibdate =      "Wed Jan 7 15:35:46 MST 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tods/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tods.bib",
  abstract =     "We consider a stream outsourcing setting, where a data
                 owner delegates the management of a set of disjoint
                 data streams to an untrusted server. The owner
                 authenticates his streams via signatures. The server
                 processes continuous queries on the union of the
                 streams for clients trusted by the owner. Along with
                 the results, the server sends proofs of result
                 correctness derived from the owner's signatures, which
                 are verifiable by the clients. We design novel
                 constructions for a collection of fundamental problems
                 over streams represented as linear algebraic queries.
                 In particular, our basic schemes authenticate dynamic
                 vector sums, matrix products, and dot products. These
                 techniques can be adapted for authenticating a wide
                 range of important operations in streaming
                 environments, including group-by queries, joins,
                 in-network aggregation, similarity matching, and event
                 processing. We also present extensions to address the
                 case of sliding window queries, and when multiple
                 clients are interested in different subsets of the
                 data. These methods take advantage of a novel nonce
                 chaining technique that we introduce, which is used to
                 reduce the verification cost without affecting any
                 other costs. All our schemes are lightweight and offer
                 strong cryptographic guarantees derived from formal
                 definitions and proofs. We experimentally confirm the
                 practicality of our schemes in the
                 performance-sensitive streaming setting.",
  acknowledgement = ack-nhfb,
  articleno =    "30",
  fjournal =     "ACM Transactions on Database Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J777",
}

@Article{Papakostas:2014:MBL,
  author =       "G. A. Papakostas and E. D. Tsougenis and D. E.
                 Koulouriotis",
  title =        "Moment-based local image watermarking via genetic
                 optimization",
  journal =      j-APPL-MATH-COMP,
  volume =       "227",
  number =       "??",
  pages =        "222--236",
  day =          "15",
  month =        jan,
  year =         "2014",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Mon Jan 27 18:25:32 MST 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/applmathcomput2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0096300313012046",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003/",
}

@Article{Park:2014:FRI,
  author =       "Jeong Soo Park and Ki Seok Bae and Yong Je Choi and
                 Doo Ho Choi",
  title =        "A fault-resistant implementation of {AES} using
                 differential bytes between input and output",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "67",
  number =       "3",
  pages =        "615--634",
  month =        mar,
  year =         "2014",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-013-0950-7",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Sat Mar 8 14:59:14 MST 2014",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0920-8542&volume=67&issue=3;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  URL =          "http://link.springer.com/article/10.1007/s11227-013-0950-7",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Article{Permpoontanalarp:2014:FTG,
  author =       "Yongyuth Permpoontanalarp and Panupong Sornkhom",
  title =        "On-the-fly Trace Generation Approach to the Security
                 Analysis of Cryptographic Protocols: Coloured {Petri}
                 Nets-based Method",
  journal =      j-FUND-INFO,
  volume =       "130",
  number =       "4",
  pages =        "423--466",
  month =        oct,
  year =         "2014",
  CODEN =        "FUMAAJ",
  DOI =          "https://doi.org/10.3233/FI-2014-999",
  ISSN =         "0169-2968 (print), 1875-8681 (electronic)",
  ISSN-L =       "0169-2968",
  bibdate =      "Sat Mar 5 17:18:29 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/fundinfo2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Fundamenta Informaticae",
  journal-URL =  "http://content.iospress.com/journals/fundamenta-informaticae",
}

@Article{Powers:2014:OSCa,
  author =       "Shawn Powers",
  title =        "The open-source classroom: encrypting your cat
                 photos",
  journal =      j-LINUX-J,
  volume =       "2014",
  number =       "237",
  pages =        "8:1--8:??",
  month =        jan,
  year =         "2014",
  CODEN =        "LIJOFX",
  ISSN =         "1075-3583 (print), 1938-3827 (electronic)",
  ISSN-L =       "1075-3583",
  bibdate =      "Thu Feb 6 07:16:21 MST 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/linux-journal.bib",
  acknowledgement = ack-nhfb,
  articleno =    "8",
  fjournal =     "Linux Journal",
  journal-URL =  "http://portal.acm.org/citation.cfm?id=J508",
}

@Article{Premnath:2014:EHR,
  author =       "Sriram Nandha Premnath and Jessica Croft and Neal
                 Patwari and Sneha Kumar Kasera",
  title =        "Efficient High-Rate Secret Key Extraction in Wireless
                 Sensor Networks Using Collaboration",
  journal =      j-TOSN,
  volume =       "11",
  number =       "1",
  pages =        "2:1--2:??",
  month =        aug,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2541289",
  ISSN =         "1550-4859 (print), 1550-4867 (electronic)",
  ISSN-L =       "1550-4859",
  bibdate =      "Tue Aug 26 18:16:52 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tosn.bib",
  abstract =     "Secret key establishment is a fundamental requirement
                 for private communication between two entities. In this
                 article, we propose and evaluate a new approach for
                 secret key extraction where multiple sensors
                 collaborate in exchanging probe packets and collecting
                 channel measurements. Essentially, measurements from
                 multiple channels have a substantially higher
                 differential entropy compared to the measurements from
                 a single channel, thereby resulting in more randomness
                 in the information source for key extraction, and this
                 in turn produces stronger secret keys. We also explore
                 the fundamental trade-off between the quadratic
                 increase in the number of measurements of the channels
                 due to multiple nodes per group versus a linear
                 reduction in the sampling rate and a linear increase in
                 the time gap between bidirectional measurements. To
                 experimentally evaluate collaborative secret key
                 extraction in wireless sensor networks, we first build
                 a simple yet flexible testbed with multiple TelosB
                 sensor nodes. Next, we perform large-scale experiments
                 with different configurations of collaboration. Our
                 experiments show that in comparison to the $ 1 \times 1
                 $ configuration, collaboration among sensor nodes
                 significantly increases the secret bit extraction per
                 second, per probe, as well as per millijoule of
                 transmission energy. In addition, we show that the
                 collaborating nodes can improve the performance further
                 when they exploit both space and frequency
                 diversities.",
  acknowledgement = ack-nhfb,
  articleno =    "2",
  fjournal =     "ACM Transactions on Sensor Networks (TOSN)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J981",
}

@Article{Pun:2014:GIT,
  author =       "Chi-Man Pun and Ka-Cheng Choi",
  title =        "Generalized integer transform based reversible
                 watermarking algorithm using efficient location map
                 encoding and adaptive thresholding",
  journal =      j-COMPUTING,
  volume =       "96",
  number =       "10",
  pages =        "951--973",
  month =        oct,
  year =         "2014",
  CODEN =        "CMPTA2",
  DOI =          "https://doi.org/10.1007/s00607-013-0357-6",
  ISSN =         "0010-485X (print), 1436-5057 (electronic)",
  ISSN-L =       "0010-485X",
  bibdate =      "Wed Feb 11 07:42:25 MST 2015",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0010-485X&volume=96&issue=10;
                 https://www.math.utah.edu/pub/tex/bib/computing.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://link.springer.com/article/10.1007/s00607-013-0357-6",
  acknowledgement = ack-nhfb,
  fjournal =     "Computing",
  journal-URL =  "http://link.springer.com/journal/607",
}

@Article{Qian:2014:IAF,
  author =       "Zhenxing Qian and Xinpeng Zhang",
  title =        "Improved anti-forensics of {JPEG} compression",
  journal =      j-J-SYST-SOFTW,
  volume =       "91",
  number =       "??",
  pages =        "100--108",
  month =        may,
  year =         "2014",
  CODEN =        "JSSODM",
  DOI =          "https://doi.org/10.1016/j.jss.2013.12.043",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Fri Mar 14 17:00:13 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/datacompression.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0164121214000168",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212/",
}

@Article{Rankin:2014:HEY,
  author =       "Kyle Rankin",
  title =        "Hack and \slash: encrypt your dog ({Mutt} and {GPG})",
  journal =      j-LINUX-J,
  volume =       "2014",
  number =       "242",
  pages =        "7:1--7:??",
  month =        jun,
  year =         "2014",
  CODEN =        "LIJOFX",
  ISSN =         "1075-3583 (print), 1938-3827 (electronic)",
  ISSN-L =       "1075-3583",
  bibdate =      "Wed Jul 9 16:16:00 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/linux-journal.bib",
  acknowledgement = ack-nhfb,
  articleno =    "7",
  fjournal =     "Linux Journal",
  journal-URL =  "http://portal.acm.org/citation.cfm?id=J508",
}

@Article{Ren:2014:HHM,
  author =       "Jian Ren and Jie Wu and Yun Li and Jian Li",
  title =        "Hop-by-Hop Message Authentication and Source Privacy
                 in Wireless Sensor Networks",
  journal =      j-IEEE-TRANS-PAR-DIST-SYS,
  volume =       "25",
  number =       "5",
  pages =        "1223--1232",
  month =        may,
  year =         "2014",
  CODEN =        "ITDSEO",
  DOI =          "https://doi.org/10.1109/TPDS.2013.119",
  ISSN =         "1045-9219 (print), 1558-2183 (electronic)",
  ISSN-L =       "1045-9219",
  bibdate =      "Mon Aug 25 07:12:16 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranspardistsys.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Parallel and Distributed
                 Systems",
  journal-URL =  "http://www.computer.org/tpds/archives.htm",
}

@TechReport{Rivest:2014:SSR,
  author =       "Ronald L. Rivest and Jacob C. N. Schuldt",
  title =        "{Spritz} ---- a spongy {RC4}-like stream cipher and
                 hash function",
  type =         "Report",
  institution =  "MIT CSAIL and Research Institute for Secure Systems",
  address =      "Cambridge, MA 02139, USA and AIST, Japan",
  pages =        "30",
  day =          "27",
  month =        oct,
  year =         "2014",
  bibdate =      "Sat Nov 15 08:26:10 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  URL =          "http://people.csail.mit.edu/rivest/pubs/RS14.pdf",
  abstract =     "This note reconsiders the design of the stream cipher
                 RC4, and proposes an improved variant, which we call
                 `Spritz' (since the output comes in fine drops rather
                 than big blocks.)\par

                 Our work leverages the considerable cryptanalytic work
                 done on the original RC4 and its proposed variants. It
                 also uses simulations extensively to search for biases
                 and to guide the selection of intermediate
                 expressions.\par

                 We estimate that Spritz can produce output with about
                 24 cycles/byte of computation. Furthermore, our
                 statistical tests suggest that about $ 2^{81} $ bytes
                 of output are needed before one can reasonably
                 distinguish Spritz output from random output; this is a
                 marked improvement over RC4.\par

                 In addition, we formulate Spritz as a `sponge (or
                 sponge-like) function,' [5], which can Absorb new data
                 at any time, and from which one can Squeeze
                 pseudorandom output sequences of arbitrary length.
                 Spritz can thus be easily adapted for use as a
                 cryptographic hash function, an encryption algorithm,
                 or a message-authentication code generator. (However,
                 in hash-function mode, Spritz is rather slow.)",
  acknowledgement = ack-nhfb,
  keywords =     "Absorb; cryptographic hash function; encryption;
                 message authentication code; RC4; sponge function;
                 Spritz; Squeeze; stream cipher",
}

@Article{Ruj:2014:DAC,
  author =       "Sushmita Ruj and Milos Stojmenovic and Amiya Nayak",
  title =        "Decentralized Access Control with Anonymous
                 Authentication of Data Stored in Clouds",
  journal =      j-IEEE-TRANS-PAR-DIST-SYS,
  volume =       "25",
  number =       "2",
  pages =        "384--394",
  month =        feb,
  year =         "2014",
  CODEN =        "ITDSEO",
  DOI =          "https://doi.org/10.1109/TPDS.2013.38",
  ISSN =         "1045-9219 (print), 1558-2183 (electronic)",
  ISSN-L =       "1045-9219",
  bibdate =      "Mon Aug 25 07:12:16 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranspardistsys.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Parallel and Distributed
                 Systems",
  journal-URL =  "http://www.computer.org/tpds/archives.htm",
}

@Book{Sacco:2014:MC,
  author =       "Luigi Sacco",
  title =        "Manuale di crittografia. ({Italian}) [{Manual} of
                 cryptography]",
  publisher =    "Apogeo",
  address =      "Milano, Italia",
  edition =      "Fourth",
  pages =        "????",
  year =         "2014",
  bibdate =      "Tue Dec 26 07:04:56 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  language =     "Italian",
}

@Article{Safkhani:2014:CCA,
  author =       "Masoumeh Safkhani and Pedro Peris-Lopez and Julio
                 Cesar Hernandez-Castro and Nasour Bagheri",
  title =        "Cryptanalysis of the {Cho et al.} protocol: a
                 hash-based {RFID} tag mutual authentication protocol",
  journal =      j-J-COMPUT-APPL-MATH,
  volume =       "259 (part B)",
  number =       "??",
  pages =        "571--577",
  day =          "15",
  month =        mar,
  year =         "2014",
  CODEN =        "JCAMDI",
  DOI =          "https://doi.org/10.1016/j.cam.2013.09.073",
  ISSN =         "0377-0427 (print), 1879-1778 (electronic)",
  ISSN-L =       "0377-0427",
  bibdate =      "Sat Feb 25 13:34:02 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcomputapplmath2010.bib",
  note =         "See \cite{Cho:2012:CBF}.",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0377042713005281",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computational and Applied Mathematics",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03770427",
}

@Article{Sahillioglu:2014:SCM,
  author =       "Y. Sahillio{\u{g}}lu and Y. Yemez",
  title =        "Shapes and Cryptography: Multiple Shape Correspondence
                 by Dynamic Programming",
  journal =      j-CGF,
  volume =       "33",
  number =       "7",
  pages =        "121--130",
  month =        oct,
  year =         "2014",
  CODEN =        "CGFODY",
  DOI =          "https://doi.org/10.1111/cgf.12480",
  ISSN =         "0167-7055 (print), 1467-8659 (electronic)",
  ISSN-L =       "0167-7055",
  bibdate =      "Fri Feb 13 14:27:08 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cgf.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Graphics World",
  journal-URL =  "http://onlinelibrary.wiley.com/journal/10.1111/(ISSN)1467-8659/",
  onlinedate =   "28 Oct 2014",
}

@Article{Sakalli:2014:ACC,
  author =       "Muharrem Tolga Sakalli and Bora Aslan",
  title =        "On the algebraic construction of cryptographically
                 good $ 32 \times 32 $ binary linear transformations",
  journal =      j-J-COMPUT-APPL-MATH,
  volume =       "259 (part B)",
  number =       "??",
  pages =        "485--494",
  day =          "15",
  month =        mar,
  year =         "2014",
  CODEN =        "JCAMDI",
  ISSN =         "0377-0427 (print), 1879-1778 (electronic)",
  ISSN-L =       "0377-0427",
  bibdate =      "Sat Feb 25 13:34:02 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcomputapplmath2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0377042713002719",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computational and Applied Mathematics",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03770427",
}

@Article{Santos:2014:ACD,
  author =       "Ricardo Jorge Santos and Jorge Bernardino and Marco
                 Vieira",
  title =        "Approaches and Challenges in Database Intrusion
                 Detection",
  journal =      j-SIGMOD,
  volume =       "43",
  number =       "3",
  pages =        "36--47",
  month =        sep,
  year =         "2014",
  CODEN =        "SRECD8",
  DOI =          "https://doi.org/10.1145/2694428.2694435",
  ISSN =         "0163-5808 (print), 1943-5835 (electronic)",
  ISSN-L =       "0163-5808",
  bibdate =      "Thu Dec 4 17:09:38 MST 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigmod.bib",
  abstract =     "Databases often support enterprise business and store
                 its secrets. This means that securing them from data
                 damage and information leakage is critical. In order to
                 deal with intrusions against database systems, Database
                 Intrusion Detection Systems (DIDS) are frequently used.
                 This paper presents a survey on the main database
                 intrusion detection techniques currently available and
                 discusses the issues concerning their application at
                 the database server layer. The identified weak spots
                 show that most DIDS inadequately deal with many
                 characteristics of specific database systems, such as
                 ad hoc workloads and alert management issues in data
                 warehousing environments, for example. Based on this
                 analysis, research challenges are presented, and
                 requirements and guidelines for the design of new or
                 improved DIDS are proposed. The main finding is that
                 the development and benchmarking of specifically
                 tailored DIDS for the context in which they operate is
                 a relevant issue, and remains a challenge. We trust
                 this work provides a strong incentive to open the
                 discussion between both the security and database
                 research communities.",
  acknowledgement = ack-nhfb,
  fjournal =     "SIGMOD Record (ACM Special Interest Group on
                 Management of Data)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J689",
}

@Article{Sarkar:2014:PEK,
  author =       "Santanu Sarkar",
  title =        "Proving empirical key-correlations in {RC4}",
  journal =      j-INFO-PROC-LETT,
  volume =       "114",
  number =       "5",
  pages =        "234--238",
  month =        may,
  year =         "2014",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Tue Jan 28 08:23:05 MST 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019014000039",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190/",
}

@Article{Savas:2014:SMQ,
  author =       "Erkay Savas and Serdar Suer Erdem and Kazim Yumbul",
  title =        "On Selection of Modulus of Quadratic Codes for the
                 Protection of Cryptographic Operations against Fault
                 Attacks",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "63",
  number =       "5",
  pages =        "1182--1196",
  month =        may,
  year =         "2014",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2012.236",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Mon Aug 25 08:24:32 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Scarani:2014:BPQ,
  author =       "Valerio Scarani and Christian Kurtsiefer",
  title =        "The black paper of quantum cryptography: Real
                 implementation problems",
  journal =      j-THEOR-COMP-SCI,
  volume =       "560 (part 1)",
  number =       "??",
  pages =        "27--32",
  day =          "4",
  month =        dec,
  year =         "2014",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Tue Dec 2 19:05:23 MST 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0304397514006938",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975/",
}

@Article{Schillewaert:2014:CCA,
  author =       "Jeroen Schillewaert and Koen Thas",
  title =        "Construction and Comparison of Authentication Codes",
  journal =      j-SIAM-J-DISCR-MATH,
  volume =       "28",
  number =       "1",
  pages =        "474--489",
  month =        "????",
  year =         "2014",
  CODEN =        "SJDMEC",
  DOI =          "https://doi.org/10.1137/130920988",
  ISSN =         "0895-4801 (print), 1095-7146 (electronic)",
  ISSN-L =       "0895-4801",
  bibdate =      "Thu Feb 12 07:10:09 MST 2015",
  bibsource =    "http://epubs.siam.org/sam-bin/dbq/toclist/SIDMA/28/1;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/siamjdiscrmath.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "SIAM Journal on Discrete Mathematics",
  journal-URL =  "http://epubs.siam.org/sidma",
  onlinedate =   "January 2014",
}

@Article{Seo:2014:RHI,
  author =       "Jae Hong Seo and Keita Emura",
  title =        "Revocable hierarchical identity-based encryption",
  journal =      j-THEOR-COMP-SCI,
  volume =       "542",
  number =       "??",
  pages =        "44--62",
  day =          "3",
  month =        jul,
  year =         "2014",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Sat Jun 28 08:55:53 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0304397514003363",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975/",
}

@Article{Seyedzadeh:2014:RCI,
  author =       "Seyed Mohammad Seyedzadeh and Benyamin Norouzi and
                 Sattar Mirzakuchaki",
  title =        "{RGB} color image encryption based on {Choquet} fuzzy
                 integral",
  journal =      j-J-SYST-SOFTW,
  volume =       "97",
  number =       "??",
  pages =        "128--139",
  month =        nov,
  year =         "2014",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Mon Sep 22 07:57:58 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0164121214001563",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212/",
}

@Article{Shakiba:2014:CCI,
  author =       "Mohsen Shakiba and Mohammad Dakhilalian and Hamid
                 Mala",
  title =        "On computational complexity of impossible differential
                 cryptanalysis",
  journal =      j-INFO-PROC-LETT,
  volume =       "114",
  number =       "5",
  pages =        "252--255",
  month =        may,
  year =         "2014",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Tue Jan 28 08:23:05 MST 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019013003116",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190/",
}

@Article{Shen:2014:ERC,
  author =       "Limin Shen and Futai Zhang and Yinxia Sun",
  title =        "Efficient Revocable Certificateless Encryption Secure
                 in the Standard Model",
  journal =      j-COMP-J,
  volume =       "57",
  number =       "4",
  pages =        "592--601",
  month =        apr,
  year =         "2014",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxt040",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Wed Mar 26 15:06:42 MDT 2014",
  bibsource =    "http://comjnl.oxfordjournals.org/content/57/3.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/57/4/592.full.pdf+html",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "April 30, 2013",
}

@Article{Shen:2014:LES,
  author =       "Xuemin Shen",
  title =        "A Lightweight Encryption Scheme for Network-Coded
                 Mobile Ad Hoc Networks",
  journal =      j-IEEE-TRANS-PAR-DIST-SYS,
  volume =       "25",
  number =       "9",
  pages =        "2211--2221",
  month =        sep,
  year =         "2014",
  CODEN =        "ITDSEO",
  ISSN =         "1045-9219 (print), 1558-2183 (electronic)",
  ISSN-L =       "1045-9219",
  bibdate =      "Thu Feb 12 13:58:32 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranspardistsys.bib",
  URL =          "http://www.computer.org/csdl/trans/td/2014/09/06559980-abs.html",
  abstract-URL = "http://www.computer.org/csdl/trans/td/2014/09/06559980-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://www.computer.org/tpds/archives.htm",
}

@Article{Shmueli:2014:IDE,
  author =       "Erez Shmueli and Ronen Vaisenberg and Ehud Gudes and
                 Yuval Elovici",
  title =        "Implementing a database encryption solution, design
                 and implementation issues",
  journal =      j-COMPUT-SECUR,
  volume =       "44",
  number =       "??",
  pages =        "33--50",
  month =        jul,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:38 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000509",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Shu:2014:DAS,
  author =       "Yuanchao Shu and Yu Jason Gu and Jiming Chen",
  title =        "Dynamic Authentication with Sensory Information for
                 the Access Control Systems",
  journal =      j-IEEE-TRANS-PAR-DIST-SYS,
  volume =       "25",
  number =       "2",
  pages =        "427--436",
  month =        feb,
  year =         "2014",
  CODEN =        "ITDSEO",
  DOI =          "https://doi.org/10.1109/TPDS.2013.153",
  ISSN =         "1045-9219 (print), 1558-2183 (electronic)",
  ISSN-L =       "1045-9219",
  bibdate =      "Mon Aug 25 07:12:16 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranspardistsys.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Parallel and Distributed
                 Systems",
  journal-URL =  "http://www.computer.org/tpds/archives.htm",
}

@Article{Sipiran:2014:SCA,
  author =       "Ivan Sipiran and Robert Gregor and Tobias Schreck",
  title =        "Shapes and Cryptography: Approximate Symmetry
                 Detection in Partial {$3$D} Meshes",
  journal =      j-CGF,
  volume =       "33",
  number =       "7",
  pages =        "131--140",
  month =        oct,
  year =         "2014",
  CODEN =        "CGFODY",
  DOI =          "https://doi.org/10.1111/cgf.12481",
  ISSN =         "0167-7055 (print), 1467-8659 (electronic)",
  ISSN-L =       "0167-7055",
  bibdate =      "Fri Feb 13 14:27:08 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cgf.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Graphics World",
  journal-URL =  "http://onlinelibrary.wiley.com/journal/10.1111/(ISSN)1467-8659/",
  onlinedate =   "28 Oct 2014",
}

@Article{Sirivianos:2014:LSF,
  author =       "Michael Sirivianos and Kyungbaek Kim and Jian Wei Gan
                 and Xiaowei Yang",
  title =        "Leveraging Social Feedback to Verify Online Identity
                 Claims",
  journal =      j-TWEB,
  volume =       "8",
  number =       "2",
  pages =        "9:1--9:??",
  month =        mar,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2543711",
  ISSN =         "1559-1131 (print), 1559-114X (electronic)",
  ISSN-L =       "1559-1131",
  bibdate =      "Tue Apr 1 05:42:19 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tweb.bib",
  abstract =     "Anonymity is one of the main virtues of the Internet,
                 as it protects privacy and enables users to express
                 opinions more freely. However, anonymity hinders the
                 assessment of the veracity of assertions that online
                 users make about their identity attributes, such as age
                 or profession. We propose FaceTrust, a system that uses
                 online social networks to provide lightweight identity
                 credentials while preserving a user's anonymity.
                 FaceTrust employs a ``game with a purpose'' design to
                 elicit the opinions of the friends of a user about the
                 user's self-claimed identity attributes, and uses
                 attack-resistant trust inference to assign veracity
                 scores to identity attribute assertions. FaceTrust
                 provides credentials, which a user can use to
                 corroborate his assertions. We evaluate our proposal
                 using a live Facebook deployment and simulations on a
                 crawled social graph. The results show that our
                 veracity scores are strongly correlated with the ground
                 truth, even when dishonest users make up a large
                 fraction of the social network and employ the Sybil
                 attack.",
  acknowledgement = ack-nhfb,
  articleno =    "9",
  fjournal =     "ACM Transactions on the Web (TWEB)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1062",
}

@Article{Soupionis:2014:GTA,
  author =       "Yannis Soupionis and Remous-Aris Koutsiamanis and
                 Pavlos Efraimidis and Dimitris Gritzalis",
  title =        "A game-theoretic analysis of preventing spam over
                 {Internet Telephony} via audio {CAPTCHA}-based
                 authentication",
  journal =      j-J-COMP-SECUR,
  volume =       "22",
  number =       "3",
  pages =        "383--413",
  month =        "????",
  year =         "2014",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-140496",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:16 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Staff:2014:KYS,
  author =       "{CACM Staff}",
  title =        "Know your steganographic enemy",
  journal =      j-CACM,
  volume =       "57",
  number =       "5",
  pages =        "8--8",
  month =        may,
  year =         "2014",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2601402",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 21 10:20:12 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cacm2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Stankovski:2014:CFE,
  author =       "Tomislav Stankovski and Peter V. E. McClintock and
                 Aneta Stefanovska",
  title =        "Coupling Functions Enable Secure Communications",
  journal =      j-PHYS-REV-X,
  volume =       "4",
  number =       "1",
  pages =        "011026",
  month =        feb,
  year =         "2014",
  CODEN =        "PRXHAE",
  DOI =          "https://doi.org/10.1103/PhysRevX.4.011026",
  ISSN =         "2160-3308",
  bibdate =      "Fri Apr 4 18:43:06 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://link.aps.org/doi/10.1103/PhysRevX.4.011026;
                 http://www.rdmag.com/news/2014/04/unbreakable-security-codes-inspired-nature",
  acknowledgement = ack-nhfb,
  fjournal =     "Physical Review X",
  journal-URL =  "http://prx.aps.org/browse",
  keywords =     "secure encryption",
  numpages =     "9",
  xxjournal-url = "http://journals.aps.org/prx/",
}

@Article{Stanton:2014:BRB,
  author =       "Jeffrey M. Stanton and Ben Rothke",
  title =        "Book Reviews: {{\booktitle{Burdens of Proof:
                 Cryptographic Culture and Evidence Law in the Age of
                 Electronic Documents}} --- by Jean-Fran{\c{c}}ois
                 Blanchette}",
  journal =      j-J-ASSOC-INF-SCI-TECHNOL,
  volume =       "65",
  number =       "7",
  pages =        "1509--1510",
  month =        jul,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1002/asi.23137",
  ISSN =         "2330-1643 (print), 2330-1643 (electronic)",
  ISSN-L =       "2330-1643",
  bibdate =      "Fri Sep 11 12:15:13 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jaist.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of the Association for Information Science and
                 Technology",
  journal-URL =  "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)2330-1643",
  onlinedate =   "26 Feb 2014",
}

@Article{Sui:2014:DAH,
  author =       "Yan Sui and Xukai Zou and Eliza Y. Du and Feng Li",
  title =        "Design and Analysis of a Highly User-Friendly, Secure,
                 Privacy-Preserving, and Revocable Authentication
                 Method",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "63",
  number =       "4",
  pages =        "902--916",
  month =        apr,
  year =         "2014",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2013.25",
  ISSN =         "0018-9340",
  ISSN-L =       "0018-9340",
  bibdate =      "Sat Apr 19 10:40:35 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Svozil:2014:NCC,
  author =       "Karl Svozil",
  title =        "Non-contextual chocolate balls versus value indefinite
                 quantum cryptography",
  journal =      j-THEOR-COMP-SCI,
  volume =       "560 (part 1)",
  number =       "??",
  pages =        "82--90",
  day =          "4",
  month =        dec,
  year =         "2014",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Tue Dec 2 19:05:23 MST 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0304397514006975",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975/",
}

@Article{Syta:2014:SAA,
  author =       "Ewa Syta and Henry Corrigan-Gibbs and Shu-Chun Weng
                 and David Wolinsky and Bryan Ford and Aaron Johnson",
  title =        "Security Analysis of Accountable Anonymity in
                 {Dissent}",
  journal =      j-TISSEC,
  volume =       "17",
  number =       "1",
  pages =        "4:1--4:??",
  month =        aug,
  year =         "2014",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/2629621",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Mon Aug 11 19:17:17 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tissec.bib",
  abstract =     "Users often wish to communicate anonymously on the
                 Internet, for example, in group discussion or instant
                 messaging forums. Existing solutions are vulnerable to
                 misbehaving users, however, who may abuse their
                 anonymity to disrupt communication. Dining
                 Cryptographers Networks (DC-nets) leave groups
                 vulnerable to denial-of-service and Sybil attacks; mix
                 networks are difficult to protect against traffic
                 analysis; and accountable voting schemes are unsuited
                 to general anonymous messaging. Dissent is the first
                 general protocol offering provable anonymity and
                 accountability for moderate-size groups, while
                 efficiently handling unbalanced communication demands
                 among users. We present an improved and hardened
                 dissent protocol, define its precise security
                 properties, and offer rigorous proofs of these
                 properties. The improved protocol systematically
                 addresses the delicate balance between provably hiding
                 the identities of well-behaved users, while provably
                 revealing the identities of disruptive users, a
                 challenging task because many forms of misbehavior are
                 inherently undetectable. The new protocol also
                 addresses several nontrivial attacks on the original
                 dissent protocol stemming from subtle design flaws.",
  acknowledgement = ack-nhfb,
  articleno =    "4",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@Article{Tang:2014:PAB,
  author =       "Ming Tang and Zhenlong Qiu and Weijie Li and Weijin
                 Sun and Xiaobo Hu and Huanguo Zhang",
  title =        "Power analysis based reverse engineering on the secret
                 round function of block ciphers",
  journal =      j-CCPE,
  volume =       "26",
  number =       "8",
  pages =        "1531--1545",
  day =          "10",
  month =        jun,
  year =         "2014",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.3068",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Fri May 30 08:55:43 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "20 Jun 2013",
}

@Article{Tao:2014:CFS,
  author =       "Jia Tao and Giora Slutzki and Vasant Honavar",
  title =        "A Conceptual Framework for Secrecy-preserving
                 Reasoning in Knowledge Bases",
  journal =      j-TOCL,
  volume =       "16",
  number =       "1",
  pages =        "3:1--3:??",
  month =        dec,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2637477",
  ISSN =         "1529-3785 (print), 1557-945X (electronic)",
  ISSN-L =       "1529-3785",
  bibdate =      "Fri Mar 6 10:01:34 MST 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tocl/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tocl.bib",
  abstract =     "In many applications, Knowledge Bases (KBs) contain
                 confidential or private information (secrets). The KB
                 should be able to use this secret information in its
                 reasoning process but in answering user queries care
                 must be exercised so that secrets are not revealed to
                 unauthorized users. We consider this problem under the
                 Open World Assumption (OWA) in a setting with multiple
                 querying agents $ M_1 $, \ldots{}, $ M_m $ that can
                 pose queries against the KB K and selectively share
                 answers that they receive from K with one or more other
                 querying agents. We assume that for each $ M_i $, the
                 KB has a prespecified set of secrets $ S_i $ that need
                 to be protected from $ M_i $. Communication between
                 querying agents is modeled by a communication graph, a
                 directed graph with self-loops. We introduce a general
                 framework and propose an approach to secrecy-preserving
                 query answering based on sound and complete proof
                 systems. The idea is to hide the truthful answer from a
                 querying agent $ M_i $ by feigning ignorance without
                 lying (i.e., to provide the answer `Unknown' to a query
                 $q$ if it needs to be protected). Under the OWA, a
                 querying agent cannot distinguish between the case that
                 $q$ is being protected (for reasons of secrecy) and the
                 case that it cannot be inferred from K. In the
                 pre-query stage we compute a set of envelopes $ E_1$,
                 \ldots{}, $ E_m$ (restricted to a finite subset of the
                 set of formulae that are entailed by K) so that $ S_i
                 \subseteq E_i$, and a query \alpha posed by agent $
                 M_i$ can be answered truthfully whenever $ \alpha \not
                 \in E_i$ and $ \isonot \alpha \not \in E_i$. After the
                 pre-query stage, the envelope is updated as needed. We
                 illustrate this approach with two simple cases: the
                 Propositional Horn KBs and the Description Logic AL
                 KBs.",
  acknowledgement = ack-nhfb,
  articleno =    "3",
  fjournal =     "ACM Transactions on Computational Logic",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J773",
}

@Article{Tariq:2014:SBL,
  author =       "Muhammad Adnan Tariq and Boris Koldehofe and Kurt
                 Rothermel",
  title =        "Securing Broker-Less Publish\slash Subscribe Systems
                 Using Identity-Based Encryption",
  journal =      j-IEEE-TRANS-PAR-DIST-SYS,
  volume =       "25",
  number =       "2",
  pages =        "518--528",
  month =        feb,
  year =         "2014",
  CODEN =        "ITDSEO",
  DOI =          "https://doi.org/10.1109/TPDS.2013.256",
  ISSN =         "1045-9219 (print), 1558-2183 (electronic)",
  ISSN-L =       "1045-9219",
  bibdate =      "Mon Aug 25 07:12:16 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranspardistsys.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Parallel and Distributed
                 Systems",
  journal-URL =  "http://www.computer.org/tpds/archives.htm",
}

@Article{Taylor:2014:WSE,
  author =       "Dave Taylor",
  title =        "Work the shell: easy watermarking with {ImageMagick}",
  journal =      j-LINUX-J,
  volume =       "2014",
  number =       "237",
  pages =        "6:1--6:??",
  month =        jan,
  year =         "2014",
  CODEN =        "LIJOFX",
  ISSN =         "1075-3583 (print), 1938-3827 (electronic)",
  ISSN-L =       "1075-3583",
  bibdate =      "Thu Feb 6 07:16:21 MST 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/linux-journal.bib",
  acknowledgement = ack-nhfb,
  articleno =    "6",
  fjournal =     "Linux Journal",
  journal-URL =  "http://portal.acm.org/citation.cfm?id=J508",
}

@Article{Thabit:2014:RRW,
  author =       "Rasha Thabit and Bee Ee Khoo",
  title =        "Robust reversible watermarking scheme using {Slantlet}
                 transform matrix",
  journal =      j-J-SYST-SOFTW,
  volume =       "88",
  number =       "??",
  pages =        "74--86",
  month =        feb,
  year =         "2014",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Mon Jan 27 19:15:03 MST 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0164121213002380",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212/",
}

@Article{Tian:2014:DFS,
  author =       "Haibo Tian and Xiaofeng Chen and Willy Susilo",
  title =        "Deniability and forward secrecy of one-round
                 authenticated key exchange",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "67",
  number =       "3",
  pages =        "671--690",
  month =        mar,
  year =         "2014",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-013-0968-x",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Sat Mar 8 14:59:14 MST 2014",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0920-8542&volume=67&issue=3;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  URL =          "http://link.springer.com/article/10.1007/s11227-013-0968-x",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Article{Tiplea:2014:NSC,
  author =       "Ferucio Laurentiu Tiplea and Constantin Catalin
                 Dragan",
  title =        "A necessary and sufficient condition for the
                 asymptotic idealness of the {GRS} threshold secret
                 sharing scheme",
  journal =      j-INFO-PROC-LETT,
  volume =       "114",
  number =       "6",
  pages =        "299--303",
  month =        jun,
  year =         "2014",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Fri Feb 28 07:46:24 MST 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019014000179",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190/",
}

@Article{Toxen:2014:NSS,
  author =       "Bob Toxen",
  title =        "The {NSA} and {Snowden}: securing the all-seeing eye",
  journal =      j-CACM,
  volume =       "57",
  number =       "5",
  pages =        "44--51",
  month =        may,
  year =         "2014",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2594502",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 21 10:20:12 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cacm2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "How good security at the NSA could have stopped him.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Tripunitara:2014:CKM,
  author =       "Mahesh V. Tripunitara and Jeffrey Lok Tin Woo",
  title =        "Composing {Kerberos} and {Multimedia Internet KEYing
                 (MIKEY)} for Authenticated Transport of Group Keys",
  journal =      j-IEEE-TRANS-PAR-DIST-SYS,
  volume =       "25",
  number =       "4",
  pages =        "898--907",
  month =        apr,
  year =         "2014",
  CODEN =        "ITDSEO",
  DOI =          "https://doi.org/10.1109/TPDS.2013.81",
  ISSN =         "1045-9219 (print), 1558-2183 (electronic)",
  ISSN-L =       "1045-9219",
  bibdate =      "Mon Aug 25 07:12:16 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranspardistsys.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Parallel and Distributed
                 Systems",
  journal-URL =  "http://www.computer.org/tpds/archives.htm",
}

@Article{Tu:2014:EPB,
  author =       "Hang Tu and Neeraj Kumar and Debiao He and Jongsung
                 Kim",
  title =        "An efficient password-based three-party authenticated
                 multiple key exchange protocol for wireless mobile
                 networks",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "70",
  number =       "1",
  pages =        "224--235",
  month =        oct,
  year =         "2014",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-014-1198-6",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Fri Feb 13 12:32:14 MST 2015",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0920-8542&volume=70&issue=1;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  URL =          "http://link.springer.com/article/10.1007/s11227-014-1198-6",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Misc{VenafiLabs:2014:VLQ,
  author =       "{Venafi Labs}",
  title =        "{Venafi Labs Q3 Heartbleed} threat research analysis",
  howpublished = "Web site.",
  year =         "2014",
  bibdate =      "Mon Mar 09 15:46:39 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.venafi.com/assets/pdf/wp/Venafi_Labs_Q3_Heartbleed_Threat_Research_Analysis.pdf",
  acknowledgement = ack-nhfb,
  remark =       "Cite in \cite[reference 51]{Schneier:2015:SWC}.",
}

@Article{Viennot:2014:MSG,
  author =       "Nicolas Viennot and Edward Garcia and Jason Nieh",
  title =        "A measurement study of {Google Play}",
  journal =      j-SIGMETRICS,
  volume =       "42",
  number =       "1",
  pages =        "221--233",
  month =        jun,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2637364.2592003",
  ISSN =         "0163-5999 (print), 1557-9484 (electronic)",
  ISSN-L =       "0163-5999",
  bibdate =      "Fri Jun 27 06:38:48 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigmetrics.bib",
  abstract =     "Although millions of users download and use
                 third-party Android applications from the Google Play
                 store, little information is known on an aggregated
                 level about these applications. We have built
                 PlayDrone, the first scalable Google Play store
                 crawler, and used it to index and analyze over
                 1,100,000 applications in the Google Play store on a
                 daily basis, the largest such index of Android
                 applications. PlayDrone leverages various hacking
                 techniques to circumvent Google's roadblocks for
                 indexing Google Play store content, and makes
                 proprietary application sources available, including
                 source code for over 880,000 free applications. We
                 demonstrate the usefulness of PlayDrone in decompiling
                 and analyzing application content by exploring four
                 previously unaddressed issues: the characterization of
                 Google Play application content at large scale and its
                 evolution over time, library usage in applications and
                 its impact on application portability, duplicative
                 application content in Google Play, and the
                 ineffectiveness of OAuth and related service
                 authentication mechanisms resulting in malicious users
                 being able to easily gain unauthorized access to user
                 data and resources on Amazon Web Services and
                 Facebook.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGMETRICS Performance Evaluation Review",
  journal-URL =  "http://portal.acm.org/toc.cfm?id=J618",
}

@Article{Visegrady:2014:SCV,
  author =       "T. Visegrady and S. Dragone and M. Osborne",
  title =        "Stateless cryptography for virtual environments",
  journal =      j-IBM-JRD,
  volume =       "58",
  number =       "1",
  pages =        "5:1--5:10",
  month =        jan # "--" # feb,
  year =         "2014",
  CODEN =        "IBMJAE",
  DOI =          "https://doi.org/10.1147/JRD.2013.2287811",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  ISSN-L =       "0018-8646",
  bibdate =      "Sat Feb 15 16:52:52 MST 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ibmjrd.bib;
                 https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IBM Journal of Research and Development",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5288520",
}

@Article{Vivek:2014:CSC,
  author =       "Srinivas Vivek and C. E. Veni Madhavan",
  title =        "{Cubic Sieve Congruence} of the {Discrete Logarithm
                 Problem}, and fractional part sequences",
  journal =      j-J-SYMBOLIC-COMP,
  volume =       "64",
  number =       "??",
  pages =        "22--34",
  month =        aug,
  year =         "2014",
  CODEN =        "JSYCEH",
  ISSN =         "0747-7171 (print), 1095-855X (electronic)",
  ISSN-L =       "0747-7171",
  bibdate =      "Fri Feb 28 07:39:29 MST 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsymcomp.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0747717113001703",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Symbolic Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/07477171/",
}

@Article{Vrakas:2014:OUI,
  author =       "Nikos Vrakas and Dimitris Geneiatakis and Costas
                 Lambrinoudakis",
  title =        "Obscuring users' identity in {VoIP\slash IMS}
                 environments",
  journal =      j-COMPUT-SECUR,
  volume =       "43",
  number =       "??",
  pages =        "145--158",
  month =        jun,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000510",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wahaballa:2014:MLS,
  author =       "Abubaker Wahaballa and Osman Wahballa and Fagen Li and
                 Mohammed Ramadan and Zhiguang Qin",
  title =        "Multiple-Layered Securities Using Steganography and
                 Cryptography",
  journal =      j-INT-J-COMPUT-APPL,
  volume =       "36",
  number =       "3",
  pages =        "93--100",
  year =         "2014",
  DOI =          "https://doi.org/10.2316/Journal.202.2014.3.202-3917",
  ISSN =         "1206-212X (print), 1925-7074 (electronic)",
  ISSN-L =       "1206-212X",
  bibdate =      "Sat Apr 21 17:29:29 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijca.bib",
  URL =          "https://www.tandfonline.com/doi/full/10.2316/Journal.202.2014.3.202-3917",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Computer Applications",
  journal-URL =  "https://www.tandfonline.com/loi/tjca20",
  online-date =  "11 Jul 2015",
}

@Article{Wang:2014:ATF,
  author =       "Ding Wang and Ping Wang",
  title =        "On the anonymity of two-factor authentication schemes
                 for wireless sensor networks: Attacks, principle and
                 solutions",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "73",
  number =       "??",
  pages =        "41--57",
  day =          "14",
  month =        nov,
  year =         "2014",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Mon Oct 20 06:32:36 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1389128614002643",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286/",
}

@Article{Wang:2014:CGR,
  author =       "Zongyue Wang and Hongbo Yu and Xiaoyun Wang",
  title =        "Cryptanalysis of {GOST R} hash function",
  journal =      j-INFO-PROC-LETT,
  volume =       "114",
  number =       "12",
  pages =        "655--662",
  month =        dec,
  year =         "2014",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Sat Aug 16 12:31:39 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019014001458",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190/",
}

@Article{Wang:2014:IIA,
  author =       "Huaqun Wang",
  title =        "Insecurity of {`Improved Anonymous Multi-Receiver
                 Identity-Based Encryption'}",
  journal =      j-COMP-J,
  volume =       "57",
  number =       "4",
  pages =        "636--638",
  month =        apr,
  year =         "2014",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxt052",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Wed Mar 26 15:06:42 MDT 2014",
  bibsource =    "http://comjnl.oxfordjournals.org/content/57/3.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  note =         "See \cite{Chien:2012:IAM}.",
  URL =          "http://comjnl.oxfordjournals.org/content/57/4/636.full.pdf+html",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "May 30, 2013",
}

@Article{Wang:2014:NAI,
  author =       "Xiaojing Wang and Qizhao Yuan and Hongliang Cai and
                 Jiajia Fang",
  title =        "A New Approach to Image Sharing with High-Security
                 Threshold Structure",
  journal =      j-J-ACM,
  volume =       "61",
  number =       "6",
  pages =        "39:1--39:??",
  month =        nov,
  year =         "2014",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/2666470",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  bibdate =      "Wed Jan 7 15:12:00 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Image sharing is an attractive research subject in
                 computer image techniques and in the information
                 security field. This article presents a novel scheme of
                 image sharing with a $ (t, n) $ high-security threshold
                 structure. The scheme can encode secret images into n
                 shadow images in such a way that all the shadow images
                 are in a perfect and ideal $ (t, n) $ threshold
                 structure, while each shadow image has its own visual
                 content assigned at random. The most common method to
                 implement image sharing is based on interpolation
                 polynomial over the field $ F_p $ = \{0, 1, 2,\ldots{},
                 p 1\} [Shamir 1979]. In this article, the authors
                 present a new approach to image sharing and its
                 computation based on algebraic-geometry code over the
                 pixel value field GF($ 2^m$).",
  acknowledgement = ack-nhfb,
  articleno =    "39",
  fjournal =     "Journal of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J401",
}

@Article{Wang:2014:NDH,
  author =       "Zhiwei Wang and Guozi Sun and Danwei Chen",
  title =        "A new definition of homomorphic signature for identity
                 management in mobile cloud computing",
  journal =      j-J-COMP-SYS-SCI,
  volume =       "80",
  number =       "3",
  pages =        "546--553",
  month =        may,
  year =         "2014",
  CODEN =        "JCSSBM",
  DOI =          "https://doi.org/10.1016/j.jcss.2013.06.010",
  ISSN =         "0022-0000 (print), 1090-2724 (electronic)",
  ISSN-L =       "0022-0000",
  bibdate =      "Tue Jan 29 15:27:25 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsyssci.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0022000013001190",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer and System Sciences",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00220000",
}

@Article{Wang:2014:RAW,
  author =       "Xian-gyang Wang and Pan-pan Niu and Hong-ying Yang and
                 Yan Zhang and Tian-xiao Ma",
  title =        "A Robust Audio Watermarking Scheme using Higher-order
                 Statistics in Empirical Mode Decomposition Domain",
  journal =      j-FUND-INFO,
  volume =       "130",
  number =       "4",
  pages =        "467--490",
  month =        oct,
  year =         "2014",
  CODEN =        "FUMAAJ",
  DOI =          "https://doi.org/10.3233/FI-2014-1000",
  ISSN =         "0169-2968 (print), 1875-8681 (electronic)",
  ISSN-L =       "0169-2968",
  bibdate =      "Sat Mar 5 17:18:29 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/fundinfo2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Fundamenta Informaticae",
  journal-URL =  "http://content.iospress.com/journals/fundamenta-informaticae",
}

@Article{Watanabe:2014:OAC,
  author =       "Shun Watanabe and Ryutaroh Matsumoto and Tomohiko
                 Uyematsu",
  title =        "Optimal axis compensation in quantum key distribution
                 protocols over unital channels",
  journal =      j-THEOR-COMP-SCI,
  volume =       "560 (part 1)",
  number =       "??",
  pages =        "91--106",
  day =          "4",
  month =        dec,
  year =         "2014",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Tue Dec 2 19:05:23 MST 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0304397514006987",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975/",
}

@Article{Watts:2014:ICB,
  author =       "Steve Watts",
  title =        "Intelligent combination --- the benefits of tokenless
                 two-factor authentication",
  journal =      j-NETWORK-SECURITY,
  volume =       "2014",
  number =       "8",
  pages =        "17--20",
  month =        aug,
  year =         "2014",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(14)70082-0",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 17:01:10 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485814700820",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Watts:2014:PYI,
  author =       "Steve Watts",
  title =        "Protecting your identity when working remotely",
  journal =      j-NETWORK-SECURITY,
  volume =       "2014",
  number =       "1",
  pages =        "5--7",
  month =        jan,
  year =         "2014",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(14)70005-4",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 17:01:03 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485814700054",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Wei:2014:EEF,
  author =       "Guiyi Wei and Rongxing Lu and Jun Shao",
  title =        "{EFADS}: Efficient, flexible and anonymous data
                 sharing protocol for cloud computing with proxy
                 re-encryption",
  journal =      j-J-COMP-SYS-SCI,
  volume =       "80",
  number =       "8",
  pages =        "1549--1562",
  month =        dec,
  year =         "2014",
  CODEN =        "JCSSBM",
  DOI =          "https://doi.org/10.1016/j.jcss.2014.04.021",
  ISSN =         "0022-0000 (print), 1090-2724 (electronic)",
  ISSN-L =       "0022-0000",
  bibdate =      "Tue Jan 29 15:27:27 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsyssci.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0022000014000658",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer and System Sciences",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00220000",
}

@Article{Wei:2014:IDC,
  author =       "Yuechuan Wei and Xiaoyuan Yang and Chao Li",
  title =        "Impossible differential cryptanalysis on cipher {E2}",
  journal =      j-CCPE,
  volume =       "26",
  number =       "8",
  pages =        "1477--1489",
  day =          "10",
  month =        jun,
  year =         "2014",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.3043",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Fri May 30 08:55:43 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "10 May 2013",
}

@Article{Wen:2014:MZC,
  author =       "Long Wen and Meiqin Wang and Andrey Bogdanov and
                 Huaifeng Chen",
  title =        "Multidimensional zero-correlation attacks on
                 lightweight block cipher {HIGHT}: Improved
                 cryptanalysis of an {ISO} standard",
  journal =      j-INFO-PROC-LETT,
  volume =       "114",
  number =       "6",
  pages =        "322--330",
  month =        jun,
  year =         "2014",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Fri Feb 28 07:46:24 MST 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019014000088",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190/",
}

@Article{Whitworth:2014:SPC,
  author =       "Jeff Whitworth and Shan Suthaharan",
  title =        "Security problems and challenges in a machine
                 learning-based hybrid big data processing network
                 systems",
  journal =      j-SIGMETRICS,
  volume =       "41",
  number =       "4",
  pages =        "82--85",
  month =        mar,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2627534.2627560",
  ISSN =         "0163-5999 (print), 1557-9484 (electronic)",
  ISSN-L =       "0163-5999",
  bibdate =      "Wed May 21 15:15:25 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigmetrics.bib",
  abstract =     "The data source that produces data continuously in
                 high volume and high velocity with large varieties of
                 data types creates Big Data, and causes problems and
                 challenges to Machine Learning (ML) techniques that
                 help extract, analyze and visualize important
                 information. To overcome these problems and challenges,
                 we propose to make use of the hybrid networking model
                 that consists of multiple components such as Hadoop
                 distributed file system (HDFS), cloud storage system,
                 security module and ML unit. Processing of Big Data in
                 this networking environment with ML technique requires
                 user interaction and additional storage hence some
                 artificial delay between the arrivals of data domains
                 through external storage can help HDFSto process the
                 Big Data efficiently. To address this problem we
                 suggest using public cloud for data storage which will
                 induce meaningful time delay to the data while making
                 use of its storage capability. However, the use of
                 public cloud will lead to security vulnerability to the
                 data transmission and storage. Therefore, we need some
                 form of security algorithm that provides a flexible
                 key-based encryption technique that can provide
                 tradeoffs between time-delay, security strength and
                 storage risks. In this paper we propose a model for
                 using public cloud provider trust levels to select
                 encryption types for data storage for use within a Big
                 Data analytics network topology.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGMETRICS Performance Evaluation Review",
  journal-URL =  "http://portal.acm.org/toc.cfm?id=J618",
}

@Article{Xiang:2014:PBA,
  author =       "Yong Xiang and I. Natgunanathan and Song Guo and
                 Wanlei Zhou and S. Nahavandi",
  title =        "Patchwork-Based Audio Watermarking Method Robust to
                 De-synchronization Attacks",
  journal =      j-IEEE-ACM-TASLP,
  volume =       "22",
  number =       "9",
  pages =        "1413--1423",
  month =        sep,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/TASLP.2014.2328175",
  ISSN =         "2329-9290",
  ISSN-L =       "2329-9290",
  bibdate =      "Mon Oct 5 06:29:39 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeeacmtaslp.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE\slash ACM Transactions on Audio, Speech, and
                 Language Processing",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6570655",
}

@Article{Xie:2014:SCP,
  author =       "Qi Xie and Guilin Wang and Fubiao Xia and Deren Chen",
  title =        "Self-certified proxy convertible authenticated
                 encryption: formal definitions and a provably secure
                 scheme",
  journal =      j-CCPE,
  volume =       "26",
  number =       "5",
  pages =        "1038--1051",
  day =          "10",
  month =        apr,
  year =         "2014",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.3058",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Fri May 30 08:55:33 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "10 Jun 2013",
}

@Article{Xu:2014:AHA,
  author =       "Chang Xu and Hua Guo and Zhoujun Li and Yi Mu",
  title =        "Affiliation-Hiding Authenticated Asymmetric Group Key
                 Agreement Based on Short Signature",
  journal =      j-COMP-J,
  volume =       "57",
  number =       "10",
  pages =        "1580--1590",
  month =        oct,
  year =         "2014",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxt098",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Sat Sep 27 12:06:41 MDT 2014",
  bibsource =    "http://comjnl.oxfordjournals.org/content/57/10.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/57/10/1580",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "September 6, 2013",
}

@Article{Xu:2014:TBH,
  author =       "Li Xu and Yuan He and Xiaofeng Chen and Xinyi Huang",
  title =        "Ticket-based handoff authentication for wireless mesh
                 networks",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "73",
  number =       "??",
  pages =        "185--194",
  day =          "14",
  month =        nov,
  year =         "2014",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Mon Oct 20 06:32:36 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1389128614002886",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286/",
}

@Article{Xue:2014:LDP,
  author =       "Kaiping Xue and Peilin Hong and Changsha Ma",
  title =        "A lightweight dynamic pseudonym identity based
                 authentication and key agreement protocol without
                 verification tables for multi-server architecture",
  journal =      j-J-COMP-SYS-SCI,
  volume =       "80",
  number =       "1",
  pages =        "195--206",
  month =        feb,
  year =         "2014",
  CODEN =        "JCSSBM",
  DOI =          "https://doi.org/10.1016/j.jcss.2013.07.004",
  ISSN =         "0022-0000 (print), 1090-2724 (electronic)",
  ISSN-L =       "0022-0000",
  bibdate =      "Tue Jan 29 15:27:24 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsyssci.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0022000013001426",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer and System Sciences",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00220000",
}

@Article{Yang:2014:BEB,
  author =       "Yang Yang",
  title =        "Broadcast encryption based non-interactive key
                 distribution in {MANETs}",
  journal =      j-J-COMP-SYS-SCI,
  volume =       "80",
  number =       "3",
  pages =        "533--545",
  month =        may,
  year =         "2014",
  CODEN =        "JCSSBM",
  DOI =          "https://doi.org/10.1016/j.jcss.2013.06.009",
  ISSN =         "0022-0000 (print), 1090-2724 (electronic)",
  ISSN-L =       "0022-0000",
  bibdate =      "Tue Jan 29 15:27:25 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsyssci.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0022000013001189",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer and System Sciences",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00220000",
}

@Article{Yang:2014:IBI,
  author =       "Guomin Yang and Chik How Tan and Yi Mu and Willy
                 Susilo and Duncan S. Wong",
  title =        "Identity based identification from algebraic coding
                 theory",
  journal =      j-THEOR-COMP-SCI,
  volume =       "520",
  number =       "??",
  pages =        "51--61",
  day =          "6",
  month =        feb,
  year =         "2014",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Thu Jan 9 16:56:40 MST 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0304397513006786",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975/",
}

@Article{Yang:2014:MDF,
  author =       "Ying Yang and Ioannis Ivrissimtzis",
  title =        "Mesh Discriminative Features for {$3$D} Steganalysis",
  journal =      j-TOMCCAP,
  volume =       "10",
  number =       "3",
  pages =        "27:1--27:??",
  month =        apr,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2535555",
  ISSN =         "1551-6857 (print), 1551-6865 (electronic)",
  ISSN-L =       "1551-6857",
  bibdate =      "Tue Apr 15 12:20:53 MDT 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tomccap/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tomccap.bib",
  abstract =     "We propose a steganalytic algorithm for triangle
                 meshes, based on the supervised training of a
                 classifier by discriminative feature vectors. After a
                 normalization step, the triangle mesh is calibrated by
                 one step of Laplacian smoothing and then a feature
                 vector is computed, encoding geometric information
                 corresponding to vertices, edges and faces. For a given
                 steganographic or watermarking algorithm, we create a
                 training set containing unmarked meshes and meshes
                 marked by that algorithm, and train a classifier using
                 Quadratic Discriminant Analysis. The performance of the
                 proposed method was evaluated on six well-known
                 watermarking/steganographic schemes with satisfactory
                 accuracy rates.",
  acknowledgement = ack-nhfb,
  articleno =    "27",
  fjournal =     "ACM Transactions on Multimedia Computing,
                 Communications, and Applications",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J961",
}

@Article{Yang:2014:PST,
  author =       "Haomin Yang and Yaoxue Zhang and Yuezhi Zhou and
                 Xiaoming Fu and Hao Liu and Athanasios V. Vasilakos",
  title =        "Provably secure three-party authenticated key
                 agreement protocol using smart cards",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "58",
  number =       "??",
  pages =        "29--38",
  day =          "15",
  month =        jan,
  year =         "2014",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Wed Feb 5 08:36:58 MST 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1389128613002867",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286/",
}

@Article{Yao:2014:NCR,
  author =       "Hongyi Yao and Danilo Silva and Sidharth Jaggi and
                 Michael Langberg",
  title =        "Network codes resilient to jamming and eavesdropping",
  journal =      j-IEEE-TRANS-NETWORKING,
  volume =       "22",
  number =       "6",
  pages =        "1978--1987",
  month =        dec,
  year =         "2014",
  CODEN =        "IEANEP",
  DOI =          "https://doi.org/10.1109/TNET.2013.2294254",
  ISSN =         "1063-6692 (print), 1558-2566 (electronic)",
  ISSN-L =       "1063-6692",
  bibdate =      "Thu Feb 12 18:29:37 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
  abstract =     "We consider the problem of communicating information
                 over a network secretly and reliably in the presence of
                 a hidden adversary who can eavesdrop and inject
                 malicious errors. We provide polynomial-time
                 distributed network codes that are
                 information-theoretically rate-optimal for this
                 scenario, improving on the rates achievable in prior
                 work by Ngai et al. Ourmain contribution shows that as
                 long as the sum of the number of links the adversary
                 can jam (denoted by Z O ) and the number of links he
                 can eavesdrop on (denoted by ZI ) is less than the
                 network capacity (denoted by C ) (i.e., ZO + ZI {$<$} C
                 ), our codes can communicate (with vanishingly small
                 error probability) a single bit correctly and without
                 leaking any information to the adversary.We then use
                 this scheme as a module to design codes that allow
                 communication at the source rate of C --- ZO when there
                 are no security requirements, and codes that allow
                 communication at the source rate of C --- ZO --- ZI
                 while keeping the communicated message provably secret
                 from the adversary. Interior nodes are oblivious to the
                 presence of adversaries and perform random linear
                 network coding; only the source and destination need to
                 be tweaked. We also prove that the rate-region obtained
                 is information-theoretically optimal. In proving our
                 results, we correct an error in prior work by a subset
                 of the authors in this paper.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE\slash ACM Transactions on Networking",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J771",
}

@Article{Ye:2014:NIE,
  author =       "Ruisong Ye",
  title =        "A Novel Image Encryption Scheme Based on Generalized
                 Multi-sawtooth Maps",
  journal =      j-FUND-INFO,
  volume =       "133",
  number =       "1",
  pages =        "87--104",
  month =        jan,
  year =         "2014",
  CODEN =        "FUMAAJ",
  DOI =          "https://doi.org/10.3233/FI-2014-1063",
  ISSN =         "0169-2968 (print), 1875-8681 (electronic)",
  ISSN-L =       "0169-2968",
  bibdate =      "Sat Mar 5 17:19:23 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/fundinfo2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Fundamenta Informaticae",
  journal-URL =  "http://content.iospress.com/journals/fundamenta-informaticae",
}

@TechReport{Ylonen:2014:SAA,
  author =       "Tatu Ylonen and Karen Scarfone and Murugiah Souppaya",
  title =        "Security of Automated Access Management Using {Secure
                 Shell (SSH)}",
  type =         "Technical report",
  number =       "NISTIR 7966 (draft)",
  institution =  pub-NIST,
  address =      pub-NIST:adr,
  year =         "2014",
  bibdate =      "Mon Sep 01 13:10:13 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://csrc.nist.gov/publications/drafts/nistir-7966/nistir_7966_draft.pdf",
  acknowledgement = ack-nhfb,
}

@Article{Yuen:2014:TCT,
  author =       "Tsz Hon Yuen and Willy Susilo and Yi Mu",
  title =        "Towards a cryptographic treatment of publish\slash
                 subscribe systems",
  journal =      j-J-COMP-SECUR,
  volume =       "22",
  number =       "1",
  pages =        "33--67",
  month =        "????",
  year =         "2014",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-130486",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:08 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Zeng:2014:NFC,
  author =       "Shengke Zeng and Shaoquan Jiang",
  title =        "A New Framework for Conditionally Anonymous Ring
                 Signature",
  journal =      j-COMP-J,
  volume =       "57",
  number =       "4",
  pages =        "567--578",
  month =        apr,
  year =         "2014",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxt036",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Wed Mar 26 15:06:42 MDT 2014",
  bibsource =    "http://comjnl.oxfordjournals.org/content/57/3.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/57/4/567.full.pdf+html",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "May 6, 2013",
}

@Book{Zetter:2014:CZD,
  author =       "Kim Zetter",
  title =        "Countdown to Zero Day: {Stuxnet} and the launch of the
                 world's first digital weapon",
  publisher =    "Crown",
  address =      "New York, NY, USA",
  pages =        "????",
  year =         "2014",
  ISBN =         "0-7704-3617-X (hardcover), 0-7704-3619-6 (paperback),
                 0-7704-3618-8 (e-book)",
  ISBN-13 =      "978-0-7704-3617-9 (hardcover), 978-0-7704-3619-3
                 (paperback), 978-0-7704-3618-6 (ebook)",
  LCCN =         "UG593 .Z48 2014",
  bibdate =      "Mon Nov 24 12:20:25 MST 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 z3950.loc.gov:7090/Voyager",
  abstract =     "Top cybersecurity journalist Kim Zetter tells the
                 story behind the virus that sabotaged Iran's nuclear
                 efforts and shows how its existence has ushered in a
                 new age of warfare--one in which a digital attack can
                 have the same destructive capability as a megaton bomb.
                 In January 2010, inspectors with the International
                 Atomic Energy Agency noticed that centrifuges at an
                 Iranian uranium enrichment plant were failing at an
                 unprecedented rate. The cause was a complete mystery
                 --- apparently as much to the technicians replacing the
                 centrifuges as to the inspectors observing them. Then,
                 five months later, a seemingly unrelated event
                 occurred: A computer security firm in Belarus was
                 called in to troubleshoot some computers in Iran that
                 were crashing and rebooting repeatedly. At first, the
                 firm's programmers believed the malicious code on the
                 machines was a simple, routine piece of malware. But as
                 they and other experts around the world investigated,
                 they discovered a mysterious virus of unparalleled
                 complexity. They had, they soon learned, stumbled upon
                 the world's first digital weapon. For Stuxnet, as it
                 came to be known, was unlike any other virus or worm
                 built before: Rather than simply hijacking targeted
                 computers or stealing information from them, it escaped
                 the digital realm to wreak actual, physical destruction
                 on a nuclear facility. In these pages, Wired journalist
                 Kim Zetter draws on her extensive sources and expertise
                 to tell the story behind Stuxnet's planning, execution,
                 and discovery, covering its genesis in the corridors of
                 Bush's White House and its unleashing on systems in
                 Iran --- and telling the spectacular, unlikely tale of
                 the security geeks who managed to unravel a sabotage
                 campaign years in the making. But \booktitle{Countdown
                 to Zero Day} ranges far beyond Stuxnet itself. Here,
                 Zetter shows us how digital warfare developed in the
                 US. She takes us inside today's flourishing zero-day
                 `grey markets,' in which intelligence agencies and
                 militaries pay huge sums for the malicious code they
                 need to carry out infiltrations and attacks. She
                 reveals just how vulnerable many of our own critical
                 systems are to Stuxnet-like strikes, from nation-state
                 adversaries and anonymous hackers alike --- and shows
                 us just what might happen should our infrastructure be
                 targeted by such an attack. Propelled by Zetter's
                 unique knowledge and access, and filled with
                 eye-opening explanations of the technologies involved,
                 \booktitle{Countdown to Zero Day} is a comprehensive
                 and prescient portrait of a world at the edge of a new
                 kind of war.\par

                 This story of the virus that destroyed Iran's nuclear
                 centrifuges, by top cybersecurity journalist Kim
                 Zetter, shows that the door has been opened on a new
                 age of warfare --- one in which a digital attack can
                 have the same destructive capability as a megaton bomb
                 dropped from an airplane",
  acknowledgement = ack-nhfb,
  subject =      "Cyberspace operations (Military science); United
                 States; Network-centric operations (Military science);
                 Israel; Computer crimes; Investigation; Iran; Case
                 studies; Rootkits (Computer software); Uranium
                 enrichment; Equipment and supplies; Sabotage; Nuclear
                 arms control; Nuclear nonproliferation; Foreign
                 relations; POLITICAL SCIENCE / Political Freedom and
                 Security / Intelligence; COMPUTERS / Security /
                 General; COMPUTERS / General",
  tableofcontents = "The case of the centrifuges \\
                 Early warning \\
                 500 kilobytes of mystery \\
                 Natanz \\
                 Stuxnet deconstructed \\
                 Springtime for Ahmadinejad \\
                 digging for zero days \\
                 Zero-day paydays \\
                 The payload \\
                 Industrial controls out of control \\
                 Precision weapon \\
                 A digital plot is hatched \\
                 A new fighting domain \\
                 Digital warheads \\
                 Son of Stuxnet \\
                 Flame \\
                 Olympic Games \\
                 The mystery of the centrifuges \\
                 Qualified success \\
                 Digital Pandora",
}

@Article{Zhang:2014:EFH,
  author =       "Xiaojun Zhang and Chunxiang Xu and Chunhua Jin and Run
                 Xie and Jining Zhao",
  title =        "Efficient fully homomorphic encryption from {RLWE}
                 with an extension to a threshold encryption scheme",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "36",
  number =       "??",
  pages =        "180--186",
  month =        jul,
  year =         "2014",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Mon Apr 28 15:56:06 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X13002422",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X/",
}

@Article{Zhang:2014:GCS,
  author =       "Yinghui Zhang and Xiaofeng Chen and Jin Li and Hui
                 Li",
  title =        "Generic construction for secure and efficient handoff
                 authentication schemes in {EAP}-based wireless
                 networks",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "75 (part A)",
  number =       "??",
  pages =        "192--211",
  day =          "24",
  month =        dec,
  year =         "2014",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Fri Nov 28 11:25:17 MST 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1389128614003648",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286/",
}

@Article{Zhang:2014:LFL,
  author =       "Mingwu Zhang and Chunzhi Wang and Kirill Morozov",
  title =        "{LR-FEAD}: leakage-tolerating and attribute-hiding
                 functional encryption mechanism with delegation in
                 affine subspaces",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "70",
  number =       "3",
  pages =        "1405--1432",
  month =        dec,
  year =         "2014",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-014-1234-6",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Fri Feb 13 12:13:22 MST 2015",
  bibsource =    "http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0920-8542&volume=70&issue=3;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  URL =          "http://link.springer.com/article/10.1007/s11227-014-1234-6",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Article{Zhang:2014:NCM,
  author =       "Miao Zhang and Xiaojun Tong",
  title =        "A new chaotic map based image encryption schemes for
                 several image formats",
  journal =      j-J-SYST-SOFTW,
  volume =       "98",
  number =       "??",
  pages =        "140--154",
  month =        dec,
  year =         "2014",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Fri Oct 24 05:50:53 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0164121214001915",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212/",
}

@Article{Zhao:2014:TAH,
  author =       "Yifan Zhao and Swee-Won Lo and Robert H. Deng and
                 Xuhua Ding",
  title =        "Technique for authenticating {H.264\slash SVC} and its
                 performance evaluation over wireless mobile networks",
  journal =      j-J-COMP-SYS-SCI,
  volume =       "80",
  number =       "3",
  pages =        "520--532",
  month =        may,
  year =         "2014",
  CODEN =        "JCSSBM",
  DOI =          "https://doi.org/10.1016/j.jcss.2013.06.008",
  ISSN =         "0022-0000 (print), 1090-2724 (electronic)",
  ISSN-L =       "0022-0000",
  bibdate =      "Tue Jan 29 15:27:25 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsyssci.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0022000013001177",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer and System Sciences",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00220000",
}

@Article{Zhou:2014:SAC,
  author =       "Lan Zhou and Vijay Varadharajan and Michael Hitchens",
  title =        "Secure administration of cryptographic role-based
                 access control for large-scale cloud storage systems",
  journal =      j-J-COMP-SYS-SCI,
  volume =       "80",
  number =       "8",
  pages =        "1518--1533",
  month =        dec,
  year =         "2014",
  CODEN =        "JCSSBM",
  DOI =          "https://doi.org/10.1016/j.jcss.2014.04.019",
  ISSN =         "0022-0000 (print), 1090-2724 (electronic)",
  ISSN-L =       "0022-0000",
  bibdate =      "Tue Jan 29 15:27:27 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsyssci.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0022000014000634",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer and System Sciences",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00220000",
}

@Article{Zhuang:2014:SCA,
  author =       "Yixin Zhuang and Ming Zou and Nathan Carr and Tao Ju",
  title =        "Shapes and Cryptography: Anisotropic geodesics for
                 live-wire mesh segmentation",
  journal =      j-CGF,
  volume =       "33",
  number =       "7",
  pages =        "111--120",
  month =        oct,
  year =         "2014",
  CODEN =        "CGFODY",
  DOI =          "https://doi.org/10.1111/cgf.12479",
  ISSN =         "0167-7055 (print), 1467-8659 (electronic)",
  ISSN-L =       "0167-7055",
  bibdate =      "Fri Feb 13 14:27:08 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cgf.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Graphics World",
  journal-URL =  "http://onlinelibrary.wiley.com/journal/10.1111/(ISSN)1467-8659/",
  onlinedate =   "28 Oct 2014",
}

@Article{Zielinska:2014:TS,
  author =       "Elzbieta Zieli{\'n}ska and Wojciech Mazurczyk and
                 Krzysztof Szczypiorski",
  title =        "Trends in steganography",
  journal =      j-CACM,
  volume =       "57",
  number =       "3",
  pages =        "86--95",
  month =        mar,
  year =         "2014",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2566590.2566610",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Feb 27 17:17:45 MST 2014",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cacm2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "Methods for embedding secret data are more
                 sophisticated than their ancient predecessors, but the
                 basic principles remain unchanged.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Abdulrahman:2015:NRR,
  author =       "E. A. H. Abdulrahman and A. Reyhani-Masoleh",
  title =        "New Regular Radix-8 Scheme for Elliptic Curve Scalar
                 Multiplication without Pre-Computation",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "64",
  number =       "2",
  pages =        "438--451",
  month =        feb,
  year =         "2015",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2013.213",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Wed Mar 4 17:06:17 MST 2015",
  bibsource =    "ghttps://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@TechReport{Adrian:2015:IFS,
  author =       "David Adrian and Karthikeyan Bhargavan and Zakir
                 Durumeric and Pierrick Gaudry and Matthew Green and J.
                 Alex Halderman and Nadia Heninger and Drew Springall
                 and Emmanuel Thom{\'e} and Luke Valenta and Benjamin
                 VanderSloot and Eric Wustrow and Santiago
                 Zanella-B{\'e}guelink and Paul Zimmermann",
  title =        "Imperfect Forward Secrecy: How {Diffie--Hellman} Fails
                 in Practice",
  type =         "Report",
  institution =  "INRIA Paris-Rocquencourt [and others]",
  address =      "Rocquencourt, France",
  pages =        "13",
  day =          "21",
  month =        may,
  year =         "2015",
  bibdate =      "Thu May 21 15:08:22 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://weakdh.org/;
                 https://weakdh.org/imperfect-forward-secrecy.pdf",
  abstract =     "We investigate the security of Diffie--Hellman key
                 exchange as used in popular Internet protocols and find
                 it to be less secure than widely believed. First, we
                 present a novel flaw in TLS that allows a
                 man-in-the-middle to downgrade connections to
                 export-grade Diffie--Hellman. To carry out this attack,
                 we implement the number field sieve discrete log
                 algorithm. After a week-long precomputation for a
                 specified 512-bit group, we can compute arbitrary
                 discrete logs in this group in minutes. We find that
                 82\% of vulnerable servers use a single 512-bit group,
                 allowing us to compromise connections to 7\% of Alexa
                 Top Million HTTPS sites. In response, major browsers
                 are being changed to reject short groups.\par

                 We go on to consider Diffie--Hellman with 768- and
                 1024-bit groups. A small number of fixed or
                 standardized groups are in use by millions of TLS, SSH,
                 and VPN servers. Performing precomputations on a few of
                 these groups would allow a passive eavesdropper to
                 decrypt a large fraction of Internet traffic. In the
                 1024-bit case, we estimate that such computations are
                 plausible given nation-state resources, and a close
                 reading of published NSA leaks shows that the agency's
                 attacks on VPNs are consistent with having achieved
                 such a break. We conclude that moving to stronger key
                 exchange methods should be a priority for the Internet
                 community.",
  acknowledgement = ack-nhfb,
}

@Article{Agosta:2015:OPP,
  author =       "Giovanni Agosta and Alessandro Barenghi and Alessandro
                 {Di Federico} and Gerardo Pelosi",
  title =        "{OpenCL} performance portability for general-purpose
                 computation on graphics processor units: an exploration
                 on cryptographic primitives",
  journal =      j-CCPE,
  volume =       "27",
  number =       "14",
  pages =        "3633--3660",
  day =          "25",
  month =        sep,
  year =         "2015",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.3358",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Mon Sep 28 09:32:54 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/pvm.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "29 Aug 2014",
}

@Article{Ahani:2015:SRB,
  author =       "S. Ahani and S. Ghaemmaghami and Z. J. Wang",
  title =        "A Sparse Representation-Based Wavelet Domain Speech
                 Steganography Method",
  journal =      j-IEEE-ACM-TASLP,
  volume =       "23",
  number =       "1",
  pages =        "80--91",
  month =        jan,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/TASLP.2014.2372313",
  ISSN =         "2329-9290",
  ISSN-L =       "2329-9290",
  bibdate =      "Mon Oct 5 06:29:41 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeeacmtaslp.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6570655",
}

@Article{Aiash:2015:FAA,
  author =       "Mahdi Aiash",
  title =        "A formal analysis of authentication protocols for
                 mobile devices in next generation networks",
  journal =      j-CCPE,
  volume =       "27",
  number =       "12",
  pages =        "2938--2953",
  day =          "25",
  month =        aug,
  year =         "2015",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.3260",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Sat Jul 25 19:54:09 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "18 Mar 2014",
}

@Article{Aiash:2015:IAA,
  author =       "Mahdi Aiash and Jonathan Loo",
  title =        "An integrated authentication and authorization
                 approach for the network of information architecture",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "50",
  number =       "??",
  pages =        "73--79",
  month =        apr,
  year =         "2015",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Sat Aug 8 15:46:38 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804514001349",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Alam:2015:ACF,
  author =       "Shahid Alam and Issa Traore and Ibrahim Sogukpinar",
  title =        "Annotated Control Flow Graph for Metamorphic Malware
                 Detection",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "10",
  pages =        "2608--2621",
  month =        oct,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxu148",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Sep 28 14:49:06 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/10.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/10/2608",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "December 15, 2014",
}

@TechReport{Albrecht:2015:FBR,
  author =       "Martin R. Albrecht and Davide Papini and Kenneth G.
                 Paterson and Ricardo Villanueva-Polanco",
  title =        "Factoring 512-bit {RSA} Moduli for Fun (and a Profit
                 of \$9,000)",
  type =         "Report",
  institution =  "Information Security Group Royal Holloway, University
                 of London",
  address =      "London, UK",
  pages =        "3",
  day =          "13",
  month =        mar,
  year =         "2015",
  bibdate =      "Sat Mar 21 09:34:09 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://martinralbrecht.files.wordpress.com/2015/03/freak-scan1.pdf",
  abstract =     "The recent FREAK attack highlighted widespread support
                 for export-grade RSA keys in TLS servers. We present
                 the results of an IPv4-wide survey of TLS servers
                 performed roughly one week after FREAK was announced.
                 We found that only 9.7\% of servers now support such
                 export-grade RSA keys. However, we also found that some
                 keys are repeated with high frequency, making each of
                 them an attractive target for a direct factoring
                 attack; one key in particular was repeated 28,394
                 times. We also computed the pairwise gcds of all the
                 export-grade RSA moduli that we found, leading to 90
                 factorisations. These moduli correspond to 294
                 different hosts. The computation took less than 3
                 minutes on an 8-core system, saving the \$9,000 that a
                 cloud computation would have cost if each modulus had
                 been attacked directly. We consider this to be a good
                 return on investment for a Friday afternoon's work.",
  acknowledgement = ack-nhfb,
}

@Article{Altaf:2015:LPM,
  author =       "Muhammad Shoaib Bin Altaf and David A. Wood",
  title =        "{LogCA}: A Performance Model for Hardware
                 Accelerators",
  journal =      j-IEEE-COMPUT-ARCHIT-LETT,
  volume =       "14",
  number =       "2",
  pages =        "132--135",
  month =        jul # "\slash " # dec,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/LCA.2014.2360182",
  ISSN =         "1556-6056 (print), 1556-6064 (electronic)",
  ISSN-L =       "1556-6056",
  bibdate =      "Thu Jun 20 17:18:18 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeecomputarchitlett.bib",
  abstract =     "To address the Dark Silicon problem, architects have
                 increasingly turned to special-purpose hardware
                 accelerators to improve the performance and energy
                 efficiency of common computational kernels, such as
                 encryption and compression. Unfortunately, the latency
                 and overhead required to off-load a computation to an
                 accelerator sometimes outweighs the potential benefits,
                 resulting in a net decrease in performance or energy
                 efficiency. To help architects and programmers reason
                 about these trade-offs, we have developed the LogCA
                 model, a simple performance model for hardware
                 accelerators. LogCA provides a simplified abstraction
                 of a hardware accelerator characterized by five key
                 parameters. We have validated the model against a
                 variety of accelerators, ranging from on-chip
                 cryptographic accelerators in Sun's UltraSparc T2 and
                 Intel's Sandy Bridge to both discrete and integrated
                 GPUs.",
  acknowledgement = ack-nhfb,
  affiliation =  "Bin Altaf, MS (Reprint Author), Univ Wisconsin,
                 Madison, WI 53706 USA. Bin Altaf, Muhammad Shoaib;
                 Wood, David A., Univ Wisconsin, Madison, WI 53706
                 USA.",
  author-email = "shoaibbinalt@wisc.edu david@cs.wisc.edu",
  da =           "2019-06-20",
  doc-delivery-number = "CZ7DC",
  eissn =        "1556-6064",
  fjournal =     "IEEE Computer Architecture Letters",
  funding-acknowledgement = "NSF [CNS-1117280, CCF-1218323,
                 CNS-1302260]",
  funding-text = "We thank Mark Hill, Michael Swift, Rathijit Sen, and
                 the members of the Wisconsin Multifacet group for their
                 comments on the paper. This work is supported in part
                 with NSF grants CNS-1117280, CCF-1218323, and
                 CNS-1302260. The views expressed herein are not
                 necessarily those of the NSF. Professor Wood has
                 significant financial interests in AMD, Google and
                 Panasas.",
  journal-iso =  "IEEE Comput. Archit. Lett.",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=10208",
  keywords =     "Accelerators; heterogeneous systems; modeling
                 techniques; performance of systems",
  number-of-cited-references = "12",
  research-areas = "Computer Science",
  times-cited =  "0",
  unique-id =    "Altaf:2015:LPM",
  web-of-science-categories = "Computer Science, Hardware \&
                 Architecture",
}

@Article{Anand:2015:ICL,
  author =       "Kapil Anand and Rajeev Barua",
  title =        "Instruction-Cache Locking for Improving Embedded
                 Systems Performance",
  journal =      j-TECS,
  volume =       "14",
  number =       "3",
  pages =        "53:1--53:??",
  month =        apr,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2700100",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Tue Apr 21 17:21:32 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tecs.bib",
  abstract =     "Cache memories in embedded systems play an important
                 role in reducing the execution time of applications.
                 Various kinds of extensions have been added to cache
                 hardware to enable software involvement in replacement
                 decisions, improving the runtime over a purely
                 hardware-managed cache. Novel embedded systems, such as
                 Intel's XScale and ARM Cortex processors, facilitate
                 locking one or more lines in cache; this feature is
                 called cache locking. We present a method in for
                 instruction-cache locking that is able to reduce the
                 average-case runtime of a program. We demonstrate that
                 the optimal solution for instruction cache locking can
                 be obtained in polynomial time. However, a fundamental
                 lack of correlation between cache hardware and software
                 program points renders such optimal solutions
                 impractical. Instead, we propose two practical
                 heuristics-based approaches to achieve cache locking.
                 First, we present a static mechanism for locking the
                 cache, in which the locked contents of the cache are
                 kept fixed over the execution of the program. Next, we
                 present a dynamic mechanism that accounts for changing
                 program requirements at runtime. We devise a
                 cost--benefit model to discover the memory addresses
                 that should be locked in the cache. We implement our
                 scheme inside a binary rewriter, widening the
                 applicability of our scheme to binaries compiled using
                 any compiler. Results obtained on a suite of MiBench
                 benchmarks show that our static mechanism results in
                 20\% improvement in the instruction-cache miss rate on
                 average and up to 18\% improvement in the execution
                 time on average for applications having instruction
                 accesses as a bottleneck, compared to no cache locking.
                 The dynamic mechanism improves the cache miss rate by
                 35\% on average and execution time by 32\% on
                 instruction-cache-constrained applications.",
  acknowledgement = ack-nhfb,
  articleno =    "53",
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J840",
}

@InProceedings{Andrysco:2015:SFP,
  author =       "Marc Andrysco and David Kohlbrenner and Keaton Mowery
                 and Ranjit Jhala and Sorin Lerner and Hovav Shacham",
  title =        "On subnormal floating point and abnormal timing",
  crossref =     "IEEE:2015:ISS",
  pages =        "623--639",
  year =         "2015",
  DOI =          "https://doi.org/10.1109/SP.2015.44",
  bibdate =      "Mon Feb 10 08:54:26 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/fparith.bib",
  abstract =     "We identify a timing channel in the floating point
                 instructions of modern x86 processors: the running time
                 of floating point addition and multiplication
                 instructions can vary by two orders of magnitude
                 depending on their operands. We develop a benchmark
                 measuring the timing variability of floating point
                 operations and report on its results. We use floating
                 point data timing variability to demonstrate practical
                 attacks on the security of the Firefox browser
                 (versions 23 through 27) and the Fuzz differentially
                 private database. Finally, we initiate the study of
                 mitigations to floating point data timing channels with
                 libfixedtimefixedpoint, a new fixed-point,
                 constant-time math library. Modern floating point
                 standards and implementations are sophisticated,
                 complex, and subtle, a fact that has not been
                 sufficiently recognized by the security community. More
                 work is needed to assess the implications of the use of
                 floating point instructions in security-relevant
                 software.",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:2015:BRDa,
  author =       "Anonymous",
  title =        "Book Review: {{\booktitle{Digital Identity
                 Management}}, Maryline Laurent and Samia Bouzefrane.
                 ISTE Press\slash Elsevier. ISBN 978-1-78548-004-1}",
  journal =      j-NETWORK-SECURITY,
  volume =       "2015",
  number =       "9",
  pages =        "4--4",
  month =        sep,
  year =         "2015",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(15)30078-7",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 17:01:23 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485815300787",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:2015:BSU,
  author =       "Anonymous",
  title =        "Blind Signatures Using Offline Repositories Provide
                 New Level of Security",
  journal =      j-SCI-COMPUT,
  volume =       "??",
  number =       "??",
  pages =        "??--??",
  day =          "15",
  month =        may,
  year =         "2015",
  CODEN =        "SCHRCU",
  ISSN =         "1930-5753 (print), 1930-6156 (electronic)",
  ISSN-L =       "1930-5753",
  bibdate =      "Mon May 18 10:39:07 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.scientificcomputing.com/news/2015/05/blind-signatures-using-offline-repositories-provide-new-level-security",
  acknowledgement = ack-nhfb,
  fjournal =     "Scientific Computing",
  journal-URL =  "http://digital.scientificcomputing.com/scientificcomputing/",
  remark =       "News story about research in
                 \cite{Ribeiro:2015:QBS}.",
}

@Article{Anonymous:2015:CEB,
  author =       "Anonymous",
  title =        "Cryptography for Everyone: Bringing End-to-end
                 Encryption to the Masses",
  journal =      "Scientific Computing",
  volume =       "??",
  number =       "??",
  pages =        "??--??",
  day =          "17",
  month =        mar,
  year =         "2015",
  bibdate =      "Wed Mar 18 18:16:46 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.scientificcomputing.com/news/2015/03/cryptography-everyone-bringing-end-end-encryption-masses",
  acknowledgement = ack-nhfb,
  keywords =     "Fraunhofer-Gesellschaft; public-key cryptography;
                 CeBIT 2015; German identity card;
                 Volksverschl{\"u}sselung",
}

@Article{Anonymous:2015:QCS,
  author =       "Anonymous",
  title =        "Quantum Cryptography Security Hole Revealed,
                 Energy-time Entanglement Vulnerable to Attack",
  journal =      j-SCI-COMPUT,
  volume =       "??",
  number =       "??",
  pages =        "??--??",
  day =          "12",
  month =        dec,
  year =         "2015",
  CODEN =        "SCHRCU",
  ISSN =         "1930-5753 (print), 1930-6156 (electronic)",
  ISSN-L =       "1930-5753",
  bibdate =      "Mon Jan 18 15:07:47 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  note =         "See research article \cite{Jogenfors:2015:HBT}.",
  URL =          "http://www.scientificcomputing.com/news/2015/12/quantum-cryptography-security-hole-revealed-energy-time-entanglement-vulnerable-attack",
  acknowledgement = ack-nhfb,
  fjournal =     "Scientific Computing",
  journal-URL =  "http://digital.scientificcomputing.com/scientificcomputing/",
}

@Article{Anonymous:2015:UGB,
  author =       "Anonymous",
  title =        "{UK Government} battles tech firms over encryption",
  journal =      j-NETWORK-SECURITY,
  volume =       "2015",
  number =       "11",
  pages =        "1--2",
  month =        nov,
  year =         "2015",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(15)30094-5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 17:01:26 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485815300945",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Appel:2015:VCP,
  author =       "Andrew W. Appel",
  title =        "Verification of a Cryptographic Primitive: {SHA-256}",
  journal =      j-TOPLAS,
  volume =       "37",
  number =       "2",
  pages =        "7:1--7:??",
  month =        apr,
  year =         "2015",
  CODEN =        "ATPSDT",
  DOI =          "https://doi.org/10.1145/2701415",
  ISSN =         "0164-0925 (print), 1558-4593 (electronic)",
  ISSN-L =       "0164-0925",
  bibdate =      "Thu Apr 16 18:32:12 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toplas/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/toplas.bib",
  abstract =     "This article presents a full formal machine-checked
                 verification of a C program: the OpenSSL implementation
                 of SHA-256. This is an interactive proof of functional
                 correctness in the Coq proof assistant, using the
                 Verifiable C program logic. Verifiable C is a
                 separation logic for the C language, proved sound with
                 respect to the operational semantics for C, connected
                 to the CompCert verified optimizing C compiler.",
  acknowledgement = ack-nhfb,
  articleno =    "7",
  fjournal =     "ACM Transactions on Programming Languages and
                 Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J783",
}

@Article{Arias-Cabarcos:2015:BIP,
  author =       "Patricia Arias-Cabarcos and Florina Almenarez and
                 Ruben Trapero and Daniel Diaz-Sanchez and Andres
                 Marin",
  title =        "Blended Identity: Pervasive {IdM} for Continuous
                 Authentication",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "3",
  pages =        "32--39",
  month =        may # "\slash " # jun,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2015.62",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 3 11:45:33 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/03/msp2015030032-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/03/msp2015030032-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
}

@Article{Arnold:2015:NGH,
  author =       "T. W. Arnold and M. Check and E. A. Dames and J. Dayka
                 and S. Dragone and D. Evans and W. Santiago Fernandez
                 and M. D. Hocker and R. Kisley and T. E. Morris and J.
                 Petreshock and K. Werner",
  title =        "The next generation of highly reliable and secure
                 encryption for the {IBM z13}",
  journal =      j-IBM-JRD,
  volume =       "59",
  number =       "4--5",
  pages =        "6:1--6:13",
  month =        jul # "\slash " # sep,
  year =         "2015",
  CODEN =        "IBMJAE",
  DOI =          "https://doi.org/10.1147/JRD.2015.2430071",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  ISSN-L =       "0018-8646",
  bibdate =      "Wed Oct 21 11:38:12 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ibmjrd.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IBM Journal of Research and Development",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5288520",
}

@Article{Arshad:2015:SAI,
  author =       "Hamed Arshad and Morteza Nikooghadam",
  title =        "Security analysis and improvement of two
                 authentication and key agreement schemes for session
                 initiation protocol",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "71",
  number =       "8",
  pages =        "3163--3180",
  month =        aug,
  year =         "2015",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-015-1434-8",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Sat Aug 8 12:23:12 MDT 2015",
  bibsource =    "http://link.springer.com/journal/11227/71/8;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  URL =          "http://link.springer.com/article/10.1007/s11227-015-1434-8",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Article{Asaar:2015:IBM,
  author =       "Maryam Rajabzadeh Asaar and Mahmoud Salmasizadeh and
                 Willy Susilo",
  title =        "An Identity-Based Multi-Proxy Multi-Signature Scheme
                 Without Bilinear Pairings and its Variants",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "4",
  pages =        "1021--1039",
  month =        apr,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxu037",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Thu Mar 26 10:33:30 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/4.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/4/1021",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "May 15, 2014",
}

@Article{Atighehchi:2015:NME,
  author =       "Kevin Atighehchi and Alexis Bonnecaze and Gabriel
                 Risterucci",
  title =        "New models for efficient authenticated dictionaries",
  journal =      j-COMPUT-SECUR,
  volume =       "53",
  number =       "??",
  pages =        "203--214",
  month =        sep,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:42 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815000607",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Attrapadung:2015:RGS,
  author =       "Nuttapong Attrapadung and Keita Emura and Goichiro
                 Hanaoka and Yusuke Sakai",
  title =        "Revocable Group Signature with Constant-Size
                 Revocation List",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "10",
  pages =        "2698--2715",
  month =        oct,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxv026",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Sep 28 14:49:06 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/10.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/10/2698",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "April 22, 2015",
}

@Article{Aysu:2015:FRT,
  author =       "Aydin Aysu and Bilgiday Yuce and Patrick Schaumont",
  title =        "The Future of Real-Time Security: Latency-Optimized
                 Lattice-Based Digital Signatures",
  journal =      j-TECS,
  volume =       "14",
  number =       "3",
  pages =        "43:1--43:??",
  month =        may,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2724714",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Sat Dec 9 08:08:56 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tecs.bib",
  abstract =     "Advances in quantum computing have spurred a
                 significant amount of research into public-key
                 cryptographic algorithms that are resistant against
                 postquantum cryptanalysis. Lattice-based cryptography
                 is one of the important candidates because of its
                 reasonable complexity combined with reasonable
                 signature sizes. However, in a postquantum world, not
                 only the cryptography will change but also the
                 computing platforms. Large amounts of
                 resource-constrained embedded systems will connect to a
                 cloud of powerful server computers. We present an
                 optimization technique for lattice-based signature
                 generation on such embedded systems; our goal is to
                 optimize latency rather than throughput. Indeed, on an
                 embedded system, the latency of a single signature for
                 user identification or message authentication is more
                 important than the aggregate signature generation rate.
                 We build a high-performance implementation using
                 hardware\slash software codesign techniques. The key
                 idea is to partition the signature generation scheme
                 into offline and online phases. The signature scheme
                 allows this separation because a large portion of the
                 computation does not depend on the message to be signed
                 and can be handled before the message is given. Then,
                 we can map complex precomputation operations in
                 software on a low-cost processor and utilize hardware
                 resources to accelerate simpler online operations. To
                 find the optimum hardware architecture for the target
                 platform, we define and explore the design space and
                 implement two design configurations. We realize our
                 solutions on the Altera Cyclone-IV CGX150 FPGA. The
                 implementation consists of a NIOS soft-core processor
                 and a low-latency hash and polynomial multiplication
                 engine. On average, the proposed low-latency
                 architecture can generate a signature with a latency of
                 96 clock cycles at 40MHz, resulting in a response time
                 of 2.4 $ \mu $ s for a signing request. On equivalent
                 platforms, this corresponds to a performance
                 improvement of 33 and 105 times compared to previous
                 hardware and software implementations, respectively.",
  acknowledgement = ack-nhfb,
  articleno =    "43",
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J840",
}

@Article{Azarderakhsh:2015:PHS,
  author =       "Reza Azarderakhsh and Arash Reyhani-Masoleh",
  title =        "Parallel and High-Speed Computations of Elliptic Curve
                 Cryptography Using Hybrid-Double Multipliers",
  journal =      j-IEEE-TRANS-PAR-DIST-SYS,
  volume =       "26",
  number =       "6",
  pages =        "1668--1677",
  month =        jun,
  year =         "2015",
  CODEN =        "ITDSEO",
  DOI =          "https://doi.org/10.1109/TPDS.2014.2323062",
  ISSN =         "1045-9219 (print), 1558-2183 (electronic)",
  ISSN-L =       "1045-9219",
  bibdate =      "Thu Jun 4 19:34:14 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranspardistsys.bib",
  URL =          "http://csdl.computer.org/csdl/trans/td/2015/06/06814322-abs.html",
  abstract-URL = "http://csdl.computer.org/csdl/trans/td/2015/06/06814322-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://www.computer.org/tpds/archives.htm",
}

@Article{Bagheri:2015:NNA,
  author =       "Kadijeh Bagheri and Mohammad-Reza Sadeghi",
  title =        "A new non-associative cryptosystem based on {NTOW}
                 public key cryptosystem and octonions algebra",
  journal =      j-ACM-COMM-COMP-ALGEBRA,
  volume =       "49",
  number =       "1",
  pages =        "13--13",
  month =        mar,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2768577.2768582",
  ISSN =         "1932-2232 (print), 1932-2240 (electronic)",
  ISSN-L =       "1932-2232",
  bibdate =      "Thu Apr 30 16:35:04 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigsam.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Communications in Computer Algebra",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1000",
}

@Article{Bard:2015:PRO,
  author =       "Gregory V. Bard and Theodore McDonnough",
  title =        "Plaintext recovery for one-time pads used twice",
  journal =      j-ACM-COMM-COMP-ALGEBRA,
  volume =       "49",
  number =       "1",
  pages =        "17--18",
  month =        mar,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2768577.2768596",
  ISSN =         "1932-2232 (print), 1932-2240 (electronic)",
  ISSN-L =       "1932-2232",
  bibdate =      "Thu Apr 30 16:35:04 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigsam.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Communications in Computer Algebra",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1000",
}

@Article{Barkatullah:2015:GCF,
  author =       "Javed Barkatullah and Timo Hanke",
  title =        "{Goldstrike 1}: {CoinTerra}'s First-Generation
                 Cryptocurrency Mining Processor for {Bitcoin}",
  journal =      j-IEEE-MICRO,
  volume =       "35",
  number =       "2",
  pages =        "68--76",
  month =        mar # "\slash " # apr,
  year =         "2015",
  CODEN =        "IEMIDZ",
  DOI =          "https://doi.org/10.1109/MM.2015.13",
  ISSN =         "0272-1732 (print), 1937-4143 (electronic)",
  ISSN-L =       "0272-1732",
  bibdate =      "Thu Nov 30 15:24:52 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeemicro.bib",
  URL =          "http://www.computer.org/csdl/mags/mi/2015/02/mmi2015020068-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/mi/2015/02/mmi2015020068-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Micro",
  journal-URL =  "http://www.computer.org/csdl/mags/mi/index.html",
  keywords =     "application specific integrated circuits; Application
                 specific integrated circuits; Blockchain; CoinTerra;
                 CoinTerra first-generation cryptocurrency mining
                 processor; CoinTerra first-generation {Bitcoin} mining
                 processor; Computer security; Cryptography;
                 cryptography; custom ASIC processors; Data mining; data
                 mining; electronic money; Energy efficiency; energy
                 efficiency; GoldStrike; Goldstrike 1; Online banking;
                 SHA-256; Terraminer IV; {Bitcoin}; {Bitcoin} ASIC;
                 {Bitcoin} mining; {Bitcoin} mining appliances;
                 {Bitcoin} mining machine",
}

@TechReport{Barker:2015:RKM,
  author =       "Elaine Barker and Quynh Dang",
  title =        "Recommendation for Key Management. {Part 3}:
                 Application-Specific Key Management Guidance",
  type =         "NIST Special Publication",
  number =       "800-57 Part 3 Revision 1",
  institution =  pub-NIST,
  address =      pub-NIST:adr,
  pages =        "vii + 94",
  month =        jan,
  year =         "2015",
  DOI =          "https://doi.org/10.6028/NIST.SP.800-57pt3r1",
  bibdate =      "Thu Apr 11 13:59:47 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-57pt3r1.pdf",
  abstract =     "NIST Special Publication 800-57 provides cryptographic
                 key management guidance. It consists of three parts.
                 Part 1 provides general guidance and best practices for
                 the management of cryptographic keying material. Part 2
                 provides guidance on policy and security planning
                 requirements for U.S. government agencies. Finally,
                 Part 3 provides guidance when using the cryptographic
                 features of current systems.",
  acknowledgement = ack-nhfb,
  keywords =     "accreditation; assurances; authentication;
                 authorization; availability; backup; certification;
                 compromise; confidentiality; cryptanalysis;
                 cryptographic key; cryptographic module; digital
                 signature; key management; key management policy; key
                 recovery; private key; public key; public key
                 infrastructure; security plan; trust anchor;
                 validation",
}

@Article{Barthe:2015:HAC,
  author =       "Gilles Barthe",
  title =        "High-Assurance Cryptography: Cryptographic Software We
                 Can Trust",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "5",
  pages =        "86--89",
  month =        sep # "\slash " # oct,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2015.112",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Oct 31 11:38:22 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/csdl/mags/sp/2015/05/msp2015050086-abs.html",
  abstract-URL = "http://csdl.computer.org/csdl/mags/sp/2015/05/msp2015050086-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
}

@Article{Basin:2015:ISC,
  author =       "David Basin and Cas Cremers and Kunihiko Miyazaki and
                 Sasa Radomirovic and Dai Watanabe",
  title =        "Improving the Security of Cryptographic Protocol
                 Standards",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "3",
  pages =        "24--31",
  month =        may # "\slash " # jun,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.162",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 3 11:45:33 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/03/msp2015030024-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/03/msp2015030024-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
}

@Article{Bellovin:2015:WRC,
  author =       "Steven M. Bellovin",
  title =        "What a Real Cybersecurity Bill Should Address",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "3",
  pages =        "92--92",
  month =        may # "\slash " # jun,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 3 11:45:33 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/03/msp2015030092.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/03/msp2015030092-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Benaloh:2015:EEV,
  author =       "Josh Benaloh and Ronald L. Rivest and Peter Y. A. Ryan
                 and Philip B. Stark and Vanessa Teague and Poorvi L.
                 Vora",
  title =        "End-to-end verifiability",
  journal =      "arxiv.org",
  volume =       "??",
  number =       "??",
  pages =        "??--??",
  day =          "15",
  month =        apr,
  year =         "2015",
  bibdate =      "Sat Oct 31 11:30:14 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://arxiv.org/abs/1504.03778",
  abstract =     "This pamphlet describes end-to-end election
                 verifiability (E2E-V) for a nontechnical audience:
                 election officials, public policymakers, and anyone
                 else interested in secure, transparent, evidence-based
                 electronic elections.",
  acknowledgement = ack-nhfb,
}

@Article{Bernstein:2015:SPS,
  author =       "Daniel J. Bernstein and Daira Hopwood and Andreas
                 H{\"u}lsing and Tanja Lange and Ruben Niederhagen and
                 Louiza Papachristodoulou and Michael Schneider and
                 Peter Schwabe and Zooko Wilcox-O'Hearn",
  title =        "{SPHINCS}: Practical Stateless Hash-Based Signatures",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "9056",
  pages =        "368--397",
  year =         "2015",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-662-46800-5_15",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 31 16:23:33 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  URL =          "https://link.springer.com/chapter/10.1007/978-3-662-46800-5_15",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
  journal-URL =  "http://link.springer.com/bookseries/558",
  remark =       "Proceedings of the International Conference on Theory
                 and Applications of Cryptographic Techniques (EUROCRYPT
                 15)",
}

@Article{Bhasin:2015:EFB,
  author =       "Shivam Bhasin and Jean-Luc Danger and Sylvain Guilley
                 and Wei He",
  title =        "Exploiting {FPGA} Block Memories for Protected
                 Cryptographic Implementations",
  journal =      j-TRETS,
  volume =       "8",
  number =       "3",
  pages =        "16:1--16:??",
  month =        may,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2629552",
  ISSN =         "1936-7406 (print), 1936-7414 (electronic)",
  ISSN-L =       "1936-7406",
  bibdate =      "Tue May 19 17:05:24 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/trets.bib",
  abstract =     "Modern field programmable gate arrays (FPGAs) are
                 power packed with features to facilitate designers.
                 Availability of features like large block memory
                 (BRAM), digital signal processing cores, and embedded
                 CPU makes the design strategy of FPGAs quite different
                 from ASICs. FPGAs are also widely used in
                 security-critical applications where protection against
                 known attacks is of prime importance. We focus on
                 physical attacks that target physical implementations.
                 To design countermeasures against such attacks, the
                 strategy for FPGA designers should be different from
                 that in ASIC. The available features should be
                 exploited to design compact and strong countermeasures.
                 In this article, we propose methods to exploit the
                 BRAMs in FPGAs for designing compact countermeasures.
                 Internal BRAM can be used to optimize intrinsic
                 countermeasures such as masking and dual-rail logics,
                 which otherwise have significant overhead (at least $ 2
                 \times $) compared to unprotected ones. The
                 optimizations are applied on a real AES-128
                 co-processor and tested for area overhead and
                 resistance on Xilinx Virtex-5 chips. The presented
                 masking countermeasure has an overhead of only 16\%
                 when applied on AES. Moreover, the dual-rail precharge
                 logic (DPL) countermeasure has been optimized to pack
                 the whole sequential part in the BRAM, hence enhancing
                 the security. Proper robustness evaluations are
                 conducted to analyze the optimization in terms of area
                 and security.",
  acknowledgement = ack-nhfb,
  articleno =    "16",
  fjournal =     "ACM Transactions on Reconfigurable Technology and
                 Systems (TRETS)",
  journal-URL =  "http://portal.acm.org/toc.cfm?id=J1151",
}

@Article{Bidgoly:2015:MQV,
  author =       "Amir Jalaly Bidgoly and Behrouz Tork Ladani",
  title =        "Modelling and Quantitative Verification of Reputation
                 Systems Against Malicious Attackers",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "10",
  pages =        "2567--2582",
  month =        oct,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxu130",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Sep 28 14:49:06 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/10.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/10/2567",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "November 18, 2014",
}

@Article{Blasco:2015:HDT,
  author =       "Jorge Blasco and Juan E. Tapiador and Pedro
                 Peris-Lopez and Guillermo Suarez-Tangil",
  title =        "Hindering data theft with encrypted data trees",
  journal =      j-J-SYST-SOFTW,
  volume =       "101",
  number =       "??",
  pages =        "147--158",
  month =        mar,
  year =         "2015",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Tue Jan 27 06:18:33 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0164121214002775",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212/",
}

@Article{Blondeau:2015:IDA,
  author =       "C{\'e}line Blondeau",
  title =        "Impossible differential attack on $ 13$-round
                 {Camellia-192}",
  journal =      j-INFO-PROC-LETT,
  volume =       "115",
  number =       "9",
  pages =        "660--666",
  month =        sep,
  year =         "2015",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Thu May 28 06:02:28 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019015000472",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190/",
}

@Article{Bollman:2015:PWI,
  author =       "Dorothy Bollman and Alcibiades Bustillo and Einstein
                 Morales",
  title =        "Parallel Watermarking of Images in the Frequency
                 Domain",
  journal =      j-SCPE,
  volume =       "16",
  number =       "2",
  pages =        "205--217",
  month =        "????",
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1895-1767",
  ISSN-L =       "1895-1767",
  bibdate =      "Mon Jan 7 06:46:46 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/scpe.bib",
  URL =          "https://www.scpe.org/index.php/scpe/article/view/1090",
  acknowledgement = ack-nhfb,
  fjournal =     "Scalable Computing: Practice and Experience",
  journal-URL =  "http://www.scpe.org/",
}

@Article{Bonneau:2015:PEI,
  author =       "Joseph Bonneau and Cormac Herley and Paul C. van
                 Oorschot and Frank Stajano",
  title =        "Passwords and the evolution of imperfect
                 authentication",
  journal =      j-CACM,
  volume =       "58",
  number =       "7",
  pages =        "78--87",
  month =        jul,
  year =         "2015",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2699390",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Jul 28 10:56:51 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cacm2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://cacm.acm.org/magazines/2015/7/188731/fulltext",
  abstract =     "Theory on passwords has lagged practice, where large
                 providers use back-end smarts to survive with imperfect
                 technology.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Boorghany:2015:CIL,
  author =       "Ahmad Boorghany and Siavash Bayat Sarmadi and Rasool
                 Jalili",
  title =        "On Constrained Implementation of Lattice-Based
                 Cryptographic Primitives and Schemes on Smart Cards",
  journal =      j-TECS,
  volume =       "14",
  number =       "3",
  pages =        "42:1--42:??",
  month =        apr,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2700078",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Tue Apr 21 17:21:32 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tecs.bib",
  abstract =     "Most lattice-based cryptographic schemes with a
                 security proof suffer from large key sizes and heavy
                 computations. This is also true for the simpler case of
                 authentication protocols that are used on smart cards
                 as a very-constrained computing environment. Recent
                 progress on ideal lattices has significantly improved
                 the efficiency and made it possible to implement
                 practical lattice-based cryptography on constrained
                 devices. However, to the best of our knowledge, no
                 previous attempts have been made to implement
                 lattice-based schemes on smart cards. In this article,
                 we provide the results of our implementation of several
                 state-of-the-art lattice-based authentication protocols
                 on smart cards and a microcontroller widely used in
                 smart cards. Our results show that only a few of the
                 proposed lattice-based authentication protocols can be
                 implemented using limited resources of such constrained
                 devices; however, cutting-edge ones are suitably
                 efficient to be used practically on smart cards.
                 Moreover, we have implemented fast Fourier transform
                 (FFT) and discrete Gaussian sampling with different
                 typical parameter sets, as well as versatile
                 lattice-based public-key encryptions. These results
                 have noticeable points that help to design or optimize
                 lattice-based schemes for constrained devices.",
  acknowledgement = ack-nhfb,
  articleno =    "42",
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J840",
}

@Article{Bouabana-Tebibel:2015:PSE,
  author =       "Thouraya Bouabana-Tebibel and Abdellah Kaci",
  title =        "Parallel search over encrypted data under attribute
                 based encryption on the Cloud Computing",
  journal =      j-COMPUT-SECUR,
  volume =       "54",
  number =       "??",
  pages =        "77--91",
  month =        oct,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:43 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815000577",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bradbury:2015:BSB,
  author =       "D. Bradbury",
  title =        "In blocks [Security {Bitcoin}]",
  journal =      "Engineering Technology",
  volume =       "10",
  number =       "2",
  pages =        "68--71",
  month =        mar,
  year =         "2015",
  DOI =          "https://doi.org/10.1049/et.2015.0208",
  ISSN =         "1750-9637 (print), 1750-9645 (electronic)",
  ISSN-L =       "1750-9637",
  bibdate =      "Thu Nov 30 15:24:52 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  keywords =     "bitcoin; blockchain; computer crime; cryptography;
                 double spending; electronic money; interoperability;
                 open systems; risk management; risk reduction; users
                 funds security",
}

@Article{Brocardo:2015:AVM,
  author =       "Marcelo Luiz Brocardo and Issa Traore and Isaac
                 Woungang",
  title =        "Authorship verification of e-mail and tweet messages
                 applied for continuous authentication",
  journal =      j-J-COMP-SYS-SCI,
  volume =       "81",
  number =       "8",
  pages =        "1429--1440",
  month =        dec,
  year =         "2015",
  CODEN =        "JCSSBM",
  DOI =          "https://doi.org/10.1016/j.jcss.2014.12.019",
  ISSN =         "0022-0000 (print), 1090-2724 (electronic)",
  ISSN-L =       "0022-0000",
  bibdate =      "Tue Jan 29 15:27:30 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsyssci.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0022000014001834",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer and System Sciences",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00220000",
}

@Article{Buchanan:2015:FIW,
  author =       "William J. Buchanan and David Lanc and Elochukwu
                 Ukwandu and Lu Fan and Gordon Russell and Owen Lo",
  title =        "The Future {Internet}: a World of Secret Shares",
  journal =      j-FUTURE-INTERNET,
  volume =       "7",
  number =       "4",
  pages =        "445--464",
  day =          "24",
  month =        nov,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi7040445",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:54 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/7/4/445",
  abstract =     "The Public Key Infrastructure (PKI) is crumbling,
                 partially due to the lack of a strong understanding of
                 how encryption actually works, but also due to
                 weaknesses in its implementation. This paper outlines
                 an Internet storage technique using secret sharing
                 methods which could be used to overcome the problems
                 inherent with PKI, while supporting new types of
                 architectures incorporating such things as automated
                 failover and break-glass data recovery. The paper
                 outlines a novel architecture: SECRET, which supports a
                 robust cloud-based infrastructure with in-built privacy
                 and failover. In order to understand the performance
                 overhead of SECRET, the paper outlines a range of
                 experiments that investigate the overhead of this and
                 other secret share methods.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Internet Security.",
}

@Article{Buckley:2015:RVV,
  author =       "N. Buckley and A. K. Nagar and S. Arumugam",
  title =        "On Real-valued Visual Cryptographic Basis Matrices",
  journal =      j-J-UCS,
  volume =       "21",
  number =       "12",
  pages =        "1536--??",
  month =        "????",
  year =         "2015",
  CODEN =        "????",
  ISSN =         "0948-695X (print), 0948-6968 (electronic)",
  ISSN-L =       "0948-6968",
  bibdate =      "Wed Sep 7 16:47:22 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jucs.bib",
  URL =          "http://www.jucs.org/jucs_21_12/on_real_valued_visual",
  acknowledgement = ack-nhfb,
  fjournal =     "J.UCS: Journal of Universal Computer Science",
  journal-URL =  "http://www.jucs.org/jucs",
}

@Article{Bugliesi:2015:ART,
  author =       "Michele Bugliesi and Stefano Calzavara and Fabienne
                 Eigner and Matteo Maffei",
  title =        "Affine Refinement Types for Secure Distributed
                 Programming",
  journal =      j-TOPLAS,
  volume =       "37",
  number =       "4",
  pages =        "11:1--11:??",
  month =        aug,
  year =         "2015",
  CODEN =        "ATPSDT",
  DOI =          "https://doi.org/10.1145/2743018",
  ISSN =         "0164-0925 (print), 1558-4593 (electronic)",
  ISSN-L =       "0164-0925",
  bibdate =      "Thu Aug 13 17:33:50 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toplas/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/toplas.bib",
  abstract =     "Recent research has shown that it is possible to
                 leverage general-purpose theorem-proving techniques to
                 develop powerful type systems for the verification of a
                 wide range of security properties on application code.
                 Although successful in many respects, these type
                 systems fall short of capturing resource-conscious
                 properties that are crucial in large classes of modern
                 distributed applications. In this article, we propose
                 the first type system that statically enforces the
                 safety of cryptographic protocol implementations with
                 respect to authorization policies expressed in affine
                 logic. Our type system draws on a novel notion of
                 ``exponential serialization'' of affine formulas, a
                 general technique to protect affine formulas from the
                 effect of duplication. This technique allows formulate
                 of an expressive logical encoding of the authentication
                 mechanisms underpinning distributed resource-aware
                 authorization policies. We discuss the effectiveness of
                 our approach on two case studies: the EPMO e-commerce
                 protocol and the Kerberos authentication protocol. We
                 finally devise a sound and complete type-checking
                 algorithm, which is the key to achieving an efficient
                 implementation of our analysis technique.",
  acknowledgement = ack-nhfb,
  articleno =    "11",
  fjournal =     "ACM Transactions on Programming Languages and
                 Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J783",
}

@Article{Bugliesi:2015:CPB,
  author =       "Michele Bugliesi and Stefano Calzavara and Riccardo
                 Focardi and Wilayat Khan",
  title =        "{CookiExt}: Patching the browser against session
                 hijacking attacks",
  journal =      j-J-COMP-SECUR,
  volume =       "23",
  number =       "4",
  pages =        "509--537",
  month =        "????",
  year =         "2015",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-150529",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:43 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Calzavara:2015:SLA,
  author =       "Stefano Calzavara and Gabriele Tolomei and Andrea
                 Casini and Michele Bugliesi and Salvatore Orlando",
  title =        "A Supervised Learning Approach to Protect Client
                 Authentication on the {Web}",
  journal =      j-TWEB,
  volume =       "9",
  number =       "3",
  pages =        "15:1--15:??",
  month =        jun,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2754933",
  ISSN =         "1559-1131 (print), 1559-114X (electronic)",
  ISSN-L =       "1559-1131",
  bibdate =      "Fri Aug 7 10:27:41 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tweb.bib",
  abstract =     "Browser-based defenses have recently been advocated as
                 an effective mechanism to protect potentially insecure
                 web applications against the threats of session
                 hijacking, fixation, and related attacks. In existing
                 approaches, all such defenses ultimately rely on
                 client-side heuristics to automatically detect cookies
                 containing session information, to then protect them
                 against theft or otherwise unintended use. While
                 clearly crucial to the effectiveness of the resulting
                 defense mechanisms, these heuristics have not, as yet,
                 undergone any rigorous assessment of their adequacy. In
                 this article, we conduct the first such formal
                 assessment, based on a ground truth of 2,464 cookies we
                 collect from 215 popular websites of the Alexa ranking.
                 To obtain the ground truth, we devise a semiautomatic
                 procedure that draws on the novel notion of
                 authentication token, which we introduce to capture
                 multiple web authentication schemes. We test existing
                 browser-based defenses in the literature against our
                 ground truth, unveiling several pitfalls both in the
                 heuristics adopted and in the methods used to assess
                 them. We then propose a new detection method based on
                 supervised learning, where our ground truth is used to
                 train a set of binary classifiers, and report on
                 experimental evidence that our method outperforms
                 existing proposals. Interestingly, the resulting
                 classifiers, together with our hands-on experience in
                 the construction of the ground truth, provide new
                 insight on how web authentication is actually
                 implemented in practice.",
  acknowledgement = ack-nhfb,
  articleno =    "15",
  fjournal =     "ACM Transactions on the Web (TWEB)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1062",
}

@Article{Cascudo:2015:SSN,
  author =       "Ignacio Cascudo and Ronald Cramer and Diego Mirandola
                 and Carles Padr{\'o} and Chaoping Xing",
  title =        "On Secret Sharing with Nonlinear Product
                 Reconstruction",
  journal =      j-SIAM-J-DISCR-MATH,
  volume =       "29",
  number =       "2",
  pages =        "1114--1131",
  month =        "????",
  year =         "2015",
  CODEN =        "SJDMEC",
  DOI =          "https://doi.org/10.1137/130931886",
  ISSN =         "0895-4801 (print), 1095-7146 (electronic)",
  ISSN-L =       "0895-4801",
  bibdate =      "Sat Aug 8 07:28:14 MDT 2015",
  bibsource =    "http://epubs.siam.org/sam-bin/dbq/toclist/SIDMA/29/2;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/siamjdiscrmath.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "SIAM Journal on Discrete Mathematics",
  journal-URL =  "http://epubs.siam.org/sidma",
  onlinedate =   "January 2015",
}

@Article{Cass:2015:SE,
  author =       "Stephen Cass",
  title =        "A simple {Enigma}",
  journal =      j-IEEE-SPECTRUM,
  volume =       "52",
  number =       "1",
  pages =        "19--20",
  month =        jan,
  year =         "2015",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.2015.6995623",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 07:02:09 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Ciphers; Cryptography; Electromechanical devices;
                 Enigma cipher machine; Military communication; Military
                 computing",
}

@Article{Cerf:2015:CTN,
  author =       "Vinton G. Cerf",
  title =        "{Cerf}'s up: There is nothing new under the sun",
  journal =      j-CACM,
  volume =       "58",
  number =       "2",
  pages =        "7--7",
  month =        feb,
  year =         "2015",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2714559",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Feb 10 13:56:49 MST 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cacm2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://cacm.acm.org/magazines/2015/2/182649/fulltext",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  keywords =     "cryptography; steganography; Voynich Manuscript;
                 William Friedman",
}

@Article{Chakraborty:2015:SSC,
  author =       "D. Chakraborty and C. Mancillas-Lopez and P. Sarkar",
  title =        "{STES}: A Stream Cipher Based Low Cost Scheme for
                 Securing Stored Data",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "64",
  number =       "9",
  pages =        "2691--2707",
  month =        "????",
  year =         "2015",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2014.2366739",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Mon Sep 28 12:03:47 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Chen:2015:SSS,
  author =       "Yu-Chi Chen",
  title =        "{SPEKS}: Secure Server-Designation Public Key
                 Encryption with Keyword Search against Keyword Guessing
                 Attacks",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "4",
  pages =        "922--933",
  month =        apr,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxu013",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Thu Mar 26 10:33:30 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/4.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/4/922",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "March 5, 2014",
}

@Article{Chen:2015:TCP,
  author =       "Shangdi Chen and Xiaolian Zhang",
  title =        "Three constructions of perfect authentication codes
                 from projective geometry over finite fields",
  journal =      j-APPL-MATH-COMP,
  volume =       "253",
  number =       "??",
  pages =        "308--317",
  day =          "15",
  month =        feb,
  year =         "2015",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Wed Feb 18 09:36:23 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/applmathcomput2015.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0096300314017494",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003/",
}

@Article{Cheng:2015:OMU,
  author =       "Rong Cheng and Fangguo Zhang",
  title =        "Obfuscation for multi-use re-encryption and its
                 application in cloud computing",
  journal =      j-CCPE,
  volume =       "27",
  number =       "8",
  pages =        "2170--2190",
  day =          "10",
  month =        jun,
  year =         "2015",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.3399",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Sat Jul 25 19:54:07 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "1 Oct 2014",
}

@Article{Cho:2015:CBF,
  author =       "Jung-Sik Cho and Young-Sik Jeong and Sang Oh Park",
  title =        "Consideration on the brute-force attack cost and
                 retrieval cost: a hash-based radio-frequency
                 identification {(RFID)} tag mutual authentication
                 protocol",
  journal =      j-COMPUT-MATH-APPL,
  volume =       "69",
  number =       "1",
  pages =        "58--65",
  month =        jan,
  year =         "2015",
  CODEN =        "CMAPDK",
  ISSN =         "0898-1221 (print), 1873-7668 (electronic)",
  ISSN-L =       "0898-1221",
  bibdate =      "Wed Mar 1 21:51:39 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computmathappl2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0898122112001393",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers and Mathematics with Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/08981221",
}

@Article{Chong:2015:SID,
  author =       "Stephen Chong and Christian Skalka and Jeffrey A.
                 Vaughan",
  title =        "Self-Identifying Data for Fair Use",
  journal =      j-JDIQ,
  volume =       "5",
  number =       "3",
  pages =        "11:1--11:??",
  month =        feb,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2687422",
  ISSN =         "1936-1955",
  bibdate =      "Tue Mar 3 14:42:39 MST 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jdqi/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jdiq.bib",
  abstract =     "Public-use earth science datasets are a useful
                 resource with the unfortunate feature that their
                 provenance is easily disconnected from their content.
                 ``Fair-use policies'' typically associated with these
                 datasets require appropriate attribution of providers
                 by users, but sound and complete attribution is
                 difficult if provenance information is lost. To address
                 this, we introduce a technique to directly associate
                 provenance information with sensor datasets. Our
                 technique is similar to traditional watermarking but is
                 intended for application to unstructured time-series
                 datasets. Our approach is potentially imperceptible
                 given sufficient margins of error in datasets and is
                 robust to a number of benign but likely transformations
                 including truncation, rounding, bit-flipping, sampling,
                 and reordering. We provide algorithms for both one-bit
                 and blind mark checking and show how our system can be
                 adapted to various data representation types. Our
                 algorithms are probabilistic in nature and are
                 characterized by both combinatorial and empirical
                 analyses. Mark embedding can be applied at any point in
                 the data life cycle, allowing adaptation of our scheme
                 to social or scientific concerns.",
  acknowledgement = ack-nhfb,
  articleno =    "11",
  fjournal =     "Journal of Data and Information Quality (JDIQ)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1191",
}

@Article{Chretien:2015:SPP,
  author =       "R{\'e}my Chr{\'e}tien and V{\'e}ronique Cortier and
                 St{\'e}phanie Delaune",
  title =        "From Security Protocols to Pushdown Automata",
  journal =      j-TOCL,
  volume =       "17",
  number =       "1",
  pages =        "3:1--3:??",
  month =        dec,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2811262",
  ISSN =         "1529-3785 (print), 1557-945X (electronic)",
  ISSN-L =       "1529-3785",
  bibdate =      "Sat Jan 9 10:42:43 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tocl/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tocl.bib",
  abstract =     "Formal methods have been very successful in analyzing
                 security protocols for reachability properties such as
                 secrecy or authentication. In contrast, there are very
                 few results for equivalence-based properties, crucial
                 for studying, for example, privacy-like properties such
                 as anonymity or vote secrecy. We study the problem of
                 checking equivalence of security protocols for an
                 unbounded number of sessions. Since replication leads
                 very quickly to undecidability (even in the simple case
                 of secrecy), we focus on a limited fragment of
                 protocols (standard primitives but pairs, one variable
                 per protocol's rules) for which the secrecy
                 preservation problem is known to be decidable.
                 Surprisingly, this fragment turns out to be undecidable
                 for equivalence. Then, restricting our attention to
                 deterministic protocols, we propose the first
                 decidability result for checking equivalence of
                 protocols for an unbounded number of sessions. This
                 result is obtained through a characterization of
                 equivalence of protocols in terms of equality of
                 languages of (generalized, real-time) deterministic
                 pushdown automata. We further show that checking for
                 equivalence of protocols is actually equivalent to
                 checking for equivalence of generalized, real-time
                 deterministic pushdown automata. Very recently, the
                 algorithm for checking for equivalence of deterministic
                 pushdown automata has been implemented. We have
                 implemented our translation from protocols to pushdown
                 automata, yielding the first tool that decides
                 equivalence of (some class of) protocols, for an
                 unbounded number of sessions. As an application, we
                 have analyzed some protocols of the literature
                 including a simplified version of the basic access
                 control (BAC) protocol used in biometric passports.",
  acknowledgement = ack-nhfb,
  articleno =    "3",
  fjournal =     "ACM Transactions on Computational Logic",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J773",
}

@Article{Cooke:2015:FSM,
  author =       "Patrick Cooke and Lu Hao and Greg Stitt",
  title =        "Finite-State-Machine Overlay Architectures for Fast
                 {FPGA} Compilation and Application Portability",
  journal =      j-TECS,
  volume =       "14",
  number =       "3",
  pages =        "54:1--54:??",
  month =        apr,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2700082",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Tue Apr 21 17:21:32 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tecs.bib",
  abstract =     "Despite significant advantages, wider usage of
                 field-programmable gate arrays (FPGAs) has been limited
                 by lengthy compilation and a lack of portability.
                 Virtual-architecture overlays have partially addressed
                 these problems, but previous work focuses mainly on
                 heavily pipelined applications with minimal control
                 requirements. We expand previous work by enabling more
                 flexible control via overlay architectures for
                 finite-state machines. Although not appropriate for
                 control-intensive circuits, the presented architectures
                 reduced compilation times of control changes in a
                 convolution case study from 7 hours to less than 1
                 second, with no performance overhead and an area
                 overhead of 0.2\%.",
  acknowledgement = ack-nhfb,
  articleno =    "54",
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J840",
}

@Article{Culnane:2015:VVV,
  author =       "Chris Culnane and Peter Y. A. Ryan and Steve Schneider
                 and Vanessa Teague",
  title =        "{vVote}: a Verifiable Voting System",
  journal =      j-TISSEC,
  volume =       "18",
  number =       "1",
  pages =        "3:1--3:??",
  month =        jun,
  year =         "2015",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/2746338",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Wed Jun 10 08:04:25 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tissec.bib",
  abstract =     "The Pr{\^e}t {\`a} Voter cryptographic voting system
                 was designed to be flexible and to offer voters a
                 familiar and easy voting experience. In this article,
                 we present our development of the Pr{\^e}t {\`a} Voter
                 design to a practical implementation used in a real
                 state election in November 2014, called vVote. As well
                 as solving practical engineering challenges, we have
                 also had to tailor the system to the idiosyncrasies of
                 elections in the Australian state of Victoria and the
                 requirements of the Victorian Electoral Commission.
                 This article includes general background, user
                 experience, and details of the cryptographic protocols
                 and human processes. We explain the problems, present
                 solutions, then analyze their security properties and
                 explain how they tie in to other design decisions.",
  acknowledgement = ack-nhfb,
  articleno =    "3",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@Article{Das:2015:DCS,
  author =       "Debasish Das and Utpal Sharma and D. K.
                 Bhattacharyya",
  title =        "Detection of Cross-Site Scripting Attack under
                 Multiple Scenarios",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "4",
  pages =        "808--822",
  month =        apr,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxt133",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Thu Mar 26 10:33:30 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/4.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/4/808",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "November 14, 2013",
}

@Article{DeCarneDeCarnavalet:2015:LSE,
  author =       "Xavier {De Carn{\'e} De Carnavalet} and Mohammad
                 Mannan",
  title =        "A Large-Scale Evaluation of High-Impact Password
                 Strength Meters",
  journal =      j-TISSEC,
  volume =       "18",
  number =       "1",
  pages =        "1:1--1:??",
  month =        jun,
  year =         "2015",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/2739044",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Wed Jun 10 08:04:25 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tissec.bib",
  abstract =     "Passwords are ubiquitous in our daily digital lives.
                 They protect various types of assets ranging from a
                 simple account on an online newspaper website to our
                 health information on government websites. However, due
                 to the inherent value they protect, attackers have
                 developed insights into cracking/guessing passwords
                 both offline and online. In many cases, users are
                 forced to choose stronger passwords to comply with
                 password policies; such policies are known to alienate
                 users and do not significantly improve password
                 quality. Another solution is to put in place proactive
                 password-strength meters/checkers to give feedback to
                 users while they create new passwords. Millions of
                 users are now exposed to these meters on highly popular
                 web services that use user-chosen passwords for
                 authentication. More recently, these meters are also
                 being built into popular password managers, which
                 protect several user secrets including passwords.
                 Recent studies have found evidence that some meters
                 actually guide users to choose better passwords-which
                 is a rare bit of good news in password research.
                 However, these meters are mostly based on ad hoc
                 design. At least, as we found, most vendors do not
                 provide any explanation for their design choices,
                 sometimes making them appear as a black box. We analyze
                 password meters deployed in selected popular websites
                 and password managers. We document obfuscated
                 source-available meters, infer the algorithm behind the
                 closed-source ones, and measure the strength labels
                 assigned to common passwords from several password
                 dictionaries. From this empirical analysis with
                 millions of passwords, we shed light on how the server
                 end of some web service meters functions and provide
                 examples of highly inconsistent strength outcomes for
                 the same password in different meters, along with
                 examples of many weak passwords being labeled as strong
                 or even excellent. These weaknesses and inconsistencies
                 may confuse users in choosing a stronger password, and
                 thus may weaken the purpose of these meters. On the
                 other hand, we believe these findings may help improve
                 existing meters and possibly make them an effective
                 tool in the long run.",
  acknowledgement = ack-nhfb,
  articleno =    "1",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@Book{Delfs:2015:ICP,
  author =       "Hans Delfs and Helmut Knebl",
  title =        "Introduction to Cryptography: Principles and
                 Applications",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  edition =      "Third",
  pages =        "xx + 508 + 5",
  year =         "2015",
  DOI =          "https://doi.org/10.1007/978-3-662-47974-2",
  ISBN =         "3-662-47973-7 (paper), 3-662-47974-5 (e-book)",
  ISBN-13 =      "978-3-662-47973-5 (paper), 978-3-662-47974-2
                 (e-book)",
  ISSN =         "1619-7100 (print), 2197-845X (electronic)",
  ISSN-L =       "1619-7100",
  LCCN =         "QA76.9.A25; QA76.9.D35",
  bibdate =      "Sat Jun 10 08:35:23 MDT 2017",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  series =       "Information Security and Cryptography",
  URL =          "http://link.springer.com/book/10.1007/978-3-662-47974-2",
  abstract =     "The first part of this book covers the key concepts of
                 cryptography on an undergraduate level, from encryption
                 and digital signatures to cryptographic protocols.
                 Essential techniques are demonstrated in protocols for
                 key exchange, user identification, electronic elections
                 and digital cash. In the second part, more advanced
                 topics are addressed, such as the bit security of
                 one-way functions and computationally perfect
                 pseudorandom bit generators. The security of
                 cryptographic schemes is a central topic. Typical
                 examples of provably secure encryption and signature
                 schemes and their security proofs are given. Though
                 particular attention is given to the mathematical
                 foundations, no special background in mathematics is
                 presumed. The necessary algebra, number theory and
                 probability theory are included in the appendix. Each
                 chapter closes with a collection of exercises. In the
                 second edition the authors added a complete description
                 of the AES, an extended section on cryptographic hash
                 functions, and new sections on random oracle proofs and
                 public-key encryption schemes that are provably secure
                 against adaptively-chosen-ciphertext attacks. The third
                 edition is a further substantive extension, with new
                 topics added, including: elliptic curve cryptography;
                 Paillier encryption; quantum cryptography; the new
                 SHA-3 standard for cryptographic hash functions; a
                 considerably extended section on electronic elections
                 and Internet voting; mix nets; and zero-knowledge
                 proofs of shuffles. The book is appropriate for
                 undergraduate and graduate students in computer
                 science, mathematics, and engineering.",
  acknowledgement = ack-nhfb,
  shorttableofcontents = "Introduction \\
                 Symmetric-Key Encryption \\
                 Public-Key Cryptography \\
                 Cryptographic Protocols \\
                 Probabilistic Algorithms \\
                 One-Way Functions and the Basic Assumptions \\
                 Bit Security of One-Way Functions \\
                 One-Way Functions and Pseudorandomness \\
                 Provably Secure Encryption \\
                 Unconditional Security of Cryptosystems \\
                 Provably Secure Digital Signatures \\
                 App. A, Algebra and Number Theory \\
                 App. B, Probabilities and Information Theory \\
                 References \\
                 Index",
  subject =      "Computer science; Informatique; Computer security;
                 S{\'e}curit{\'e} informatique; Data structures
                 (Computer science); Structures de donn{\'e}es
                 (Informatique); Mathematics; Math{\'e}matiques; Number
                 theory; Th{\'e}orie des nombres; Computer science;
                 Mathematics; Computer security; Data structures
                 (Computer science); Number theory.",
  tableofcontents = "1. Introduction / 1 \\
                 1.1 Encryption and Secrecy / 1 \\
                 1.2 The Objectives of Cryptography / 2 \\
                 1.3 Attacks / 4 \\
                 1.4 Cryptographic Protocols / 5 \\
                 1.5 Provable Security / 6 \\
                 2. Symmetric-Key Cryptography / 11 \\
                 2.1 Symmetric-Key Encryption / 11 \\
                 2.1.1 Stream Ciphers / 12 \\
                 2.1.2 Block Ciphers / 15 \\
                 2.1.3 DES / 16 \\
                 2.1.4 AES / 19 \\
                 2.1.5 Modes of Operation / 25 \\
                 2.2 Cryptographic Hash Functions / 30 \\
                 2.2.1 Security Requirements for Hash Functions / 30 \\
                 2.2.2 Construction of Hash Functions / 32 \\
                 2.2.3 Data Integrity and Message Authentication / 42
                 \\
                 2.2.4 Hash Functions as Random Functions / 44 \\
                 3. Public-Key Cryptography / 49 \\
                 3.1 The Concept of Public-Key Cryptography / 49 \\
                 3.2 Modular Arithmetic / 51 \\
                 3.2.1 The Integers / 51 \\
                 3.2.2 The Integers Modulo n / 53 \\
                 3.3 RSA : / 58 \\
                 3.3.1 Key Generation and Encryption / 58 \\
                 3.3.2 Attacks Against RSA Encryption / 62 \\
                 3.3.3 Probabilistic RSA Encryption / 67 \\
                 3.3.4 Digital Signatures The Basic Scheme / 70 \\
                 3.3.5 Signatures with Hash Functions / 71 \\
                 3.4 The Discrete Logarithm / 77 \\
                 3.4.1 ElGamal Encryption / 77 \\
                 3.4.2 ElGamal Signatures / 78 \\
                 3.4.3 Digital Signature Algorithm / 80 \\
                 3.4.4 ElGamal Encryption in a Prime-Order Subgroup / 82
                 \\
                 3.5 Modular Squaring / 85 \\
                 3.5.1 Rabin's Encryption / 85 \\
                 3.5.2 Rabin's Signature Scheme / 86 \\
                 3.6 Homomorphic Encryption Algorithms / 87 \\
                 3.6.1 ElGamal Encryption / 87 \\
                 3.6.2 Paillier Encryption / 88 \\
                 3.6.3 Re-encryption of Ciphertexts / 89 \\
                 3.7 Elliptic Curve Cryptography / 90 \\
                 3.7.1 Selecting the Curve and the Base Point / 93 \\
                 3.7.2 Diffie-Hellman Key Exchange / 98 \\
                 3.7.3 ElGamal Encryption / 100 \\
                 3.7.4 Elliptic Curve Digital Signature Algorithm / 102
                 \\
                 4. Cryptographic Protocols / 107 \\
                 4.1 Key Exchange and Entity Authentication / 107 \\
                 4.1.1 Kerberos / 108 \\
                 4.1.2 Diffie-Hellman Key Agreement Ill 4.1.3 Key
                 Exchange and Mutual Authentication / 112 \\
                 4.1.4 Station-to-Station Protocol / 114 \\
                 4.1.5 Public-Key Management Techniques / 115 \\
                 4.2 Identification Schemes / 117 \\
                 4.2.1 Interactive Proof Systems / 117 \\
                 4.2.2 Simplified Fiat--Shamir Identification Scheme /
                 119 \\
                 4.2.3 Zero-Knowledge / 121 \\
                 4.2.4 Fiat--Shamir Identification Scheme / 123 \\
                 4.2.5 Fiat--Shamir Signature Scheme / 125 \\
                 4.3 Commitment Schemes / 126 \\
                 4.3.1 A Commitment Scheme Based on Quadratic Residues /
                 127 \\
                 4.3.2 A Commitment Scheme Based on Discrete Logarithms
                 / 128 \\
                 4.3.3 Homomorphic Commitments / 129 \\
                 4.4 Secret Sharing / 130 \\
                 4.5 Verifiable Electronic Elections / 133 \\
                 4.5.1 A Multi-authority Election Scheme / 135 \\
                 4.5.2 Proofs of Knowledge / 138 \\
                 4.5.3 Non-interactive Proofs of Knowledge / 142 \\
                 4.5.4 Extension to Multi-way Elections / 143 \\
                 4.5.5 Eliminating the Trusted Center / 144 \\
                 4.6 Mix Nets and Shuffles / 146 \\
                 4.6.1 Decryption Mix Nets / 147 \\
                 4.6.2 Re-encryption Mix Nets / 150 \\
                 4.6.3 Proving Knowledge of the Plaintext / 153 \\
                 4.6.4 Zero-Knowledge Proofs of Shuffles / 154 \\
                 4.7 Receipt-Free and Coercion-Resistant Elections / 168
                 \\
                 4.7.1 Receipt-Freeriess by Randomized Re-encryption /
                 169 \\
                 4.7.2 A Coercion-Resistant Protocol / 176 \\
                 4.8 Digital Cash / 184 \\
                 4.8.1 Blindly Issued Proofs / 186 \\
                 4.8.2 A Fair Electronic Cash System / 192 \\
                 4.8.3 Underlying Problems / 197 \\
                 5. Probabilistic Algorithms / 203 \\
                 5.1 Coin-Tossing Algorithms / 203 \\
                 5.2 Monte Carlo and Las Vegas Algorithms / 208 \\
                 6. One-Way Functions and the Basic Assumptions / 215
                 \\
                 6.1 A Notation for Probabilities / 216 \\
                 6.2 Discrete Exponential Function / 217 \\
                 6.3 Uniform Sampling Algorithms / 223 \\
                 6.4 Modular Powers / 226 \\
                 6.5 Modular Squaring / 229 \\
                 6.6 Quadratic Residuosity Property / 230 \\
                 6.7 Formal Definition of One-Way Functions / 231 \\
                 6.8 Hard-Core Predicates / 235 \\
                 7. Bit Security of One-Way Functions / 243 \\
                 7.1 Bit Security of the Exp Family / 243 \\
                 7.2 Bit Security of the RSA Family / 250 \\
                 7.3 Bit Security of the Square Family / 258 \\
                 8. One-Way Functions and Pseudorandomness / 267 \\
                 8.1 Computationally Perfect Pseudorandom Bit Generators
                 / 267 \\
                 8.2 Yao's Theorem / 275 \\
                 9. Provably Secure Encryption / 283 \\
                 9.1 Classical Information-Theoretic Security / 284 \\
                 9.2 Perfect Secrecy and Probabilistic Attacks / 288 \\
                 9.3 Public-Key One-Time Pads / 292 \\
                 9.4 Passive Eavesdroppers / 294 \\
                 9.5 Chosen-Ciphertext Attacks / 301 \\
                 9.5.1 A Security Proof in the Random Oracle Model / 304
                 \\
                 9.5.2 Security Under Standard Assumptions / 313 \\
                 10. Unconditional Security of Cryptosystems / 321 \\
                 10.1 The Bounded Storage Model / 322 \\
                 10.2 The Noisy Channel Model / 332 \\
                 10.3 Unconditionally Secure Message Authentication /
                 333 \\
                 10.3.1 Almost Universal Classes of Hash Functions / 333
                 \\
                 10.3.2 Message Authentication with Universal Hash
                 Families / 335 \\
                 10.3.3 Authenticating Multiple Messages / 336 \\
                 10.4 Collision Entropy and Privacy Amplification / 337
                 \\
                 10.4.1 Renyi Entropy / 338 \\
                 10.4.2 Privacy Amplification / 340 \\
                 10.4.3 Extraction of a Secret Key / 341 \\
                 10.5 Quantum Key Distribution / 343 \\
                 10.5.1 Quantum Bits and Quantum Measurements / 344 \\
                 10.5.2 The BB84 Protocol / 350 \\
                 10.5.3 Estimation of the Error Rate / 353 \\
                 10.5.4 Intercept-and-Resend Attacks / 354 \\
                 10.5.5 Information Reconciliation / 362 \\
                 10.5.6 Exchanging a Secure Key - An Example / 367 \\
                 10.5.7 General Attacks and Security Proofs / 368 \\
                 11. Provably Secure Digital Signatures / 373 \\
                 11.1 Attacks and Levels of Security / 373 \\
                 11.2 Claw-Free Pairs and Collision-Resistant Hash
                 Functions / 376 \\
                 11.3 Authentication-Tree-Based Signatures / 379 \\
                 11.4 A State-Free Signature Scheme / 381 \\
                 A. Algebra and Number Theory / 397 \\
                 A.l The Integers / 397 \\
                 A.2 Residues / 403 \\
                 A.3 The Chinese Remainder Theorem / 407 \\
                 A.4 Primitive Roots and the Discrete Logarithm / 409
                 \\
                 A.5 Polynomials and Finite Fields / 413 \\
                 A.5.1 The Ring of Polynomials / 413 \\
                 A.5.2 Residue Class Rings / 415 \\
                 A.5.3 Finite Fields / 417 \\
                 A.6 Solving Quadratic Equations in Binary Fields / 419
                 \\
                 A.7 Quadratic Residues / 421 \\
                 A.8 Modular Square Roots / 426 \\
                 A.9 The Group Z*n2 / 430 \\
                 A.10 Primes and Primality Tests / 432 \\
                 A. 11 Elliptic Curves / 437 \\
                 A. 11.1 Plane Curves / 438 \\
                 A.11.2 Normal Forms of Elliptic Curves / 446 \\
                 A. 11.3 Point Addition on Elliptic Curves / 449 \\
                 A.11.4 Group Order and Group Structure of Elliptic
                 Curves / 455 \\
                 B. Probabilities and Information Theory / 459 \\
                 B.l Finite Probability Spaces and Random Variables /
                 459 \\
                 B.2 Some Useful and Important Inequalities / 467 \\
                 B.3 The Weak Law of Large Numbers / 470 \\
                 B.4 Distance Measures / 472 \\
                 B.5 Basic Concepts of Information Theory / 476 \\
                 References / 483 \\
                 Index / 501",
}

@Article{DeLuca:2015:SUS,
  author =       "Alexander {De Luca} and Janne Lindqvist",
  title =        "Is Secure and Usable {Smartphone} Authentication
                 Asking Too Much?",
  journal =      j-COMPUTER,
  volume =       "48",
  number =       "5",
  pages =        "64--68",
  month =        may,
  year =         "2015",
  CODEN =        "CPTRB4",
  DOI =          "https://doi.org/10.1109/MC.2015.134",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Tue Jun 9 06:31:54 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computer2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://csdl.computer.org/csdl/mags/co/2015/05/mco2015050064-abs.html",
  abstract-URL = "http://csdl.computer.org/csdl/mags/co/2015/05/mco2015050064-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
}

@Article{Dimitrakakis:2015:ELA,
  author =       "Christos Dimitrakakis and Aikaterini Mitrokotsa and
                 Serge Vaudenay",
  title =        "Expected loss analysis for authentication in
                 constrained channels",
  journal =      j-J-COMP-SECUR,
  volume =       "23",
  number =       "3",
  pages =        "309--329",
  month =        "????",
  year =         "2015",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-140521",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:40 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Ding:2015:CWF,
  author =       "Lin Ding and Chenhui Jin and Jie Guan and Shaowu Zhang
                 and Ting Cui and Dong Han and Wei Zhao",
  title =        "Cryptanalysis of {WG} Family of Stream Ciphers",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "10",
  pages =        "2677--2685",
  month =        oct,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxv024",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Sep 28 14:49:06 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/10.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/10/2677",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "April 20, 2015",
}

@Article{Djuric:2015:FSF,
  author =       "Zoran Djuric and Dragan Gasevic",
  title =        "{FEIPS}: a Secure Fair-Exchange Payment System for
                 {Internet} Transactions",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "10",
  pages =        "2537--2556",
  month =        oct,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxu120",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Sep 28 14:49:06 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/10.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/10/2537",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "November 5, 2014",
}

@Article{Dong:2015:SSS,
  author =       "Xin Dong and Jiadi Yu and Yanmin Zhu and Yingying Chen
                 and Yuan Luo and Minglu Li",
  title =        "{SECO}: Secure and scalable data collaboration
                 services in cloud computing",
  journal =      j-COMPUT-SECUR,
  volume =       "50",
  number =       "??",
  pages =        "91--105",
  month =        may,
  year =         "2015",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2015.01.003",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:41 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815000048",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Doroz:2015:AFH,
  author =       "Y. Doroz and E. Ozturk and B. Sunar",
  title =        "Accelerating Fully Homomorphic Encryption in
                 Hardware",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "64",
  number =       "6",
  pages =        "1509--1521",
  month =        "????",
  year =         "2015",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2014.2345388",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Wed Jun 10 07:41:35 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Doychev:2015:CTS,
  author =       "Goran Doychev and Boris K{\"o}pf and Laurent Mauborgne
                 and Jan Reineke",
  title =        "{CacheAudit}: a Tool for the Static Analysis of Cache
                 Side Channels",
  journal =      j-TISSEC,
  volume =       "18",
  number =       "1",
  pages =        "4:1--4:??",
  month =        jun,
  year =         "2015",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/2756550",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Wed Jun 10 08:04:25 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tissec.bib",
  abstract =     "We present CacheAudit, a versatile framework for the
                 automatic, static analysis of cache side channels.
                 CacheAudit takes as input a program binary and a cache
                 configuration and derives formal, quantitative security
                 guarantees for a comprehensive set of side-channel
                 adversaries, namely, those based on observing cache
                 states, traces of hits and misses, and execution times.
                 Our technical contributions include novel abstractions
                 to efficiently compute precise overapproximations of
                 the possible side-channel observations for each of
                 these adversaries. These approximations then yield
                 upper bounds on the amount of information that is
                 revealed. In case studies, we apply CacheAudit to
                 binary executables of algorithms for sorting and
                 encryption, including the AES implementation from the
                 PolarSSL library, and the reference implementations of
                 the finalists of the eSTREAM stream cipher competition.
                 The results we obtain exhibit the influence of cache
                 size, line size, associativity, replacement policy, and
                 coding style on the security of the executables and
                 include the first formal proofs of security for
                 implementations with countermeasures such as preloading
                 and data-independent memory access patterns.",
  acknowledgement = ack-nhfb,
  articleno =    "4",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@Article{Dreier:2015:BFP,
  author =       "Jannik Dreier and Jean-Guillaume Dumas and Pascal
                 Lafourcade",
  title =        "{Brandt}'s fully private auction protocol revisited",
  journal =      j-J-COMP-SECUR,
  volume =       "23",
  number =       "5",
  pages =        "587--610",
  month =        "????",
  year =         "2015",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-150535",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:46 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Durcheva:2015:SAI,
  author =       "Mariana Durcheva",
  title =        "Some applications of idempotent semirings in public
                 key cryptography",
  journal =      j-ACM-COMM-COMP-ALGEBRA,
  volume =       "49",
  number =       "1",
  pages =        "19--19",
  month =        mar,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2768577.2768600",
  ISSN =         "1932-2232 (print), 1932-2240 (electronic)",
  ISSN-L =       "1932-2232",
  bibdate =      "Thu Apr 30 16:35:04 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigsam.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Communications in Computer Algebra",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1000",
}

@Article{Ebadi:2015:DPN,
  author =       "Hamid Ebadi and David Sands and Gerardo Schneider",
  title =        "Differential Privacy: Now it's Getting Personal",
  journal =      j-SIGPLAN,
  volume =       "50",
  number =       "1",
  pages =        "69--81",
  month =        jan,
  year =         "2015",
  CODEN =        "SINODQ",
  DOI =          "https://doi.org/10.1145/2775051.2677005",
  ISSN =         "0362-1340 (print), 1523-2867 (print), 1558-1160
                 (electronic)",
  ISSN-L =       "0362-1340",
  bibdate =      "Tue May 12 17:41:19 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigplan2010.bib",
  abstract =     "Differential privacy provides a way to get useful
                 information about sensitive data without revealing much
                 about any one individual. It enjoys many nice
                 compositionality properties not shared by other
                 approaches to privacy, including, in particular,
                 robustness against side-knowledge. Designing
                 differentially private mechanisms from scratch can be a
                 challenging task. One way to make it easier to
                 construct new differential private mechanisms is to
                 design a system which allows more complex mechanisms
                 (programs) to be built from differentially private
                 building blocks in principled way, so that the
                 resulting programs are guaranteed to be differentially
                 private by construction. This paper is about a new
                 accounting principle for building differentially
                 private programs. It is based on a simple
                 generalisation of classic differential privacy which we
                 call Personalised Differential Privacy (PDP). In PDP
                 each individual has its own personal privacy level. We
                 describe ProPer, a interactive system for implementing
                 PDP which maintains a privacy budget for each
                 individual. When a primitive query is made on data
                 derived from individuals, the provenance of the
                 involved records determines how the privacy budget of
                 an individual is affected: the number of records
                 derived from Alice determines the multiplier for the
                 privacy decrease in Alice's budget. This offers some
                 advantages over previous systems, in particular its
                 fine-grained character allows better utilisation of the
                 privacy budget than mechanisms based purely on the
                 concept of global sensitivity, and it applies naturally
                 to the case of a live database where new individuals
                 are added over time. We provide a formal model of the
                 ProPer approach, prove that it provides personalised
                 differential privacy, and describe a prototype
                 implementation based on McSherry's PINQ system.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGPLAN Notices",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J706",
  remark =       "POPL '15 conference proceedings.",
}

@Article{El-Razouk:2015:NHI,
  author =       "H. El-Razouk and A. Reyhani-Masoleh and Guang Gong",
  title =        "New Hardware Implementations of {WG} and {WG}-
                 {StreamCiphers} Using Polynomial Basis",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "64",
  number =       "7",
  pages =        "2020--2035",
  month =        jul,
  year =         "2015",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2014.2346207",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Sat Aug 1 08:53:41 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{English:2015:SME,
  author =       "Rosanne English",
  title =        "Simulating and modelling the effectiveness of
                 graphical password intersection attacks",
  journal =      j-CCPE,
  volume =       "27",
  number =       "12",
  pages =        "3089--3107",
  day =          "25",
  month =        aug,
  year =         "2015",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.3196",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Sat Jul 25 19:54:09 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "18 Dec 2013",
}

@Article{Enos:2015:IBS,
  author =       "Graham Enos and Yuliang Zheng",
  title =        "An {ID}-based signcryption scheme with compartmented
                 secret sharing for unsigncryption",
  journal =      j-INFO-PROC-LETT,
  volume =       "115",
  number =       "2",
  pages =        "128--133",
  month =        feb,
  year =         "2015",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Thu Nov 20 09:46:44 MST 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019014001537",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190/",
}

@Article{Fallahpour:2015:AWB,
  author =       "M. Fallahpour and D. Megias",
  title =        "Audio Watermarking Based on {Fibonacci} Numbers",
  journal =      j-IEEE-ACM-TASLP,
  volume =       "23",
  number =       "8",
  pages =        "1273--1282",
  month =        aug,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/TASLP.2015.2430818",
  ISSN =         "2329-9290",
  ISSN-L =       "2329-9290",
  bibdate =      "Mon Oct 5 06:29:45 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/fibquart.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeeacmtaslp.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE\slash ACM Transactions on Audio, Speech, and
                 Language Processing",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6570655",
}

@Article{Fan:2015:IRD,
  author =       "Xinyu Fan and Guomin Yang and Yi Mu and Yong Yu",
  title =        "On Indistinguishability in Remote Data Integrity
                 Checking",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "4",
  pages =        "823--830",
  month =        apr,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxt137",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Thu Mar 26 10:33:30 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/4.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/4/823",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "November 17, 2013",
}

@Article{Fanti:2015:SVS,
  author =       "Giulia Fanti and Peter Kairouz and Sewoong Oh and
                 Pramod Viswanath",
  title =        "Spy vs. Spy: Rumor Source Obfuscation",
  journal =      j-SIGMETRICS,
  volume =       "43",
  number =       "1",
  pages =        "271--284",
  month =        jun,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2796314.2745866",
  ISSN =         "0163-5999 (print), 1557-9484 (electronic)",
  ISSN-L =       "0163-5999",
  bibdate =      "Fri Sep 18 06:59:51 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigmetrics.bib",
  abstract =     "Anonymous messaging platforms, such as Secret, Yik Yak
                 and Whisper, have emerged as important social media for
                 sharing one's thoughts without the fear of being judged
                 by friends, family, or the public. Further, such
                 anonymous platforms are crucial in nations with
                 authoritarian governments; the right to free expression
                 and sometimes the personal safety of the author of the
                 message depend on anonymity. Whether for fear of
                 judgment or personal endangerment, it is crucial to
                 keep anonymous the identity of the user who initially
                 posted a sensitive message. In this paper, we consider
                 an adversary who observes a snapshot of the spread of a
                 message at a certain time. Recent advances in rumor
                 source detection shows that the existing messaging
                 protocols are vulnerable against such an adversary. We
                 introduce a novel messaging protocol, which we call
                 adaptive diffusion, and show that it spreads the
                 messages fast and achieves a perfect obfuscation of the
                 source when the underlying contact network is an
                 infinite regular tree: all users with the message are
                 nearly equally likely to have been the origin of the
                 message. Experiments on a sampled Facebook network show
                 that it effectively hides the location of the source
                 even when the graph is finite, irregular and has
                 cycles.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGMETRICS Performance Evaluation Review",
  journal-URL =  "http://portal.acm.org/toc.cfm?id=J618",
}

@Article{Farash:2015:PSE,
  author =       "Mohammad Sabzinejad Farash and Sk Hafizul Islam and
                 Mohammad S. Obaidat",
  title =        "A provably secure and efficient two-party
                 password-based explicit authenticated key exchange
                 protocol resistance to password guessing attacks",
  journal =      j-CCPE,
  volume =       "27",
  number =       "17",
  pages =        "4897--4913",
  day =          "10",
  month =        dec,
  year =         "2015",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.3477",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Tue Feb 9 06:13:20 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "17 Mar 2015",
}

@Article{Ferreira:2015:LPA,
  author =       "Anselmo Ferreira and Luiz C. Navarro and Giuliano
                 Pinheiro and Jefersson A. dos Santos and Anderson
                 Rocha",
  title =        "Laser printer attribution: Exploring new features and
                 beyond",
  journal =      "Forensic Science International",
  volume =       "247",
  number =       "0",
  pages =        "105--125",
  year =         "2015",
  DOI =          "https://doi.org/10.1016/j.forsciint.2014.11.030",
  ISSN =         "0379-0738",
  bibdate =      "Wed Jan 28 10:08:12 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/benfords-law.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  note =         "See also \cite{Jiang:2010:NMS}.",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0379073814005064",
  abstract =     "With a huge amount of printed documents nowadays,
                 identifying their source is useful for criminal
                 investigations and also to authenticate digital copies
                 of a document. In this paper, we propose novel
                 techniques for laser printer attribution. Our solutions
                 do not need very high resolution scanning of the
                 investigated document and explore the multidirectional,
                 multiscale and low-level gradient texture patterns
                 yielded by printing devices. The main contributions of
                 this work are: (1) the description of printed areas
                 using multidirectional and multiscale co-occurring
                 texture patterns; (2) description of texture on
                 low-level gradient areas by a convolution texture
                 gradient filter that emphasizes textures in specific
                 transition areas and (3) the analysis of printer
                 patterns in segments of interest, which we call frames,
                 instead of whole documents or only printed letters. We
                 show by experiments in a well documented dataset that
                 the proposed methods outperform techniques described in
                 the literature and present near-perfect classification
                 accuracy being very promising for deployment in
                 real-world forensic investigations.",
  acknowledgement = ack-nhfb,
  keywords =     "Banding; Benford's Law; Printer forensics; Texture
                 patterns",
}

@Article{Fiore:2015:EIB,
  author =       "Ugo Fiore and Francesco Rossi",
  title =        "Embedding an Identity-Based Short Signature as a
                 Digital Watermark",
  journal =      j-FUTURE-INTERNET,
  volume =       "7",
  number =       "4",
  pages =        "393--404",
  day =          "23",
  month =        oct,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi7040393",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:54 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/7/4/393",
  abstract =     "Digital watermarking aims at protecting multimedia
                 content by hiding into it some data that can be used
                 for such purposes as, for example, intellectual
                 property protection or integrity control. Sometimes,
                 the owner of an image would prefer to not transmit,
                 publish, or hand to a cloud service the original image,
                 but rather an encrypted version of it. Encrypted images
                 allow for less embedding room with respect to their
                 unencrypted counterparts, as there is less spatial
                 correlation to leverage upon. An architecture for
                 embedding as payload the digital signature of an
                 encrypted image, by means of a reversible watermarking
                 technique, is presented in this work. A noteworthy
                 point is the use of an identity-based cryptosystem to
                 avoid certificate management and improve performance.
                 In addition, the use of IBS-1, a recently proposed
                 signature scheme, allows for a reduction in the size of
                 the signature.",
  acknowledgement = ack-nhfb,
}

@Article{Fisher:2015:CS,
  author =       "Charles Fisher",
  title =        "Cipher security",
  journal =      j-LINUX-J,
  volume =       "2015",
  number =       "257",
  pages =        "2:1--2:??",
  month =        sep,
  year =         "2015",
  CODEN =        "LIJOFX",
  ISSN =         "1075-3583 (print), 1938-3827 (electronic)",
  ISSN-L =       "1075-3583",
  bibdate =      "Tue Dec 8 06:34:02 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/linux-journal.bib",
  URL =          "http://dl.acm.org/ft_gateway.cfm?id=2846057",
  abstract =     "Best-practice approaches to close known exploits and
                 strengthen communication security.",
  acknowledgement = ack-nhfb,
  articleno =    "2",
  fjournal =     "Linux Journal",
  journal-URL =  "http://portal.acm.org/citation.cfm?id=J508",
}

@Article{Forbes:2015:CTC,
  author =       "Michael A. Forbes and Amir Shpilka",
  title =        "Complexity Theory Column 88: Challenges in Polynomial
                 Factorization",
  journal =      j-SIGACT,
  volume =       "46",
  number =       "4",
  pages =        "32--49",
  month =        dec,
  year =         "2015",
  CODEN =        "SIGNDM",
  DOI =          "https://doi.org/10.1145/2852040.2852051",
  ISSN =         "0163-5700 (print), 1943-5827 (electronic)",
  bibdate =      "Tue Feb 16 11:18:42 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib",
  abstract =     "Algebraic complexity theory studies the complexity of
                 computing (multivariate) polynomials efficiently using
                 algebraic circuits. This succinct representation leads
                 to fundamental algorithmic challenges such as the
                 polynomial identity testing (PIT) problem (decide
                 nonzeroness of the computed polynomial) and the
                 polynomial factorization problem (compute succinct
                 representations of the factors of the circuit). While
                 the Schwartz-Zippel-DeMillo-Lipton Lemma
                 [Sch80,Zip79,DL78] gives an easy randomized algorithm
                 for PIT, randomized algorithms for factorization
                 require more ideas as given by Kaltofen [Kal89].
                 However, even derandomizing PIT remains a fundamental
                 problem in understanding the power of randomness. In
                 this column, we survey the factorization problem,
                 discussing the algorithmic ideas as well as the
                 applications to other problems. We then discuss the
                 challenges ahead, in particular focusing on the goal of
                 obtaining deterministic factoring algorithms. While
                 deterministic PIT algorithms have been developed for
                 various restricted circuit classes, there are very few
                 corresponding factoring algorithms. We discuss some
                 recent progress on the divisibility testing problem
                 (test if a given polynomial divides another given
                 polynomial) which captures some of the difficulty of
                 factoring. Along the way we attempt to highlight key
                 challenges whose solutions we hope will drive progress
                 in the area.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGACT News",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J697",
}

@Article{Frattolillo:2015:WPP,
  author =       "Franco Frattolillo",
  title =        "Watermarking Protocols: Problems, Challenges and a
                 Possible Solution",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "4",
  pages =        "944--960",
  month =        apr,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxu015",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Thu Mar 26 10:33:30 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/4.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/4/944",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "March 13, 2014",
}

@Article{Fu:2015:TVG,
  author =       "Dong Lai Fu and Xin Guang Peng and Yu Li Yang",
  title =        "Trusted Validation for Geolocation of Cloud Data",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "10",
  pages =        "2595--2607",
  month =        oct,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxu144",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Sep 28 14:49:06 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/10.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/10/2595",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "December 15, 2014",
}

@Article{Gao:2015:GCC,
  author =       "Wei Gao and Guilin Wang and Xueli Wang and Kefei
                 Chen",
  title =        "Generic Construction of Certificate-Based Encryption
                 from Certificateless Encryption Revisited",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "10",
  pages =        "2747--2757",
  month =        oct,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxv045",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Sep 28 14:49:06 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/10.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/10/2747",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "July 1, 2015",
}

@Article{Garcia-Martinez:2015:HEB,
  author =       "M. Garc{\'\i}a-Mart{\'\i}nez and L. J.
                 Onta{\~n}{\'o}n-Garc{\'\i}a and E. Campos-Cant{\'o}n
                 and S. Celikovsk{\'y}",
  title =        "Hyperchaotic encryption based on multi-scroll
                 piecewise linear systems",
  journal =      j-APPL-MATH-COMP,
  volume =       "270",
  number =       "??",
  pages =        "413--424",
  day =          "1",
  month =        nov,
  year =         "2015",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Thu Nov 5 06:24:28 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/applmathcomput2015.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0096300315010929",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003/",
}

@Article{Garcia-Morchon:2015:HCR,
  author =       "Oscar Garc{\'\i}a-Morch{\'o}n and Ronald Rietman and
                 Ludo Tolhuizen and Domingo G{\'o}mez and Jaime
                 Guti{\'e}rrez",
  title =        "{HIMMO}: a collusion-resistant identity-based scheme
                 for symmetric key generation",
  journal =      j-ACM-COMM-COMP-ALGEBRA,
  volume =       "49",
  number =       "1",
  pages =        "19--19",
  month =        mar,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2768577.2768601",
  ISSN =         "1932-2232 (print), 1932-2240 (electronic)",
  ISSN-L =       "1932-2232",
  bibdate =      "Thu Apr 30 16:35:04 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigsam.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Communications in Computer Algebra",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1000",
}

@Article{Giambruno:2015:GGB,
  author =       "Laura Giambruno and Sabrina Mantaci and Jean
                 N{\'e}raud and Carla Selmi",
  title =        "A Generalization of {Girod}'s Bidirectional Decoding
                 Method to Codes with a Finite Deciphering Delay",
  journal =      j-INT-J-FOUND-COMP-SCI,
  volume =       "26",
  number =       "6",
  pages =        "733--??",
  month =        sep,
  year =         "2015",
  CODEN =        "IFCSEN",
  DOI =          "https://doi.org/10.1142/S0129054115500410",
  ISSN =         "0129-0541",
  ISSN-L =       "0129-0541",
  bibdate =      "Sat Nov 7 08:40:07 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijfcs.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Foundations of Computer
                 Science (IJFCS)",
  journal-URL =  "http://www.worldscientific.com/loi/ijfcs",
}

@Misc{Giry:2015:BCK,
  author =       "Damien Giry",
  title =        "BlueKrypt Cryptographic Key Length Recommendation",
  howpublished = "Web site",
  day =          "26",
  month =        feb,
  year =         "2015",
  bibdate =      "Fri May 01 17:26:51 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.keylength.com/",
  abstract =     "In most cryptographic functions, the key length is an
                 important security parameter. Both academic and private
                 organizations provide recommendations and mathematical
                 formulas to approximate the minimum key size
                 requirement for security. Despite the availability of
                 these publications, choosing an appropriate key size to
                 protect your system from attacks remains a headache as
                 you need to read and understand all these papers.

                 This web site implements mathematical formulas and
                 summarizes reports from well-known organizations
                 allowing you to quickly evaluate the minimum security
                 requirements for your system. You can also easily
                 compare all these techniques and find the appropriate
                 key length for your desired level of protection. The
                 lengths provided here are designed to resist
                 mathematical attacks; they do not take algorithmic
                 attacks, hardware flaws, etc. into account.",
  acknowledgement = ack-nhfb,
}

@Article{Gope:2015:RLA,
  author =       "Prosanta Gope and Tzonelih Hwang",
  title =        "A realistic lightweight authentication protocol
                 preserving strong anonymity for securing {RFID}
                 system",
  journal =      j-COMPUT-SECUR,
  volume =       "55",
  number =       "??",
  pages =        "271--280",
  month =        nov,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:43 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815000681",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gorbunov:2015:ABE,
  author =       "Sergey Gorbunov and Vinod Vaikuntanathan and Hoeteck
                 Wee",
  title =        "Attribute-Based Encryption for Circuits",
  journal =      j-J-ACM,
  volume =       "62",
  number =       "6",
  pages =        "45:1--45:??",
  month =        dec,
  year =         "2015",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/2824233",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  bibdate =      "Mon Dec 21 17:57:46 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "In an attribute-based encryption (ABE) scheme, a
                 ciphertext is associated with an $l$-bit public index
                 ind and a message $m$, and a secret key is associated
                 with a Boolean predicate $P$. The secret key allows
                 decrypting the ciphertext and learning $m$ if and only
                 if $ P({\rm ind}) = 1$. Moreover, the scheme should be
                 secure against collusions of users, namely, given
                 secret keys for polynomially many predicates, an
                 adversary learns nothing about the message if none of
                 the secret keys can individually decrypt the
                 ciphertext. We present attribute-based encryption
                 schemes for circuits of any arbitrary polynomial size,
                 where the public parameters and the ciphertext grow
                 linearly with the depth of the circuit. Our
                 construction is secure under the standard learning with
                 errors (LWE) assumption. Previous constructions of
                 attribute-based encryption were for Boolean formulas,
                 captured by the complexity class NC$^1$. In the course
                 of our construction, we present a new framework for
                 constructing ABE schemes. As a by-product of our
                 framework, we obtain ABE schemes for polynomial-size
                 branching programs, corresponding to the complexity
                 class LOGSPACE, under quantitatively better
                 assumptions.",
  acknowledgement = ack-nhfb,
  articleno =    "45",
  fjournal =     "Journal of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J401",
}

@Article{Gravier:2015:WOD,
  author =       "Sylvain Gravier and J{\'e}r{\^o}me Javelle and Mehdi
                 Mhalla and Simon Perdrix",
  title =        "On weak odd domination and graph-based quantum secret
                 sharing",
  journal =      j-THEOR-COMP-SCI,
  volume =       "598",
  number =       "??",
  pages =        "129--137",
  day =          "20",
  month =        sep,
  year =         "2015",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Wed Sep 16 10:32:16 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2015.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0304397515004806",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975/",
}

@Article{Gregio:2015:TTM,
  author =       "Andr{\'e} Ricardo Abed Gr{\'e}gio and Vitor Monte
                 Afonso and Dario Sim{\~o}es Fernandes Filho and Paulo
                 L{\'\i}cio de Geus and Mario Jino",
  title =        "Toward a Taxonomy of Malware Behaviors",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "10",
  pages =        "2758--2777",
  month =        oct,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxv047",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Sep 28 14:49:06 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/10.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/10/2758",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "July 13, 2015",
}

@Article{Grimes:2015:CCT,
  author =       "William Grimes",
  title =        "Cracking Codes through the Centuries",
  journal =      j-NY-TIMES,
  volume =       "??",
  number =       "??",
  pages =        "??--??",
  day =          "4",
  month =        feb,
  year =         "2015",
  CODEN =        "NYTIAO",
  ISSN =         "0362-4331 (print), 1542-667X, 1553-8095",
  ISSN-L =       "0362-4331",
  bibdate =      "Thu Feb 05 06:20:13 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "New York Times",
  journal-URL =  "http://www.nytimes.com/",
  keywords =     "Enigma; Sigaba",
  remark =       "This article describes the exhibition ``Decoding the
                 Renaissance: 500 Years of Codes and Ciphers'' at the
                 Folger Shakespeare Library during February 2015.",
}

@Article{Gu:2015:EIB,
  author =       "Ke Gu and Weijia Jia and Chunlin Jiang",
  title =        "Efficient Identity-Based Proxy Signature in the
                 Standard Model",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "4",
  pages =        "792--807",
  month =        apr,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxt132",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Thu Mar 26 10:33:30 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/4.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/4/792",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "November 11, 2013",
}

@Article{Gupta:2015:GEM,
  author =       "Vinay Gupta",
  title =        "Guest Eof: a machine for keeping secrets?",
  journal =      j-LINUX-J,
  volume =       "2015",
  number =       "254",
  pages =        "7:1--7:??",
  month =        jun,
  year =         "2015",
  CODEN =        "LIJOFX",
  ISSN =         "1075-3583 (print), 1938-3827 (electronic)",
  ISSN-L =       "1075-3583",
  bibdate =      "Tue Sep 22 17:33:58 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/linux-journal.bib",
  URL =          "http://dl.acm.org/ft_gateway.cfm?id=2807685",
  acknowledgement = ack-nhfb,
  articleno =    "7",
  fjournal =     "Linux Journal",
  journal-URL =  "http://portal.acm.org/citation.cfm?id=J508",
}

@Article{Guyeux:2015:ECS,
  author =       "Christophe Guyeux and Rapha{\"e}l Couturier and
                 Pierre-Cyrille H{\'e}am",
  title =        "Efficient and cryptographically secure generation of
                 chaotic pseudorandom numbers on {GPU}",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "71",
  number =       "10",
  pages =        "3877--3903",
  month =        oct,
  year =         "2015",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-015-1479-8",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Tue Sep 29 10:07:24 MDT 2015",
  bibsource =    "http://link.springer.com/journal/11227/71/10;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://link.springer.com/article/10.1007/s11227-015-1479-8",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Article{Hald:2015:RRA,
  author =       "David Hald and Alex Udakis",
  title =        "Rethinking remote authentication: time to kiss tokens
                 goodbye?",
  journal =      j-NETWORK-SECURITY,
  volume =       "2015",
  number =       "6",
  pages =        "15--17",
  month =        jun,
  year =         "2015",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(15)30050-7",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 17:01:20 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485815300507",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Hardesty:2015:BAC,
  author =       "Larry Hardesty",
  title =        "A basis for all cryptography",
  journal =      "{R\&D} Magazine",
  volume =       "??",
  number =       "??",
  pages =        "??--??",
  day =          "28",
  month =        oct,
  year =         "2015",
  bibdate =      "Wed Oct 28 09:03:25 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.rdmag.com/news/2015/10/basis-all-cryptography",
  acknowledgement = ack-nhfb,
  keywords =     "functional encryption; indistinguishability
                 obfuscation",
}

@Article{Harn:2015:DTS,
  author =       "Lein Harn and Ching-Fang Hsu",
  title =        "Dynamic threshold secret reconstruction and its
                 application to the threshold cryptography",
  journal =      j-INFO-PROC-LETT,
  volume =       "115",
  number =       "11",
  pages =        "851--857",
  month =        nov,
  year =         "2015",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Sat Jul 25 09:11:21 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019015001106",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190/",
}

@Article{He:2015:IEI,
  author =       "Debiao He and Mingwu Zhang and Baowen Xu",
  title =        "Insecurity of an Efficient Identity-Based Proxy
                 Signature in the Standard Model",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "10",
  pages =        "2507--2508",
  month =        oct,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxu097",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Sep 28 14:49:06 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/10.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/10/2507",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "September 26, 2014",
}

@Article{He:2015:SSQ,
  author =       "Zhian He and Wai Kit Wong and Ben Kao and David Wai
                 Lok Cheung and Rongbin Li and Siu Ming Yiu and Eric
                 Lo",
  title =        "{SDB}: a secure query processing system with data
                 interoperability",
  journal =      j-PROC-VLDB-ENDOWMENT,
  volume =       "8",
  number =       "12",
  pages =        "1876--1879",
  month =        aug,
  year =         "2015",
  CODEN =        "VLDBFR",
  DOI =          "https://doi.org/10.14778/2824032.2824090",
  ISSN =         "2150-8097",
  ISSN-L =       "2150-8097",
  bibdate =      "Wed Sep 16 18:23:11 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/vldbe.bib",
  abstract =     "We address security issues in a cloud database system
                 which employs the DBaaS model --- a data owner (DO)
                 exports data to a cloud database service provider (SP).
                 To provide data security, sensitive data is encrypted
                 by the DO before it is uploaded to the SP. Compared to
                 existing secure query processing systems like CryptDB
                 [7] and MONOMI [8], in which data operations (e.g.,
                 comparison or addition) are supported by specialized
                 encryption schemes, our demo system, SDB, is
                 implemented based on a set of data-interoperable secure
                 operators, i.e., the output of an operator can be used
                 as input of another operator. As a result, SDB can
                 support a wide range of complex queries (e.g., all
                 TPC-H queries) efficiently. In this demonstration, we
                 show how our SDB prototype supports secure query
                 processing on complex workload like TPC-H. We also
                 demonstrate how our system protects sensitive
                 information from malicious attackers.",
  acknowledgement = ack-nhfb,
  fjournal =     "VLDB Journal: Very Large Data Bases",
  journal-URL =  "http://portal.acm.org/toc.cfm?id=J869",
}

@Article{Heath:2015:HNS,
  author =       "Nick Heath",
  title =        "Hacking the {Nazis}: The secret story of the women who
                 broke {Hitler}'s codes",
  journal =      "TechRepublic",
  volume =       "??",
  number =       "??",
  pages =        "??--??",
  day =          "26",
  month =        mar,
  year =         "2015",
  bibdate =      "Tue Apr 21 11:09:42 2015",
  bibsource =    "https://www.math.utah.edu/pub/bibnet/authors/t/turing-alan-mathison.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.techrepublic.com/article/the-women-who-helped-crack-nazi-codes-at-bletchley-park/",
  acknowledgement = ack-nhfb,
}

@Article{Hinarejos:2015:MES,
  author =       "M. Francisca Hinarejos and Andreu Pere Isern-Dey{\`a}
                 and Josep-Llu{\'\i}s Ferrer-Gomila and Magdalena
                 Payeras-Capell{\`a}",
  title =        "{MC-2D}: an Efficient and Scalable Multicoupon
                 Scheme",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "4",
  pages =        "758--778",
  month =        apr,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxt119",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Thu Mar 26 10:33:30 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/4.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/4/758",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "October 14, 2013",
}

@Article{Hmood:2015:ACA,
  author =       "Haider Salim Hmood and Zhitang Li and Hasan Khalaf
                 Abdulwahid and Yang Zhang",
  title =        "Adaptive Caching Approach to Prevent {DNS} Cache
                 Poisoning Attack",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "4",
  pages =        "973--985",
  month =        apr,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxu023",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Thu Mar 26 10:33:30 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/4.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/4/973",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "April 7, 2014",
}

@Article{Hoffmann:2015:LBQb,
  author =       "Leah Hoffmann",
  title =        "Last byte: {Q\&A}: A Passion for Pairings",
  journal =      j-CACM,
  volume =       "58",
  number =       "9",
  pages =        "128--ff",
  month =        sep,
  year =         "2015",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2800615",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Aug 27 19:08:25 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cacm2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://cacm.acm.org/magazines/2015/9/191171/fulltext",
  abstract =     "Dan Boneh on pairing-based cryptography, multilinear
                 maps, and how an 1,800-year-old ``intellectual
                 curiosity'' became the foundation of all secure network
                 traffic.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Hong:2015:RSM,
  author =       "Wien Hong and Gwoboa Horng and Chih-Wei Shiu and
                 Tung-Shou Chen and Yu-Chi Chen",
  title =        "Reversible Steganographic Method Using Complexity
                 Control and Human Visual System",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "10",
  pages =        "2583--2594",
  month =        oct,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxu142",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Sep 28 14:49:06 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/10.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/10/2583",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "December 2, 2014",
}

@Article{Howe:2015:PLB,
  author =       "James Howe and Thomas P{\"o}ppelmann and M{\'a}ire
                 O'Neill and Elizabeth O'Sullivan and Tim G{\"u}neysu",
  title =        "Practical Lattice-Based Digital Signature Schemes",
  journal =      j-TECS,
  volume =       "14",
  number =       "3",
  pages =        "41:1--41:??",
  month =        apr,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2724713",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Tue Apr 21 17:21:32 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tecs.bib",
  abstract =     "Digital signatures are an important primitive for
                 building secure systems and are used in most real-world
                 security protocols. However, almost all popular
                 signature schemes are either based on the factoring
                 assumption (RSA) or the hardness of the discrete
                 logarithm problem (DSA/ECDSA). In the case of classical
                 cryptanalytic advances or progress on the development
                 of quantum computers, the hardness of these closely
                 related problems might be seriously weakened. A
                 potential alternative approach is the construction of
                 signature schemes based on the hardness of certain
                 lattice problems that are assumed to be intractable by
                 quantum computers. Due to significant research
                 advancements in recent years, lattice-based schemes
                 have now become practical and appear to be a very
                 viable alternative to number-theoretic cryptography. In
                 this article, we focus on recent developments and the
                 current state of the art in lattice-based digital
                 signatures and provide a comprehensive survey
                 discussing signature schemes with respect to
                 practicality. Additionally, we discuss future research
                 areas that are essential for the continued development
                 of lattice-based cryptography.",
  acknowledgement = ack-nhfb,
  articleno =    "41",
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J840",
}

@Article{Hua:2015:TSE,
  author =       "Guang Hua and J. Goh and V. L. L. Thing",
  title =        "Time-Spread Echo-Based Audio Watermarking With
                 Optimized Imperceptibility and Robustness",
  journal =      j-IEEE-ACM-TASLP,
  volume =       "23",
  number =       "2",
  pages =        "227--239",
  month =        feb,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/TASLP.2014.2387385",
  ISSN =         "2329-9290",
  ISSN-L =       "2329-9290",
  bibdate =      "Mon Oct 5 06:29:42 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeeacmtaslp.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE\slash ACM Transactions on Audio, Speech, and
                 Language Processing",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6570655",
}

@Article{Huang:2015:CEA,
  author =       "Xinyi Huang and J. K. Liu and Shaohua Tang and Yang
                 Xiang and Kaitai Liang and Li Xu and Jianying Zhou",
  title =        "Cost-Effective Authentic and Anonymous Data Sharing
                 with Forward Security",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "64",
  number =       "4",
  pages =        "971--983",
  month =        apr,
  year =         "2015",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2014.2315619",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Thu Jun 4 19:46:38 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Huang:2015:MSE,
  author =       "Chanying Huang and Hwaseong Lee and Hyoseung Kim and
                 Dong Hoon Lee",
  title =        "{mvSERS}: a Secure Emergency Response Solution for
                 Mobile Healthcare in Vehicular Environments",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "10",
  pages =        "2461--2475",
  month =        oct,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxu083",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Sep 28 14:49:06 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/10.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/10/2461",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "August 24, 2014",
}

@Article{Huang:2015:PAP,
  author =       "Kaibin Huang and Raylin Tso and Yu-Chi Chen and Sk Md
                 Mizanur Rahman and Ahmad Almogren and Atif Alamri",
  title =        "{PKE-AET}: Public Key Encryption with Authorized
                 Equality Test",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "10",
  pages =        "2686--2697",
  month =        oct,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxv025",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Sep 28 14:49:06 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/10.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/10/2686",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "April 20, 2015",
}

@Article{Imai:2015:IRR,
  author =       "Shigeyoshi Imai and Kaoru Kurosawa",
  title =        "Improved reconstruction of {RSA} private-keys from
                 their fraction",
  journal =      j-INFO-PROC-LETT,
  volume =       "115",
  number =       "6--8",
  pages =        "630--632",
  month =        jun # "\slash " # aug,
  year =         "2015",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Thu May 28 06:03:49 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019015000368",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190/",
}

@Article{Islam:2015:LFP,
  author =       "Sk Hafizul Islam and Fagen Li",
  title =        "Leakage-Free and Provably Secure Certificateless
                 Signcryption Scheme Using Bilinear Pairings",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "10",
  pages =        "2636--2648",
  month =        oct,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxv002",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Sep 28 14:49:06 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/10.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/10/2636",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "January 30, 2015",
}

@Article{Islam:2015:MBA,
  author =       "Md Saiful Islam and Naif Alajlan",
  title =        "Model-based Alignment of Heartbeat Morphology for
                 Enhancing Human Recognition Capability",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "10",
  pages =        "2622--2635",
  month =        oct,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxu150",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Sep 28 14:49:06 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/10.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/10/2622",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "December 15, 2014",
}

@Article{Jin:2015:NCD,
  author =       "Chunhua Jin and Chunxiang Xu and Fagen Li and Xiaojun
                 Zhang",
  title =        "A novel certificateless deniable authentication
                 protocol",
  journal =      j-INT-J-COMPUT-APPL,
  volume =       "37",
  number =       "3-4",
  pages =        "181--192",
  year =         "2015",
  DOI =          "https://doi.org/10.1080/1206212X.2016.1188564",
  ISSN =         "1206-212X (print), 1925-7074 (electronic)",
  ISSN-L =       "1206-212X",
  bibdate =      "Sat Apr 21 17:30:08 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijca.bib",
  URL =          "https://www.tandfonline.com/doi/full/10.1080/1206212X.2016.1188564",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Computer Applications",
  journal-URL =  "https://www.tandfonline.com/loi/tjca20",
  online-date =  "06 Jun 2016",
}

@Article{Jogenfors:2015:HBT,
  author =       "Jonathan Jogenfors and Ashraf Mohamed Elhassan and
                 Johan Ahrens and Mohamed Bourennane and Jan-{\AA}ke
                 Larsson",
  title =        "Hacking the {Bell} Test Using Classical Light in
                 Energy--Time Entanglement-Based Quantum Key
                 Distribution",
  journal =      j-SCI-ADV,
  volume =       "1",
  number =       "11",
  pages =        "e1500793",
  day =          "18",
  month =        dec,
  year =         "2015",
  CODEN =        "SACDAF",
  DOI =          "https://doi.org/10.1126/sciadv.1500793",
  ISSN =         "2375-2548",
  ISSN-L =       "2375-2548",
  bibdate =      "Mon Jan 18 15:09:00 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://advances.sciencemag.org/content/1/11/e1500793",
  acknowledgement = ack-nhfb,
  fjournal =     "Science Advances",
  journal-URL =  "http://advances.sciencemag.org/content/by/year",
}

@Book{Johnson:2015:NGA,
  author =       "Kevin Wade Johnson",
  title =        "The neglected giant: {Agnes Meyer Driscoll}",
  volume =       "10",
  publisher =    "National Security Agency, Center for Cryptologic
                 History",
  address =      "Fort George G. Meade, MD, USA",
  pages =        "66",
  year =         "2015",
  LCCN =         "????",
  bibdate =      "Thu Dec 28 09:50:21 MST 2017",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  series =       "Center for Cryptologic History special series",
  abstract =     "Although Agnes May Meyer, later Agnes May Driscoll,
                 was the Navy's principal cryptanalyst of many years,
                 spent over 40 years in cryptology, became a member of
                 the Cryptologic Hall of Honor, and has principal credit
                 for personally breaking two major codes\slash ciphers,
                 she was curiously neglected during her career and
                 after. Never credited with as much as she believed was
                 her due, never promoted in grade with her peers, even
                 now she is not always ranked with those she regarded as
                 peers. Although considered one of the giants of
                 American cryptology, she is nevertheless rarely
                 mentioned in the same breath as a William Friedman or a
                 Laurance Safford, even though she began her code and
                 cipher work in 1918, contemporary with Friedman. Should
                 she be ranked with them? Has she been neglected by
                 history? We will consider exactly that.",
  acknowledgement = ack-nhfb,
  subject =      "Driscoll, Alice Meyer; Cryptographers; United States;
                 Biography",
  subject-dates = "1889--1971",
}

@Article{Kanwal:2015:TTM,
  author =       "Ayesha Kanwal and Rahat Masood and Muhammad Awais
                 Shibli and Rafia Mumtaz",
  title =        "Taxonomy for Trust Models in Cloud Computing",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "4",
  pages =        "601--626",
  month =        apr,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxu138",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Thu Mar 26 10:33:30 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/4.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/4/601",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "December 8, 2014",
}

@Article{Karakoc:2015:AKA,
  author =       "F. Karako{\c{c}} and H. Demirci and A. E. Harmanci",
  title =        "{AKF}: a key alternating {Feistel} scheme for
                 lightweight cipher designs",
  journal =      j-INFO-PROC-LETT,
  volume =       "115",
  number =       "2",
  pages =        "359--367",
  month =        feb,
  year =         "2015",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Thu Nov 20 09:46:44 MST 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019014002257",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190/",
}

@Book{Katz:2015:IMC,
  author =       "Jonathan Katz and Yehuda Lindell",
  title =        "Introduction to modern cryptography",
  publisher =    pub-TAYLOR-FRANCIS,
  address =      pub-TAYLOR-FRANCIS:adr,
  edition =      "Second",
  pages =        "583",
  year =         "2015",
  ISBN =         "1-4665-7026-1 (hardcover)",
  ISBN-13 =      "978-1-4665-7026-9 (hardcover)",
  LCCN =         "QA76.9.A25 K36 2014",
  bibdate =      "Sat Aug 15 16:27:31 MDT 2020",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  series =       "Chapman and hall/CRC cryptography and network security
                 series",
  abstract =     "Cryptography is ubiquitous and plays a key role in
                 ensuring data secrecy and integrity as well as in
                 securing computer systems more broadly. Introduction to
                 Modern Cryptography provides a rigorous yet accessible
                 treatment of this fascinating subject. The authors
                 introduce the core principles of modern cryptography,
                 with an emphasis on formal definitions, clear
                 assumptions, and rigorous proofs of security. The book
                 begins by focusing on private-key cryptography,
                 including an extensive treatment of private-key
                 encryption, message authentication codes, and hash
                 functions. The authors also present design principles
                 for widely used stream ciphers and block ciphers
                 including RC4, DES, and AES, plus provide provable
                 constructions of stream ciphers and block ciphers from
                 lower-level primitives. The second half of the book
                 covers public-key cryptography, beginning with a
                 self-contained introduction to the number theory needed
                 to understand the RSA, Diffie--Hellman, and El Gamal
                 cryptosystems (and others), followed by a thorough
                 treatment of several standardized public-key encryption
                 and digital signature schemes. Integrating a more
                 practical perspective without sacrificing rigor, this
                 widely anticipated Second Edition offers improved
                 treatment of: Stream ciphers and block ciphers,
                 including modes of operation and design principles;
                 Authenticated encryption and secure communication
                 sessions; Hash functions, including hash-function
                 applications and design principles Attacks on poorly
                 implemented cryptography, including attacks on
                 chained-CBC encryption, padding-oracle attacks, and
                 timing attacks. The random-oracle model and its
                 application to several standardized, widely used
                 public-key encryption and signature schemes;
                 Elliptic-curve cryptography and associated standards
                 such as DSA/ECDSA and DHIES/ECIES Containing updated
                 exercises and worked examples, Introduction to Modern
                 Cryptography, Second Edition can serve as a textbook.",
  acknowledgement = ack-nhfb,
  subject =      "Computer security; Cryptography; COMPUTERS; Operating
                 Systems; General.; Security; Cryptography.;
                 MATHEMATICS; Combinatorics.; Computer security;
                 Cryptography",
  tableofcontents = "I: Introduction and classical cryptography \\
                 1: Introduction \\
                 2: Perfectly secret encryption \\
                 II: Private-key (symmetric) cryptography \\
                 3: Private-key encryption \\
                 4: Message authentication codes \\
                 5: Hash functions and applications \\
                 6: Practical constructions of symmetric-key primitives
                 \\
                 7: *Theoretical constructions of symmetric-key
                 primitives \\
                 III: Public-key (asymmetric) cryptography \\
                 8: Number theory and cryptographic hardness assumptions
                 \\
                 9: *Algorithms for factoring and computing discrete
                 logarithms \\
                 10: Key management and the public-key revolution \\
                 11: Public-key encryption \\
                 12: Digital signature schemes \\
                 13: *Advanced topics in public-key encryption \\
                 Index of common notation \\
                 Appendix A: Mathematical background \\
                 Appendix B: Basic algorithmic number theory",
}

@Article{Kawamoto:2015:LSH,
  author =       "Junpei Kawamoto",
  title =        "A Locality Sensitive Hashing Filter for Encrypted
                 Vector Databases",
  journal =      j-FUND-INFO,
  volume =       "137",
  number =       "2",
  pages =        "291--304",
  month =        apr,
  year =         "2015",
  CODEN =        "FUMAAJ",
  DOI =          "https://doi.org/10.3233/FI-2015-1180",
  ISSN =         "0169-2968 (print), 1875-8681 (electronic)",
  ISSN-L =       "0169-2968",
  bibdate =      "Sat Mar 5 17:20:24 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/fundinfo2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Fundamenta Informaticae",
  journal-URL =  "http://content.iospress.com/journals/fundamenta-informaticae",
}

@Article{Keblusek:2015:BRK,
  author =       "Marika Keblusek",
  title =        "Book Review: {Kristie Macrakis, \booktitle{Prisoners,
                 Lovers, and Spies: The Story of Invisible Ink from
                 Herodotus to Al-Qaeda}}",
  journal =      j-ISIS,
  volume =       "106",
  number =       "3",
  pages =        "692--693",
  month =        sep,
  year =         "2015",
  CODEN =        "ISISA4",
  DOI =          "https://doi.org/10.1086/683195",
  ISSN =         "0021-1753 (print), 1545-6994 (electronic)",
  ISSN-L =       "0021-1753",
  bibdate =      "Thu Nov 12 18:41:59 MST 2015",
  bibsource =    "http://www.jstor.org/action/showPublication?journalCode=isis;
                 http://www.jstor.org/stable/10.1086/681973;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/isis2010.bib",
  URL =          "http://www.jstor.org/stable/10.1086/683195",
  acknowledgement = ack-nhfb,
  fjournal =     "Isis",
  journal-URL =  "http://www.jstor.org/page/journal/isis/about.html",
}

@Article{Kent:2015:AGA,
  author =       "Alexander D. Kent and Lorie M. Liebrock and Joshua C.
                 Neil",
  title =        "Authentication graphs: Analyzing user behavior within
                 an enterprise network",
  journal =      j-COMPUT-SECUR,
  volume =       "48",
  number =       "??",
  pages =        "150--166",
  month =        feb,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:40 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814001321",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Khan:2015:CMB,
  author =       "Abdul Nasir Khan and M. L. Mat Kiah and Mazhar Ali",
  title =        "A Cloud-Manager-Based Re-Encryption Scheme for Mobile
                 Users in Cloud Environment: a Hybrid Approach",
  journal =      j-J-GRID-COMP,
  volume =       "13",
  number =       "4",
  pages =        "651--675",
  month =        dec,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10723-015-9352-9",
  ISSN =         "1570-7873 (print), 1572-9184 (electronic)",
  ISSN-L =       "1570-7873",
  bibdate =      "Thu Apr 7 10:29:30 MDT 2016",
  bibsource =    "http://link.springer.com/journal/10723/13/4;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jgridcomp.bib",
  URL =          "http://link.springer.com/article/10.1007/s10723-015-9352-9",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Grid Computing",
  journal-URL =  "http://link.springer.com/journal/10723",
}

@Article{Kim:2015:CEH,
  author =       "Y. Kim",
  title =        "Comments on {``An Efficient Homomorphic MAC with Small
                 Key Size for Authentication in Network Coding}",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "64",
  number =       "12",
  pages =        "3619--3620",
  month =        "????",
  year =         "2015",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2015.2409859",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Mon Nov 9 17:50:21 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  note =         "See \cite{Cheng:2013:EHM}.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@TechReport{Koblitz:2015:RWE,
  author =       "Neal Koblitz and Alfred J. Menezes",
  title =        "A Riddle Wrapped in an Enigma",
  type =         "Report",
  institution =  "????",
  address =      "????",
  pages =        "1--20",
  day =          "1",
  month =        nov,
  year =         "2015",
  bibdate =      "Mon Nov 16 05:55:00 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://eprint.iacr.org/2015/1018.pdf",
  abstract =     "In August 2015 the U.S. National Security Agency (NSA)
                 released a major policy statement on the need for
                 post-quantum cryptography (PQC). This announcement will
                 be a great stimulus to the development,
                 standardization, and commercialization of new
                 quantumsafe algorithms. However, certain peculiarities
                 in the wording and timing of the statement have puzzled
                 many people and given rise to much speculation
                 concerning the NSA, elliptic curve cryptography (ECC),
                 and quantum-safe cryptography. Our purpose is to
                 attempt to evaluate some of the theories that have been
                 proposed.",
  acknowledgement = ack-nhfb,
}

@Article{Kong:2015:CSM,
  author =       "Jia Hao Kong and Li-Minn Ang and Kah Phooi Seng",
  title =        "A comprehensive survey of modern symmetric
                 cryptographic solutions for resource constrained
                 environments",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "49",
  number =       "??",
  pages =        "15--50",
  month =        mar,
  year =         "2015",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Wed Jan 28 15:45:20 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804514002136",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Netw. Comput. Appl.",
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Kumar:2015:RGB,
  author =       "Sachin Kumar and Rajendra Kumar Sharma",
  title =        "Random-Grid Based Region Incrementing Visual Secret
                 Sharing",
  journal =      j-FUND-INFO,
  volume =       "137",
  number =       "3",
  pages =        "369--386",
  month =        jul,
  year =         "2015",
  CODEN =        "FUMAAJ",
  DOI =          "https://doi.org/10.3233/FI-2015-1185",
  ISSN =         "0169-2968 (print), 1875-8681 (electronic)",
  ISSN-L =       "0169-2968",
  bibdate =      "Sat Mar 5 17:20:31 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/fundinfo2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Fundamenta Informaticae",
  journal-URL =  "http://content.iospress.com/journals/fundamenta-informaticae",
}

@Article{Kupcu:2015:OAS,
  author =       "Alptekin K{\"u}p{\c{c}}{\"u}",
  title =        "Official Arbitration with Secure Cloud Storage
                 Application",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "4",
  pages =        "831--852",
  month =        apr,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxt138",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Thu Mar 26 10:33:30 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/4.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/4/831",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "December 5, 2013",
}

@Article{Lackey:2015:UHP,
  author =       "Scott Lackey",
  title =        "Using {\tt hiera} with {\tt puppet}",
  journal =      j-LINUX-J,
  volume =       "2015",
  number =       "251",
  pages =        "1:1--1:??",
  month =        mar,
  year =         "2015",
  CODEN =        "LIJOFX",
  ISSN =         "1075-3583 (print), 1938-3827 (electronic)",
  ISSN-L =       "1075-3583",
  bibdate =      "Thu Apr 2 16:27:46 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/linux-journal.bib",
  URL =          "http://dl.acm.org/ft_gateway.cfm?id=2754912",
  abstract =     "Use Hiera to encrypt sensitive data in Puppet.",
  acknowledgement = ack-nhfb,
  articleno =    "1",
  fjournal =     "Linux Journal",
  journal-URL =  "http://portal.acm.org/citation.cfm?id=J508",
}

@Article{Lathey:2015:IEE,
  author =       "Ankita Lathey and Pradeep K. Atrey",
  title =        "Image Enhancement in Encrypted Domain over Cloud",
  journal =      j-TOMCCAP,
  volume =       "11",
  number =       "3",
  pages =        "38:1--38:??",
  month =        jan,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2656205",
  ISSN =         "1551-6857 (print), 1551-6865 (electronic)",
  ISSN-L =       "1551-6857",
  bibdate =      "Thu Feb 5 17:03:39 MST 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tomccap/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tomccap.bib",
  abstract =     "Cloud-based multimedia systems are becoming
                 increasingly common. These systems offer not only
                 storage facility, but also high-end computing
                 infrastructure which can be used to process data for
                 various analysis tasks ranging from low-level data
                 quality enhancement to high-level activity and behavior
                 identification operations. However, cloud data centers,
                 being third party servers, are often prone to
                 information leakage, raising security and privacy
                 concerns. In this article, we present a Shamir's secret
                 sharing based method to enhance the quality of
                 encrypted image data over cloud. Using the proposed
                 method we show that several image enhancement
                 operations such as noise removal, antialiasing, edge
                 and contrast enhancement, and dehazing can be performed
                 in encrypted domain with near-zero loss in accuracy and
                 minimal computation and data overhead. Moreover, the
                 proposed method is proven to be information
                 theoretically secure.",
  acknowledgement = ack-nhfb,
  articleno =    "38",
  fjournal =     "ACM Transactions on Multimedia Computing,
                 Communications, and Applications",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J961",
}

@Article{Lazarus:2015:RE,
  author =       "M. Lazarus",
  title =        "Radar everywhere",
  journal =      j-IEEE-SPECTRUM,
  volume =       "52",
  number =       "2",
  pages =        "52--59",
  month =        feb,
  year =         "2015",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.2015.7024512",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 07:02:09 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Aircraft; aircraft detection; app-based ride sharing;
                 Command and control systems; cryptocurrencies;
                 government regulators; History; innovation; innovation
                 management; Military communications; modern industrial
                 society; radar applications; radar speed guns; Radar
                 tracking; technologies-including drones",
}

@Article{Lee:2015:SAS,
  author =       "Kwangsu Lee and Dong Hoon Lee and Moti Yung",
  title =        "Sequential aggregate signatures with short public keys
                 without random oracles",
  journal =      j-THEOR-COMP-SCI,
  volume =       "579",
  number =       "??",
  pages =        "100--125",
  day =          "10",
  month =        may,
  year =         "2015",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Thu Apr 2 07:37:28 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2015.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0304397515001164",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975/",
}

@Article{Lee:2015:TSS,
  author =       "Cheng-Chi Lee and Yan-Ming Lai",
  title =        "Toward a Secure Single Sign-On Mechanism for
                 Distributed Computer Networks",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "4",
  pages =        "934--943",
  month =        apr,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxu014",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Thu Mar 26 10:33:30 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/4.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/4/934",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "March 2, 2014",
}

@Article{Li:2015:ANA,
  author =       "Jie Li and Huang Lu and Mohsen Guizani",
  title =        "{ACPN}: A Novel Authentication Framework with
                 Conditional Privacy-Preservation and Non-Repudiation
                 for {VANETs}",
  journal =      j-IEEE-TRANS-PAR-DIST-SYS,
  volume =       "26",
  number =       "4",
  pages =        "938--948",
  month =        apr,
  year =         "2015",
  CODEN =        "ITDSEO",
  DOI =          "https://doi.org/10.1109/TPDS.2014.2308215",
  ISSN =         "1045-9219 (print), 1558-2183 (electronic)",
  ISSN-L =       "1045-9219",
  bibdate =      "Thu Jun 4 19:34:08 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranspardistsys.bib",
  URL =          "http://csdl.computer.org/csdl/trans/td/2015/04/06748095-abs.html",
  abstract-URL = "http://csdl.computer.org/csdl/trans/td/2015/04/06748095-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://www.computer.org/tpds/archives.htm",
}

@Article{Li:2015:CEH,
  author =       "Chen Li and Le Chen and Rongxing Lu and Hui Li",
  title =        "Comment on {``An Efficient Homomorphic MAC with Small
                 Key Size for Authentication in Network Coding''}",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "64",
  number =       "3",
  pages =        "882--883",
  month =        mar,
  year =         "2015",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2015.2389800",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Tue Mar 17 18:41:22 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  note =         "See \cite{Cheng:2013:EHM}.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Li:2015:FSC,
  author =       "Jiguo Li and Huiyun Teng and Xinyi Huang and Yichen
                 Zhang and Jianying Zhou",
  title =        "A Forward-Secure Certificate-Based Signature Scheme",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "4",
  pages =        "853--866",
  month =        apr,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxt141",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Thu Mar 26 10:33:30 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/4.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/4/853",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "December 3, 2013",
}

@Article{Li:2015:IBE,
  author =       "Jin Li and Jingwei Li and Xiaofeng Chen and Chunfu Jia
                 and Wenjing Lou",
  title =        "Identity-Based Encryption with Outsourced Revocation
                 in Cloud Computing",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "64",
  number =       "2",
  pages =        "??--??",
  month =        feb,
  year =         "2015",
  CODEN =        "ITCOB4",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Wed Feb 11 14:05:05 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Li:2015:NAC,
  author =       "Jin Li and Xiaofeng Chen and Jingwei Li and Chunfu Jia
                 and Jianfeng Ma and Wenjing Lou",
  title =        "New access control systems based on outsourced
                 attribute-based encryption",
  journal =      j-J-COMP-SECUR,
  volume =       "23",
  number =       "6",
  pages =        "659--683",
  month =        "????",
  year =         "2015",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-150533",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:51 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Lian:2015:GRG,
  author =       "Chunfeng Lian and Liaojun Pang and Jimin Liang",
  title =        "Generalized Random Grid-Based Visual Secret Sharing
                 for General Access Structures",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "10",
  pages =        "2426--2442",
  month =        oct,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxu078",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Sep 28 14:49:06 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/10.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/10/2426",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "August 21, 2014",
}

@Article{Liang:2015:CPA,
  author =       "Kaitai Liang and Liming Fang and Duncan S. Wong and
                 Willy Susilo",
  title =        "A ciphertext-policy attribute-based proxy
                 re-encryption scheme for data sharing in public
                 clouds",
  journal =      j-CCPE,
  volume =       "27",
  number =       "8",
  pages =        "2004--2027",
  day =          "10",
  month =        jun,
  year =         "2015",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.3397",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Sat Jul 25 19:54:07 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "13 Oct 2014",
}

@Article{Liang:2015:EFC,
  author =       "Kaitai Liang and Willy Susilo and Joseph K. Liu and
                 Duncan S. Wong",
  title =        "Efficient and Fully {CCA} Secure Conditional Proxy
                 Re-Encryption from Hierarchical Identity-Based
                 Encryption",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "10",
  pages =        "2778--2792",
  month =        oct,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxv050",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Sep 28 14:49:06 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/10.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/10/2778",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "July 19, 2015",
}

@Article{Liang:2015:SEC,
  author =       "Kaitai Liang and Man Ho Au and Joseph K. Liu and Willy
                 Susilo and Duncan S. Wong and Guomin Yang and Yong Yu
                 and Anjia Yang",
  title =        "A secure and efficient {Ciphertext-Policy
                 Attribute-Based Proxy Re-Encryption} for cloud data
                 sharing",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "52",
  number =       "??",
  pages =        "95--108",
  month =        nov,
  year =         "2015",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Sat Jul 25 08:56:11 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X14002507",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X/",
}

@Article{Lin:2015:CND,
  author =       "Hui Lin and Jia Hu and Jianfeng Ma and Li Xu and Li
                 Yang",
  title =        "{CRM}: a New Dynamic Cross-Layer Reputation
                 Computation Model in Wireless Networks",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "4",
  pages =        "656--667",
  month =        apr,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxu075",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Thu Mar 26 10:33:30 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/4.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/4/656",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "August 16, 2014",
}

@Article{Lin:2015:DVS,
  author =       "Pei-Yu Lin",
  title =        "Double Verification Secret Sharing Mechanism Based on
                 Adaptive Pixel Pair Matching",
  journal =      j-TOMCCAP,
  volume =       "11",
  number =       "3",
  pages =        "36:1--36:??",
  month =        jan,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2700291",
  ISSN =         "1551-6857 (print), 1551-6865 (electronic)",
  ISSN-L =       "1551-6857",
  bibdate =      "Thu Feb 5 17:03:39 MST 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tomccap/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tomccap.bib",
  abstract =     "Verifiability is essential for the secret sharing
                 approach, which allows the involved participants to
                 detect cheaters during the secret retrieval process. In
                 this article, we propose a double verification secret
                 sharing (DVSS) mechanism that can not only prevent
                 fraudulent participants but also satisfy the
                 requirements of secret payload, camouflage, image
                 fidelity and lossless revealed secret. DVSS offers
                 double verification process to enhance the cheater
                 detectability; experimental results reveal that the
                 designed scheme can share larger secret capacity and
                 retain superior image quality than the related secret
                 sharing methods.",
  acknowledgement = ack-nhfb,
  articleno =    "36",
  fjournal =     "ACM Transactions on Multimedia Computing,
                 Communications, and Applications",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J961",
}

@Article{Lin:2015:IAA,
  author =       "Xi-Jun Lin and Lin Sun and Haipeng Qu",
  title =        "Insecurity of an anonymous authentication for
                 privacy-preserving {IoT} target-driven applications",
  journal =      j-COMPUT-SECUR,
  volume =       "48",
  number =       "??",
  pages =        "142--149",
  month =        feb,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:40 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814001229",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lin:2015:SSE,
  author =       "Chung-Hsiang Lin and De-Yu Shen and Yi-Jung Chen and
                 Chia-Lin Yang and Cheng-Yuan Michael Wang",
  title =        "{SECRET}: a Selective Error Correction Framework for
                 Refresh Energy Reduction in {DRAMs}",
  journal =      j-TACO,
  volume =       "12",
  number =       "2",
  pages =        "19:1--19:??",
  month =        jul,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2747876",
  ISSN =         "1544-3566 (print), 1544-3973 (electronic)",
  ISSN-L =       "1544-3566",
  bibdate =      "Fri Aug 7 09:46:00 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/taco.bib",
  abstract =     "DRAMs are used as the main memory in most computing
                 systems today. Studies show that DRAMs contribute to a
                 significant part of overall system power consumption.
                 One of the main challenges in low-power DRAM design is
                 the inevitable refresh process. Due to process
                 variation, memory cells exhibit retention time
                 variations. Current DRAMs use a single refresh period
                 determined by the cell with the largest leakage. Since
                 prolonging refresh intervals introduces retention
                 errors, a set of previous works adopt conventional
                 error-correcting code (ECC) to correct retention
                 errors. However, these approaches introduce significant
                 area and energy overheads. In this article, we propose
                 a novel error correction framework for retention errors
                 in DRAMs, called SECRET (selective error correction for
                 refresh energy reduction). The key observations we make
                 are that retention errors are hard errors rather than
                 soft errors, and only few DRAM cells have large
                 leakage. Therefore, instead of equipping error
                 correction capability for all memory cells as existing
                 ECC schemes, we only allocate error correction
                 information to leaky cells under a refresh interval.
                 Our SECRET framework contains two parts: an offline
                 phase to identify memory cells with retention errors
                 given a target error rate and a low-overhead error
                 correction mechanism. The experimental results show
                 that among all test cases performed, the proposed
                 SECRET framework can reduce refresh power by 87.2\% and
                 overall DRAM power up to 18.57\% with negligible area
                 and performance overheads.",
  acknowledgement = ack-nhfb,
  articleno =    "19",
  fjournal =     "ACM Transactions on Architecture and Code Optimization
                 (TACO)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J924",
}

@Article{Liu:2015:GTB,
  author =       "Shaohui Liu and Anand Paul and Guochao Zhang and
                 Gwanggil Jeon",
  title =        "A game theory-based block image compression method in
                 encryption domain",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "71",
  number =       "9",
  pages =        "3353--3372",
  month =        sep,
  year =         "2015",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-015-1413-0",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Tue Sep 29 10:07:23 MDT 2015",
  bibsource =    "http://link.springer.com/journal/11227/71/9;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/datacompression.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  URL =          "http://link.springer.com/article/10.1007/s11227-015-1413-0",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Article{Liu:2015:IAC,
  author =       "Qingzhong Liu and Zhongxue Chen",
  title =        "Improved Approaches with Calibrated Neighboring Joint
                 Density to Steganalysis and Seam-Carved Forgery
                 Detection in {JPEG} Images",
  journal =      j-TIST,
  volume =       "5",
  number =       "4",
  pages =        "63:1--63:??",
  month =        jan,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2560365",
  ISSN =         "2157-6904 (print), 2157-6912 (electronic)",
  ISSN-L =       "2157-6904",
  bibdate =      "Wed Feb 11 12:29:09 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tist.bib",
  abstract =     "Steganalysis and forgery detection in image forensics
                 are generally investigated separately. We have designed
                 a method targeting the detection of both steganography
                 and seam-carved forgery in JPEG images. We analyze the
                 neighboring joint density of the DCT coefficients and
                 reveal the difference between the untouched image and
                 the modified version. In realistic detection, the
                 untouched image and the modified version may not be
                 obtained at the same time, and different JPEG images
                 may have different neighboring joint density features.
                 By exploring the self-calibration under different shift
                 recompressions, we propose calibrated neighboring joint
                 density-based approaches with a simple feature set to
                 distinguish steganograms and tampered images from
                 untouched ones. Our study shows that this approach has
                 multiple promising applications in image forensics.
                 Compared to the state-of-the-art steganalysis
                 detectors, our approach delivers better or comparable
                 detection performances with a much smaller feature set
                 while detecting several JPEG-based steganographic
                 systems including DCT-embedding-based adaptive
                 steganography and Yet Another Steganographic Scheme
                 (YASS). Our approach is also effective in detecting
                 seam-carved forgery in JPEG images. By integrating
                 calibrated neighboring density with spatial domain rich
                 models that were originally designed for steganalysis,
                 the hybrid approach obtains the best detection accuracy
                 to discriminate seam-carved forgery from an untouched
                 image. Our study also offers a promising manner to
                 explore steganalysis and forgery detection together.",
  acknowledgement = ack-nhfb,
  articleno =    "63",
  fjournal =     "ACM Transactions on Intelligent Systems and Technology
                 (TIST)",
  journal-URL =  "http://portal.acm.org/citation.cfm?id=J1318",
}

@Article{Liu:2015:IEP,
  author =       "H. Liu and L. Chen and Z. Davar and M. R. Pour",
  title =        "Insecurity of an Efficient Privacy-preserving Public
                 Auditing Scheme for Cloud Data Storage",
  journal =      j-J-UCS,
  volume =       "21",
  number =       "3",
  pages =        "473--??",
  month =        "????",
  year =         "2015",
  CODEN =        "????",
  ISSN =         "0948-695X (print), 0948-6968 (electronic)",
  ISSN-L =       "0948-6968",
  bibdate =      "Wed Sep 7 16:47:18 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jucs.bib",
  URL =          "http://www.jucs.org/jucs_21_3/insecurity_of_an_efficient",
  acknowledgement = ack-nhfb,
  fjournal =     "J.UCS: Journal of Universal Computer Science",
  journal-URL =  "http://www.jucs.org/jucs",
}

@Article{Liu:2015:IMB,
  author =       "Chao-Liang Liu and Cheng-Jung Tsai and Ting-Yi Chang
                 and Wang-Jui Tsai and Po-Kai Zhong",
  title =        "Implementing multiple biometric features for a
                 recall-based graphical keystroke dynamics
                 authentication system on a smart phone",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "53",
  number =       "??",
  pages =        "128--139",
  month =        jul,
  year =         "2015",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Sat Aug 8 15:46:40 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804515000612",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Liu:2015:LBD,
  author =       "Huacui Liu and Chenhui Jin",
  title =        "Lower Bounds of Differential and Linear Active
                 {$S$}-boxes for {$3$D}-like Structure",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "4",
  pages =        "904--921",
  month =        apr,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxu010",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Thu Mar 26 10:33:30 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/4.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/4/904",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "March 2, 2014",
}

@Article{Liu:2015:MSG,
  author =       "Chao-Liang Liu and Wang-Jui Tsai and Ting-Yi Chang and
                 Chun-Cheng Peng and Peng-Shiang Wong",
  title =        "Meaningful Share Generation for $ (2, 2)$-Multiple
                 Visual Secret Sharing Scheme Without Pixel Expansion",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "7",
  pages =        "1598--1606",
  month =        jul,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxu105",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Jul 28 10:40:55 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/7.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/7/1598",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "November 11, 2014",
}

@Article{Liu:2015:SAA,
  author =       "Zhusong Liu and Hongyang Yan and Zhike Li",
  title =        "Server-aided anonymous attribute-based authentication
                 in cloud computing",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "52",
  number =       "??",
  pages =        "61--66",
  month =        nov,
  year =         "2015",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Sat Jul 25 08:56:11 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X14002544",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X/",
}

@Article{Liu:2015:SAB,
  author =       "Hong Liu and Huansheng Ning and Qingxu Xiong and
                 Laurence T. Yang",
  title =        "Shared Authority Based Privacy-Preserving
                 Authentication Protocol in Cloud Computing",
  journal =      j-IEEE-TRANS-PAR-DIST-SYS,
  volume =       "26",
  number =       "1",
  pages =        "241--251",
  month =        jan,
  year =         "2015",
  CODEN =        "ITDSEO",
  ISSN =         "1045-9219 (print), 1558-2183 (electronic)",
  ISSN-L =       "1045-9219",
  bibdate =      "Thu Feb 12 13:58:35 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranspardistsys.bib",
  URL =          "http://www.computer.org/csdl/trans/td/2015/01/06748054-abs.html",
  abstract-URL = "http://www.computer.org/csdl/trans/td/2015/01/06748054-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://www.computer.org/tpds/archives.htm",
}

@Article{Liu:2015:SDS,
  author =       "Chen Liu and Chengmo Yang",
  title =        "Secure and Durable {(SEDURA)}: an Integrated
                 Encryption and Wear-leveling Framework for {PCM}-based
                 Main Memory",
  journal =      j-SIGPLAN,
  volume =       "50",
  number =       "5",
  pages =        "12:1--12:??",
  month =        may,
  year =         "2015",
  CODEN =        "SINODQ",
  DOI =          "https://doi.org/10.1145/2808704.2754969",
  ISSN =         "0362-1340 (print), 1523-2867 (print), 1558-1160
                 (electronic)",
  ISSN-L =       "0362-1340",
  bibdate =      "Fri Jul 31 19:39:44 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigplan2010.bib",
  abstract =     "Phase changing memory (PCM) is considered a promising
                 candidate for next-generation main-memory. Despite its
                 advantages of lower power and high density, PCM faces
                 critical security challenges due to its non-volatility:
                 data are still accessible by the attacker even if the
                 device is detached from a power supply. While
                 encryption has been widely adopted as the solution to
                 protect data, it not only creates additional
                 performance and energy overhead during data
                 encryption\slash decryption, but also hurts PCM
                 lifetime by introducing more writes to PCM cells. In
                 this paper, we propose a framework that integrates
                 encryption and wear-leveling so as to mitigate the
                 adverse impact of encryption on PCM performance and
                 lifetime. Moreover, by randomizing the address space
                 during wear-leveling, an extra level of protection is
                 provided to the data in memory. We propose two
                 algorithms that respectively prioritize data security
                 and memory lifetime, allowing designers to trade-off
                 between these two factors based on their needs.
                 Compared to previous encryption techniques, the
                 proposed SEDURA framework is able to deliver both more
                 randomness to protect data and more balanced PCM
                 writes, thus effectively balancing the three aspects of
                 data security, application performance, and device
                 lifetime.",
  acknowledgement = ack-nhfb,
  articleno =    "12",
  fjournal =     "ACM SIGPLAN Notices",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J706",
  remark =       "LCTES '15 conference proceedings.",
}

@Article{Liu:2015:SSP,
  author =       "Jianghua Liu and Xinyi Huang and Joseph K. Liu",
  title =        "Secure sharing of {Personal Health Records} in cloud
                 computing: {Ciphertext-Policy Attribute-Based
                 Signcryption}",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "52",
  number =       "??",
  pages =        "67--76",
  month =        nov,
  year =         "2015",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Sat Jul 25 08:56:11 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X14002076",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X/",
}

@Article{Loeb:2015:MGM,
  author =       "Larry Loeb",
  title =        "{Microsoft}, {Google}, {Mozilla} Abandon {RC4}
                 Cryptographic Standard",
  journal =      j-INFORMATION-WEEK,
  volume =       "??",
  number =       "??",
  pages =        "??",
  day =          "2",
  month =        sep,
  year =         "2015",
  CODEN =        "INFWE4",
  ISSN =         "8750-6874",
  ISSN-L =       "1938-3371",
  bibdate =      "Tue Sep 08 17:58:54 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.informationweek.com/software/enterprise-applications/microsoft-google-mozilla-abandon-rc4-cryptographic-standard/a/d-id/1322032",
  abstract =     "With Microsoft, Google, and Mozilla turning against
                 the RC4 cryptographic suite, the standard will likely
                 die in 2016.",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Week",
}

@Article{Lopriore:2015:PCR,
  author =       "Lanfranco Lopriore",
  title =        "Password Capabilities Revisited",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "4",
  pages =        "782--791",
  month =        apr,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxt131",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Thu Mar 26 10:33:30 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/4.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/4/782",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "November 11, 2013",
}

@Article{Lopriore:2015:PMD,
  author =       "Lanfranco Lopriore",
  title =        "Password Management: Distribution, Review and
                 Revocation",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "10",
  pages =        "2557--2566",
  month =        oct,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxu125",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Sep 28 14:49:06 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/10.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/10/2557",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "November 9, 2014",
}

@Article{Lotz:2015:SCS,
  author =       "Volkmar Lotz and Francesco {Di Cerbo} and Michele
                 Bezzi and Samuel Paul Kaluvuri and Antonino Sabetta and
                 Slim Trabelsi",
  title =        "Security Certification for Service-Based Business
                 Ecosystems",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "4",
  pages =        "709--723",
  month =        apr,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxt101",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Thu Mar 26 10:33:30 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/4.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/4/709",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "October 15, 2013",
}

@Article{Lubicz:2015:GMA,
  author =       "David Lubicz and Damien Robert",
  title =        "A generalisation of {Miller}'s algorithm and
                 applications to pairing computations on abelian
                 varieties",
  journal =      j-J-SYMBOLIC-COMP,
  volume =       "67",
  number =       "??",
  pages =        "68--92",
  month =        mar # "\slash " # apr,
  year =         "2015",
  CODEN =        "JSYCEH",
  DOI =          "https://doi.org/10.1016/j.jsc.2014.08.001",
  ISSN =         "0747-7171 (print), 1095-855X (electronic)",
  ISSN-L =       "0747-7171",
  bibdate =      "Wed Sep 3 08:32:01 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsymcomp.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0747717114000510",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Symbolic Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/07477171/",
  keywords =     "Abelian varieties; cryptography; elliptic curves;
                 Miller's algorithm; Pairing computations; Tate pairing;
                 Weil pairing",
}

@Article{Ma:2015:PKE,
  author =       "Sha Ma and Mingwu Zhang and Qiong Huang and Bo Yang",
  title =        "Public Key Encryption with Delegated Equality Test in
                 a Multi-User Setting",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "4",
  pages =        "986--1002",
  month =        apr,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxu026",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Thu Mar 26 10:33:30 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/4.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/4/986",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "April 4, 2014",
}

@Article{Maeng:2015:TAU,
  author =       "YoungJae Maeng and Aziz Mohaisen and Mun-Kyu Lee and
                 DaeHun Nyang",
  title =        "Transaction authentication using complementary
                 colors",
  journal =      j-COMPUT-SECUR,
  volume =       "48",
  number =       "??",
  pages =        "167--181",
  month =        feb,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:40 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814001473",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Mansfield-Devine:2015:MIC,
  author =       "Steve Mansfield-Devine",
  title =        "Managing identity for a competitive edge",
  journal =      j-NETWORK-SECURITY,
  volume =       "2015",
  number =       "1",
  pages =        "14--18",
  month =        jan,
  year =         "2015",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(15)70010-3",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 17:01:15 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485815700103",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Mao:2015:PUA,
  author =       "Qian Mao and K. Bharanitharan and Chin-Chen Chang",
  title =        "A Proxy User Authentication Protocol Using
                 Source-Based Image Morphing",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "7",
  pages =        "1573--1584",
  month =        jul,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxu094",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Jul 28 10:40:55 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/7.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/7/1573",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "September 26, 2014",
}

@Article{Marquez-Corbella:2015:ECP,
  author =       "Irene M{\'a}rquez-Corbella and Ruud Pellikaan",
  title =        "Error-correcting pairs: a new approach to code-based
                 cryptography",
  journal =      j-ACM-COMM-COMP-ALGEBRA,
  volume =       "49",
  number =       "1",
  pages =        "21--21",
  month =        mar,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2768577.2768606",
  ISSN =         "1932-2232 (print), 1932-2240 (electronic)",
  ISSN-L =       "1932-2232",
  bibdate =      "Thu Apr 30 16:35:04 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigsam.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Communications in Computer Algebra",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1000",
}

@Article{Massolino:2015:OSC,
  author =       "Pedro Maat C. Massolino and Paulo S. L. M. Barreto and
                 Wilson V. Ruggiero",
  title =        "Optimized and Scalable Co-Processor for {McEliece}
                 with Binary {Goppa} Codes",
  journal =      j-TECS,
  volume =       "14",
  number =       "3",
  pages =        "45:1--45:??",
  month =        apr,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2736284",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Tue Apr 21 17:21:32 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tecs.bib",
  abstract =     "Asymmetric cryptographic primitives are essential to
                 enable secure communications in public networks or
                 public mediums. Such primitives can be deployed as
                 software libraries or hardware co-processors, the
                 latter being more commonly employed in systems on chip
                 (SoC) scenarios, embedded devices, or
                 application-specific servers. Unfortunately, the most
                 commonly available solutions, based on RSA or elliptic
                 curve cryptography (ECC), are highly processing
                 intensive due to the underlying extended-precision
                 modular arithmetic. Consequently, they are not
                 available on highly constrained platforms. Aiming to
                 tackle this issue, we here investigate an alternative
                 asymmetric encryption scheme that relies on lightweight
                 arithmetic: McEliece. This scheme is especially
                 appealing because, being based on error correction
                 codes, it displays a simpler arithmetic and leads to
                 better performance when compared to RSA or ECC. To
                 evaluate the implementation of this scheme in hardware,
                 we propose and analyze a flexible architecture whose
                 security level and time versus area usage
                 characteristics can be reconfigured as desired. The
                 proposed architecture is suitable to all usual security
                 levels, ranging from 80 to 256 bits. It is also very
                 efficient, being able to perform data decryption with
                 binary Goppa codes in 56$ \mu $ s with 3,402 slices on
                 a Xilinx Spartan-3AN FPGA, whereas the best-known
                 result in the literature for the same FPGA is 115$ \mu
                 $ s with 7,331 slices. Alternatively, the architecture
                 can operate with quasi-dyadic Goppa (QD-Goppa) codes,
                 which involves smaller keys than traditional binary
                 Goppa codes. In the latter case, for an 80-bit security
                 level, the decryption operation can take from 1.1ms
                 with 1,129 slices to 68$ \mu $ s with 8,268 slices. By
                 choosing a more hardware-friendly decoding algorithm,
                 focusing hardware resources on most bottleneck
                 operations and sharing hardware resource for two
                 different algorithms, better results than the those in
                 the literature were obtained.",
  acknowledgement = ack-nhfb,
  articleno =    "45",
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J840",
}

@Article{Mathew:2015:NMB,
  author =       "Jimson Mathew and Rajat Subhra Chakraborty and Durga
                 Prasad Sahoo and Yuanfan Yang and Dhiraj K. Pradhan",
  title =        "A Novel Memristor-Based Hardware Security Primitive",
  journal =      j-TECS,
  volume =       "14",
  number =       "3",
  pages =        "60:1--60:??",
  month =        apr,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2736285",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Tue Apr 21 17:21:32 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tecs.bib",
  abstract =     "Memristor is an exciting new addition to the
                 repertoire of fundamental circuit elements.
                 Alternatives to many security protocols originally
                 employing traditional mathematical cryptography involve
                 novel hardware security primitives, such as Physically
                 Unclonable Functions (PUFs). In this article, we
                 propose a novel hybrid memristor-CMOS PUF circuit and
                 demonstrate its suitability through extensive
                 simulations of environmental and process variation
                 effects. The proposed PUF circuit has substantially
                 less hardware overhead than previously proposed
                 memristor-based PUF circuits while being inherently
                 resistant to machine learning-based modeling attacks
                 because of challenge-dependent delays of the memristor
                 stages. The proposed PUF can be conveniently used in
                 many security applications and protocols based on
                 hardware-intrinsic security.",
  acknowledgement = ack-nhfb,
  articleno =    "60",
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J840",
}

@Article{Mayron:2015:BAM,
  author =       "Liam M. Mayron",
  title =        "Biometric Authentication on Mobile Devices",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "3",
  pages =        "70--73",
  month =        may # "\slash " # jun,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2015.67",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 3 11:45:33 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/03/msp2015030070-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/03/msp2015030070-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
}

@Book{McKusick:2015:DIF,
  author =       "Marshall Kirk McKusick and George V. Neville-Neil and
                 Robert N. M. Watson",
  title =        "The design and implementation of the {FreeBSD}
                 operating system",
  publisher =    pub-AW,
  address =      pub-AW:adr,
  edition =      "Second",
  pages =        "xxx + 886",
  year =         "2015",
  ISBN =         "0-321-96897-2 (hardcover)",
  ISBN-13 =      "978-0-321-96897-5 (hardcover)",
  LCCN =         "QA76.774.F74 M35 2015",
  bibdate =      "Sun Oct 4 11:28:07 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/unix.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://proquest.safaribooksonline.com/9780133761825",
  acknowledgement = ack-nhfb,
  subject =      "FreeBSD; Free computer software; Operating systems
                 (Computers)",
  tableofcontents = "About This eBook \\
                 Title Page \\
                 Copyright Page \\
                 Dedication \\
                 Contents \\
                 Preface \\
                 UNIX-like Systems \\
                 Berkeley Software Distributions \\
                 Material Covered in this Book \\
                 Use by Computer Professionals \\
                 Use in Courses on Operating Systems \\
                 Organization \\
                 Getting BSD \\
                 Acknowledgments \\
                 References \\
                 About the Authors \\
                 Part I: Overview \\
                 1. History and Goals \\
                 1.1 History of the UNIX System \\
                 1.2 BSD and Other Systems \\
                 1.3 The Transition of BSD to Open Source \\
                 1.4 The FreeBSD Development Model \\
                 2. Design Overview of FreeBSD \\
                 2.1 FreeBSD Facilities and the Kernel \\
                 2.2 Kernel Organization \\
                 2.3 Kernel Services \\
                 2.4 Process Management \\
                 2.5 Security \\
                 2.6 Memory Management \\
                 2.7 I/O System Overview \\
                 2.8 Devices \\
                 2.9 The Fast Filesystem \\
                 2.10 The Zettabyte Filesystem \\
                 2.11 The Network Filesystem \\
                 2.12 Interprocess Communication \\
                 2.13 Network-Layer Protocols \\
                 2.14 Transport-Layer Protocols \\
                 2.15 System Startup and Shutdown \\
                 3. Kernel Services \\
                 3.1 Kernel Organization \\
                 3.2 System Calls \\
                 3.3 Traps and Interrupts \\
                 3.4 Clock Interrupts \\
                 3.5 Memory-Management Services \\
                 3.6 Timing Services \\
                 3.7 Resource Services \\
                 3.8 Kernel Tracing Facilities \\
                 Part II: Processes \\
                 4. Process Management \\
                 4.1 Introduction to Process Management \\
                 4.2 Process State \\
                 4.3 Context Switching \\
                 4.4 Thread Scheduling \\
                 4.5 Process Creation \\
                 4.6 Process Termination \\
                 4.7 Signals \\
                 4.8 Process Groups and Sessions \\
                 4.9 Process Debugging \\
                 5. Security \\
                 5.1 Operating-System Security \\
                 5.2 Security Model \\
                 5.3 Process Credentials \\
                 5.4 Users and Groups \\
                 5.5 Privilege Model \\
                 5.6 Interprocess Access Control \\
                 5.7 Discretionary Access Control \\
                 5.8 Capsicum Capability Model \\
                 5.9 Jails \\
                 5.10 Mandatory Access-Control Framework \\
                 5.11 Security Event Auditing \\
                 5.12 Cryptographic Services \\
                 5.13 GELI Full-Disk Encryption \\
                 6. Memory Management \\
                 6.1 Terminology \\
                 6.2 Overview of the FreeBSD Virtual-Memory System \\
                 6.3 Kernel Memory Management \\
                 6.4 Per-Process Resources \\
                 6.5 Shared Memory \\
                 6.6 Creation of a New Process \\
                 6.7 Execution of a File \\
                 6.8 Process Manipulation of Its Address Space \\
                 6.9 Termination of a Process \\
                 6.10 The Pager Interface \\
                 6.11 Paging \\
                 6.12 Page Replacement \\
                 6.13 Portability \\
                 Part III: I/O System \\
                 7. I/O System Overview \\
                 7.1 Descriptor Management and Services \\
                 7.2 Local Interprocess Communication \\
                 7.3 The Virtual-Filesystem Interface \\
                 7.4 Filesystem-Independent Services \\
                 7.5 Stackable Filesystems \\
                 8. Devices \\
                 8.1 Device Overview \\
                 8.2 I/O Mapping from User to Device \\
                 8.3 Character Devices \\
                 8.4 Disk Devices \\
                 8.5 Network Devices \\
                 8.6 Terminal Handling \\
                 8.7 The GEOM Layer \\
                 8.8 The CAM Layer \\
                 8.9 Device Configuration \\
                 8.10 Device Virtualization \\
                 9. The Fast Filesystem \\
                 9.1 Hierarchical Filesystem Management \\
                 9.2 Structure of an Inode \\
                 9.3 Naming \\
                 9.4 Quotas \\
                 9.5 File Locking \\
                 9.6 Soft Updates \\
                 9.7 Filesystem Snapshots \\
                 9.8 Journaled Soft Updates \\
                 9.9 The Local Filestore \\
                 9.10 The Berkeley Fast Filesystem \\
                 10. The Zettabyte Filesystem \\
                 10.1 Introduction \\
                 10.2 ZFS Organization \\
                 10.3 ZFS Structure \\
                 10.4 ZFS Operation \\
                 10.5 ZFS Design Tradeoffs \\
                 11. The Network Filesystem \\
                 11.1 Overview \\
                 11.2 Structure and Operation \\
                 11.3 NFS Evolution \\
                 Part IV: Interprocess Communication \\
                 12. Interprocess Communication \\
                 12.1 Interprocess-Communication Model \\
                 12.2 Implementation Structure and Overview \\
                 12.3 Memory Management \\
                 12.4 IPC Data Structures \\
                 12.5 Connection Setup \\
                 12.6 Data Transfer \\
                 12.7 Socket Shutdown \\
                 12.8 Network-Communication Protocol Internal Structure
                 \\
                 12.9 Socket-to-Protocol Interface \\
                 12.10 Protocol-to-Protocol Interface \\
                 12.11 Protocol-to-Network Interface \\
                 12.12 Buffering and Flow Control \\
                 12.13 Network Virtualization \\
                 13. Network-Layer Protocols \\
                 13.1 Internet Protocol Version / 4 \\ \\
                 13.2 Internet Control Message Protocols (ICMP) \\
                 13.3 Internet Protocol Version / 6 \\ \\
                 13.4 Internet Protocols Code Structure \\
                 13.5 Routing \\
                 13.6 Raw Sockets \\
                 13.7 Security \\
                 13.8 Packet-Processing Frameworks \\
                 14. Transport-Layer Protocols \\
                 14.1 Internet Ports and Associations \\
                 14.2 User Datagram Protocol (UDP) \\
                 14.3 Transmission Control Protocol (TCP) \\
                 14.4 TCP Algorithms \\
                 14.5 TCP Input Processing \\
                 14.6 TCP Output Processing \\
                 14.7 Stream Control Transmission Protocol (SCTP) \\
                 Part V: System Operation \\
                 15. System Startup and Shutdown \\
                 15.1 Firmware and BIOSes \\
                 15.2 Boot Loaders \\
                 15.3 Kernel Boot \\
                 15.4 User-Level Initialization \\
                 15.5 System Operation \\
                 Glossary \\
                 Index \\
                 FreeBSD Kernel Internals on Video \\
                 Advanced FreeBSD Course on Video \\
                 FreeBSD Networking from the Bottom Up on Video \\
                 CSRG Archive CD-ROMs \\
                 History of UNIX at Berkeley \\
                 Teaching a Course Using This Book \\
                 Code Snippets",
}

@Article{Meng:2015:CRS,
  author =       "Xianmeng Meng and Xuexin Zheng",
  title =        "Cryptanalysis of {RSA} with a small parameter
                 revisited",
  journal =      j-INFO-PROC-LETT,
  volume =       "115",
  number =       "11",
  pages =        "858--862",
  month =        nov,
  year =         "2015",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Sat Jul 25 09:11:21 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S002001901500109X",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190/",
}

@Article{Merlo:2015:MEP,
  author =       "Alessio Merlo and Mauro Migliardi and Paolo
                 Fontanelli",
  title =        "Measuring and estimating power consumption in
                 {Android} to support energy-based intrusion detection",
  journal =      j-J-COMP-SECUR,
  volume =       "23",
  number =       "5",
  pages =        "611--637",
  month =        "????",
  year =         "2015",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-150530",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Tue May 24 06:26:46 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer Security",
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Meshram:2015:EIB,
  author =       "Chandrashekhar Meshram",
  title =        "An efficient {ID}-based cryptographic encryption based
                 on discrete logarithm problem and integer factorization
                 problem",
  journal =      j-INFO-PROC-LETT,
  volume =       "115",
  number =       "2",
  pages =        "351--358",
  month =        feb,
  year =         "2015",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Thu Nov 20 09:46:44 MST 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019014002221",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190/",
}

@Article{Mohd:2015:SLB,
  author =       "Bassam J. Mohd and Thaier Hayajneh and Athanasios V.
                 Vasilakos",
  title =        "A survey on lightweight block ciphers for low-resource
                 devices: Comparative study and open issues",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "58",
  number =       "??",
  pages =        "73--93",
  month =        dec,
  year =         "2015",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Mon Feb 8 11:55:17 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804515002076",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Moufek:2015:MCB,
  author =       "Hamza Moufek and Kenza Guenda",
  title =        "{McEliece} cryptosystem based on punctured
                 convolutional codes and the pseudo-random generators",
  journal =      j-ACM-COMM-COMP-ALGEBRA,
  volume =       "49",
  number =       "1",
  pages =        "21--21",
  month =        mar,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2768577.2768607",
  ISSN =         "1932-2232 (print), 1932-2240 (electronic)",
  ISSN-L =       "1932-2232",
  bibdate =      "Thu Apr 30 16:35:04 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigsam.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Communications in Computer Algebra",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1000",
}

@Article{Moulick:2015:RDS,
  author =       "Subhayan Roy Moulick",
  title =        "Review of: {{\booktitle{Digital Signatures}} by
                 Jonathan Katz}",
  journal =      j-SIGACT,
  volume =       "46",
  number =       "1",
  pages =        "10--12",
  month =        mar,
  year =         "2015",
  CODEN =        "SIGNDM",
  DOI =          "https://doi.org/10.1145/2744447.2744450",
  ISSN =         "0163-5700 (print), 1943-5827 (electronic)",
  bibdate =      "Tue Feb 16 11:18:41 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGACT News",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J697",
}

@Article{Natarajan:2015:MAD,
  author =       "V. Natarajan and Shina Sheen and R. Anitha",
  title =        "Multilevel Analysis to Detect Covert Social Botnet in
                 Multimedia Social Networks",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "4",
  pages =        "679--687",
  month =        apr,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxu063",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Thu Mar 26 10:33:30 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/4.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/4/679",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "July 22, 2014",
}

@Article{Negre:2015:NPA,
  author =       "C. Negre and J.-M. Robert",
  title =        "New Parallel Approaches for Scalar Multiplication in
                 Elliptic Curve over Fields of Small Characteristic",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "64",
  number =       "10",
  pages =        "2875--2890",
  month =        oct,
  year =         "2015",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2015.2389817",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Tue Oct 13 06:51:51 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Neville-Neil:2015:KVH,
  author =       "George V. Neville-Neil",
  title =        "Kode Vicious: Hickory dickory doc",
  journal =      j-CACM,
  volume =       "58",
  number =       "8",
  pages =        "27--28",
  month =        aug,
  year =         "2015",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2790834",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Jul 28 10:56:55 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cacm2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://cacm.acm.org/magazines/2015/8/189849/fulltext",
  abstract =     "On null encryption and automated documentation.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Ning:2015:APB,
  author =       "Huansheng Ning and Hong Liu and Laurence T. Yang",
  title =        "Aggregated-Proof Based Hierarchical Authentication
                 Scheme for the {Internet of Things}",
  journal =      j-IEEE-TRANS-PAR-DIST-SYS,
  volume =       "26",
  number =       "3",
  pages =        "657--667",
  month =        mar,
  year =         "2015",
  CODEN =        "ITDSEO",
  ISSN =         "1045-9219 (print), 1558-2183 (electronic)",
  ISSN-L =       "1045-9219",
  bibdate =      "Thu Feb 12 13:58:36 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranspardistsys.bib",
  URL =          "http://www.computer.org/csdl/trans/td/2015/03/06767153-abs.html",
  abstract-URL = "http://www.computer.org/csdl/trans/td/2015/03/06767153-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://www.computer.org/tpds/archives.htm",
}

@TechReport{NIST:2015:SSP,
  author =       "{NIST}",
  title =        "{SHA-3} Standard: Permutation-Based Hash and
                 Extendable-Output Functions",
  type =         "FIPS PUB",
  number =       "202",
  institution =  pub-NIST,
  address =      pub-NIST:adr,
  pages =        "viii + 29",
  year =         "2015",
  DOI =          "https://doi.org/10.6028/NIST.FIPS.202",
  bibdate =      "Sat Dec 10 16:05:20 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/mathcw.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  abstract =     "This Standard specifies the Secure Hash Algorithm-3
                 (SHA-3) family of functions on binary data. Each of the
                 SHA-3 functions is based on an instance of the KECCAK
                 algorithm that NIST selected as the winner of the SHA-3
                 Cryptographic Hash Algorithm Competition. This Standard
                 also specifies the KECCAK-p family of mathematical
                 permutations, including the permutation that underlies
                 KECCAK, in order to facilitate the development of
                 additional permutation-based cryptographic
                 functions.\par

                 The SHA-3 family consists of four cryptographic hash
                 functions, called SHA3-224, SHA3-256, SHA3-384, and
                 SHA3-512, and two extendable-output functions (XOFs),
                 called SHAKE128 and SHAKE256.\par

                 Hash functions are components for many important
                 information security applications, including (1) the
                 generation and verification of digital signatures, (2)
                 key derivation, and (3) pseudorandom bit generation.
                 The hash functions specified in this Standard
                 supplement the SHA-1 hash function and the SHA-2 family
                 of hash functions that are specified in FIPS 180-4, the
                 Secure Hash Standard.

                 Extendable-output functions are different from hash
                 functions, but it is possible to use them in similar
                 ways, with the flexibility to be adapted directly to
                 the requirements of individual applications, subject to
                 additional security considerations.",
  acknowledgement = ack-nhfb,
  keywords =     "computer security; cryptography; extendable-output
                 function; Federal Information Processing Standard; hash
                 algorithm; hash function; information security; KECCAK;
                 message digest; permutation; SHA-3; sponge
                 construction; sponge function; XOF",
}

@Article{Niu:2015:CRS,
  author =       "Danmei Niu and Lanlan Rui and Cheng Zhong and Xuesong
                 Qiu",
  title =        "A Composition and Recovery Strategy for Mobile Social
                 Network Service in Disaster",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "4",
  pages =        "700--708",
  month =        apr,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxu044",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Thu Mar 26 10:33:30 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/4.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/4/700",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "June 3, 2014",
}

@Article{Niu:2015:NAS,
  author =       "Ben Niu and Xiaoyan Zhu and Qinghua Li and Jie Chen
                 and Hui Li",
  title =        "A novel attack to spatial cloaking schemes in
                 location-based services",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "49",
  number =       "??",
  pages =        "125--132",
  month =        aug,
  year =         "2015",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Wed Apr 29 07:41:59 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X14002209",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X/",
}

@Article{Ntantogian:2015:GTF,
  author =       "Christoforos Ntantogian and Stefanos Malliaros and
                 Christos Xenakis",
  title =        "{Gaithashing}: a two-factor authentication scheme
                 based on gait features",
  journal =      j-COMPUT-SECUR,
  volume =       "52",
  number =       "??",
  pages =        "17--32",
  month =        jul,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:42 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815000413",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Misc{Oliynykov:2015:NES,
  author =       "Roman Oliynykov and Ivan Gorbenko and Oleksandr
                 Kazymyrov and Victor Ruzhentsev and Oleksandr Kuznetsov
                 and Yurii Gorbenko and Oleksandr Dyrda and Viktor
                 Dolgov and Andrii Pushkaryov and Ruslan Mordvinov and
                 Dmytro Kaidalov",
  title =        "A New Encryption Standard of {Ukraine}: The {Kalyna}
                 Block Cipher",
  howpublished = "Cryptology ePrint Archive, Report 2015/650",
  year =         "2015",
  bibdate =      "Sat Apr 15 17:57:47 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://eprint.iacr.org/2015/650",
  acknowledgement = ack-nhfb,
}

@Article{Pal:2015:SDC,
  author =       "Jiban K. Pal",
  title =        "Scientometric dimensions of cryptographic research",
  journal =      j-SCIENTOMETRICS,
  volume =       "105",
  number =       "1",
  pages =        "179--202",
  month =        oct,
  year =         "2015",
  CODEN =        "SCNTDX",
  DOI =          "https://doi.org/10.1007/s11192-015-1661-z",
  ISSN =         "0138-9130 (print), 1588-2861 (electronic)",
  ISSN-L =       "0138-9130",
  bibdate =      "Mon Oct 5 09:09:51 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/scientometrics2010.bib",
  URL =          "http://link.springer.com/article/10.1007/s11192-015-1661-z",
  acknowledgement = ack-nhfb,
  fjournal =     "Scientometrics",
  journal-URL =  "http://link.springer.com/journal/11192",
}

@Article{Papadopoulos:2015:PAP,
  author =       "Dimitrios Papadopoulos and Charalampos Papamanthou and
                 Roberto Tamassia and Nikos Triandopoulos",
  title =        "Practical authenticated pattern matching with optimal
                 proof size",
  journal =      j-PROC-VLDB-ENDOWMENT,
  volume =       "8",
  number =       "7",
  pages =        "750--761",
  month =        feb,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "2150-8097",
  bibdate =      "Wed Apr 15 19:04:24 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/string-matching.bib;
                 https://www.math.utah.edu/pub/tex/bib/vldbe.bib",
  abstract =     "We address the problem of authenticating pattern
                 matching queries over textual data that is outsourced
                 to an untrusted cloud server. By employing
                 cryptographic accumulators in a novel optimal
                 integrity-checking tool built directly over a suffix
                 tree, we design the first authenticated data structure
                 for verifiable answers to pattern matching queries
                 featuring fast generation of constant-size proofs. We
                 present two main applications of our new construction
                 to authenticate: (i) pattern matching queries over text
                 documents, and (ii) exact path queries over XML
                 documents. Answers to queries are verified by proofs of
                 size at most 500 bytes for text pattern matching, and
                 at most 243 bytes for exact path XML search,
                 independently of the document or answer size. By
                 design, our authentication schemes can also be
                 parallelized to offer extra efficiency during data
                 outsourcing. We provide a detailed experimental
                 evaluation of our schemes showing that for both
                 applications the times required to compute and verify a
                 proof are very small --- e.g., it takes less than $ 10
                 \mu $ s to generate a proof for a pattern (mis)match of
                 $ 10^2 $ characters in a text of $ 10^6 $ characters,
                 once the query has been evaluated.",
  acknowledgement = ack-nhfb,
  fjournal =     "Proceedings of the VLDB Endowment",
  journal-URL =  "http://portal.acm.org/citation.cfm?id=J1174",
}

@Article{Patsakis:2015:PSM,
  author =       "Constantinos Patsakis and Athanasios Zigomitros and
                 Achilleas Papageorgiou and Agusti Solanas",
  title =        "Privacy and Security for Multimedia Content shared on
                 {OSNs}: Issues and Countermeasures",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "4",
  pages =        "518--535",
  month =        apr,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxu066",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Thu Mar 26 10:33:30 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/4.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/4/518",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "July 31, 2014",
}

@Article{Pei:2015:SWT,
  author =       "Qingqi Pei and Dingyu Yan and Lichuan Ma and Zi Li and
                 Yang Liao",
  title =        "A Strong and Weak Ties Feedback-Based Trust Model in
                 Multimedia Social Networks",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "4",
  pages =        "627--643",
  month =        apr,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxv017",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Thu Mar 26 10:33:30 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/4.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/4/627",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Perazzo:2015:DRL,
  author =       "Pericle Perazzo and Pavel Skvortsov and Gianluca
                 Dini",
  title =        "On Designing Resilient Location-Privacy Obfuscators",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "10",
  pages =        "2649--2664",
  month =        oct,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxv009",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Sep 28 14:49:06 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/10.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/10/2649",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "February 11, 2015",
}

@Article{Pereira:2015:PKE,
  author =       "Mayana Pereira and Rafael Dowsley and Anderson C. A.
                 Nascimento and Goichiro Hanaoka",
  title =        "Public-Key Encryption Schemes with Bounded {CCA}
                 Security and Optimal Ciphertext Length Based on the
                 {CDH} and {HDH} Assumptions",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "10",
  pages =        "2738--2746",
  month =        oct,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxv040",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Sep 28 14:49:06 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/10.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/10/2738",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "June 8, 2015",
}

@Article{Popa:2015:HCD,
  author =       "R. A. Popa and N. Zeldovich",
  title =        "How to compute with data you can't see",
  journal =      j-IEEE-SPECTRUM,
  volume =       "52",
  number =       "8",
  pages =        "42--47",
  month =        aug,
  year =         "2015",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.2015.7164401",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 07:02:09 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Computer hacking; Computer security; cryptography;
                 data security; Databases; Encryption; encryption;
                 Internet; Web applications",
}

@Article{Premarathne:2015:LDD,
  author =       "Uthpala Subodhani Premarathne and Ibrahim Khalil and
                 Mohammed Atiquzzaman",
  title =        "Location-dependent disclosure risk based decision
                 support framework for persistent authentication in
                 pervasive computing applications",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "88",
  number =       "??",
  pages =        "161--177",
  day =          "9",
  month =        sep,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Sat Jul 25 08:35:39 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1389128615001954",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286/",
}

@Article{Proudfoot:2015:WTH,
  author =       "D. Proudfoot",
  title =        "What {Turing} himself said about the imitation game",
  journal =      j-IEEE-SPECTRUM,
  volume =       "52",
  number =       "7",
  pages =        "42--47",
  month =        jul,
  year =         "2015",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.2015.7131694",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 07:02:09 2020",
  bibsource =    "https://www.math.utah.edu/pub/bibnet/authors/t/turing-alan-mathison.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Computers; Cryptography; Encoding; Game theory;
                 History; imitation game; learning (artificial
                 intelligence); machine thinking; Nazi naval codes;
                 Turing machines; Turing, Alan",
}

@Article{Rabbachin:2015:WNI,
  author =       "Alberto Rabbachin and Andrea Conti and Moe Z. Win",
  title =        "Wireless network intrinsic secrecy",
  journal =      j-IEEE-TRANS-NETWORKING,
  volume =       "23",
  number =       "1",
  pages =        "56--69",
  month =        feb,
  year =         "2015",
  CODEN =        "IEANEP",
  DOI =          "https://doi.org/10.1109/TNET.2013.2297339",
  ISSN =         "1063-6692 (print), 1558-2566 (electronic)",
  ISSN-L =       "1063-6692",
  bibdate =      "Fri Aug 28 06:01:29 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
  abstract =     "Wireless secrecy is essential for communication
                 confidentiality, health privacy, public safety,
                 information superiority, and economic advantage in the
                 modern information society. Contemporary security
                 systems are based on cryptographic primitives and can
                 be complemented by techniques that exploit the
                 intrinsic properties of a wireless environment. This
                 paper develops a foundation for design and analysis of
                 wireless networks with secrecy provided by intrinsic
                 properties such as node spatial distribution, wireless
                 propagation medium, and aggregate network interference.
                 We further propose strategies that mitigate
                 eavesdropping capabilities, and we quantify their
                 benefits in terms of network secrecy metrics. This
                 research provides insights into the essence of wireless
                 network intrinsic secrecy and offers a new perspective
                 on the role of network interference in communication
                 confidentiality.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE\slash ACM Transactions on Networking",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J771",
}

@Article{Radke:2015:CFA,
  author =       "Kenneth Radke and Colin Boyd and Juan Gonzalez Nieto
                 and Harry Bartlett",
  title =        "{CHURNs}: Freshness Assurance for Humans",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "10",
  pages =        "2404--2425",
  month =        oct,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxu073",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Sep 28 14:49:06 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/10.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/10/2404",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "August 24, 2014",
}

@Article{Rajendran:2015:FAB,
  author =       "J. Rajendran and Huan Zhang and Chi Zhang and G. S.
                 Rose and Youngok Pino and O. Sinanoglu and R. Karri",
  title =        "Fault Analysis-Based Logic Encryption",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "64",
  number =       "2",
  pages =        "??--??",
  month =        feb,
  year =         "2015",
  CODEN =        "ITCOB4",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Wed Feb 11 14:05:05 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Rauscher:2015:FMT,
  author =       "Karl Frederick Rauscher",
  title =        "Forum: A Matter of Trust",
  journal =      j-SCI-AMER,
  volume =       "312",
  number =       "3",
  pages =        "8--8",
  month =        mar,
  year =         "2015",
  CODEN =        "SCAMAC",
  DOI =          "https://doi.org/10.1038/scientificamerican0315-8",
  ISSN =         "0036-8733 (print), 1946-7087 (electronic)",
  ISSN-L =       "0036-8733",
  bibdate =      "Mon Mar 9 16:32:36 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sciam2010.bib;
                 http://www.nature.com/scientificamerican",
  URL =          "http://www.nature.com/scientificamerican/journal/v312/n3/full/scientificamerican0315-8.html;
                 http://www.nature.com/scientificamerican/journal/v312/n3/pdf/scientificamerican0315-8.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Scientific American",
  remark =       "The author calls for separation of commercial
                 enterprises from government security agencies, with
                 contractual penalties against government covert
                 security compromises.",
}

@Article{Reeve:2015:ARC,
  author =       "Tom Reeve",
  title =        "Aged {RC4} cipher to be shunned by security conscious
                 browsers",
  journal =      "SC Magazine",
  volume =       "??",
  number =       "??",
  pages =        "??",
  day =          "2",
  month =        sep,
  year =         "2015",
  bibdate =      "Tue Sep 08 17:57:09 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.scmagazine.com/aged-rc4-cipher-to-be-shunned-by-security-conscious-browsers/article/436521/",
  abstract =     "In an apparent coordinated announcement, Google,
                 Mozilla and Microsoft announced that they would stop
                 using the RC4 stream cipher in their respective
                 browsers.",
  acknowledgement = ack-nhfb,
}

@Article{Ren:2015:ASE,
  author =       "Jianbao Ren and Yong Qi and Yuehua Dai and Xiaoguang
                 Wang and Yi Shi",
  title =        "{AppSec}: a Safe Execution Environment for Security
                 Sensitive Applications",
  journal =      j-SIGPLAN,
  volume =       "50",
  number =       "7",
  pages =        "187--199",
  month =        jul,
  year =         "2015",
  CODEN =        "SINODQ",
  DOI =          "https://doi.org/10.1145/2817817.2731199",
  ISSN =         "0362-1340 (print), 1523-2867 (print), 1558-1160
                 (electronic)",
  ISSN-L =       "0362-1340",
  bibdate =      "Tue Feb 16 12:01:42 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigplan2010.bib",
  abstract =     "Malicious OS kernel can easily access user's private
                 data in main memory and pries human-machine interaction
                 data, even one that employs privacy enforcement based
                 on application level or OS level. This paper introduces
                 AppSec, a hypervisor-based safe execution environment,
                 to protect both the memory data and human-machine
                 interaction data of security sensitive applications
                 from the untrusted OS transparently. AppSec provides
                 several security mechanisms on an untrusted OS. AppSec
                 introduces a safe loader to check the code integrity of
                 application and dynamic shared objects. During runtime,
                 AppSec protects application and dynamic shared objects
                 from being modified and verifies kernel memory accesses
                 according to application's intention. AppSec provides a
                 devices isolation mechanism to prevent the
                 human-machine interaction devices being accessed by
                 compromised kernel. On top of that, AppSec further
                 provides a privileged-based window system to protect
                 application's X resources. The major advantages of
                 AppSec are threefold. First, AppSec verifies and
                 protects all dynamic shared objects during runtime.
                 Second, AppSec mediates kernel memory access according
                 to application's intention but not encrypts all
                 application's data roughly. Third, AppSec provides a
                 trusted I/O path from end-user to application. A
                 prototype of AppSec is implemented and shows that
                 AppSec is efficient and practical.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGPLAN Notices",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J706",
  remark =       "VEE '15 conference proceedings.",
}

@Article{Ribeiro:2015:QBS,
  author =       "J. Ribeiro and A. Souto and P. Mateus",
  title =        "Quantum blind signature with an offline repository",
  journal =      "International Journal of Quantum Information",
  volume =       "13",
  number =       "2",
  pages =        "1550016",
  month =        "????",
  year =         "2015",
  DOI =          "https://doi.org/10.1142/S0219749915500161",
  bibdate =      "Mon May 18 10:40:50 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  note =         "See also news story \cite{Anonymous:2015:BSU}.",
  URL =          "www.worldscientific.com/doi/pdf/10.1142/S0219749915500161",
  acknowledgement = ack-nhfb,
  keywords =     "Bell states; Quantum blind signatures; trusted party",
  pagecount =    "21",
}

@Article{Rossi:2015:IBS,
  author =       "Francesco Rossi and Giovanni Schmid",
  title =        "Identity-based secure group communications using
                 pairings",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "89",
  number =       "??",
  pages =        "32--43",
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1016/j.comnet.2015.07.007",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Tue Sep 8 19:39:32 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1389128615002303",
  acknowledgement = ack-nhfb,
  keywords =     "Group key agreement; Identity-based cryptography;
                 Pairing-based signatures",
}

@Article{Roy:2015:SCP,
  author =       "Arpan Roy and Santonu Sarkar and Rajeshwari Ganesan
                 and Geetika Goel",
  title =        "Secure the Cloud: From the Perspective of a
                 Service-Oriented Organization",
  journal =      j-COMP-SURV,
  volume =       "47",
  number =       "3",
  pages =        "41:1--41:??",
  month =        apr,
  year =         "2015",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2693841",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Apr 16 18:47:49 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  abstract =     "In response to the revival of virtualized technology
                 by Rosenblum and Garfinkel [2005], NIST defined cloud
                 computing, a new paradigm in service computing
                 infrastructures. In cloud environments, the basic
                 security mechanism is ingrained in virtualization ---
                 that is, the execution of instructions at different
                 privilege levels. Despite its obvious benefits, the
                 caveat is that a crashed virtual machine (VM) is much
                 harder to recover than a crashed workstation. When
                 crashed, a VM is nothing but a giant corrupt binary
                 file and quite unrecoverable by standard disk-based
                 forensics. Therefore, VM crashes should be avoided at
                 all costs. Security is one of the major contributors to
                 such VM crashes. This includes compromising the
                 hypervisor, cloud storage, images of VMs used
                 infrequently, and remote cloud client used by the
                 customer as well as threat from malicious insiders.
                 Although using secure infrastructures such as private
                 clouds alleviate several of these security problems,
                 most cloud users end up using cheaper options such as
                 third-party infrastructures (i.e., private clouds),
                 thus a thorough discussion of all known security issues
                 is pertinent. Hence, in this article, we discuss
                 ongoing research in cloud security in order of the
                 attack scenarios exploited most often in the cloud
                 environment. We explore attack scenarios that call for
                 securing the hypervisor, exploiting co-residency of
                 VMs, VM image management, mitigating insider threats,
                 securing storage in clouds, abusing lightweight
                 software-as-a-service clients, and protecting data
                 propagation in clouds. Wearing a practitioner's
                 glasses, we explore the relevance of each attack
                 scenario to a service company like Infosys. At the same
                 time, we draw parallels between cloud security research
                 and implementation of security solutions in the form of
                 enterprise security suites for the cloud. We discuss
                 the state of practice in the form of enterprise
                 security suites that include cryptographic solutions,
                 access control policies in the cloud, new techniques
                 for attack detection, and security quality assurance in
                 clouds.",
  acknowledgement = ack-nhfb,
  articleno =    "41",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Ruoti:2015:WJS,
  author =       "Scott Ruoti and Jeff Andersen and Daniel Zappala and
                 Kent Seamons",
  title =        "Why {Johnny} Still, Still Can't Encrypt: Evaluating
                 the Usability of a Modern {PGP} Client",
  journal =      "arxiv.org",
  volume =       "??",
  number =       "??",
  pages =        "1--5",
  day =          "29",
  month =        oct,
  year =         "2015",
  bibdate =      "Mon Nov 16 05:52:32 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://arxiv.org/pdf/1510.08555.pdf",
  abstract =     "This paper presents the results of a laboratory study
                 involving Mailvelope, a modern PGP client that
                 integrates tightly with existing webmail providers. In
                 our study, we brought in pairs of participants and had
                 them attempt to use Mailvelope to communicate with each
                 other. Our results shown that more than a decade and a
                 half after Why Johnny Can't Encrypt, modern PGP tools
                 are still unusable for the masses. We finish with a
                 discussion of pain points encountered using Mailvelope,
                 and discuss what might be done to address them in
                 future PGP systems",
  acknowledgement = ack-nhfb,
}

@Article{Rupp:2015:CTM,
  author =       "Andy Rupp and Foteini Baldimtsi and Gesine
                 Hinterw{\"a}lder and Christof Paar",
  title =        "Cryptographic Theory Meets Practice: Efficient and
                 Privacy-Preserving Payments for Public Transport",
  journal =      j-TISSEC,
  volume =       "17",
  number =       "3",
  pages =        "10:1--10:??",
  month =        mar,
  year =         "2015",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/2699904",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Fri Mar 27 17:03:46 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tissec.bib",
  abstract =     "We propose a new lightweight cryptographic payment
                 scheme for transit systems, called P4R
                 (Privacy-Preserving Pre-Payments with Refunds), which
                 is suitable for low-cost user devices with limited
                 capabilities. Using P4R, users deposit money to obtain
                 one-show credentials, where each credential allows the
                 user to make an arbitrary ride on the system. The trip
                 fare is determined on-the-fly at the end of the trip.
                 If the deposit for the credential exceeds this fare,
                 the user obtains a refund. Refund values collected over
                 several trips are aggregated in a single token, thereby
                 saving memory and increasing privacy. Our solution
                 builds on Brands's e-cash scheme to realize the
                 prepayment system and on Boneh-Lynn-Shacham (BLS)
                 signatures to implement the refund capabilities.
                 Compared to a Brands-only solution for transportation
                 payment systems, P4R allows us to minimize the number
                 of coins a user needs to pay for his rides and thus
                 minimizes the number of expensive withdrawal
                 transactions, as well as storage requirements for the
                 fairly large coins. Moreover, P4R enables flexible
                 pricing because it allows for exact payments of
                 arbitrary amounts (within a certain range) using a
                 single fast paying (and refund) transaction.
                 Fortunately, the mechanisms enabling these features
                 require very little computational overhead. Choosing
                 contemporary security parameters, we implemented P4R on
                 a prototyping payment device and show its suitability
                 for future transit payment systems. Estimation results
                 demonstrate that the data required for 20 rides consume
                 less than 10KB of memory, and the payment and refund
                 transactions during a ride take less than half a
                 second. We show that malicious users are not able to
                 cheat the system by receiving a refund that exceeds the
                 overall deposit minus the overall fare and can be
                 identified during double-spending checks. At the same
                 time, the system protects the privacy of honest users
                 in that transactions are anonymous (except for
                 deposits) and trips are unlinkable.",
  acknowledgement = ack-nhfb,
  articleno =    "10",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@Article{Russo:2015:FPT,
  author =       "Alejandro Russo",
  title =        "Functional pearl: two can keep a secret, if one of
                 them uses {Haskell}",
  journal =      j-SIGPLAN,
  volume =       "50",
  number =       "9",
  pages =        "280--288",
  month =        sep,
  year =         "2015",
  CODEN =        "SINODQ",
  DOI =          "https://doi.org/10.1145/2858949.2784756",
  ISSN =         "0362-1340 (print), 1523-2867 (print), 1558-1160
                 (electronic)",
  ISSN-L =       "0362-1340",
  bibdate =      "Tue Feb 16 12:01:43 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigplan2010.bib",
  abstract =     "For several decades, researchers from different
                 communities have independently focused on protecting
                 confidentiality of data. Two distinct technologies have
                 emerged for such purposes: Mandatory Access Control
                 (MAC) and Information-Flow Control (IFC)-the former
                 belonging to operating systems (OS) research, while the
                 latter to the programming languages community. These
                 approaches restrict how data gets propagated within a
                 system in order to avoid information leaks. In this
                 scenario, Haskell plays a unique privileged role: it is
                 able to protect confidentiality via libraries. This
                 pearl presents a monadic API which statically protects
                 confidentiality even in the presence of advanced
                 features like exceptions, concurrency, and mutable data
                 structures. Additionally, we present a mechanism to
                 safely extend the library with new primitives, where
                 library designers only need to indicate the read and
                 write effects of new operations.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGPLAN Notices",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J706",
  remark =       "ICFP '15 conference proceedings.",
}

@Article{Ryan:2015:EEVa,
  author =       "Peter Y. A. Ryan and Steve Schneider and Vanessa
                 Teague",
  title =        "End-to-End Verifiability in Voting Systems, from
                 Theory to Practice",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "3",
  pages =        "59--62",
  month =        may # "\slash " # jun,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2015.54",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 3 11:45:33 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/03/msp2015030059-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/03/msp2015030059-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
}

@Article{Ryan:2015:EEVb,
  author =       "Peter Y. A. Ryan and Steve Schneider and Vanessa
                 Teague",
  title =        "End-to-End Verifiability in Voting Systems, from
                 Theory to Practice",
  journal =      j-COMPUT-EDGE,
  volume =       "1",
  number =       "10",
  pages =        "9--11",
  month =        oct,
  year =         "2015",
  ISSN =         "2376-113X",
  bibdate =      "Sat Oct 31 11:24:26 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.computer.org/cms/Computer.org/computing-edge/ce-oct15-final.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Computing Edge",
  journal-URL =  "http://www.computer.org/web/computingedge",
}

@Article{Saevanee:2015:CUA,
  author =       "Hataichanok Saevanee and Nathan Clarke and Steven
                 Furnell and Valerio Biscione",
  title =        "Continuous user authentication using multi-modal
                 biometrics",
  journal =      j-COMPUT-SECUR,
  volume =       "53",
  number =       "??",
  pages =        "234--246",
  month =        sep,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:42 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815000875",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Sarkar:2015:DFA,
  author =       "S. Sarkar and S. Banik and S. Maitra",
  title =        "Differential Fault Attack against Grain Family with
                 Very Few Faults and Minimal Assumptions",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "64",
  number =       "6",
  pages =        "1647--1657",
  month =        jun,
  year =         "2015",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2014.2339854",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Wed Jun 10 07:41:35 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Sarreshtedari:2015:WMD,
  author =       "S. Sarreshtedari and M. A. Akhaee and A. Abbasfar",
  title =        "A Watermarking Method for Digital Speech
                 Self-Recovery",
  journal =      j-IEEE-ACM-TASLP,
  volume =       "23",
  number =       "11",
  pages =        "1917--1925",
  month =        nov,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/TASLP.2015.2456431",
  ISSN =         "2329-9290",
  ISSN-L =       "2329-9290",
  bibdate =      "Mon Oct 5 06:29:46 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeeacmtaslp.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE\slash ACM Transactions on Audio, Speech, and
                 Language Processing",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6570655",
}

@Article{Sasdrich:2015:ICS,
  author =       "Pascal Sasdrich and Tim G{\"u}neysu",
  title =        "Implementing {Curve25519} for Side-Channel--Protected
                 Elliptic Curve Cryptography",
  journal =      j-TRETS,
  volume =       "9",
  number =       "1",
  pages =        "3:1--3:??",
  month =        nov,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2700834",
  ISSN =         "1936-7406 (print), 1936-7414 (electronic)",
  ISSN-L =       "1936-7406",
  bibdate =      "Tue Dec 22 16:19:56 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/trets.bib",
  abstract =     "For security-critical embedded applications Elliptic
                 Curve Cryptography (ECC) has become the predominant
                 cryptographic system for efficient key agreement and
                 digital signatures. However, ECC still involves complex
                 modular arithmetic that is a particular burden for
                 small processors. In this context, Bernstein proposed
                 the highly efficient ECC instance Curve25519 that
                 particularly enables efficient software implementations
                 at a security level comparable to AES-128 with inherent
                 resistance to simple power analysis (SPA) and timing
                 attacks. In this work, we show that Curve25519 is
                 likewise competitive on FPGAs even when countermeasures
                 to thwart side-channel power analysis are included. Our
                 basic multicore DSP-based architectures achieves a
                 maximal performance of more than 32,000 point
                 multiplications per second on a Xilinx Zynq 7020 FPGA.
                 Including a mix of side-channel countermeasures to
                 impede simple and differential power analysis, we still
                 achieve more than 27,500 point multiplications per
                 second with a moderate increase in logic resources.",
  acknowledgement = ack-nhfb,
  articleno =    "3",
  fjournal =     "ACM Transactions on Reconfigurable Technology and
                 Systems (TRETS)",
  journal-URL =  "http://portal.acm.org/toc.cfm?id=J1151",
}

@Article{Savage:2015:NVS,
  author =       "Neil Savage",
  title =        "News: Visualizing sound",
  journal =      j-CACM,
  volume =       "58",
  number =       "2",
  pages =        "15--17",
  month =        feb,
  year =         "2015",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2693430",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Feb 10 13:56:49 MST 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cacm2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://cacm.acm.org/magazines/2015/2/182639/fulltext",
  abstract =     "New techniques capture speech by looking for the
                 vibrations it causes.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  keywords =     "cryptography; eavesdropping",
  remark =       "The article describes progress in recovering
                 comprehensible speech from vibrations of objects in
                 video films.",
}

@Article{Savas:2015:GMA,
  author =       "Erkay Sava{\c{s}} and Cemal Y{\i}lmaz",
  title =        "A Generic Method for the Analysis of a Class of Cache
                 Attacks: a Case Study for {AES}",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "10",
  pages =        "2716--2737",
  month =        oct,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxv027",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Sep 28 14:49:06 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/10.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/10/2716",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "April 23, 2015",
}

@Article{Schaefer:2015:BRB,
  author =       "Edward F. Schaefer",
  title =        "Book Review: {{\booktitle{The Mathematics of
                 Encryption: An Elementary Introduction}}, Reviewed
                 work(s): The Mathematics of Encryption: An Elementary
                 Introduction. By Margaret Cozzens and Steven J. Miller.
                 American Mathematical Society, Providence, RI, 2013,
                 xviii + 332 pp., ISBN 978-0-8218-8321-1, \$49.00}",
  journal =      j-AMER-MATH-MONTHLY,
  volume =       "122",
  number =       "1",
  pages =        "83--88",
  month =        jan,
  year =         "2015",
  CODEN =        "AMMYAE",
  DOI =          "https://doi.org/10.4169/amer.math.monthly.122.01.83",
  ISSN =         "0002-9890 (print), 1930-0972 (electronic)",
  ISSN-L =       "0002-9890",
  bibdate =      "Thu Mar 19 08:36:23 MDT 2015",
  bibsource =    "http://www.jstor.org/stable/10.4169/amermathmont.122.issue-01;
                 https://www.math.utah.edu/pub/tex/bib/amermathmonthly2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.jstor.org/stable/10.4169/amer.math.monthly.122.01.83",
  acknowledgement = ack-nhfb,
  fjournal =     "American Mathematical Monthly",
  journal-URL =  "http://www.jstor.org/journals/00029890.html",
}

@Article{Schaffer:2015:ECA,
  author =       "Kim B. Schaffer",
  title =        "Expanding Continuous Authentication with Mobile
                 Devices",
  journal =      j-COMPUTER,
  volume =       "48",
  number =       "11",
  pages =        "92--95",
  month =        nov,
  year =         "2015",
  CODEN =        "CPTRB4",
  DOI =          "https://doi.org/10.1109/MC.2015.333",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Mon Jan 4 18:58:36 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computer2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.computer.org/csdl/mags/co/2015/11/mco2015110092-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/co/2015/11/mco2015110092-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
}

@Article{Schaumont:2015:IEP,
  author =       "Patrick Schaumont and Maire O'Neill and Tim
                 G{\"u}neysu",
  title =        "Introduction for Embedded Platforms for Cryptography
                 in the Coming Decade",
  journal =      j-TECS,
  volume =       "14",
  number =       "3",
  pages =        "40:1--40:??",
  month =        apr,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2745710",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Tue Apr 21 17:21:32 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tecs.bib",
  acknowledgement = ack-nhfb,
  articleno =    "40",
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J840",
}

@Book{Schneier:2015:DGH,
  author =       "Bruce Schneier",
  title =        "{Data and Goliath}: the hidden battles to collect your
                 data and control your world",
  publisher =    pub-NORTON,
  address =      pub-NORTON:adr,
  pages =        "383",
  year =         "2015",
  ISBN =         "0-393-24481-4 (hardcover)",
  ISBN-13 =      "978-0-393-24481-6 (hardcover)",
  LCCN =         "HM846 .S362 2015",
  bibdate =      "Fri Mar 13 16:17:25 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://www.democracynow.org/2015/3/13/data_and_goliath_bruce_schneier_on;
                 http://www.democracynow.org/blog/2015/3/13/part_2_bruce_schneier_on_the",
  acknowledgement = ack-nhfb,
  author-dates = "1963--",
  subject =      "Electronic surveillance; Social aspects; Information
                 technology; Computer security; Privacy, Right of;
                 Social control",
  tableofcontents = "Data as a by-product of computing \\
                 Data as surveillance \\
                 Analyzing our data \\
                 The business of surveillance \\
                 Government surveillance and control \\
                 Consolidation of institutional control \\
                 Political liberty and justice \\
                 Commercial fairness and equality \\
                 Business competitiveness \\
                 Privacy \\
                 Security \\
                 Principles \\
                 Solutions for government \\
                 Solutions for corporations \\
                 Solutions for the rest of us \\
                 Social norms and the big data trade-off",
}

@TechReport{Schneier:2015:SWC,
  author =       "Bruce Schneier and Matthew Fredrikson and Tadayoshi
                 Kohno and Thomas Ristenpart",
  title =        "Surreptitiously Weakening Cryptographic Systems",
  type =         "Report",
  institution =  "Co3 Systems; University of Wisconsin; University of
                 Washington",
  address =      "????; Madison, WI, USA; Seattle, WA, USA",
  day =          "9",
  month =        feb,
  year =         "2015",
  bibdate =      "Mon Mar 02 11:53:19 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://eprint.iacr.org/2015/097",
  acknowledgement = ack-nhfb,
}

@Article{Seo:2015:AEC,
  author =       "Seog Chung Seo and Taehong Kim and Seokhie Hong",
  title =        "Accelerating elliptic curve scalar multiplication over
                 {$ {\rm GF}(2^m) $} on graphic hardwares",
  journal =      j-J-PAR-DIST-COMP,
  volume =       "75",
  number =       "??",
  pages =        "152--167",
  month =        jan,
  year =         "2015",
  CODEN =        "JPDCER",
  DOI =          "https://doi.org/10.1016/j.jpdc.2014.09.001",
  ISSN =         "0743-7315 (print), 1096-0848 (electronic)",
  ISSN-L =       "0743-7315",
  bibdate =      "Tue Nov 25 18:17:38 MST 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jpardistcomp.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0743731514001646",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Parallel and Distributed Computing",
  journal-URL =  "http://www.sciencedirect.com/science/journal/07437315/",
}

@Article{Shahandashti:2015:RUP,
  author =       "Siamak F. Shahandashti and Reihaneh Safavi-Naini and
                 Nashad Ahmed Safa",
  title =        "Reconciling user privacy and implicit authentication
                 for mobile devices",
  journal =      j-COMPUT-SECUR,
  volume =       "53",
  number =       "??",
  pages =        "215--233",
  month =        sep,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:42 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815000838",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Shao:2015:SAS,
  author =       "Zhi-Yi Shao and Bo Yang",
  title =        "On security against the server in designated tester
                 public key encryption with keyword search",
  journal =      j-INFO-PROC-LETT,
  volume =       "115",
  number =       "12",
  pages =        "957--961",
  month =        dec,
  year =         "2015",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Thu Aug 20 06:19:48 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019015001283",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190/",
}

@Article{Shen:2015:CSC,
  author =       "Emily Shen and Mayank Varia and Robert K. Cunningham
                 and W. Konrad Vesey",
  title =        "Cryptographically Secure Computation",
  journal =      j-COMPUTER,
  volume =       "48",
  number =       "4",
  pages =        "78--81",
  month =        apr,
  year =         "2015",
  CODEN =        "CPTRB4",
  DOI =          "https://doi.org/10.1109/MC.2015.101",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Tue Jun 9 06:31:50 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computer2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://csdl.computer.org/csdl/mags/co/2015/04/mco2015040078-abs.html",
  abstract-URL = "http://csdl.computer.org/csdl/mags/co/2015/04/mco2015040078-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
}

@Article{Shi:2015:CTS,
  author =       "Run-hua Shi and Hong Zhong and Shun Zhang",
  title =        "Comments on two schemes of identity-based user
                 authentication and key agreement for mobile
                 client-server networks",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "71",
  number =       "11",
  pages =        "4015--4018",
  month =        nov,
  year =         "2015",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-015-1496-7",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Mon Jan 25 08:18:10 MST 2016",
  bibsource =    "http://link.springer.com/journal/11227/71/11;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  URL =          "http://link.springer.com/article/10.1007/s11227-015-1496-7",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Article{Shiaeles:2015:FII,
  author =       "Stavros N. Shiaeles and Maria Papadaki",
  title =        "{FHSD}: an Improved {IP} Spoof Detection Method for
                 {Web} {DDoS} Attacks",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "4",
  pages =        "892--903",
  month =        apr,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxu007",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Thu Mar 26 10:33:30 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/4.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/4/892",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "February 21, 2014",
}

@Article{Shim:2015:SDA,
  author =       "Kyung-Ah Shim and Cheol-Min Park",
  title =        "A Secure Data Aggregation Scheme Based on Appropriate
                 Cryptographic Primitives in Heterogeneous Wireless
                 Sensor Networks",
  journal =      j-IEEE-TRANS-PAR-DIST-SYS,
  volume =       "26",
  number =       "8",
  pages =        "2128--2139",
  month =        aug,
  year =         "2015",
  CODEN =        "ITDSEO",
  DOI =          "https://doi.org/10.1109/TPDS.2014.2346764",
  ISSN =         "1045-9219 (print), 1558-2183 (electronic)",
  ISSN-L =       "1045-9219",
  bibdate =      "Mon Aug 3 11:58:55 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranspardistsys.bib",
  URL =          "http://www.computer.org/csdl/trans/td/2015/08/06875932-abs.html",
  abstract-URL = "http://www.computer.org/csdl/trans/td/2015/08/06875932-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://www.computer.org/tpds/archives.htm",
}

@InProceedings{Shrestha:2015:CIS,
  author =       "Ajaya Shrestha and Arun Timalsina",
  booktitle =    "{2015 9th International Conference on Software,
                 Knowledge, Information Management and Applications
                 (SKIMA)}",
  title =        "Color image steganography technique using {Daubechies}
                 discrete wavelet transform",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  month =        dec,
  year =         "2015",
  DOI =          "https://doi.org/10.1109/skima.2015.7400039",
  bibdate =      "Sat Mar 10 14:29:20 2018",
  bibsource =    "https://www.math.utah.edu/pub/bibnet/authors/d/daubechies-ingrid.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  ORCID-numbers = "Daubechies, Ingrid/0000-0002-6472-1056",
  pagecount =    "7",
}

@Article{Shu:2015:PML,
  author =       "Tao Shu and Yingying Chen and Jie Yang",
  title =        "Protecting multi-lateral localization privacy in
                 pervasive environments",
  journal =      j-IEEE-TRANS-NETWORKING,
  volume =       "23",
  number =       "5",
  pages =        "1688--1701",
  month =        oct,
  year =         "2015",
  CODEN =        "IEANEP",
  DOI =          "https://doi.org/10.1109/TNET.2015.2478881",
  ISSN =         "1063-6692 (print), 1558-2566 (electronic)",
  ISSN-L =       "1063-6692",
  bibdate =      "Tue Jan 5 18:36:30 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
  abstract =     "Location-based services (LBSs) have raised serious
                 privacy concerns in the society, due to the possibility
                 of leaking a mobile user's location information in
                 enabling location-dependent services. While existing
                 location-privacy studies are mainly focused on
                 preventing the leakage of a user's location in
                 accessing the LBS server, the possible privacy leakage
                 in the calculation of the user's location, i.e., the
                 localization, has been largely ignored. Such a privacy
                 leakage stems from the fact that a localization
                 algorithm typically takes the location of anchors
                 (reference points for localization) as input, and
                 generates the target's location as output. As such, the
                 location of anchors and target could be leaked to
                 others. An adversary could further utilize the leakage
                 of anchor's locations to attack the localization
                 infrastructure and undermine the accurate estimation of
                 the target's location. To address this issue, in this
                 paper, we study the multilateral privacy-preserving
                 localization problem, whereby the location of a target
                 is calculated without the need of revealing anchors'
                 location, and the knowledge of the localization
                 outcome, i.e., the target's location, is strictly
                 limited to the target itself. To fully protect the
                 user's privacy, our study protects not only the user's
                 exact location information (the geo-coordinates), but
                 also any side information that may lead to a coarse
                 estimate of the location. We formulate the problem as a
                 secure least-squared-error (LSE) estimation for an
                 overdetermined linear system and develop three
                 privacy-preserving solutions by leveraging combinations
                 of information-hiding and homomorphic encryption. These
                 solutions provide different levels of protection for
                 location-side information and resilience to node
                 collusion and have the advantage of being able to trade
                 a user's privacy requirements for better computation
                 and communication efficiency. Through numerical
                 results, we verify the significant efficiency
                 improvement of the proposed schemes over existing
                 multiparty secure LSE algorithms.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE\slash ACM Transactions on Networking",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J771",
}

@Article{Shyu:2015:VCR,
  author =       "Shyong Jian Shyu",
  title =        "Visual cryptograms of random grids for threshold
                 access structures",
  journal =      j-THEOR-COMP-SCI,
  volume =       "565",
  number =       "??",
  pages =        "30--49",
  day =          "2",
  month =        feb,
  year =         "2015",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Wed Jan 7 16:00:37 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0304397514008408",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975/",
}

@Article{Simion:2015:RST,
  author =       "Emil Simion",
  title =        "The Relevance of Statistical Tests in Cryptography",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "1",
  pages =        "66--70",
  month =        jan # "\slash " # feb,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2015.16",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:13 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/01/msp2015010066-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/01/msp2015010066-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
}

@Article{Simmonds:2015:DII,
  author =       "Paul Simmonds",
  title =        "The digital identity issue",
  journal =      j-NETWORK-SECURITY,
  volume =       "2015",
  number =       "8",
  pages =        "8--13",
  month =        aug,
  year =         "2015",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(15)30069-6",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 17:01:22 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485815300696",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Singh:2015:EST,
  author =       "Dilraj Singh and Amardeep Singh",
  title =        "Enhanced Secure Trusted {AODV} {(ESTA)} Protocol to
                 Mitigate Blackhole Attack in Mobile Ad Hoc Networks",
  journal =      j-FUTURE-INTERNET,
  volume =       "7",
  number =       "3",
  pages =        "342--362",
  day =          "23",
  month =        sep,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi7030342",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:54 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/7/3/342",
  abstract =     "The self-organizing nature of the Mobile Ad hoc
                 Networks (MANETs) provide a communication channel
                 anywhere, anytime without any pre-existing network
                 infrastructure. However, it is exposed to various
                 vulnerabilities that may be exploited by the malicious
                 nodes. One such malicious behavior is introduced by
                 blackhole nodes, which can be easily introduced in the
                 network and, in turn, such nodes try to crumble the
                 working of the network by dropping the maximum data
                 under transmission. In this paper, a new protocol is
                 proposed which is based on the widely used Ad hoc
                 On-Demand Distance Vector (AODV) protocol, Enhanced
                 Secure Trusted AODV (ESTA), which makes use of multiple
                 paths along with use of trust and asymmetric
                 cryptography to ensure data security. The results,
                 based on NS-3 simulation, reveal that the proposed
                 protocol is effectively able to counter the blackhole
                 nodes in three different scenarios.",
  acknowledgement = ack-nhfb,
}

@Book{Smith:2015:DBP,
  author =       "Michael Smith",
  title =        "The Debs of {Bletchley Park} and other stories",
  publisher =    "Aurum Press",
  address =      "London, UK",
  pages =        "298 + 8",
  year =         "2015",
  ISBN =         "1-78131-387-3 (hardcover), 1-78131-388-1",
  ISBN-13 =      "978-1-78131-387-9 (hardcover), 978-1-78131-388-6",
  LCCN =         "D810.S7 S65 2015",
  bibdate =      "Thu Dec 28 10:06:30 MST 2017",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/bibnet/authors/t/turing-alan-mathison.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "At the peak of Bletchley's success, a total of twelve
                 thousand people worked there of whom more than eight
                 thousand were women. In \booktitle{The Debs of
                 Bletchley Park AND Other Stories}, author Michael
                 Smith, trustee of Bletchley Park and chair of the
                 Trust's Historical Advisory Committee, tells their
                 tale. Through interviews with the women themselves and
                 unique access to the Bletchley Park archives, Smith
                 reveals how they came to be there, the lives they gave
                 up to do `their bit' for the war effort, and the part
                 they played in the vital work of `Station X'.",
  acknowledgement = ack-nhfb,
  author-dates = "1952 May 1--",
  subject =      "World War, 1939--1945; Cryptography; Electronic
                 intelligence; Great Britain; Women; Cryptography;
                 Electronic intelligence; Women; Bletchley Park (Milton
                 Keynes, England); History; England; Milton Keynes;
                 Bletchley Park",
  tableofcontents = "The biggest lunatic asylum in Britain \\
                 Breaking Enigma \\
                 Sink the Bismarck \\
                 The Wrens arrive \\
                 Let's call the whole thing off \\
                 Turing and the U-boats \\
                 Dilly's girls \\
                 The world's first electronic computer \\
                 The Jappy Waaf \\
                 An extraordinary army of people",
}

@Book{Smith:2015:HHB,
  author =       "Christopher Smith",
  title =        "The hidden history of {Bletchley Park}: a social and
                 organisational history, 1939--1945",
  publisher =    "Palgrave Macmillan",
  address =      "New York, NY, USA",
  pages =        "vii + 238",
  year =         "2015",
  DOI =          "https://doi.org/10.1057/9781137484932",
  ISBN =         "1-137-48492-6",
  ISBN-13 =      "978-1-137-48492-5",
  LCCN =         "D810.C88 C653 2015",
  bibdate =      "Wed Dec 21 12:21:44 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/bibnet/authors/t/turing-alan-mathison.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "http://www.loc.gov/catdir/enhancements/fy1608/2015015176-d.html;
                 http://www.loc.gov/catdir/enhancements/fy1608/2015015176-t.html",
  abstract =     "Bletchley Park is typically described as a `unique'
                 institution, a conclusion derived from the
                 eccentricities of its most celebrated staff members,
                 its perceived egalitarian and collegiate working
                 environment, and the extreme secrecy surrounding its
                 activities. Yet contrary to this popular image of
                 Bletchley Park, the agency developed over the course of
                 the war into a highly regimented, highly professional
                 --- and highly typical --- wartime institution.
                 Notwithstanding the veil of secrecy that permeated
                 every level of its operation, the agency faced the same
                 kinds of logistical, organizational and administrative
                 challenges common to organizations during the war and
                 in many respects responded in a `typical' fashion.
                 Similarly, prevalent social norms within British
                 society dominated the day-to-day lives of staff
                 members. Meanwhile, the agency was able to function and
                 remain secret in no small part thanks to the
                 willingness of local people to accept a surprising
                 degree of wartime inconvenience and restriction.",
  acknowledgement = ack-nhfb,
  author-dates = "1986--",
  subject =      "World War, 1939--1945; Cryptography; Secret service;
                 Great Britain; Electronic intelligence; England;
                 Bletchley (Buckinghamshire); Women; Intelligence
                 service; Social aspects; History; 20th century;
                 Corporate culture; Bletchley (Buckinghamshire,
                 England); Social conditions",
  tableofcontents = "Introduction \\
                 1. The Organisation of the Government Code and Cypher
                 School \\
                 2. Recruitment at GC and CS: 1919--1945 \\
                 3. On-duty Life at the Government Code and Cypher
                 School \\
                 4. The Administration of Off-Duty Life and Staff
                 Welfare \\
                 5. Off-Duty Life: Staff Experience \\
                 6. Bletchley Park and its Impact on the Local Community
                 \\
                 Conclusion",
}

@Article{Somanatha:2015:RAK,
  author =       "Revathi Bangalore Somanatha and J. William Atwood",
  title =        "Router authentication, key management, and adjacency
                 management for securing inter-router control messages",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "79",
  number =       "??",
  pages =        "68--90",
  day =          "14",
  month =        mar,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Mon Feb 23 09:22:20 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1389128614004691",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286/",
}

@Article{Song:2015:ADT,
  author =       "WeiTao Song and Bin Hu",
  title =        "Approach to Detecting Type-Flaw Attacks Based on
                 Extended Strand Spaces",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "4",
  pages =        "572--587",
  month =        apr,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxu106",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Thu Mar 26 10:33:30 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/4.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/4/572",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "October 14, 2014",
}

@Article{Steel:2015:APF,
  author =       "Graham Steel",
  title =        "Automated Proof and Flaw-Finding Tools in
                 Cryptography",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "2",
  pages =        "81--83",
  month =        mar # "\slash " # apr,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2015.22",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jun 4 19:11:45 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/02/msp2015020081-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/02/msp2015020081-abs.html",
  acknowledgement = ack-nhfb,
}

@Article{Stenn:2015:SNT,
  author =       "Harlan Stenn",
  title =        "Securing {Network Time Protocol}",
  journal =      j-CACM,
  volume =       "58",
  number =       "2",
  pages =        "48--51",
  month =        feb,
  year =         "2015",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2697397",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Feb 10 13:56:49 MST 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cacm2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://cacm.acm.org/magazines/2015/2/182654/fulltext",
  abstract =     "Crackers discover how to use NTP as a weapon for
                 abuse.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Misc{Stevens:2015:FCF,
  author =       "Marc Stevens and Pierre Karpman and Thomas Peyrin",
  title =        "Freestart collision on full {SHA-1}",
  howpublished = "Cryptology ePrint Archive, Report 2015/967.",
  year =         "2015",
  bibdate =      "Thu Oct 15 06:33:53 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  URL =          "https://eprint.iacr.org/2015/967",
  abstract =     "We present in this article a freestart collision
                 example for SHA-1, i.e., a collision for its internal
                 compression function. This is the first practical break
                 of the full SHA-1, reaching all 80 out of 80 steps,
                 while only 10 days of computation on a 64 GPU cluster
                 were necessary to perform the attack. This work builds
                 on a continuous series of cryptanalytic advancements on
                 SHA-1 since the theoretical collision attack
                 breakthrough in 2005. In particular, we extend the
                 recent freestart collision work on reduced-round SHA-1
                 from CRYPTO 2015 that leverages the computational power
                 of graphic cards and adapt it to allow the use of
                 boomerang speed-up techniques. We also leverage the
                 cryptanalytic techniques by Stevens from EUROCRYPT 2013
                 to obtain optimal attack conditions, which required
                 further refinements for this work.\par

                 Freestart collisions, like the one presented here, do
                 not directly imply a collision for SHA-1. However, this
                 work is an important milestone towards an actual SHA-1
                 collision and it further shows how graphics cards can
                 be used very efficiently for these kind of attacks.
                 Based on the state-of-the-art collision attack on SHA-1
                 by Stevens from EUROCRYPT 2013, we are able to present
                 new projections on the computational/financial cost
                 required by a SHA-1 collision computation. These
                 projections are significantly lower than previously
                 anticipated by the industry, due to the use of the more
                 cost efficient graphics cards compared to regular
                 CPUs.\par

                 We therefore recommend the industry, in particular
                 Internet browser vendors and Certification Authorities,
                 to retract SHA-1 soon. We hope the industry has learned
                 from the events surrounding the cryptanalytic breaks of
                 MD5 and will retract SHA-1 before example signature
                 forgeries appear in the near future. With our new cost
                 projections in mind, we strongly and urgently recommend
                 against a recent proposal to extend the issuance of
                 SHA-1 certificates with a year in the CAB/forum (vote
                 closes October 9 2015).",
  acknowledgement = ack-nhfb,
  keywords =     "cryptanalysis; freestart collision; GPU
                 implementation; hash function; public-key cryptography
                 / SHA-1",
}

@Article{Stickney:2015:CBS,
  author =       "Zephorene Stickney",
  title =        "Code Breakers: The Secret Service",
  journal =      "Wheaton Quarterly",
  volume =       "??",
  number =       "??",
  pages =        "??--??",
  month =        "Summer",
  year =         "2015",
  bibdate =      "Sun Dec 31 07:51:47 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://wheatoncollege.edu/news/code-breakers-secret-service/",
  acknowledgement = ack-nhfb,
  remark =       "The URL points to a Spring 2011 issue.",
}

@Article{Sun:2015:FSW,
  author =       "Shi-Feng Sun and Dawu Gu and Zhengan Huang",
  title =        "Fully Secure Wicked Identity-Based Encryption Against
                 Key Leakage Attacks",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "10",
  pages =        "2520--2536",
  month =        oct,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxu110",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Sep 28 14:49:06 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/10.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/10/2520",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "November 12, 2014",
}

@Article{Suresh:2015:AGU,
  author =       "Chandra K. H. Suresh and Sule Ozev and Ozgur
                 Sinanoglu",
  title =        "Adaptive Generation of Unique {IDs} for Digital Chips
                 through Analog Excitation",
  journal =      j-TODAES,
  volume =       "20",
  number =       "3",
  pages =        "46:1--46:??",
  month =        jun,
  year =         "2015",
  CODEN =        "ATASFO",
  DOI =          "https://doi.org/10.1145/2732408",
  ISSN =         "1084-4309 (print), 1557-7309 (electronic)",
  ISSN-L =       "1084-4309",
  bibdate =      "Fri Aug 7 08:47:44 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/todaes/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/todaes.bib",
  abstract =     "Globalization of the integrated circuit design and
                 manufacturing flow has successfully ameliorated design
                 complexity and fabrication cost challenges, and helped
                 deliver cost-effective products while meeting stringent
                 time-to-market requirements. On the flip side, it has
                 resulted in various forms of security vulnerabilities
                 in the supply chain that involves designers, fabs, test
                 facilities, and distributors until the end-product
                 reaches customers. One of the biggest threats to
                 semiconductor industry today is the entry of aged,
                 reject, or cloned parts, that is, counterfeit chips,
                 into the supply chain, leading to annual revenue losses
                 in the order of billions of dollars. While traceability
                 of chips between trusted parties can help monitor the
                 supply chain at various points in the flow, existing
                 solutions are in the form of integrating costly
                 hardware units on chip, or utilizing easy-to-circumvent
                 inspection-based detection techniques. In this article,
                 we propose a technique for adaptive unique ID
                 generation that leverages process variations, enabling
                 chip traceability. The proposed method stimulates
                 digital chips with an analog signal from the supply
                 lines, which serve as primary inputs to each gate in
                 the signal path. Using a sinusoidal signal that
                 exercises the transistors as gain components, we create
                 a chip-specific response that can be post-processed
                 into a digital ID. The proposed technique enables quick
                 and cost-effective authenticity validation that
                 requires no on-chip hardware support. Our simulation
                 and experimentation on actual chips show that the
                 proposed technique is capable of generating unique IDs
                 even in the presence of environmental noise.",
  acknowledgement = ack-nhfb,
  articleno =    "46",
  fjournal =     "ACM Transactions on Design Automation of Electronic
                 Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J776",
}

@Article{Swierczynski:2015:PSE,
  author =       "Pawel Swierczynski and Amir Moradi and David Oswald
                 and Christof Paar",
  title =        "Physical Security Evaluation of the Bitstream
                 Encryption Mechanism of {Altera Stratix II} and
                 {Stratix III} {FPGAs}",
  journal =      j-TRETS,
  volume =       "7",
  number =       "4",
  pages =        "7:1--7:??",
  month =        jan,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2629462",
  ISSN =         "1936-7406 (print), 1936-7414 (electronic)",
  ISSN-L =       "1936-7406",
  bibdate =      "Fri Feb 13 07:24:19 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/trets.bib",
  abstract =     "To protect Field-Programmable Gate Array (FPGA)
                 designs against Intellectual Property (IP) theft and
                 related issues such as product cloning, all major FPGA
                 manufacturers offer a mechanism to encrypt the
                 bitstream that is used to configure the FPGA. From a
                 mathematical point of view, the employed encryption
                 algorithms (e.g., Advanced Encryption Standard (AES) or
                 3DES) are highly secure. However, it has been shown
                 that the bitstream encryption feature of several FPGA
                 families is susceptible to side-channel attacks based
                 on measuring the power consumption of the cryptographic
                 module. In this article, we present the first
                 successful attack on the bitstream encryption of the
                 Altera Stratix II and Stratix III FPGA families. To
                 this end, we analyzed the Quartus II software and
                 reverse engineered the details of the proprietary and
                 unpublished schemes used for bitstream encryption on
                 Stratix II and Stratix III. Using this knowledge, we
                 demonstrate that the full 128-bit AES key of a Stratix
                 II as well as the full 256-bit AES key of a Stratix III
                 can be recovered by means of side-channel attacks. In
                 both cases, the attack can be conducted in a few hours.
                 The complete bitstream of these FPGAs that are
                 (seemingly) protected by the bitstream encryption
                 feature can hence fall into the hands of a competitor
                 or criminal-possibly implying system-wide damage if
                 confidential information such as proprietary encryption
                 schemes or secret keys programmed into the FPGA are
                 extracted. In addition to lost IP, reprogramming the
                 attacked FPGA with modified code, for instance, to
                 secretly plant a hardware Trojan, is a particularly
                 dangerous scenario for many security-critical
                 applications.",
  acknowledgement = ack-nhfb,
  articleno =    "7",
  fjournal =     "ACM Transactions on Reconfigurable Technology and
                 Systems (TRETS)",
  journal-URL =  "http://portal.acm.org/toc.cfm?id=J1151",
}

@Article{Tamayo:2015:AFH,
  author =       "Matthew Tamayo",
  title =        "Algebraic full homomorphic encryption and resisting
                 {Gr{\"o}bner} basis cryptanalysis",
  journal =      j-ACM-COMM-COMP-ALGEBRA,
  volume =       "49",
  number =       "2",
  pages =        "63--63",
  month =        jun,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2815111.2815160",
  ISSN =         "1932-2232 (print), 1932-2240 (electronic)",
  ISSN-L =       "1932-2232",
  bibdate =      "Fri Aug 14 17:27:46 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigsam.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Communications in Computer Algebra",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1000",
}

@Article{Tang:2015:CER,
  author =       "Ying-Kai Tang and Sherman S. M. Chow and Joseph K.
                 Liu",
  title =        "Comments on {`Efficient Revocable Certificateless
                 Encryption Secure in the Standard Model'}",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "4",
  pages =        "779--781",
  month =        apr,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxt127",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Thu Mar 26 10:33:30 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/4.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/4/779",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "November 1, 2013",
}

@Article{Tang:2015:ECP,
  author =       "Qiang Tang and Hua Ma and Xiaofeng Chen",
  title =        "Extend the Concept of Public Key Encryption with
                 Delegated Search",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "4",
  pages =        "724--734",
  month =        apr,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxt102",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Thu Mar 26 10:33:30 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/4.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/4/724",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "September 6, 2013",
}

@Article{Tang:2015:ETE,
  author =       "Qiang Tang",
  title =        "From Ephemerizer to Timed-Ephemerizer: Achieve Assured
                 Lifecycle Enforcement for Sensitive Data",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "4",
  pages =        "1003--1020",
  month =        apr,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxu030",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Thu Mar 26 10:33:30 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/4.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/4/1003",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "May 2, 2014",
}

@Article{Tang:2015:HAC,
  author =       "Zhaohui Tang",
  title =        "Homomorphic authentication codes for network coding",
  journal =      j-CCPE,
  volume =       "27",
  number =       "15",
  pages =        "3892--3911",
  month =        oct,
  year =         "2015",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.3079",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Mon Sep 28 09:32:54 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "4 Jul 2013",
}

@Article{Tian:2015:IBP,
  author =       "Miaomiao Tian",
  title =        "Identity-based proxy re-signatures from lattices",
  journal =      j-INFO-PROC-LETT,
  volume =       "115",
  number =       "4",
  pages =        "462--467",
  month =        apr,
  year =         "2015",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Tue Jan 20 08:43:02 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S002001901400266X",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190/",
}

@Article{Tilli:2015:GCR,
  author =       "Andrea Tilli and Andrea Bartolini and Matteo Cacciari
                 and Luca Benini",
  title =        "Guaranteed Computational Resprinting via
                 Model-Predictive Control",
  journal =      j-TECS,
  volume =       "14",
  number =       "3",
  pages =        "48:1--48:??",
  month =        apr,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2724715",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Tue Apr 21 17:21:32 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tecs.bib",
  abstract =     "Today and future many-core systems are facing the
                 utilization wall and dark silicon problems, for which
                 not all the processing engines can be powered at the
                 same time as this will lead to a power consumption
                 higher than the Total Design Power (TDP) budget.
                 Recently, computational sprinting approaches addressed
                 the problem by exploiting the intrinsic thermal
                 capacitance of the chip and the properties of common
                 applications, which require intense, but temporary, use
                 of resources. The thermal capacitance, possibly
                 augmented with phase change materials, enables the
                 temporary activation of all the resources
                 simultaneously, although they largely exceed the
                 steady-state thermal design power. In this article, we
                 present an innovative and low-overhead hierarchical
                 model-predictive controller for managing thermally safe
                 sprinting with predictable resprinting rate, which
                 ensures the correct execution of mixed-criticality
                 tasks. Well-targeted simulations, also based on real
                 workload benchmarks, show the applicability and the
                 effectiveness of our solution.",
  acknowledgement = ack-nhfb,
  articleno =    "48",
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J840",
}

@Article{Tseng:2015:LFI,
  author =       "Yuh-Min Tseng and Tung-Tso Tsai and Sen-Shan Huang",
  title =        "Leakage-Free {ID}-Based Signature",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "4",
  pages =        "750--757",
  month =        apr,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxt116",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Thu Mar 26 10:33:30 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/4.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/4/750",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "October 11, 2013",
}

@Article{Tupakula:2015:TES,
  author =       "Udaya Tupakula and Vijay Varadharajan",
  title =        "Trust Enhanced Security for Tenant Transactions in the
                 Cloud Environment",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "10",
  pages =        "2388--2403",
  month =        oct,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxu048",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Sep 28 14:49:06 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/10.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/10/2388",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "June 17, 2014",
}

@Article{Unruh:2015:RQT,
  author =       "Dominique Unruh",
  title =        "Revocable Quantum Timed-Release Encryption",
  journal =      j-J-ACM,
  volume =       "62",
  number =       "6",
  pages =        "49:1--49:??",
  month =        dec,
  year =         "2015",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/2817206",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  bibdate =      "Mon Dec 21 17:57:46 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Timed-release encryption is a kind of encryption
                 scheme in which a recipient can decrypt only after a
                 specified amount of time T (assuming that we have a
                 moderately precise estimate of his computing power). A
                 revocable timed-release encryption is one where, before
                 the time T is over, the sender can ``give back'' the
                 timed-release encryption, provably loosing all access
                 to the data. We show that revocable timed-release
                 encryption without trusted parties is possible using
                 quantum cryptography (while trivially impossible
                 classically). Along the way, we develop two proof
                 techniques in the quantum random oracle model that we
                 believe may have applications also for other protocols.
                 Finally, we also develop another new primitive, unknown
                 recipient encryption, which allows us to send a message
                 to an unknown/unspecified recipient over an insecure
                 network in such a way that at most one recipient will
                 get the message.",
  acknowledgement = ack-nhfb,
  articleno =    "49",
  fjournal =     "Journal of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J401",
}

@Article{Vernize:2015:MNI,
  author =       "Grazielle Vernize and Andr{\'e} Luiz Pires Guedes and
                 Luiz Carlos Pessoa Albini",
  title =        "Malicious Nodes Identification for Complex Network
                 Based on Local Views",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "10",
  pages =        "2476--2491",
  month =        oct,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxu086",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Sep 28 14:49:06 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/10.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/10/2476",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "September 30, 2014",
}

@Article{Vigil:2015:IAN,
  author =       "Mart{\'\i}n Vigil and Johannes Buchmann and Daniel
                 Cabarcas and Christian Weinert and Alexander
                 Wiesmaier",
  title =        "Integrity, authenticity, non-repudiation, and proof of
                 existence for long-term archiving: a survey",
  journal =      j-COMPUT-SECUR,
  volume =       "50",
  number =       "??",
  pages =        "16--32",
  month =        may,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:41 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814001849",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Vlachos:2015:DPC,
  author =       "Michail Vlachos and Johannes Schneider and Vassilios
                 G. Vassiliadis",
  title =        "On Data Publishing with Clustering Preservation",
  journal =      j-TKDD,
  volume =       "9",
  number =       "3",
  pages =        "23:1--23:??",
  month =        apr,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2700403",
  ISSN =         "1556-4681 (print), 1556-472X (electronic)",
  ISSN-L =       "1556-4681",
  bibdate =      "Tue Apr 14 09:22:28 MDT 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tkdd/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tkdd.bib",
  abstract =     "The emergence of cloud-based storage services is
                 opening up new avenues in data exchange and data
                 dissemination. This has amplified the interest in
                 right-protection mechanisms to establish ownership in
                 the event of data leakage. Current right-protection
                 technologies, however, rarely provide strong guarantees
                 on dataset utility after the protection process. This
                 work presents techniques that explicitly address this
                 topic and provably preserve the outcome of certain
                 mining operations. In particular, we take special care
                 to guarantee that the outcome of hierarchical
                 clustering operations remains the same before and after
                 right protection. Our approach considers all prevalent
                 hierarchical clustering variants: single-, complete-,
                 and average-linkage. We imprint the ownership in a
                 dataset using watermarking principles, and we derive
                 tight bounds on the expansion/contraction of distances
                 incurred by the process. We leverage our analysis to
                 design fast algorithms for right protection without
                 exhaustively searching the vast design space. Finally,
                 because the right-protection process introduces a
                 user-tunable distortion on the dataset, we explore the
                 possibility of using this mechanism for data
                 obfuscation. We quantify the tradeoff between
                 obfuscation and utility for spatiotemporal datasets and
                 discover very favorable characteristics of the process.
                 An additional advantage is that when one is interested
                 in both right-protecting and obfuscating the original
                 data values, the proposed mechanism can accomplish both
                 tasks simultaneously.",
  acknowledgement = ack-nhfb,
  articleno =    "23",
  fjournal =     "ACM Transactions on Knowledge Discovery from Data
                 (TKDD)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1054",
}

@Article{Vliegen:2015:SRD,
  author =       "Jo Vliegen and Nele Mentens and Ingrid Verbauwhede",
  title =        "Secure, Remote, Dynamic Reconfiguration of {FPGAs}",
  journal =      j-TRETS,
  volume =       "7",
  number =       "4",
  pages =        "8:1--8:??",
  month =        jan,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2629423",
  ISSN =         "1936-7406 (print), 1936-7414 (electronic)",
  ISSN-L =       "1936-7406",
  bibdate =      "Fri Feb 13 07:24:19 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/trets.bib",
  abstract =     "With the widespread availability of broadband
                 Internet, Field-Programmable Gate Arrays (FPGAs) can
                 get remote updates in the field. This provides hardware
                 and software updates, and enables issue solving and
                 upgrade ability without device modification. In order
                 to prevent an attacker from eavesdropping or
                 manipulating the configuration data, security is a
                 necessity. This work describes an architecture that
                 allows the secure, remote reconfiguration of an FPGA.
                 The architecture is partially dynamically
                 reconfigurable and it consists of a static partition
                 that handles the secure communication protocol and a
                 single reconfigurable partition that holds the main
                 application. Our solution distinguishes itself from
                 existing work in two ways: it provides entity
                 authentication and it avoids the use of a trusted third
                 party. The former provides protection against active
                 attackers on the communication channel, while the
                 latter reduces the number of reliable entities.
                 Additionally, this work provides basic countermeasures
                 against simple power-oriented side-channel analysis
                 attacks. The result is an implementation that is
                 optimized toward minimal resource occupation. Because
                 configuration updates occur infrequently, configuration
                 speed is of minor importance with respect to area. A
                 prototype of the proposed design is implemented, using
                 5,702 slices and having minimal downtime.",
  acknowledgement = ack-nhfb,
  articleno =    "8",
  fjournal =     "ACM Transactions on Reconfigurable Technology and
                 Systems (TRETS)",
  journal-URL =  "http://portal.acm.org/toc.cfm?id=J1151",
}

@Article{VonMaurich:2015:IQM,
  author =       "Ingo {Von Maurich} and Tobias Oder and Tim
                 G{\"u}neysu",
  title =        "Implementing {QC--MDPC} {McEliece} Encryption",
  journal =      j-TECS,
  volume =       "14",
  number =       "3",
  pages =        "44:1--44:??",
  month =        apr,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2700102",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Tue Apr 21 17:21:32 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tecs.bib",
  abstract =     "With respect to performance, asymmetric code-based
                 cryptography based on binary Goppa codes has been
                 reported as a highly interesting alternative to RSA and
                 ECC. A major drawback is still the large keys in the
                 range between 50 and 100KB that prevented real-world
                 applications of code-based cryptosystems so far. A
                 recent proposal by Misoczki et al. showed that
                 quasi-cyclic moderate-density parity-check (QC-MDPC)
                 codes can be used in McEliece encryption, reducing the
                 public key to just 0.6KB to achieve an 80-bit security
                 level. In this article, we provide optimized decoding
                 techniques for MDPC codes and survey several efficient
                 implementations of the QC-MDPC McEliece cryptosystem.
                 This includes high-speed and lightweight architectures
                 for reconfigurable hardware, efficient coding styles
                 for ARM's Cortex-M4 microcontroller, and novel
                 high-performance software implementations that fully
                 employ vector instructions. Finally, we conclude that
                 McEliece encryption in combination with QC-MDPC codes
                 not only enables high-performance implementations but
                 also allows for lightweight designs on a wide range of
                 different platforms.",
  acknowledgement = ack-nhfb,
  articleno =    "44",
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J840",
}

@Article{Vu:2015:NAN,
  author =       "Hai L. Vu and Kenneth K. Khaw and Tsong Yueh Chen",
  title =        "A New Approach for Network Vulnerability Analysis",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "4",
  pages =        "878--891",
  month =        apr,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxt149",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Thu Mar 26 10:33:30 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/4.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/4/878",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "January 5, 2014",
}

@Article{Wang:2015:EFF,
  author =       "Wei Wang and Yin Hu and Lianmu Chen and Xinming Huang
                 and B. Sunar",
  title =        "Exploring the Feasibility of Fully Homomorphic
                 Encryption",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "64",
  number =       "3",
  pages =        "698--706",
  month =        mar,
  year =         "2015",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2013.154",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Tue Mar 17 18:41:22 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Wang:2015:HAD,
  author =       "Xing Wang and Nga Lam Or and Ziyan Lu and Derek Pao",
  title =        "Hardware Accelerator to Detect Multi-Segment Virus
                 Patterns",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "10",
  pages =        "2443--2460",
  month =        oct,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxu079",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Sep 28 14:49:06 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/10.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/10/2443",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "August 22, 2014",
}

@Article{Wang:2015:RSA,
  author =       "Yang Wang and Willy Susilo and Man Ho Au",
  title =        "Revisiting Security Against the Arbitrator in
                 Optimistic Fair Exchange",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "10",
  pages =        "2665--2676",
  month =        oct,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxv011",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Sep 28 14:49:06 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/10.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/10/2665",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "February 12, 2015",
}

@Article{Watts:2015:HGA,
  author =       "Steve Watts",
  title =        "The holy grail of authentication",
  journal =      j-NETWORK-SECURITY,
  volume =       "2015",
  number =       "12",
  pages =        "18--19",
  month =        dec,
  year =         "2015",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(15)30113-6",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 17:01:27 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485815301136",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Wei:2015:CPK,
  author =       "Puwen Wei and Yuliang Zheng",
  title =        "On the Construction of Public Key Encryption with
                 Sender Recovery",
  journal =      j-INT-J-FOUND-COMP-SCI,
  volume =       "26",
  number =       "1",
  pages =        "1--??",
  month =        jan,
  year =         "2015",
  CODEN =        "IFCSEN",
  DOI =          "https://doi.org/10.1142/S012905411550001X",
  ISSN =         "0129-0541",
  ISSN-L =       "0129-0541",
  bibdate =      "Tue Apr 14 10:17:11 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijfcs.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Foundations of Computer
                 Science (IJFCS)",
  journal-URL =  "http://www.worldscientific.com/loi/ijfcs",
}

@Article{Wei:2015:FST,
  author =       "Jianghong Wei and Wenfen Liu and Xuexian Hu",
  title =        "Forward-Secure Threshold Attribute-Based Signature
                 Scheme",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "10",
  pages =        "2492--2506",
  month =        oct,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxu095",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Sep 28 14:49:06 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/10.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/10/2492",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "September 25, 2014",
}

@Article{Wei:2015:TPE,
  author =       "Lei Wei and Michael K. Reiter",
  title =        "Toward practical encrypted email that supports
                 private, regular-expression searches",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "5",
  pages =        "397--416",
  month =        oct,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0268-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:44 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib;
                 https://www.math.utah.edu/pub/tex/bib/string-matching.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0268-3;
                 http://link.springer.com/content/pdf/10.1007/s10207-014-0268-3.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
  keywords =     "Cloud security; Private search on encrypted data;
                 Regular-expression search",
}

@Article{Wendzel:2015:CME,
  author =       "S. Wendzel and C. Palmer",
  title =        "Creativity in Mind: Evaluating and Maintaining
                 Advances in Network Steganographic Research",
  journal =      j-J-UCS,
  volume =       "21",
  number =       "12",
  pages =        "1684--??",
  month =        "????",
  year =         "2015",
  CODEN =        "????",
  ISSN =         "0948-695X (print), 0948-6968 (electronic)",
  ISSN-L =       "0948-6968",
  bibdate =      "Wed Sep 7 16:47:22 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jucs.bib",
  URL =          "http://www.jucs.org/jucs_21_12/creativity_in_mind_evaluating",
  acknowledgement = ack-nhfb,
  fjournal =     "J.UCS: Journal of Universal Computer Science",
  journal-URL =  "http://www.jucs.org/jucs",
}

@Book{West:2015:EC,
  author =       "Tom West",
  title =        "The {Einstein} code",
  publisher =    "Pan Books",
  address =      "London, UK",
  pages =        "400",
  year =         "2015",
  ISBN =         "1-4472-1034-4 (paperback), 1-4472-4660-8 (ePub
                 e-book)",
  ISBN-13 =      "978-1-4472-1034-4 (paperback), 978-1-4472-4660-2 (ePub
                 ebook)",
  LCCN =         "????",
  bibdate =      "Fri Aug 21 10:35:08 MDT 2015",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/einstein.bib",
  abstract =     "A lost cipher. A race against time to decode it.
                 Marine archaeologists Kate Wetherall and Lou Bates are
                 diving off Howland Island in the middle of the Pacific
                 Ocean, when a torpedo-shaped object hurtles through the
                 water towards them; the fuselage of Amelia Earhart's
                 lost plane. In the cockpit, they find a corroded metal
                 cylinder the size of a baton. Landing back on US soil,
                 Kate and Lou are arrested and interrogated by special
                 forces, and the cylinder confiscated. Behind the
                 arrests is Glena Buckingham, CEO of the powerful energy
                 conglomerate Eurenergy, as she too has discovered that
                 the wrecked plane may have held precious secret cargo.
                 Meanwhile, an extraordinary piece of footage has come
                 to light - of Einstein talking about a radical new
                 defence technology he had been working on. Whoever can
                 decrypt the lost cipher, which holds the key to
                 Einstein's secret defence technology, could hold the
                 key to global power.",
  acknowledgement = ack-nhfb,
  subject =      "Marine archaeologists; Fiction; Underwater
                 archaeology; Technological innovations; Code and cipher
                 stories",
}

@Article{Wu:2015:TRM,
  author =       "Guowei Wu and Zuosong Liu and Lin Yao and Jing Deng
                 and Jie Wang",
  title =        "A Trust Routing for Multimedia Social Networks",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "4",
  pages =        "688--699",
  month =        apr,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxu091",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Thu Mar 26 10:33:30 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/4.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/4/688",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "October 4, 2014",
}

@Article{Xia:2015:SPK,
  author =       "Q. Xia and J. Ni and A. J. B. A. Kanpogninge and J. C.
                 Gee",
  title =        "Searchable Public-Key Encryption with Data Sharing in
                 Dynamic Groups for Mobile Cloud Storage",
  journal =      j-J-UCS,
  volume =       "21",
  number =       "3",
  pages =        "440--??",
  month =        "????",
  year =         "2015",
  CODEN =        "????",
  ISSN =         "0948-695X (print), 0948-6968 (electronic)",
  ISSN-L =       "0948-6968",
  bibdate =      "Wed Sep 7 16:47:18 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jucs.bib",
  URL =          "http://www.jucs.org/jucs_21_3/searchable_public_key_encryption",
  acknowledgement = ack-nhfb,
  fjournal =     "J.UCS: Journal of Universal Computer Science",
  journal-URL =  "http://www.jucs.org/jucs",
}

@Article{Xiang:2015:SSB,
  author =       "Yong Xiang and I. Natgunanathan and Yue Rong and Song
                 Guo",
  title =        "Spread Spectrum-Based High Embedding Capacity
                 Watermarking Method for Audio Signals",
  journal =      j-IEEE-ACM-TASLP,
  volume =       "23",
  number =       "12",
  pages =        "2228--2237",
  month =        dec,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/TASLP.2015.2476755",
  ISSN =         "2329-9290",
  ISSN-L =       "2329-9290",
  bibdate =      "Tue Nov 17 07:34:26 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeeacmtaslp.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE\slash ACM Transactions on Audio, Speech, and
                 Language Processing",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6570655",
}

@Article{Xiong:2015:SRE,
  author =       "Lizhi Xiong and Zhengquan Xu and Yanyan Xu",
  title =        "A secure re-encryption scheme for data services in a
                 cloud computing environment",
  journal =      j-CCPE,
  volume =       "27",
  number =       "17",
  pages =        "4573--4585",
  day =          "10",
  month =        dec,
  year =         "2015",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.3423",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Tue Feb 9 06:13:20 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "23 Jan 2015",
}

@Article{Xu:2015:ORA,
  author =       "Chang Xu and Liehuang Zhu and Zhoujun Li and Feng
                 Wang",
  title =        "One-Round Affiliation-Hiding Authenticated Asymmetric
                 Group Key Agreement with Semi-trusted Group Authority",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "10",
  pages =        "2509--2519",
  month =        oct,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxu099",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Sep 28 14:49:06 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/10.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/10/2509",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "October 6, 2014",
}

@Article{Yang:2015:EPS,
  author =       "Bin Yang and Xingming Sun and Xianyi Chen and Jianjun
                 Zhang and Xu Li",
  title =        "Exposing Photographic Splicing by Detecting the
                 Inconsistencies in Shadows",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "4",
  pages =        "588--600",
  month =        apr,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxu146",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Thu Mar 26 10:33:30 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/4.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/4/588",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "December 15, 2014",
}

@Article{Yang:2015:RCI,
  author =       "Hong-Ying Yang and Xiang-Yang Wang and Pan-Pan Niu and
                 Ai-Long Wang",
  title =        "Robust Color Image Watermarking Using Geometric
                 Invariant Quaternion Polar Harmonic Transform",
  journal =      j-TOMCCAP,
  volume =       "11",
  number =       "3",
  pages =        "40:1--40:??",
  month =        jan,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2700299",
  ISSN =         "1551-6857 (print), 1551-6865 (electronic)",
  ISSN-L =       "1551-6857",
  bibdate =      "Thu Feb 5 17:03:39 MST 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tomccap/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tomccap.bib",
  abstract =     "It is a challenging work to design a robust color
                 image watermarking scheme against geometric
                 distortions. Moments and moment invariants have become
                 a powerful tool in robust image watermarking owing to
                 their image description capability and geometric
                 invariance property. However, the existing moment-based
                 watermarking schemes were mainly designed for gray
                 images but not for color images, and detection quality
                 and robustness will be lowered when watermark is
                 directly embedded into the luminance component or three
                 color channels of color images. Furthermore, the
                 imperceptibility of the embedded watermark is not well
                 guaranteed. Based on algebra of quaternions and polar
                 harmonic transform (PHT), we introduced the quaternion
                 polar harmonic transform (QPHT) for invariant color
                 image watermarking in this article, which can be seen
                 as the generalization of PHT for gray-level images. It
                 is shown that the QPHT can be obtained from the PHT of
                 each color channel. We derived and analyzed the
                 rotation, scaling, and translation (RST) invariant
                 property of QPHT. We also discussed the problem of
                 color image watermarking using QPHT. Experimental
                 results are provided to illustrate the efficiency of
                 the proposed color image watermarking against geometric
                 distortions and common image processing operations
                 (including color attacks).",
  acknowledgement = ack-nhfb,
  articleno =    "40",
  fjournal =     "ACM Transactions on Multimedia Computing,
                 Communications, and Applications",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J961",
}

@Article{Yang:2015:SHI,
  author =       "Zhen Yang and Kaiming Gao and Kefeng Fan and Yingxu
                 Lai",
  title =        "Sensational Headline Identification By Normalized
                 Cross Entropy-Based Metric",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "4",
  pages =        "644--655",
  month =        apr,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxu107",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Thu Mar 26 10:33:30 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/4.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/4/644",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "October 14, 2014",
}

@Article{Yao:2015:LAB,
  author =       "Xuanxia Yao and Zhi Chen and Ye Tian",
  title =        "A lightweight attribute-based encryption scheme for
                 the {Internet of Things}",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "49",
  number =       "??",
  pages =        "104--112",
  month =        aug,
  year =         "2015",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Wed Apr 29 07:41:59 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X14002039",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X/",
}

@Article{Yasuda:2015:MQC,
  author =       "Takanori Yasuda and Xavier Dahan and Yun-Ju Huang and
                 Tsuyoshi Takagi and Kouichi Sakurai",
  title =        "A multivariate quadratic challenge toward post-quantum
                 generation cryptography",
  journal =      j-ACM-COMM-COMP-ALGEBRA,
  volume =       "49",
  number =       "3",
  pages =        "105--107",
  month =        sep,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2850449.2850462",
  ISSN =         "1932-2232 (print), 1932-2240 (electronic)",
  ISSN-L =       "1932-2232",
  bibdate =      "Wed Dec 2 14:16:56 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigsam.bib",
  abstract =     "Multivariate polynomials over finite fields have found
                 applications in Public Key Cryptography (PKC) where the
                 hardness to find solutions provides the ``one-way
                 function'' indispensable to such cryptosystems. Several
                 schemes for both encryption and signature have been
                 proposed, many of which are using quadratic (degree 2)
                 polynomials. Finding a solution to such systems in
                 general is called MQ problem, which easiest ``generic''
                 instances are NP-hard. An important feature of this
                 Multivariate Pubic Key Cryptography (MPKC) is the
                 resistance to quantum computers: no faster quantum
                 algorithm than classical ones to solve MQ problem is
                 known. Besides being thereby a candidate for
                 Post-Quantum Cryptography, signatures are much shorter
                 than to other candidates. We have established an open
                 public ``MQ Challenge'' (https://www.mqchallenge.org)
                 to stimulate progress in the design of efficient
                 algorithms to solve MQ problem, and thus test limit
                 parameters guaranteeing security of MPKC.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Communications in Computer Algebra",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1000",
}

@Article{Yesilyurt:2015:RWM,
  author =       "Murat Yesilyurt and Yildiray Yalman and A. Turan
                 Ozcerit",
  title =        "A Robust Watermarking Method for {MPEG-4} Based on
                 Kurtosis",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "7",
  pages =        "1645--1655",
  month =        jul,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxu112",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Jul 28 10:40:55 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/7.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/7/1645",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "October 24, 2014",
}

@Article{Young:2015:DWE,
  author =       "Vinson Young and Prashant J. Nair and Moinuddin K.
                 Qureshi",
  title =        "{DEUCE}: Write-Efficient Encryption for Non-Volatile
                 Memories",
  journal =      j-SIGPLAN,
  volume =       "50",
  number =       "4",
  pages =        "33--44",
  month =        apr,
  year =         "2015",
  CODEN =        "SINODQ",
  DOI =          "https://doi.org/10.1145/2775054.2694387",
  ISSN =         "0362-1340 (print), 1523-2867 (print), 1558-1160
                 (electronic)",
  ISSN-L =       "0362-1340",
  bibdate =      "Tue May 12 17:41:19 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigplan2010.bib",
  abstract =     "Phase Change Memory (PCM) is an emerging Non Volatile
                 Memory (NVM) technology that has the potential to
                 provide scalable high-density memory systems. While the
                 non-volatility of PCM is a desirable property in order
                 to save leakage power, it also has the undesirable
                 effect of making PCM main memories susceptible to newer
                 modes of security vulnerabilities, for example,
                 accessibility to sensitive data if a PCM DIMM gets
                 stolen. PCM memories can be made secure by encrypting
                 the data. Unfortunately, such encryption comes with a
                 significant overhead in terms of bits written to PCM
                 memory, causing half of the bits in the line to change
                 on every write, even if the actual number of bits being
                 written to memory is small. Our studies show that a
                 typical writeback modifies, on average, only 12\% of
                 the bits in the cacheline. Thus, encryption causes
                 almost a 4x increase in the number of bits written to
                 PCM memories. Such extraneous bit writes cause
                 significant increase in write power, reduction in write
                 endurance, and reduction in write bandwidth. To provide
                 the benefit of secure memory in a write efficient
                 manner this paper proposes Dual Counter Encryption
                 (DEUCE). DEUCE is based on the observation that a
                 typical writeback only changes a few words, so DEUCE
                 reencrypts only the words that have changed. We show
                 that DEUCE reduces the number of modified bits per
                 writeback for a secure memory from 50\% to 24\%, which
                 improves performance by 27\% and increases lifetime by
                 2x.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGPLAN Notices",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J706",
  remark =       "ASPLOS '15 conference proceedings.",
}

@Article{Yu:2015:SDS,
  author =       "Yong Yu and Man Ho Au and Yi Mu and Willy Susilo and
                 Huai Wu",
  title =        "Secure Delegation of Signing Power from
                 Factorization",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "4",
  pages =        "867--877",
  month =        apr,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxt144",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Thu Mar 26 10:33:30 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/4.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/4/867",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "December 18, 2013",
}

@Article{Yumbul:2015:EEP,
  author =       "Kazim Yumbul and Erkay Sava{\c{s}}",
  title =        "Enhancing an Embedded Processor Core for Efficient and
                 Isolated Execution of Cryptographic Algorithms",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "10",
  pages =        "2368--2387",
  month =        oct,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxu040",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Sep 28 14:49:06 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/10.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/10/2368",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "May 19, 2014",
}

@Article{Zadeh:2015:ASP,
  author =       "Abdulah Abdulah Zadeh and Howard M. Heys",
  title =        "Application of Simple Power Analysis to Stream Ciphers
                 Constructed Using Feedback Shift Registers",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "4",
  pages =        "961--972",
  month =        apr,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxu021",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Thu Mar 26 10:33:30 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/4.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/4/961",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "March 21, 2014",
}

@Article{Zavattoni:2015:SIA,
  author =       "E. Zavattoni and L. J. Dominguez Perez and S.
                 Mitsunari and A. H. Sanchez-Ramirez and T. Teruya and
                 F. Rodriguez-Henriquez",
  title =        "Software Implementation of an Attribute-Based
                 Encryption Scheme",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "64",
  number =       "5",
  pages =        "1429--1441",
  month =        "????",
  year =         "2015",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2014.2329681",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Thu Jun 4 19:46:44 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Zhang:2015:BYO,
  author =       "Hongwen Zhang",
  title =        "Bring your own encryption: balancing security with
                 practicality",
  journal =      j-NETWORK-SECURITY,
  volume =       "2015",
  number =       "1",
  pages =        "18--20",
  month =        jan,
  year =         "2015",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(15)70011-5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 17:01:15 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485815700115",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Zhang:2015:FAA,
  author =       "Zhiyong Zhang and Kanliang Wang",
  title =        "A Formal Analytic Approach to Credible Potential Path
                 and Mining Algorithms for Multimedia Social Networks",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "4",
  pages =        "668--678",
  month =        apr,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxu035",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Thu Mar 26 10:33:30 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/4.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/4/668",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "June 5, 2014",
}

@Article{Zhang:2015:FER,
  author =       "Mingwu Zhang and Chunzhi Wang and Tsuyoshi Takagi and
                 Yi Mu",
  title =        "Functional Encryption Resilient to Hard-to-Invert
                 Leakage",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "4",
  pages =        "735--749",
  month =        apr,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxt105",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Thu Mar 26 10:33:30 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/4.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/4/735",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "September 26, 2013",
}

@Article{Zhang:2015:IAI,
  author =       "Zhi-Kai Zhang and Michael Cheng Yi Cho and Zong-Yu Wu
                 and Shiuhpyng Winston Shieh",
  title =        "Identifying and Authenticating {IoT} Objects in a
                 Natural Context",
  journal =      j-COMPUTER,
  volume =       "48",
  number =       "8",
  pages =        "81--83",
  month =        aug,
  year =         "2015",
  CODEN =        "CPTRB4",
  DOI =          "https://doi.org/10.1109/MC.2015.213",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Tue Nov 3 07:04:37 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computer2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://csdl.computer.org/csdl/mags/co/2015/08/mco2015080081-abs.html",
  abstract-URL = "http://csdl.computer.org/csdl/mags/co/2015/08/mco2015080081-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
}

@Article{Zhang:2015:ITS,
  author =       "Jie Zhang and Futai Zhang",
  title =        "Information-theoretical secure verifiable secret
                 sharing with vector space access structures over
                 bilinear groups and its applications",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "52",
  number =       "??",
  pages =        "109--115",
  month =        nov,
  year =         "2015",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Sat Jul 25 08:56:11 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X14002477",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X/",
}

@Article{Zhang:2015:MAA,
  author =       "G. Zhang and J. Qin and S. Qazi",
  title =        "Multi-Authority Attribute-Based Encryption Scheme from
                 Lattices",
  journal =      j-J-UCS,
  volume =       "21",
  number =       "3",
  pages =        "483--??",
  month =        "????",
  year =         "2015",
  CODEN =        "????",
  ISSN =         "0948-695X (print), 0948-6968 (electronic)",
  ISSN-L =       "0948-6968",
  bibdate =      "Wed Sep 7 16:47:18 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jucs.bib",
  URL =          "http://www.jucs.org/jucs_21_3/multi_authority_attribute_based",
  acknowledgement = ack-nhfb,
  fjournal =     "J.UCS: Journal of Universal Computer Science",
  journal-URL =  "http://www.jucs.org/jucs",
}

@Article{Zhang:2015:PCL,
  author =       "Zongyang Zhang and Sherman S. M. Chow and Zhenfu Cao",
  title =        "Post-challenge leakage in public-key encryption",
  journal =      j-THEOR-COMP-SCI,
  volume =       "572",
  number =       "??",
  pages =        "25--49",
  day =          "23",
  month =        mar,
  year =         "2015",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Mon Feb 23 08:03:13 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2015.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0304397515000377",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975/",
}

@Article{Zhang:2015:RBA,
  author =       "Jiliang Zhang and Yaping Lin and Gang Qu",
  title =        "Reconfigurable Binding against {FPGA} Replay Attacks",
  journal =      j-TODAES,
  volume =       "20",
  number =       "2",
  pages =        "33:1--33:??",
  month =        feb,
  year =         "2015",
  CODEN =        "ATASFO",
  DOI =          "https://doi.org/10.1145/2699833",
  ISSN =         "1084-4309 (print), 1557-7309 (electronic)",
  ISSN-L =       "1084-4309",
  bibdate =      "Tue Mar 3 14:46:37 MST 2015",
  bibsource =    "http://www.acm.org/pubs/contents/journals/todaes/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/todaes.bib",
  abstract =     "The FPGA replay attack, where an attacker downgrades
                 an FPGA-based system to the previous version with known
                 vulnerabilities, has become a serious security and
                 privacy concern for FPGA design. Current FPGA
                 intellectual property (IP) protection mechanisms target
                 the protection of FPGA configuration bitstreams by
                 watermarking or encryption or binding. However, these
                 mechanisms fail to prevent replay attacks. In this
                 article, based on a recently reported PUF-FSM binding
                 method that protects the usage of configuration
                 bitstreams, we propose to reconfigure both the physical
                 unclonable functions (PUFs) and the locking scheme of
                 the finite state machine (FSM) in order to defeat the
                 replay attack. We analyze the proposed scheme and
                 demonstrate how replay attack would fail in attacking
                 systems protected by the reconfigurable binding method.
                 We implement two ways to build reconfigurable PUFs and
                 propose two practical methods to reconfigure the
                 locking scheme. Experimental results show that the two
                 reconfigurable PUFs can generate significantly distinct
                 responses with average reconfigurability of more than
                 40\%. The reconfigurable locking schemes only incur a
                 timing overhead less than 1\%.",
  acknowledgement = ack-nhfb,
  articleno =    "33",
  fjournal =     "ACM Transactions on Design Automation of Electronic
                 Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J776",
}

@Article{Zhang:2015:STR,
  author =       "Zhiyong Zhang",
  title =        "Security, Trust and Risk in Multimedia Social
                 Networks",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "4",
  pages =        "515--517",
  month =        apr,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxu151",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Thu Mar 26 10:33:30 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/4.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/4/515",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "December 23, 2014",
}

@Article{Zheng:2015:EPT,
  author =       "Minghui Zheng and Huihua Zhou and Jing Chen",
  title =        "An efficient protocol for two-party explicit
                 authenticated key agreement",
  journal =      j-CCPE,
  volume =       "27",
  number =       "12",
  pages =        "2954--2963",
  day =          "25",
  month =        aug,
  year =         "2015",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.3198",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Sat Jul 25 19:54:09 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "26 Dec 2013",
}

@Article{Zhou:2015:EPP,
  author =       "Zhibin Zhou and Dijiang Huang and Zhijie Wang",
  title =        "Efficient Privacy-Preserving Ciphertext-Policy
                 Attribute Based-Encryption and Broadcast Encryption",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "64",
  number =       "1",
  pages =        "126--138",
  month =        jan,
  year =         "2015",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2013.200",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Wed Jan 21 08:56:46 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
  keywords =     "Access control; access policy; attribute
                 based-encryption; Attribute-based encryption (ABE);
                 broadcast encryption; ciphertext-policy; Complexity
                 theory; constant ciphertext length; CP-ABE encryption;
                 cryptography; data privacy; Encryption; PP-CP-ABE
                 scheme; Privacy; privacy-preserving; privacy-preserving
                 ciphertext-policy; Public key; Receivers",
}

@Article{Zhou:2015:PPS,
  author =       "Jun Zhou and Xiaodong Lin and Xiaolei Dong and Zhenfu
                 Cao",
  title =        "{PSMPA}: Patient Self-Controllable and Multi-Level
                 Privacy-Preserving Cooperative Authentication in
                 Distributed-Healthcare Cloud Computing System",
  journal =      j-IEEE-TRANS-PAR-DIST-SYS,
  volume =       "26",
  number =       "6",
  pages =        "1693--1703",
  month =        jun,
  year =         "2015",
  CODEN =        "ITDSEO",
  DOI =          "https://doi.org/10.1109/TPDS.2014.2314119",
  ISSN =         "1045-9219 (print), 1558-2183 (electronic)",
  ISSN-L =       "1045-9219",
  bibdate =      "Thu Jun 4 19:34:14 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranspardistsys.bib",
  URL =          "http://csdl.computer.org/csdl/trans/td/2015/06/06779640-abs.html",
  abstract-URL = "http://csdl.computer.org/csdl/trans/td/2015/06/06779640-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://www.computer.org/tpds/archives.htm",
}

@Article{Zhu:2015:IDM,
  author =       "Hui Zhu and Cheng Huang and Hui Li",
  title =        "Information Diffusion Model Based on Privacy Setting
                 in Online Social Networking Services",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "4",
  pages =        "536--548",
  month =        apr,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxu062",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Thu Mar 26 10:33:30 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/4.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/4/536",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "July 20, 2014",
}

@Article{Zhu:2015:PPD,
  author =       "Hong Zhu and Shengli Tian and Kevin L{\"u}",
  title =        "Privacy-Preserving Data Publication with Features of
                 Independent {$ \ell $}-Diversity",
  journal =      j-COMP-J,
  volume =       "58",
  number =       "4",
  pages =        "549--571",
  month =        apr,
  year =         "2015",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxu102",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Thu Mar 26 10:33:30 MDT 2015",
  bibsource =    "http://comjnl.oxfordjournals.org/content/58/4.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/58/4/549",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "October 8, 2014",
}

@Article{Abdullaziz:2016:AAI,
  author =       "Osamah Ibrahiem Abdullaziz and Vik Tor Goh and
                 Huo-Chong Ling and KokSheik Wong",
  title =        "{AIPISteg}: an active {IP} identification based
                 steganographic method",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "63",
  number =       "??",
  pages =        "150--158",
  month =        mar,
  year =         "2016",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Mon Jun 20 11:42:20 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S108480451600059X",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Abo-alian:2016:KDB,
  author =       "Alshaimaa Abo-alian and Nagwa L. Badr and M. F.
                 Tolba",
  title =        "Keystroke dynamics-based user authentication service
                 for cloud computing",
  journal =      j-CCPE,
  volume =       "28",
  number =       "9",
  pages =        "2567--2585",
  day =          "25",
  month =        jun,
  year =         "2016",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.3718",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Wed Jun 8 06:47:20 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
}

@Article{Akleylek:2016:SPM,
  author =       "Sedat Akleylek and Erdem Alkim and Zaliha Y{\"u}ce
                 Tok",
  title =        "Sparse polynomial multiplication for lattice-based
                 cryptography with small complexity",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "72",
  number =       "2",
  pages =        "438--450",
  month =        feb,
  year =         "2016",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-015-1570-1",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Thu Apr 7 12:01:24 MDT 2016",
  bibsource =    "http://link.springer.com/journal/11227/72/2;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  URL =          "http://link.springer.com/article/10.1007/s11227-015-1570-1",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Article{Alhanahnah:2016:MTI,
  author =       "Mohannad J. Alhanahnah and Arshad Jhumka and Sahel
                 Alouneh",
  title =        "A Multidimension Taxonomy of Insider Threats in Cloud
                 Computing",
  journal =      j-COMP-J,
  volume =       "59",
  number =       "11",
  pages =        "1612--1622",
  month =        nov,
  year =         "2016",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxw020",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Fri Nov 4 09:11:48 MDT 2016",
  bibsource =    "http://comjnl.oxfordjournals.org/content/59/11.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/59/11/1612",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "June 17, 2016",
}

@Article{Aliberti:2016:RPS,
  author =       "Giulio Aliberti and Roberto {Di Pietro} and Stefano
                 Guarino",
  title =        "Reliable and perfectly secret communication over the
                 generalized {Ozarow--Wyner}'s wire-tap channel",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "109 (part 1)",
  number =       "??",
  pages =        "21--30",
  day =          "9",
  month =        nov,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Wed Nov 23 16:15:16 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1389128616302146",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286/",
}

@Article{Alizadeh:2016:AMC,
  author =       "Mojtaba Alizadeh and Saeid Abolfazli and Mazdak Zamani
                 and Sabariah Baharun and Kouichi Sakurai",
  title =        "Authentication in mobile cloud computing: a survey",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "61",
  number =       "??",
  pages =        "59--80",
  month =        feb,
  year =         "2016",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Mon Jun 20 11:42:19 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804515002258",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Alvarez-Cubero:2016:AVL,
  author =       "Jos{\'e} Antonio {\'A}lvarez-Cubero and Pedro J.
                 Zufiria",
  title =        "{Algorithm 959}: {VBF}: a Library of {C++} Classes for
                 Vector {Boolean} Functions in Cryptography",
  journal =      j-TOMS,
  volume =       "42",
  number =       "2",
  pages =        "16:1--16:22",
  month =        may,
  year =         "2016",
  CODEN =        "ACMSCU",
  DOI =          "https://doi.org/10.1145/2794077",
  ISSN =         "0098-3500 (print), 1557-7295 (electronic)",
  ISSN-L =       "0098-3500",
  bibdate =      "Mon May 23 16:40:02 MDT 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toms/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/toms.bib",
  abstract =     "VBF is a collection of C++ classes designed for
                 analyzing vector Boolean functions (functions that map
                 a Boolean vector to another Boolean vector) from a
                 cryptographic perspective. This implementation uses the
                 NTL library from Victor Shoup, adding new modules that
                 call NTL functions and complement the existing ones,
                 making it better suited to cryptography. The class
                 representing a vector Boolean function can be
                 initialized by several alternative types of data
                 structures such as Truth Table, Trace Representation,
                 and Algebraic Normal Form (ANF), among others. The most
                 relevant cryptographic criteria for both block and
                 stream ciphers as well as for hash functions can be
                 evaluated with VBF: it obtains the nonlinearity,
                 linearity distance, algebraic degree, linear
                 structures, and frequency distribution of the absolute
                 values of the Walsh Spectrum or the Autocorrelation
                 Spectrum, among others. In addition, operations such as
                 equality testing, composition, inversion, sum, direct
                 sum, bricklayering (parallel application of vector
                 Boolean functions as employed in Rijndael cipher), and
                 adding coordinate functions of two vector Boolean
                 functions are presented. Finally, three real
                 applications of the library are described: the first
                 one analyzes the KASUMI block cipher, the second one
                 analyzes the Mini-AES cipher, and the third one finds
                 Boolean functions with very high nonlinearity, a key
                 property for robustness against linear attacks.",
  acknowledgement = ack-nhfb,
  articleno =    "16",
  fjournal =     "ACM Transactions on Mathematical Software (TOMS)",
  journal-URL =  "http://dl.acm.org/pub.cfm?id=J782",
}

@Article{Alzubi:2016:SCC,
  author =       "O. A. Alzubi and T. M. Chen and J. A. Alzubi and H.
                 Rashaideh and N. Al-Najdawi",
  title =        "Secure Channel Coding Schemes based on
                 Algebraic--Geometric Codes over {Hermitian} Curves",
  journal =      j-J-UCS,
  volume =       "22",
  number =       "4",
  pages =        "552--??",
  month =        "????",
  year =         "2016",
  CODEN =        "????",
  ISSN =         "0948-695X (print), 0948-6968 (electronic)",
  ISSN-L =       "0948-6968",
  bibdate =      "Wed Sep 7 16:47:24 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jucs.bib",
  URL =          "http://www.jucs.org/jucs_22_4/secure_channel_coding_schemes",
  acknowledgement = ack-nhfb,
  fjournal =     "J.UCS: Journal of Universal Computer Science",
  journal-URL =  "http://www.jucs.org/jucs",
}

@Article{Ambrosin:2016:FAB,
  author =       "Moreno Ambrosin and Arman Anzanpour and Mauro Conti
                 and Tooska Dargahi and Sanaz Rahimi Moosavi and Amir M.
                 Rahmani and Pasi Liljeberg",
  title =        "On the Feasibility of Attribute-Based Encryption on
                 {Internet of Things} Devices",
  journal =      j-IEEE-MICRO,
  volume =       "36",
  number =       "6",
  pages =        "25--35",
  month =        nov # "\slash " # dec,
  year =         "2016",
  CODEN =        "IEMIDZ",
  ISSN =         "0272-1732 (print), 1937-4143 (electronic)",
  ISSN-L =       "0272-1732",
  bibdate =      "Thu Dec 8 06:45:37 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeemicro.bib",
  URL =          "https://www.computer.org/csdl/mags/mi/2016/06/mmi2016060025-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://www.computer.org/csdl/mags/mi/index.html",
}

@Article{Amin:2016:DAP,
  author =       "Ruhul Amin and SK Hafizul Islam and G. P. Biswas and
                 Muhammad Khurram Khan and Lu Leng and Neeraj Kumar",
  title =        "Design of an anonymity-preserving three-factor
                 authenticated key exchange protocol for wireless sensor
                 networks",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "101",
  number =       "??",
  pages =        "42--62",
  day =          "4",
  month =        jun,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Thu May 12 08:55:10 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1389128616000207",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286/",
}

@Article{Amoah:2016:FMA,
  author =       "Raphael Amoah and Seyit Camtepe and Ernest Foo",
  title =        "Formal modelling and analysis of {DNP3} secure
                 authentication",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "59",
  number =       "??",
  pages =        "345--360",
  month =        jan,
  year =         "2016",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Mon Feb 8 11:55:17 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804515001228",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Andrade:2016:LEP,
  author =       "Ewerton R. Andrade and Marcos A. Simplicio and Paulo
                 S. L. M. Barreto and Paulo C. F. dos Santos",
  title =        "{Lyra2}: Efficient Password Hashing with High Security
                 against Time-Memory Trade-Offs",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "65",
  number =       "10",
  pages =        "3096--3108",
  month =        "????",
  year =         "2016",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2016.2516011",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Tue Sep 13 06:19:58 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Andrychowicz:2016:SMC,
  author =       "Marcin Andrychowicz and Stefan Dziembowski and Daniel
                 Malinowski and Lukasz Mazurek",
  title =        "Secure multiparty computations on {Bitcoin}",
  journal =      j-CACM,
  volume =       "59",
  number =       "4",
  pages =        "76--84",
  month =        apr,
  year =         "2016",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2896386",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Apr 15 14:58:10 MDT 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cacm2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://cacm.acm.org/magazines/2016/4/200175/fulltext",
  abstract =     "Is it possible to design an online protocol for
                 playing a lottery, in a completely decentralized way,
                 that is, without relying on a trusted third party? Or
                 can one construct a fully decentralized protocol for
                 selling secret information, so that neither the seller
                 nor the buyer can cheat in it? Until recently, it
                 seemed that every online protocol that has financial
                 consequences for the participants needs to rely on some
                 sort of a trusted server that ensures that the money is
                 transferred between them. In this work, we propose to
                 use Bitcoin (a digital currency, introduced in 2008) to
                 design such fully decentralized protocols that are
                 secure even if no trusted third party is available. As
                 an instantiation of this idea, we construct protocols
                 for secure multiparty lotteries using the Bitcoin
                 currency, without relying on a trusted authority. Our
                 protocols guarantee fairness for the honest parties no
                 matter how the loser behaves. For example, if one party
                 interrupts the protocol, then her money is transferred
                 to the honest participants. Our protocols are practical
                 (to demonstrate it, we performed their transactions in
                 the actual Bitcoin system) and in principle could be
                 used in real life as a replacement for the online
                 gambling sites.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Anghelescu:2016:FIP,
  author =       "Petre Anghelescu",
  title =        "{FPGA} implementation of programmable cellular
                 automata encryption algorithm for network
                 communications",
  journal =      j-INT-J-COMPUT-SYST-SCI-ENG,
  volume =       "31",
  number =       "5",
  pages =        "??--??",
  month =        sep,
  year =         "2016",
  CODEN =        "CSSEEI",
  ISSN =         "0267-6192",
  ISSN-L =       "0267-6192",
  bibdate =      "Sun Apr 2 09:35:33 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsystscieng.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Computer Systems Science and
                 Engineering",
  journal-URL =  "http://www.crlpublishing.co.uk/csse",
}

@Article{Anonymous:2016:BRBa,
  author =       "Anonymous",
  title =        "Book Review: {{\booktitle{Bitcoin and Cryptocurrency
                 Technologies}}, Arvind Narayanan, Joseph Bonneau,
                 Edward Felten, Andrew Miller and Steven Goldfeder}",
  journal =      j-NETWORK-SECURITY,
  volume =       "2016",
  number =       "8",
  pages =        "4--4",
  month =        aug,
  year =         "2016",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(16)30074-5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 17:01:35 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485816300745",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:2016:CPSd,
  author =       "Anonymous",
  title =        "Call for Papers Special Issue on Postquantum
                 Cryptography",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "4",
  pages =        "63",
  month =        jul # "\slash " # aug,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 08:21:28 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/04/msp2016040063.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
}

@Article{Anonymous:2016:CPSe,
  author =       "Anonymous",
  title =        "Call for Papers Special Issue on Postquantum
                 Cryptography",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "5",
  pages =        "57",
  month =        sep # "\slash " # oct,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 08:21:29 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/05/msp2016050057.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
}

@Article{Anonymous:2016:EMT,
  author =       "Anonymous",
  title =        "The {Enigma} Machine Takes a Quantum Leap",
  journal =      "{R\&D} Magazine",
  volume =       "??",
  number =       "??",
  pages =        "??--??",
  day =          "7",
  month =        sep,
  year =         "2016",
  bibdate =      "Wed Sep 07 10:19:17 2016",
  bibsource =    "https://www.math.utah.edu/pub/bibnet/authors/s/shannon-claude-elwood.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  note =         "News story on quantum data locking research in
                 \cite{Liu:2016:EQD,Lum:2016:QEM}.",
  URL =          "http://www.rdmag.com/news/2016/09/enigma-machine-takes-quantum-leap",
  acknowledgement = ack-nhfb,
}

@Misc{Anonymous:2016:FVM,
  author =       "Anonymous",
  title =        "Facsimile of the {Voynich Manuscript} Now Available to
                 Citizen Cryptographers",
  howpublished = "Web document",
  day =          "16",
  month =        nov,
  year =         "2016",
  bibdate =      "Thu Dec 15 07:18:21 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://hyperallergic.com/335505/voynich-manuscript-facsimile-published-yale-university/",
  abstract =     "Yale University released a book that recreates through
                 photographs the enigmatic medieval Voynich Manuscript
                 in its full form",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:2016:GUP,
  author =       "Anonymous",
  title =        "Generating Unclonable Patterns to Fight
                 Counterfeiting",
  journal =      "Scientific Computing",
  volume =       "??",
  number =       "??",
  pages =        "??--??",
  day =          "13",
  month =        jun,
  year =         "2016",
  bibdate =      "Mon Jun 13 09:27:14 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.scientificcomputing.com/news/2016/06/generating-unclonable-patterns-fight-counterfeiting",
  acknowledgement = ack-nhfb,
  remark =       "This is an application of optical surface design to
                 the problem of creating unforgeable certificates of
                 authenticity.",
}

@Article{Anonymous:2016:IICd,
  author =       "Anonymous",
  title =        "Introducing {IEEE Collabratec}",
  journal =      j-IEEE-COMPUT-ARCHIT-LETT,
  volume =       "15",
  number =       "1",
  pages =        "66--66",
  month =        jan # "\slash " # jun,
  year =         "2016",
  DOI =          "https://doi.org/10.1109/LCA.2016.2578800",
  ISSN =         "1556-6056 (print), 1556-6064 (electronic)",
  ISSN-L =       "1556-6056",
  bibdate =      "Fri Jun 21 08:36:31 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeecomputarchitlett.bib",
  abstract =     "IEEE Collabratec is a new, integrated online community
                 where IEEE members, researchers, authors, and
                 technology professionals with similar fields of
                 interest can network and collaborate, as well as create
                 and manage content. Featuring a suite of powerful
                 online networking and collaboration tools, IEEE
                 Collabratec allows you to connect according to
                 geographic location, technical interests, or career
                 pursuits. You can also create and share a professional
                 identity that showcases key accomplishments and
                 participate in groups focused around mutual interests,
                 actively learning from and contributing to
                 knowledgeable communities. All in one place! Learn
                 about IEEE Collabratec at ieeecollabratec.org.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Computer Architecture Letters",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=10208",
  keywords =     "",
}

@Article{Anonymous:2016:MBE,
  author =       "Anonymous",
  title =        "More battles over encryption \& surveillance",
  journal =      j-NETWORK-SECURITY,
  volume =       "2016",
  number =       "1",
  pages =        "2--2",
  month =        jan,
  year =         "2016",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(16)30002-2",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 17:01:28 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485816300022",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Anonymous:2016:SIR,
  author =       "Anonymous",
  title =        "Special Issue on Real-World Cryptography Call for
                 Papers House Advertisement",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "1",
  pages =        "62",
  month =        jan # "\slash " # feb,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Jun 8 08:40:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security {\&} Privacy",
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
}

@Misc{Anonymous:2016:SWT,
  author =       "Anonymous",
  title =        "{Smith} wins {Test of Time} award for paper",
  howpublished = "Penn State News",
  day =          "18",
  month =        jan,
  year =         "2016",
  bibdate =      "Tue Jan 19 16:15:55 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://news.psu.edu/story/387916/2016/01/18/academics/smith-wins-test-time-award-paper",
  acknowledgement = ack-nhfb,
  remark =       "From the story: ``A paper co-authored by Adam Smith,
                 associate professor of computer science and engineering
                 at Penn State, was recently selected as the winner of
                 the Theory of Cryptography Conference (TCC) 2016 Test
                 of Time award.\par

                 ``Calibrating Noise to Sensitivity in Private Data
                 Analysis,'' by Smith, Cynthia Dwork (Microsoft
                 Research), Frank McSherry (Microsoft Research) and
                 Kobbi Nissim (Ben-Gurion University of the Negev), was
                 published in 2006. It was selected for introducing the
                 definition of differential privacy and providing a
                 solid mathematical foundation for a vast body of
                 subsequent work on private data analysis.",
}

@Article{Archer:2016:MPP,
  author =       "David W. Archer and Dan Bogdanov and Benny Pinkas and
                 Pille Pullonen",
  title =        "Maturity and Performance of Programmable Secure
                 Computation",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "5",
  pages =        "48--56",
  month =        sep # "\slash " # oct,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 08:21:29 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/05/msp2016050048-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Asharov:2016:LPI,
  author =       "Gilad Asharov and Gil Segev",
  title =        "Limits on the Power of Indistinguishability
                 Obfuscation and Functional Encryption",
  journal =      j-SIAM-J-COMPUT,
  volume =       "45",
  number =       "6",
  pages =        "2117--2176",
  month =        "????",
  year =         "2016",
  CODEN =        "SMJCAT",
  DOI =          "https://doi.org/10.1137/15M1034064",
  ISSN =         "0097-5397 (print), 1095-7111 (electronic)",
  ISSN-L =       "0097-5397",
  bibdate =      "Mon Mar 13 14:59:47 MDT 2017",
  bibsource =    "http://epubs.siam.org/sam-bin/dbq/toclist/SICOMP/45/6;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/siamjcomput.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "SIAM Journal on Computing",
  journal-URL =  "http://epubs.siam.org/sicomp",
  onlinedate =   "January 2016",
}

@Article{Aslan:2016:DEM,
  author =       "Ilhan Aslan and Andreas Uhl and Alexander
                 Meschtscherjakov and Manfred Tscheligi",
  title =        "Design and Exploration of Mid-Air Authentication
                 Gestures",
  journal =      j-TIIS,
  volume =       "6",
  number =       "3",
  pages =        "23:1--23:??",
  month =        oct,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2832919",
  ISSN =         "2160-6455 (print), 2160-6463 (electronic)",
  bibdate =      "Tue Oct 18 11:51:14 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tiis.bib",
  abstract =     "Authentication based on touchless mid-air gestures
                 would benefit a multitude of ubiquitous computing
                 applications, especially those that are used in clean
                 environments (e.g., medical environments or clean
                 rooms). In order to explore the potential of mid-air
                 gestures for novel authentication approaches, we
                 performed a series of studies and design experiments.
                 First, we collected data from more then 200 users
                 during a 3-day science event organized within a
                 shopping mall. These data were used to investigate
                 capabilities of the Leap Motion sensor, observe
                 interaction in the wild, and to formulate an initial
                 design problem. The design problem, as well as the
                 design of mid-air gestures for authentication purposes,
                 were iterated in subsequent design activities. In a
                 final study with 13 participants, we evaluated two
                 mid-air gestures for authentication purposes in
                 different situations, including different body
                 positions. Our results highlight a need for different
                 mid-air gestures for differing situations and carefully
                 chosen constraints for mid-air gestures. We conclude by
                 proposing an exemplary system, which aims to provide
                 tool-support for designers and engineers, allowing them
                 to explore authentication gestures in the original
                 context of use and thus support them with the design of
                 contextual mid-air authentication gestures.",
  acknowledgement = ack-nhfb,
  articleno =    "23",
  fjournal =     "ACM Transactions on Interactive Intelligent Systems
                 (TIIS)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1341",
}

@Article{Avoine:2016:SSP,
  author =       "Gildas Avoine and Antonin Beaujeant and Julio
                 Hernandez-Castro and Louis Demay and Philippe Teuwen",
  title =        "A Survey of Security and Privacy Issues in {ePassport}
                 Protocols",
  journal =      j-COMP-SURV,
  volume =       "48",
  number =       "3",
  pages =        "47:1--47:??",
  month =        feb,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2825026",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Feb 9 09:29:36 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "This article examines in great detail the most
                 relevant security and privacy issues affecting the
                 protocols used by contactless chips integrated in
                 ePassports, and presents all relevant literature
                 together with some new attacks and insights that could
                 help in improving future standards and the next
                 generations of ePassports.",
  acknowledgement = ack-nhfb,
  articleno =    "47",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Awad:2016:SSZ,
  author =       "Amro Awad and Pratyusa Manadhata and Stuart Haber and
                 Yan Solihin and William Horne",
  title =        "Silent Shredder: Zero-Cost Shredding for Secure
                 Non-Volatile Main Memory Controllers",
  journal =      j-SIGPLAN,
  volume =       "51",
  number =       "4",
  pages =        "263--276",
  month =        apr,
  year =         "2016",
  CODEN =        "SINODQ",
  DOI =          "https://doi.org/10.1145/2954679.2872377",
  ISSN =         "0362-1340 (print), 1523-2867 (print), 1558-1160
                 (electronic)",
  ISSN-L =       "0362-1340",
  bibdate =      "Thu Jun 9 17:13:59 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigplan2010.bib",
  abstract =     "As non-volatile memory (NVM) technologies are expected
                 to replace DRAM in the near future, new challenges have
                 emerged. For example, NVMs have slow and
                 power-consuming writes, and limited write endurance. In
                 addition, NVMs have a data remanence vulnerability,
                 i.e., they retain data for a long time after being
                 powered off. NVM encryption alleviates the
                 vulnerability, but exacerbates the limited endurance by
                 increasing the number of writes to memory. We observe
                 that, in current systems, a large percentage of main
                 memory writes result from data shredding in operating
                 systems, a process of zeroing out physical pages before
                 mapping them to new processes, in order to protect
                 previous processes' data. In this paper, we propose
                 Silent Shredder, which repurposes initialization
                 vectors used in standard counter mode encryption to
                 completely eliminate the data shredding writes. Silent
                 Shredder also speeds up reading shredded cache lines,
                 and hence reduces power consumption and improves
                 overall performance. To evaluate our design, we run
                 three PowerGraph applications and 26 multi-programmed
                 workloads from the SPEC 2006 suite, on a gem5-based
                 full system simulator. Silent Shredder eliminates an
                 average of 48.6\% of the writes in the initialization
                 and graph construction phases. It speeds up main memory
                 reads by 3.3 times, and improves the number of
                 instructions per cycle (IPC) by 6.4\% on average.
                 Finally, we discuss several use cases, including
                 virtual machines' data isolation and user-level large
                 data initialization, where Silent Shredder can be used
                 effectively at no extra cost.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGPLAN Notices",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J706",
  remark =       "ASPLOS '16 conference proceedings.",
}

@Article{Baek:2016:EGC,
  author =       "Joonsang Baek and Duncan S. Wong and Jin Li and Man Ho
                 Au",
  title =        "Efficient Generic Construction of {CCA}-Secure
                 Identity-Based Encryption from Randomness Extraction",
  journal =      j-COMP-J,
  volume =       "59",
  number =       "4",
  pages =        "508--521",
  month =        apr,
  year =         "2016",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxv070",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Mar 28 10:52:39 MDT 2016",
  bibsource =    "http://comjnl.oxfordjournals.org/content/59/4.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/59/4/508",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "September 3, 2015",
}

@Article{Bahri:2016:CCO,
  author =       "Leila Bahri and Barbara Carminati and Elena Ferrari",
  title =        "{COIP}-Continuous, Operable, Impartial, and
                 Privacy-Aware Identity Validity Estimation for {OSN}
                 Profiles",
  journal =      j-TWEB,
  volume =       "10",
  number =       "4",
  pages =        "23:1--23:??",
  month =        dec,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3014338",
  ISSN =         "1559-1131 (print), 1559-114X (electronic)",
  ISSN-L =       "1559-1131",
  bibdate =      "Mon Apr 3 11:10:10 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tweb.bib",
  abstract =     "Identity validation of Online Social Networks' (OSNs')
                 peers is a critical concern to the insurance of safe
                 and secure online socializing environments. Starting
                 from the vision of empowering users to determine the
                 validity of OSN identities, we suggest a framework to
                 estimate the trustworthiness of online social profiles
                 based only on the information they contain. Our
                 framework is based on learning identity correlations
                 between profile attributes in an OSN community and on
                 collecting ratings from OSN community members to
                 evaluate the trustworthiness of target profiles. Our
                 system guarantees utility, user anonymity, impartiality
                 in rating, and operability within the dynamics and
                 continuous evolution of OSNs. In this article, we
                 detail the system design, and we prove its correctness
                 against these claimed quality properties. Moreover, we
                 test its effectiveness, feasibility, and efficiency
                 through experimentation on real-world datasets from
                 Facebook and Google+, in addition to using the Adults
                 UCI dataset.",
  acknowledgement = ack-nhfb,
  articleno =    "23",
  fjournal =     "ACM Transactions on the Web (TWEB)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1062",
}

@Article{Bai:2016:ALC,
  author =       "Kunpeng Bai and Chuankun Wu",
  title =        "An {AES}-Like Cipher and Its White-Box
                 Implementation",
  journal =      j-COMP-J,
  volume =       "59",
  number =       "7",
  pages =        "1054--1065",
  month =        jul,
  year =         "2016",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxv119",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Aug 30 07:10:49 MDT 2016",
  bibsource =    "http://comjnl.oxfordjournals.org/content/59/7.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/59/7/1054",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "January 6, 2016",
}

@InProceedings{Bajard:2016:MFA,
  author =       "Jean-Claude Bajard and Julien Eynard and Nabil
                 Merkiche",
  title =        "Multi-fault Attack Detection for {RNS} Cryptographic
                 Architecture",
  crossref =     "Montuschi:2016:ISC",
  pages =        "16--23",
  year =         "2016",
  DOI =          "https://doi.org/10.1109/ARITH.2016.16",
  bibdate =      "Fri Dec 16 15:17:20 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/fparith.bib",
  acknowledgement = ack-nhfb,
  keywords =     "ARITH-23",
}

@Article{Bao:2016:LPP,
  author =       "Haiyong Bao and Le Chen",
  title =        "A lightweight privacy-preserving scheme with data
                 integrity for smart grid communications",
  journal =      j-CCPE,
  volume =       "28",
  number =       "4",
  pages =        "1094--1110",
  day =          "25",
  month =        mar,
  year =         "2016",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.3527",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Sun Apr 3 12:34:13 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "28 May 2015",
}

@Article{Barenghi:2016:FBS,
  author =       "Alessandro Barenghi and Guido M. Bertoni and Luca
                 Breveglieri and Gerardo Pelosi and Stefano Sanfilippo
                 and Ruggero Susella",
  title =        "A Fault-Based Secret Key Retrieval Method for {ECDSA}:
                 Analysis and Countermeasure",
  journal =      j-JETC,
  volume =       "13",
  number =       "1",
  pages =        "8:1--8:??",
  month =        dec,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2767132",
  ISSN =         "1550-4832",
  bibdate =      "Sat Apr 8 10:16:07 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jetc/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jetc.bib",
  abstract =     "Elliptic curve cryptosystems proved to be well suited
                 for securing systems with constrained resources like
                 embedded and portable devices. In a fault-based attack,
                 errors are induced during the computation of a
                 cryptographic primitive, and the results are collected
                 to derive information about the secret key safely
                 stored in the device. We introduce a novel attack
                 methodology to recover the secret key employed in
                 implementations of the Elliptic Curve Digital Signature
                 Algorithm. Our attack exploits the information leakage
                 induced when altering the execution of the modular
                 arithmetic operations used in the signature primitive
                 and does not rely on the underlying elliptic curve
                 mathematical structure, thus being applicable to all
                 standardized curves. We provide both a validation of
                 the feasibility of the attack, even employing common
                 off-the-shelf hardware to perform the required
                 computations, and a low-cost countermeasure to
                 counteract it.",
  acknowledgement = ack-nhfb,
  articleno =    "8",
  fjournal =     "ACM Journal on Emerging Technologies in Computing
                 Systems (JETC)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J967",
}

@Article{Barenghi:2016:PPE,
  author =       "Alessandro Barenghi and Michele Beretta and Alessandro
                 {Di Federico} and Gerardo Pelosi",
  title =        "A privacy-preserving encrypted {OSN} with stateless
                 server interaction: the Snake design",
  journal =      j-COMPUT-SECUR,
  volume =       "63",
  number =       "??",
  pages =        "67--84",
  month =        nov,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:47 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404816301031",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@TechReport{Barker:2016:RKM,
  author =       "Elaine Barker",
  title =        "Recommendation for Key Management. {Part 1}: General",
  type =         "xi + 147",
  institution =  pub-NIST,
  address =      pub-NIST:adr,
  month =        jan,
  year =         "2016",
  bibdate =      "Fri Feb 15 10:14:56 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r4.pdf",
  abstract =     "This Recommendation provides cryptographic key
                 management guidance. It consists of three parts. Part 1
                 provides general guidance and best practices for the
                 management of cryptographic keying material. Part 2
                 provides guidance on policy and security planning
                 requirements for U.S. government agencies. Finally,
                 Part 3 provides guidance when using the cryptographic
                 features of current systems",
  acknowledgement = ack-nhfb,
}

@Article{Bartkewitz:2016:LPL,
  author =       "Timo Bartkewitz",
  title =        "Leakage Prototype Learning for Profiled Differential
                 Side-Channel Cryptanalysis",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "65",
  number =       "6",
  pages =        "1761--1774",
  month =        jun,
  year =         "2016",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2015.2455974",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Tue May 31 08:56:47 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Bellovin:2016:EEE,
  author =       "Steven M. Bellovin",
  title =        "Easy Email Encryption",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "6",
  pages =        "96--96",
  month =        nov # "\slash " # dec,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Feb 25 10:03:53 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/06/msp2016060096.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
}

@Article{Benamara:2016:ICA,
  author =       "Oualid Benamara and Fatiha Merazka and Kamel Betina",
  title =        "An improvement of a cryptanalysis algorithm",
  journal =      j-INFO-PROC-LETT,
  volume =       "116",
  number =       "2",
  pages =        "192--196",
  month =        feb,
  year =         "2016",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Sat Nov 28 07:11:23 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019015001398",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190/",
}

@Article{Benhamouda:2016:NFP,
  author =       "Fabrice Benhamouda and Marc Joye and Beno{\^\i}T
                 Libert",
  title =        "A New Framework for Privacy-Preserving Aggregation of
                 Time-Series Data",
  journal =      j-TISSEC,
  volume =       "18",
  number =       "3",
  pages =        "10:1--10:??",
  month =        apr,
  year =         "2016",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/2873069",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Fri Apr 15 13:02:47 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tissec.bib",
  abstract =     "Aggregator-oblivious encryption is a useful notion put
                 forward by Shi et al. in 2011 that allows an untrusted
                 aggregator to periodically compute an aggregate value
                 over encrypted data contributed by a set of users. Such
                 encryption schemes find numerous applications,
                 particularly in the context of privacy-preserving smart
                 metering. This article presents a general framework for
                 constructing privacy-preserving aggregator-oblivious
                 encryption schemes using a variant of Cramer--Shoup's
                 paradigm of smooth projective hashing. This abstraction
                 leads to new schemes based on a variety of complexity
                 assumptions. It also improves upon existing
                 constructions, providing schemes with shorter
                 ciphertexts and better encryption times.",
  acknowledgement = ack-nhfb,
  articleno =    "10",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@Article{Benzaid:2016:FAW,
  author =       "Chafika Benzaid and Karim Lounis and Ameer Al-Nemrat
                 and Nadjib Badache and Mamoun Alazab",
  title =        "Fast authentication in wireless sensor networks",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "55",
  number =       "??",
  pages =        "362--375",
  month =        feb,
  year =         "2016",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Fri Dec 4 07:08:16 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X14001393",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X/",
}

@InCollection{Bernstein:2016:DES,
  author =       "Daniel J. Bernstein and Tanja Lange and Ruben
                 Niederhagen",
  title =        "Dual {EC}: A Standardized Back Door",
  crossref =     "Ryan:2016:NCE",
  pages =        "256--281",
  year =         "2016",
  DOI =          "https://doi.org/10.1007/978-3-662-49301-4_17",
  bibdate =      "Fri Jul 29 07:29:53 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
}

@Article{Berger:2016:EGF,
  author =       "Thierry P. Berger and Julien Francq and Marine Minier
                 and Ga{\"e}l Thomas",
  title =        "Extended Generalized {Feistel} Networks Using Matrix
                 Representation to Propose a New Lightweight Block
                 Cipher: {Lilliput}",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "65",
  number =       "7",
  pages =        "2074--2089",
  month =        "????",
  year =         "2016",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2015.2468218",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Wed Jun 15 06:49:34 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers -",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Berghel:2016:CKF,
  author =       "Hal Berghel",
  title =        "Coda in the Key of {F2654hD4}",
  journal =      j-COMPUTER,
  volume =       "49",
  number =       "9",
  pages =        "104--109",
  month =        sep,
  year =         "2016",
  CODEN =        "CPTRB4",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Tue Oct 25 06:11:19 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computer2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.computer.org/csdl/mags/co/2016/09/mco2016090104.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/cga",
  keywords =     "integrity of electronic voting machines",
}

@Article{Berghel:2016:DJT,
  author =       "Hal Berghel",
  title =        "{Douglas Jones} on Today's Voting Machines",
  journal =      j-COMPUTER,
  volume =       "49",
  number =       "10",
  pages =        "84--89",
  month =        oct,
  year =         "2016",
  CODEN =        "CPTRB4",
  DOI =          "https://doi.org/10.1109/MC.2016.306",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Tue Oct 25 06:11:19 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computer2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.computer.org/csdl/mags/co/2016/10/mco2016100084.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/cga",
}

@Article{Berghel:2016:S,
  author =       "Hal Berghel",
  title =        "Secretocracy",
  journal =      j-COMPUTER,
  volume =       "49",
  number =       "2",
  pages =        "63--67",
  month =        feb,
  year =         "2016",
  CODEN =        "CPTRB4",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Tue Feb 16 07:03:03 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computer2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://csdl.computer.org/csdl/mags/co/2016/02/mco2016020063.html",
  abstract-URL = "http://csdl.computer.org/csdl/mags/co/2016/02/mco2016020063-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
}

@Article{Beunardeau:2016:WBC,
  author =       "Marc Beunardeau and Aisling Connolly and Remi Geraud
                 and David Naccache",
  title =        "White-Box Cryptography: Security in an Insecure
                 Environment",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "5",
  pages =        "88--92",
  month =        sep # "\slash " # oct,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 08:21:29 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/05/msp2016050088-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
}

@Article{Bhargavan:2016:MVP,
  author =       "Karthikeyan Bhargavan and Cedric Fournet and Markulf
                 Kohlweiss",
  title =        "{miTLS}: Verifying Protocol Implementations against
                 Real-World Attacks",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "6",
  pages =        "18--25",
  month =        nov # "\slash " # dec,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Feb 25 10:03:53 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/06/msp2016060018-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
}

@Book{Bhattacharjee:2016:SWC,
  author =       "Yudhijit Bhattacharjee",
  title =        "The spy who couldn't spell: a dyslexic traitor, an
                 unbreakable code, and the {FBI}'s hunt for {America}'s
                 stolen secrets",
  publisher =    "New American Library",
  address =      "New York, NY, USA",
  pages =        "????",
  year =         "2016",
  ISBN =         "1-59240-900-8 (hardcover), 0-698-40409-2",
  ISBN-13 =      "978-1-59240-900-6 (hardcover), 978-0-698-40409-0",
  LCCN =         "JK468.I6 B48 2016",
  bibdate =      "Tue Nov 1 16:03:50 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 z3950.loc.gov:7090/Voyager",
  abstract =     "The thrilling, true-life account of the FBI's hunt for
                 the ingenious traitor Brian Regan --- known as The Spy
                 Who Couldn't Spell. Before Edward Snowden's infamous
                 data breach, the largest theft of government secrets
                 was committed by an ingenious traitor whose intricate
                 espionage scheme and complex system of coded messages
                 were made even more baffling by his dyslexia. His name
                 is Brian Regan, but he came to be known as The Spy Who
                 Couldn't Spell. In December of 2000, FBI Special Agent
                 Steven Carr of the bureau's Washington, D.C., office
                 received a package from FBI New York: a series of coded
                 letters from an anonymous sender to the Libyan
                 consulate, offering to sell classified United States
                 intelligence. The offer, and the threat, were all too
                 real. A self-proclaimed CIA analyst with top secret
                 clearance had information about U.S. reconnaissance
                 satellites, air defense systems, weapons depots,
                 munitions factories, and underground bunkers throughout
                 the Middle East. Rooting out the traitor would not be
                 easy, but certain clues suggested a government agent
                 with a military background, a family, and a dire need
                 for money. Leading a diligent team of investigators and
                 code breakers, Carr spent years hunting down a
                 dangerous spy and his cache of stolen secrets. In this
                 fast-paced true-life spy thriller, Yudhijit
                 Bhattacharjee reveals how the FBI unraveled Regan's
                 strange web of codes to build a case against a man who
                 nearly collapsed America's military security.",
  acknowledgement = ack-nhfb,
  subject =      "Regan, Brian; Spies; United States; Biography;
                 Espionage, American; History; 21st century; Dyslexics;
                 Intelligence service; TRUE CRIME / Espionage; HISTORY /
                 Modern / 21st Century; POLITICAL SCIENCE / Political
                 Freedom and Security / Intelligence.",
  subject-dates = "1962",
}

@Article{Bidgoly:2016:MQV,
  author =       "Amir Jalaly Bidgoly and Behrouz Tork Ladani",
  title =        "Modeling and Quantitative Verification of Trust
                 Systems Against Malicious Attackers",
  journal =      j-COMP-J,
  volume =       "59",
  number =       "7",
  pages =        "1005--1027",
  month =        jul,
  year =         "2016",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxv108",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Aug 30 07:10:49 MDT 2016",
  bibsource =    "http://comjnl.oxfordjournals.org/content/59/7.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/59/7/1005",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "December 17, 2015",
}

@InProceedings{Biryukov:2016:ANG,
  author =       "Alex Biryukov and Daniel Dinu and Dmitry
                 Khovratovich",
  editor =       "{IEEE}",
  booktitle =    "{2016 IEEE European Symposium on Security and Privacy
                 (EURO S\&P 2016). 21--24 March 2016 Saarbruecken,
                 Germany}",
  title =        "{Argon2}: new generation of memory-hard functions for
                 password hashing and other applications",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  bookpages =    "xix + 488",
  pages =        "292--302",
  year =         "2016",
  DOI =          "https://doi.org/10.1109/EuroSP.2016.31",
  ISBN =         "1-5090-1751-8",
  ISBN-13 =      "978-1-5090-1751-5",
  LCCN =         "????",
  bibdate =      "Wed Feb 19 09:07:41 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  note =         "IEEE Computer Society Order Number P5776. See
                 \cite{Alwen:2017:TPA}.",
  URL =          "https://ieeexplore.ieee.org/document/7467361",
  acknowledgement = ack-nhfb,
}

@Article{Blasco:2016:SWB,
  author =       "Jorge Blasco and Thomas M. Chen and Juan Tapiador and
                 Pedro Peris-Lopez",
  title =        "A Survey of Wearable Biometric Recognition Systems",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "3",
  pages =        "43:1--43:??",
  month =        nov,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2968215",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Nov 8 16:12:56 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "The growing popularity of wearable devices is leading
                 to new ways to interact with the environment, with
                 other smart devices, and with other people. Wearables
                 equipped with an array of sensors are able to capture
                 the owner's physiological and behavioural traits, thus
                 are well suited for biometric authentication to control
                 other devices or access digital services. However,
                 wearable biometrics have substantial differences from
                 traditional biometrics for computer systems, such as
                 fingerprints, eye features, or voice. In this article,
                 we discuss these differences and analyse how
                 researchers are approaching the wearable biometrics
                 field. We review and provide a categorization of
                 wearable sensors useful for capturing biometric
                 signals. We analyse the computational cost of the
                 different signal processing techniques, an important
                 practical factor in constrained devices such as
                 wearables. Finally, we review and classify the most
                 recent proposals in the field of wearable biometrics in
                 terms of the structure of the biometric system
                 proposed, their experimental setup, and their results.
                 We also present a critique of experimental issues such
                 as evaluation and feasibility aspects, and offer some
                 final thoughts on research directions that need
                 attention in future work.",
  acknowledgement = ack-nhfb,
  articleno =    "43",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Misc{Blaze:2016:UHR,
  author =       "Matt Blaze",
  title =        "{US House of Representatives, Committee on Energy and
                 Commerce, Subcommittee on Oversight and Investigations,
                 Hearing on ``Deciphering the Debate over
                 Encryption''}",
  howpublished = "Web document",
  day =          "19",
  month =        apr,
  year =         "2016",
  bibdate =      "Tue May 17 07:24:51 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://docs.house.gov/meetings/IF/IF02/20160419/104812/HHRG-114-IF02-Wstate-BlazeM-20160419-U3.pdf",
  acknowledgement = ack-nhfb,
  remark =       "The author argues before the US Government that back
                 doors to encryption systems for law enforcement
                 significantly weaken all communications and computer
                 security.",
}

@Article{Bo:2016:ETK,
  author =       "Yang Bo and Mingwu Zhang and Jun-Qiang Du",
  title =        "An error-tolerant keyword search scheme based on
                 public-key encryption in secure cloud computing",
  journal =      j-CCPE,
  volume =       "28",
  number =       "4",
  pages =        "1083--1093",
  day =          "25",
  month =        mar,
  year =         "2016",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.3521",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Sun Apr 3 12:34:13 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "7 Jul 2015",
}

@Article{Boche:2016:DSK,
  author =       "H. Boche and G. Jan{\ss}en",
  title =        "Distillation of secret-key from a class of compound
                 memoryless quantum sources",
  journal =      j-J-MATH-PHYS,
  volume =       "57",
  number =       "8",
  pages =        "082201",
  month =        aug,
  year =         "2016",
  CODEN =        "JMAPAQ",
  DOI =          "https://doi.org/10.1063/1.4960217",
  ISSN =         "0022-2488 (print), 1089-7658 (electronic), 1527-2427",
  ISSN-L =       "0022-2488",
  bibdate =      "Mon Sep 19 15:18:17 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jmathphys2015.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Physics",
  journal-URL =  "http://jmp.aip.org/",
}

@InProceedings{Bock:2016:NDA,
  author =       "Hanno B{\"o}ck and Aaron Zauner and Sean Devlin and
                 Juraj Somorovsky and Philipp Jovanovic",
  booktitle =    "10th {Usenix} Workshop on Offensive Technologies",
  title =        "Nonce-disrespecting adversaries: practical forgery
                 attacks on {GCM} in {TLS}",
  publisher =    pub-USENIX,
  address =      pub-USENIX:adr,
  pages =        "1--11",
  month =        aug,
  year =         "2016",
  bibdate =      "Fri Jul 29 07:30:59 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "https://www.usenix.org/conference/woot16/workshop-program/presentation/bock",
  abstract =     "We investigate nonce reuse issues with the GCM block
                 cipher mode as used in TLS and focus in particular on
                 AES-GCM, the most widely deployed variant. With an
                 Internet-wide scan we identified 184 HTTPS servers
                 repeating nonces, which fully breaks the authenticity
                 of the connections. Affected servers include large
                 corporations, financial institutions, and a credit card
                 company. We present a proof of concept of our attack
                 allowing to violate the authenticity of affected HTTPS
                 connections which in turn can be utilized to inject
                 seemingly valid content into encrypted sessions.
                 Furthermore, we discovered over 70,000 HTTPS servers
                 using random nonces, which puts them at risk of nonce
                 reuse, in the unlikely case that large amounts of data
                 are sent via the same session.",
  acknowledgement = ack-nhfb,
}

@Article{Boneh:2016:BCR,
  author =       "Dan Boneh and Kenny Paterson and Nigel P. Smart",
  title =        "Building a Community of Real-World Cryptographers",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "6",
  pages =        "7--9",
  month =        nov # "\slash " # dec,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Feb 25 10:03:53 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/06/msp2016060007.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
}

@Misc{Boneh:2016:BHP,
  author =       "Dan Boneh and Henry Corrigan-Gibbs and Stuart
                 Schechter",
  title =        "Balloon hashing: Provably space-hard hash functions
                 with data-independent access patterns",
  pages =        "36",
  day =          "14",
  month =        jan,
  year =         "2016",
  bibdate =      "Wed Feb 19 09:28:48 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  note =         "Cryptology ePrint Archive Report 2016/027 Version:
                 20160601:225540. See \cite{Alwen:2017:TPA}.",
  URL =          "https://pdfs.semanticscholar.org/f49f/8e135695937bfe03e467e215177eec79d7dc.pdf",
  abstract =     "We present the Balloon family of password hashing
                 functions. These are the first cryptographic hash
                 functions with proven space-hardness properties that:
                 (i) use a password-independent access pattern, (ii)
                 build exclusively upon standard cryptographic
                 primitives, and (iii) are fast enough for real-world
                 use. Space-hard functions require a large amount of
                 working space to evaluate efficiently and, when used
                 for password hashing, they dramatically increase the
                 cost of offline dictionary attacks. The central
                 technical challenge of this work was to devise the
                 graph-theoretic and linear-algebraic techniques
                 necessary to prove the space-hardness properties of the
                 Balloon functions (in the random-oracle model). To
                 motivate our interest in security proofs, we
                 demonstrate that it is possible to compute Argon2i, a
                 recently proposed space-hard function that lacks a
                 formal analysis, in less than the claimed required
                 space with no increase in the computation time.",
  acknowledgement = ack-nhfb,
}

@Article{Bossuet:2016:EPA,
  author =       "Lilian Bossuet and Nilanjan Datta and Cuauhtemoc
                 Mancillas-L{\'o}pez and Mridul Nandi",
  title =        "{ELmD}: A Pipelineable Authenticated Encryption and
                 Its Hardware Implementation",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "65",
  number =       "11",
  pages =        "3318--3331",
  month =        nov,
  year =         "2016",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2016.2529618",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Tue Oct 11 05:14:24 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Boumerzoug:2016:LKM,
  author =       "Hayette Boumerzoug and Boucif Amar Bensaber and Ismail
                 Biskri",
  title =        "A lightweight key management scheme based on an
                 {Adelson-Velskii} and {Landis} tree and elliptic curve
                 cryptography for wireless sensor networks",
  journal =      j-CCPE,
  volume =       "28",
  number =       "6",
  pages =        "1831--1847",
  day =          "25",
  month =        apr,
  year =         "2016",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.3153",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Wed Jun 8 06:47:19 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
}

@Article{Boyce:2016:BOT,
  author =       "Griffin Boyce",
  title =        "Bake in {\tt .onion} for Tear-Free and Stronger
                 {Website} Authentication",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "2",
  pages =        "15--21",
  month =        mar # "\slash " # apr,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2016.33",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Jun 8 08:40:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security {\&} Privacy",
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
}

@Book{Budiansky:2016:CWN,
  author =       "Stephen Budiansky",
  title =        "Code warriors: {NSA}'s codebreakers and the secret
                 intelligence war against the {Soviet Union}",
  publisher =    pub-KNOPF,
  address =      pub-KNOPF:adr,
  pages =        "xxi + 389 + 16",
  year =         "2016",
  ISBN =         "0-385-35266-2, 0-385-35267-0",
  ISBN-13 =      "978-0-385-35266-6, 978-0-385-35267-3",
  LCCN =         "UB256.U6 B83 2016",
  bibdate =      "Mon Dec 19 12:22:02 MST 2016",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "A sweeping history of the NSA and its codebreaking
                 achievements from World War II through the Cold War
                 shares insights into the challenges faced by
                 cryptanalysts and their role in some of the most
                 complicated events of the twentieth century.",
  acknowledgement = ack-nhfb,
  subject =      "Cryptography; United States; History; Cryptography.;
                 Diplomatic relations.; Foreign relations; Soviet
                 Union",
  tableofcontents = "The Russian problem \\
                 Unbreakable codes \\
                 Learning to lie \\
                 Digital dawn \\
                 Shooting wars \\
                 ``An old mule skinner'' \\
                 Brains versus bugs \\
                 Days of crisis \\
                 Reinventing the wheel \\
                 Brute force and legerdemain \\
                 Epilogue: the collapse of the wall, and a verdict",
}

@Article{Canard:2016:HPP,
  author =       "S. Canard and J. Devigne",
  title =        "Highly privacy-protecting data sharing in a tree
                 structure",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "62",
  number =       "??",
  pages =        "119--127",
  month =        sep,
  year =         "2016",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Tue May 31 08:45:28 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X16300036",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X/",
}

@Article{Cao:2016:OMA,
  author =       "Xiaolin Cao and Ciara Moore and M{\'a}ire O'Neill and
                 Elizabeth O'Sullivan and Neil Hanley",
  title =        "Optimised Multiplication Architectures for
                 Accelerating Fully Homomorphic Encryption",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "65",
  number =       "9",
  pages =        "2794--2806",
  month =        "????",
  year =         "2016",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2015.2498606",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Wed Aug 10 09:04:52 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Castro:2016:FVB,
  author =       "Stephan {De Castro} and Jean-Max Dutertre and Bruno
                 Rouzeyre and Giorgio {Di Natale} and Marie-Lise
                 Flottes",
  title =        "Frontside Versus Backside Laser Injection: a
                 Comparative Study",
  journal =      j-JETC,
  volume =       "13",
  number =       "1",
  pages =        "7:1--7:??",
  month =        dec,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2845999",
  ISSN =         "1550-4832",
  bibdate =      "Sat Apr 8 10:16:07 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jetc.bib",
  abstract =     "The development of cryptographic devices was followed
                 by the development of so-called implementation attacks,
                 which are intended to retrieve secret information
                 exploiting the hardware itself. Among these attacks,
                 fault attacks can be used to disturb the circuit while
                 performing a computation to retrieve the secret. Among
                 possible means of injecting a fault, laser beams have
                 proven to be accurate and powerful. The laser can be
                 used to illuminate the circuit either from its
                 frontside (i.e., where metal interconnections are first
                 encountered) or from the backside (i.e., through the
                 substrate). Historically, frontside injection was
                 preferred because it does not require the die to be
                 thinned. Nevertheless, due to the increasing
                 integration of metal layers in modern technologies,
                 frontside injections do not allow targeting of any
                 desired location. Indeed, metal lines act as mirrors,
                 and they reflect and refract most of the energy
                 provided by the laser beam. Conversely, backside
                 injections, although more difficult to set up, allow an
                 increase of the resolution of the target location and
                 remove the drawbacks of the frontside technique. This
                 article compares experimental results from frontside
                 and backside fault injections. The effectiveness of the
                 two techniques is measured in terms of exploitable
                 errors on an AES circuit (i.e., errors that can be used
                 to extract the value of the secret key used during the
                 encryption process). We will show, conversely to what
                 is generally assumed, that frontside injection can
                 provide even better results compared to backside
                 injection, especially for low-cost beams with a large
                 laser spot.",
  acknowledgement = ack-nhfb,
  articleno =    "7",
  fjournal =     "ACM Journal on Emerging Technologies in Computing
                 Systems (JETC)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J967",
}

@Article{Celesti:2016:ALT,
  author =       "Antonio Celesti and Maria Fazio and Massimo Villari
                 and Antonio Puliafito",
  title =        "Adding long-term availability, obfuscation, and
                 encryption to multi-cloud storage systems",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "59",
  number =       "??",
  pages =        "208--218",
  month =        jan,
  year =         "2016",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Mon Feb 8 11:55:17 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804514002288",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Chadha:2016:AVE,
  author =       "Rohit Chadha and Vincent Cheval and Stefan Ciob{\^a}ca
                 and Steve Kremer",
  title =        "Automated Verification of Equivalence Properties of
                 Cryptographic Protocols",
  journal =      j-TOCL,
  volume =       "17",
  number =       "4",
  pages =        "23:1--23:??",
  month =        nov,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2926715",
  ISSN =         "1529-3785 (print), 1557-945X (electronic)",
  ISSN-L =       "1529-3785",
  bibdate =      "Wed Mar 15 16:49:14 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tocl/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tocl.bib",
  abstract =     "Indistinguishability properties are essential in
                 formal verification of cryptographic protocols. They
                 are needed to model anonymity properties, strong
                 versions of confidentiality, and resistance against
                 offline guessing attacks. Indistinguishability
                 properties can be conveniently modeled as equivalence
                 properties. We present a novel procedure to verify
                 equivalence properties for a bounded number of sessions
                 of cryptographic protocols. As in the applied pi
                 calculus, our protocol specification language is
                 parametrized by a first-order sorted term signature and
                 an equational theory that allows formalization of
                 algebraic properties of cryptographic primitives. Our
                 procedure is able to verify trace equivalence for
                 determinate cryptographic protocols. On determinate
                 protocols, trace equivalence coincides with
                 observational equivalence, which can therefore be
                 automatically verified for such processes. When
                 protocols are not determinate, our procedure can be
                 used for both under- and over-approximations of trace
                 equivalence, which proved successful on examples. The
                 procedure can handle a large set of cryptographic
                 primitives, namely those whose equational theory is
                 generated by an optimally reducing convergent rewrite
                 system. The procedure is based on a fully abstract
                 modelling of the traces of a bounded number of sessions
                 of the protocols into first-order Horn clauses on which
                 a dedicated resolution procedure is used to decide
                 equivalence properties. We have shown that our
                 procedure terminates for the class of subterm
                 convergent equational theories. Moreover, the procedure
                 has been implemented in a prototype tool Active
                 Knowledge in Security Protocols and has been
                 effectively tested on examples. Some of the examples
                 were outside the scope of existing tools, including
                 checking anonymity of an electronic voting protocol due
                 to Okamoto.",
  acknowledgement = ack-nhfb,
  articleno =    "23",
  fjournal =     "ACM Transactions on Computational Logic",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J773",
}

@Article{Chande:2016:NSC,
  author =       "Manoj Kumar Chande and Cheng-Chi Lee and Chun-Ta Li",
  title =        "A New Self-Certified Convertible Authenticated
                 Encryption Scheme Based on Discrete Logarithm Problem",
  journal =      j-PARALLEL-PROCESS-LETT,
  volume =       "26",
  number =       "4",
  pages =        "1650018",
  month =        dec,
  year =         "2016",
  CODEN =        "PPLTEE",
  DOI =          "https://doi.org/10.1142/S0129626416500183",
  ISSN =         "0129-6264 (print), 1793-642X (electronic)",
  ISSN-L =       "0129-6264",
  bibdate =      "Tue May 29 09:05:29 MDT 2018",
  bibsource =    "http://ejournals.wspc.com.sg/ppl/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/parallelprocesslett.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Parallel Processing Letters",
  journal-URL =  "http://www.worldscientific.com/loi/ppl",
  xxnote =       "Check downcased author string??",
}

@InProceedings{Chang-Fong:2016:CSC,
  author =       "N. Chang-Fong and A. Essex",
  editor =       "{ACM}",
  booktitle =    "{Proceedings of the 32nd Annual Conference on Computer
                 Security Applications (ACSAC 16: 5--9 December 2016,
                 Hilton Los Angeles Universal City, Los Angeles, CA,
                 USA)}",
  title =        "The Cloudier Side of Cryptographic End-to-End
                 Verifiable Voting: A Security Analysis of {Helios}",
  publisher =    pub-ACM,
  address =      pub-ACM:adr,
  year =         "2016",
  DOI =          "https://doi.org/10.1145/2991079.2991106",
  ISBN =         "1-4503-4771-1",
  ISBN-13 =      "978-1-4503-4771-6",
  bibdate =      "Wed Jul 26 17:53:33 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  abstract =     "Helios is an open-audit internet voting system
                 providing cryptographic protections to voter privacy,
                 and election integrity. As part of these protections,
                 Helios produces a cryptographic audit trail that can be
                 used to verify ballots were correctly counted.
                 Cryptographic end-to-end (E2E) election verification
                 schemes of this kind are a promising step toward
                 developing trustworthy electronic voting
                 systems.\par

                 In this paper we approach the discussion from the
                 flip-side by exploring the practical potential for
                 threats to be introduced by the presence of a
                 cryptographic audit trail. We conducted a security
                 analysis of the Helios implementation and discovered a
                 range of vulnerabilities and implemented exploits that
                 would: allow a malicious election official to produce
                 arbitrary election results with accepting proofs of
                 correctness; allow a malicious voter to cast a
                 malformed ballot to prevent the tally from being
                 computed; and, allow an attacker to surreptitiously
                 cast a ballot on a voter's behalf. We also examine
                 privacy issues including a random-number generation
                 bias affecting the indistinguishably of encrypted
                 ballots. We reported the issues and worked with the
                 Helios designers to fix them.",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1145/2991079",
}

@Article{Chatterjee:2016:TAD,
  author =       "Urbi Chatterjee and Rajat Subhra Chakraborty and
                 Hitesh Kapoor and Debdeep Mukhopadhyay",
  title =        "Theory and Application of Delay Constraints in Arbiter
                 {PUF}",
  journal =      j-TECS,
  volume =       "15",
  number =       "1",
  pages =        "10:1--10:??",
  month =        feb,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2815621",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Wed Jun 8 09:43:30 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tecs.bib",
  abstract =     "Physically Unclonable Function (PUF) circuits are
                 often vulnerable to mathematical model-building
                 attacks. We theoretically quantify the advantage
                 provided to an adversary by any training dataset
                 expansion technique along the lines of security
                 analysis of cryptographic hash functions. We present an
                 algorithm to enumerate certain sets of delay
                 constraints for the widely studied Arbiter PUF (APUF)
                 circuit, then demonstrate how these delay constraints
                 can be utilized to expand the set of known
                 Challenge--Response Pairs (CRPs), thus facilitating
                 model-building attacks. We provide experimental results
                 for Field Programmable Gate Array (FPGA)--based APUF to
                 establish the effectiveness of the proposed attack.",
  acknowledgement = ack-nhfb,
  articleno =    "10",
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J840",
}

@Misc{Checkoway:2016:SAJ,
  author =       "Stephen Checkoway and Shaanan Cohney and Christina
                 Garman and Matthew Green and Nadia Heninger and Jacob
                 Maskiewicz and Eric Rescorla and Hovav Shacham and
                 Ralf-Philipp Weinmann",
  title =        "A Systematic Analysis of the {Juniper Dual EC}
                 Incident",
  howpublished = "Cryptology ePrint Archive, Report 2016/376.",
  day =          "14",
  month =        apr,
  year =         "2016",
  bibdate =      "Mon May 16 11:24:17 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://eprint.iacr.org/2016/376",
  abstract =     "In December 2015, Juniper Networks announced that
                 unknown attackers had added unauthorized code to
                 ScreenOS, the operating system for their NetScreen VPN
                 routers. This code created two vulnerabilities: an
                 authentication bypass that enabled remote
                 administrative access, and a second vulnerability that
                 allowed passive decryption of VPN traffic. Reverse
                 engineering of ScreenOS binaries revealed that the
                 first of these vulnerabilities was a conventional back
                 door in the SSH password checker. The second is far
                 more intriguing: a change to the Q parameter used by
                 the Dual EC pseudorandom number generator. It is widely
                 known that Dual EC has the unfortunate property that an
                 attacker with the ability to choose Q can, from a small
                 sample of the generator's output, predict all future
                 outputs. In a 2013 public statement, Juniper noted the
                 use of Dual EC but claimed that ScreenOS included
                 countermeasures that neutralized this form of
                 attack.

                 In this work, we report the results of a thorough
                 independent analysis of the ScreenOS randomness
                 subsystem, as well as its interaction with the IKE VPN
                 key establishment protocol. Due to apparent flaws in
                 the code, Juniper's countermeasures against a Dual EC
                 attack are never executed. Moreover, by comparing
                 sequential versions of ScreenOS, we identify a cluster
                 of additional changes that were introduced concurrently
                 with the inclusion of Dual EC in a single 2008 release.
                 Taken as a whole, these changes render the ScreenOS
                 system vulnerable to passive exploitation by an
                 attacker who selects Q. We demonstrate this by
                 installing our own parameters, and showing that it is
                 possible to passively decrypt a single IKE handshake
                 and its associated VPN traffic in isolation without
                 observing any other network traffic.",
  acknowledgement = ack-nhfb,
  keywords =     "applications; implementation / pseudo-randomness",
}

@Article{Chen:2016:EPN,
  author =       "Yu-Jia Chen and Li-Chun Wang and Chen-Hung Liao",
  title =        "Eavesdropping Prevention for Network Coding Encrypted
                 Cloud Storage Systems",
  journal =      j-IEEE-TRANS-PAR-DIST-SYS,
  volume =       "27",
  number =       "8",
  pages =        "2261--2273",
  month =        aug,
  year =         "2016",
  CODEN =        "ITDSEO",
  DOI =          "https://doi.org/10.1109/TPDS.2015.2486772",
  ISSN =         "1045-9219 (print), 1558-2183 (electronic)",
  ISSN-L =       "1045-9219",
  bibdate =      "Tue Jul 19 06:55:24 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranspardistsys.bib",
  URL =          "http://csdl.computer.org/csdl/trans/td/2016/08/07289458-abs.html",
  abstract-URL = "http://csdl.computer.org/csdl/trans/td/2016/08/07289458-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://www.computer.org/tpds/archives.htm",
}

@Article{Chen:2016:RPR,
  author =       "Zhenhua Chen and Shundong Li and Qiong Huang and Yilei
                 Wang and Sufang Zhou",
  title =        "A restricted proxy re-encryption with keyword search
                 for fine-grained data access control in cloud storage",
  journal =      j-CCPE,
  volume =       "28",
  number =       "10",
  pages =        "2858--2876",
  month =        jul,
  year =         "2016",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.3754",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Tue Sep 13 08:30:11 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
}

@Article{Chen:2016:WPM,
  author =       "Zhide Chen and Meng Wang and Li Xu and Wei Wu",
  title =        "Worm propagation model in mobile network",
  journal =      j-CCPE,
  volume =       "28",
  number =       "4",
  pages =        "1134--1144",
  day =          "25",
  month =        mar,
  year =         "2016",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.3566",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Sun Apr 3 12:34:13 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "5 Jun 2015",
}

@Article{Cheon:2016:ANP,
  author =       "Jung Hee Cheon and Jinhyuck Jeong and Changmin Lee",
  title =        "An algorithm for {NTRU} problems and cryptanalysis of
                 the {GGH} multilinear map without a low-level encoding
                 of zero",
  journal =      j-LMS-J-COMPUT-MATH,
  volume =       "19",
  number =       "A",
  pages =        "255--266",
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1112/S1461157016000371",
  ISSN =         "1461-1570",
  bibdate =      "Fri Mar 31 08:49:52 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lms-j-comput-math.bib",
  URL =          "https://www.cambridge.org/core/product/230ECFEEE6AF4D8027FF3E13998D560C",
  acknowledgement = ack-nhfb,
  ajournal =     "LMS J. Comput. Math.",
  fjournal =     "LMS Journal of Computation and Mathematics",
  journal-URL =  "http://journals.cambridge.org/action/displayJournal?jid=JCM",
  onlinedate =   "26 August 2016",
}

@Article{Chien:2016:GAI,
  author =       "Hung-Yu Chien",
  title =        "A Generic Approach to Improving {Diffie--Hellman} Key
                 Agreement Efficiency for Thin Clients",
  journal =      j-COMP-J,
  volume =       "59",
  number =       "4",
  pages =        "592--601",
  month =        apr,
  year =         "2016",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxv094",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Mar 28 10:52:39 MDT 2016",
  bibsource =    "http://comjnl.oxfordjournals.org/content/59/4.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/59/4/592",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "November 2, 2015",
}

@Article{Cho:2016:MAT,
  author =       "Haehyun Cho and Jiwoong Bang and Myeongju Ji and Jeong
                 Hyun Yi",
  title =        "Mobile application tamper detection scheme using
                 dynamic code injection against repackaging attacks",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "72",
  number =       "9",
  pages =        "3629--3645",
  month =        sep,
  year =         "2016",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-016-1763-2",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Tue Sep 20 10:45:03 MDT 2016",
  bibsource =    "http://link.springer.com/journal/11227/72/9;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  URL =          "http://link.springer.com/article/10.1007/s11227-016-1763-2",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Article{Choo:2016:CCT,
  author =       "Kim-Kwang Raymond Choo and Josep Domingo-Ferrer and
                 Lei Zhang",
  title =        "Cloud Cryptography: Theory, Practice and Future
                 Research Directions",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "62",
  number =       "??",
  pages =        "51--53",
  month =        sep,
  year =         "2016",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Tue May 31 08:45:28 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X16300942",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X/",
}

@Article{Chu:2016:BEE,
  author =       "Jennifer Chu",
  title =        "The Beginning of the End for Encryption Schemes?",
  journal =      j-SCI-COMPUT,
  volume =       "??",
  number =       "??",
  pages =        "??",
  day =          "7",
  month =        mar,
  year =         "2016",
  CODEN =        "SCHRCU",
  ISSN =         "1930-5753 (print), 1930-6156 (electronic)",
  ISSN-L =       "1930-5753",
  bibdate =      "Tue Mar 08 10:59:40 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.scientificcomputing.com/news/2016/03/beginning-end-encryption-schemes",
  acknowledgement = ack-nhfb,
  fjournal =     "Scientific Computing",
  journal-URL =  "http://digital.scientificcomputing.com/scientificcomputing/",
  remark =       "This article describes recent research
                 \cite{Monz:2016:RSS} that successfully constructed a
                 5-atom quantum computer that correctly factored $ 15
                 \to 3 \times 5 $, and that has the possibility of
                 significant scaling up in size to tackle the large
                 integer factorization using Peter Shor's 1994 quantum
                 factoring algorithm.",
}

@Article{Chung:2016:NBB,
  author =       "Kai-Min Chung and Rafael Pass and Karn Seth",
  title =        "Non-Black-Box Simulation from One-Way Functions and
                 Applications to Resettable Security",
  journal =      j-SIAM-J-COMPUT,
  volume =       "45",
  number =       "2",
  pages =        "415--458",
  month =        "????",
  year =         "2016",
  CODEN =        "SMJCAT",
  DOI =          "https://doi.org/10.1137/130946083",
  ISSN =         "0097-5397 (print), 1095-7111 (electronic)",
  ISSN-L =       "0097-5397",
  bibdate =      "Mon Jun 20 15:35:28 MDT 2016",
  bibsource =    "http://epubs.siam.org/sam-bin/dbq/toclist/SICOMP/45/2;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/siamjcomput.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "SIAM Journal on Computing",
  journal-URL =  "http://epubs.siam.org/sicomp",
  onlinedate =   "January 2016",
}

@Article{Ciegis:2016:ADP,
  author =       "Raimondas Ciegis and Vadimas Starikovicius and
                 Natalija Tumanova and Minvydas Ragulskis",
  title =        "Application of distributed parallel computing for
                 dynamic visual cryptography",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "72",
  number =       "11",
  pages =        "4204--4220",
  month =        nov,
  year =         "2016",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-016-1733-8",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Sat Jun 24 10:31:30 MDT 2017",
  bibsource =    "http://link.springer.com/journal/11227/72/11;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Article{Coles:2016:NAU,
  author =       "Patrick J. Coles and Eric M. Metodiev and Norbert
                 L{\"u}tkenhaus",
  title =        "Numerical approach for unstructured quantum key
                 distribution",
  journal =      j-NATURE-COMMUN,
  volume =       "7",
  pages =        "11712",
  month =        may,
  year =         "2016",
  CODEN =        "NCAOBW",
  DOI =          "https://doi.org/10.1038/ncomms11712",
  ISSN =         "2041-1723 (electronic)",
  bibdate =      "Thu May 26 07:43:16 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.nature.com/ncomms/2016/160520/ncomms11712/full/ncomms11712.html;
                 http://www.scientificcomputing.com/news/2016/05/computing-secret-unbreakable-key",
  acknowledgement = ack-nhfb,
  fjournal =     "Nature Communications",
  journal-URL =  "http://www.nature.com/ncomms",
}

@Article{Colin:2016:CTC,
  author =       "Alexei Colin and Brandon Lucia",
  title =        "{Chain}: tasks and channels for reliable intermittent
                 programs",
  journal =      j-SIGPLAN,
  volume =       "51",
  number =       "10",
  pages =        "514--530",
  month =        oct,
  year =         "2016",
  CODEN =        "SINODQ",
  DOI =          "https://doi.org/10.1145/3022671.2983995",
  ISSN =         "0362-1340 (print), 1523-2867 (print), 1558-1160
                 (electronic)",
  ISSN-L =       "0362-1340",
  bibdate =      "Sat Sep 16 10:18:13 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigplan2010.bib",
  abstract =     "Energy harvesting computers enable general-purpose
                 computing using energy collected from their
                 environment. Energy-autonomy of such devices has great
                 potential, but their intermittent power supply poses a
                 challenge. Intermittent program execution compromises
                 progress and leaves state inconsistent. This work
                 describes Chain: a new model for programming
                 intermittent devices. A Chain program is a set of
                 programmer-defined tasks that compute and exchange data
                 through channels. Chain guarantees forward progress at
                 task granularity. A task is restartable and never sees
                 inconsistent state, because its input and output
                 channels are separated. Our system supports language
                 features for expressing advanced data exchange patterns
                 and for encapsulating reusable functionality. Chain
                 fundamentally differs from state-of-the-art
                 checkpointing approaches and does not incur the
                 associated overhead. We implement Chain as C language
                 extensions and a runtime library. We used Chain to
                 implement four applications: machine learning,
                 encryption, compression, and sensing. In experiments,
                 Chain ensured consistency where prior approaches failed
                 and improved throughput by 2-7x over the leading
                 state-of-the-art system.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGPLAN Notices",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J706",
  remark =       "OOPSLA '16 conference proceedings.",
}

@Article{Coras:2016:AML,
  author =       "Florin Coras and Jordi Domingo-Pascual and Darrel
                 Lewis and Albert Cabellos-Aparicio",
  title =        "An analytical model for {Loc\slash ID} mappings
                 caches",
  journal =      j-IEEE-TRANS-NETWORKING,
  volume =       "24",
  number =       "1",
  pages =        "506--516",
  month =        feb,
  year =         "2016",
  CODEN =        "IEANEP",
  DOI =          "https://doi.org/10.1109/TNET.2014.2373398",
  ISSN =         "1063-6692 (print), 1558-2566 (electronic)",
  ISSN-L =       "1063-6692",
  bibdate =      "Mon May 23 16:25:57 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
  abstract =     "Concerns regarding the scalability of the interdomain
                 routing have encouraged researchers to start
                 elaborating a more robust Internet architecture. While
                 consensus on the exact form of the solution is yet to
                 be found, the need for a semantic decoupling of a
                 node's location and identity is generally accepted as a
                 promising way forward. However, this typically requires
                 the use of caches that store temporal bindings between
                 the two namespaces, to avoid hampering router packet
                 forwarding speeds. In this article, we propose a
                 methodology for an analytical analysis of cache
                 performance that relies on the working-set theory. We
                 first identify the conditions that network traffic must
                 comply with for the theory to be applicable and then
                 develop a model that predicts average cache miss rates
                 relying on easily measurable traffic parameters. We
                 validate the result by emulation, using real packet
                 traces collected at the egress points of a campus and
                 an academic network. To prove its versatility, we
                 extend the model to consider cache polluting user
                 traffic and observe that simple, low intensity attacks
                 drastically reduce performance, whereby manufacturers
                 should either overprovision router memory or implement
                 more complex cache eviction policies.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE\slash ACM Transactions on Networking",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J771",
}

@Article{Cordeiro:2016:MPG,
  author =       "Weverton Luis da Costa Cordeiro and Fl{\'a}vio Roberto
                 Santos and Marinho Pilla Barcelos and Luciano Paschoal
                 Gaspary and Hanna Kavalionak and Alessio Guerrieri and
                 Alberto Montresor",
  title =        "Making puzzles green and useful for adaptive identity
                 management in large-scale distributed systems",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "95",
  number =       "??",
  pages =        "97--114",
  day =          "11",
  month =        feb,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Mon Jan 25 06:18:20 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1389128615004818",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286/",
}

@Article{Crichlow:2016:RSE,
  author =       "Ramon Crichlow",
  title =        "Rock-solid encrypted video streaming using {SSH}
                 tunnels and the {BeagleBone Black}",
  journal =      j-LINUX-J,
  volume =       "2016",
  number =       "264",
  pages =        "1:1--1:??",
  month =        apr,
  year =         "2016",
  CODEN =        "LIJOFX",
  ISSN =         "1075-3583 (print), 1938-3827 (electronic)",
  ISSN-L =       "1075-3583",
  bibdate =      "Tue Jun 7 18:42:43 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/linux-journal.bib",
  URL =          "http://dl.acm.org/ft_gateway.cfm?id=2933362",
  abstract =     "Learn how SSH tunnels work by setting up a remote
                 viewable Webcam on your BeagleBone Black.",
  acknowledgement = ack-nhfb,
  articleno =    "1",
  fjournal =     "Linux Journal",
  journal-URL =  "http://portal.acm.org/citation.cfm?id=J508",
}

@Article{Cui:2016:KAS,
  author =       "Baojiang Cui and Zheli Liu and Lingyu Wang",
  title =        "{Key-Aggregate Searchable Encryption (KASE)} for Group
                 Data Sharing via Cloud Storage",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "65",
  number =       "8",
  pages =        "2374--2385",
  month =        "????",
  year =         "2016",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2015.2389959",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Mon Jul 11 18:58:52 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers -",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Cui:2016:RDA,
  author =       "Hui Cui and Robert H. Deng",
  title =        "Revocable and Decentralized Attribute-Based
                 Encryption",
  journal =      j-COMP-J,
  volume =       "59",
  number =       "8",
  pages =        "1220--1235",
  month =        aug,
  year =         "2016",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxw007",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Aug 30 07:10:50 MDT 2016",
  bibsource =    "http://comjnl.oxfordjournals.org/content/59/8.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/59/8/1220",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "February 12, 2016",
}

@Article{Dai:2016:MLR,
  author =       "Shuguang Dai and Huige Li and Fangguo Zhang",
  title =        "Memory leakage-resilient searchable symmetric
                 encryption",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "62",
  number =       "??",
  pages =        "76--84",
  month =        sep,
  year =         "2016",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Tue May 31 08:45:28 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X15003404",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X/",
}

@Article{Das:2016:CWM,
  author =       "Aveek K. Das and Parth H. Pathak and Chen-Nee Chuah
                 and Prasant Mohapatra",
  title =        "Characterization of Wireless Multidevice Users",
  journal =      j-TOIT,
  volume =       "16",
  number =       "4",
  pages =        "29:1--29:??",
  month =        dec,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2955096",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Thu Dec 22 16:47:17 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "The number of wireless-enabled devices owned by a user
                 has had huge growth over the past few years. Over one
                 third of adults in the United States currently own
                 three wireless devices: a smartphone, laptop, and
                 tablet. This article provides a study of the network
                 usage behavior of today's multidevice users. Using data
                 collected from a large university campus, we provide a
                 detailed multidevice user (MDU) measurement study of
                 more than 30,000 users. The major objective of this
                 work is to study how the presence of multiple wireless
                 devices affects the network usage behavior of users.
                 Specifically, we characterize the usage pattern of the
                 different device types in terms of total and
                 intermittent usage, how the usage of different devices
                 overlap over time, and uncarried device usage
                 statistics. We also study user preferences of accessing
                 sensitive content and device-specific factors that
                 govern the choice of WiFi encryption type. The study
                 reveals several interesting findings about MDUs. We see
                 how the use of tablets and laptops are interchangeable
                 and how the overall multidevice usage is additive
                 instead of being shared among the devices. We also
                 observe how current DHCP configurations are oblivious
                 to multiple devices, which results in inefficient
                 utilization of available IP address space. All findings
                 about multidevice usage patterns have the potential to
                 be utilized by different entities, such as app
                 developers, network providers, security researchers,
                 and analytics and advertisement systems, to provide
                 more intelligent and informed services to users who
                 have at least two devices among a smartphone, tablet,
                 and laptop.",
  acknowledgement = ack-nhfb,
  articleno =    "29",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Das:2016:MPU,
  author =       "Jayita Das and Kevin Scott and Sanjukta Bhanja",
  title =        "{MRAM PUF}: Using Geometric and Resistive Variations
                 in {MRAM} Cells",
  journal =      j-JETC,
  volume =       "13",
  number =       "1",
  pages =        "2:1--2:??",
  month =        dec,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2854154",
  ISSN =         "1550-4832",
  bibdate =      "Sat Apr 8 10:16:07 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jetc.bib",
  abstract =     "In this work, we have studied two novel techniques to
                 enhance the performance of existing geometry-based
                 magnetoresistive RAM physically unclonable function
                 (MRAM PUF). Geometry-based MRAM PUFs rely only on
                 geometric variations in MRAM cells that generate
                 preferred ground state in cells and form the basis of
                 digital signature generation. Here we study two novel
                 ways to improve the performance of the geometry-based
                 PUF signature. First, we study how the choice between
                 specific geometries can enhance the reliability of the
                 digital signature. Using fabrications and simulations,
                 we study how the rectangular shape in the PUF cells is
                 more susceptible to lithography-based geometric
                 variations than the elliptical shape of the same aspect
                 ratio. The choice of rectangular over elliptical masks
                 in the lithography process can therefore improve the
                 reliability of the digital signature from PUF. Second,
                 we present a MRAM PUF architecture and study how
                 resistances in MRAM cells can be used to generate
                 analog voltage output that are easier to detect if
                 probed by an adversary. In the new PUF architecture, we
                 have the choice between selection of rows and columns
                 to generate unique and hard-to-predict analog voltage
                 outputs. For a 64-bit response, the analog voltage
                 output can range between 20 and 500 mV, making it tough
                 for an adversary to guess over this wide range of
                 voltages. This work ends with a discussion on the
                 threat resilience ability of the new improved MRAM PUF
                 to attacks from probing-, tampering-, reuse-, and
                 simulation-based models.",
  acknowledgement = ack-nhfb,
  articleno =    "2",
  fjournal =     "ACM Journal on Emerging Technologies in Computing
                 Systems (JETC)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J967",
}

@Article{Dasgupta:2016:TDA,
  author =       "Dipankar Dasgupta and Arunava Roy and Abhijit Nag",
  title =        "Toward the design of adaptive selection strategies for
                 multi-factor authentication",
  journal =      j-COMPUT-SECUR,
  volume =       "63",
  number =       "??",
  pages =        "85--116",
  month =        nov,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:47 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481630102X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Degefa:2016:PSE,
  author =       "Fikadu B. Degefa and Donghoon Lee and Jiye Kim and
                 Younsung Choi and Dongho Won",
  title =        "Performance and security enhanced authentication and
                 key agreement protocol for {SAE\slash LTE} network",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "94",
  number =       "??",
  pages =        "145--163",
  day =          "15",
  month =        jan,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Fri Feb 5 18:54:57 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1389128615004211",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286/",
}

@Article{Delimitrou:2016:SID,
  author =       "Christina Delimitrou and Christos Kozyrakis",
  title =        "Security Implications of Data Mining in Cloud
                 Scheduling",
  journal =      j-IEEE-COMPUT-ARCHIT-LETT,
  volume =       "15",
  number =       "2",
  pages =        "109--112",
  month =        jul # "\slash " # dec,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/LCA.2015.2461215",
  ISSN =         "1556-6056 (print), 1556-6064 (electronic)",
  ISSN-L =       "1556-6056",
  bibdate =      "Tue Jun 25 07:41:05 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeecomputarchitlett.bib",
  abstract =     "Cloud providers host an increasing number of popular
                 applications, on the premise of resource flexibility
                 and cost efficiency. Most of these systems expose
                 virtualized resources of different types and sizes. As
                 instances share the same physical host to increase
                 utilization, they contend on hardware resources, e.g.,
                 last-level cache, making them vulnerable to
                 side-channel attacks from co-scheduled applications. In
                 this work we show that using data mining techniques can
                 help an adversarial user of the cloud determine the
                 nature and characteristics of co-scheduled applications
                 and negatively impact their performance through
                 targeted contention injections. We design Bolt, a
                 simple runtime that extracts the sensitivity of
                 co-scheduled applications to various types of
                 interference and uses this signal to determine the type
                 of these applications by applying a set of data mining
                 techniques. We validate the accuracy of Bolt on a
                 39-server cluster. Bolt correctly identifies the type
                 and characteristics of 81 percent out of 108 victim
                 applications, and constructs specialized contention
                 signals that degrade their performance. We also use
                 Bolt to find the most commonly-run applications on EC2.
                 We hope that underlining such security vulnerabilities
                 in modern cloud facilities will encourage cloud
                 providers to introduce stronger resource isolation
                 primitives in their systems.",
  acknowledgement = ack-nhfb,
  affiliation =  "Delimitrou, C (Reprint Author), Stanford Univ, Dept
                 Elect Engn, Stanford, CA 94305 USA. Delimitrou,
                 Christina; Kozyrakis, Christos, Stanford Univ, Dept
                 Elect Engn, Stanford, CA 94305 USA.",
  author-email = "cdel@stanford.edu kozyraki@stanford.edu",
  da =           "2019-06-20",
  doc-delivery-number = "EH9MM",
  eissn =        "1556-6064",
  fjournal =     "IEEE Computer Architecture Letters",
  journal-iso =  "IEEE Comput. Archit. Lett.",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=10208",
  keywords =     "39-server cluster; application studies resulting in
                 better multiple-processor systems; Bolt; Cloud
                 computing; cloud computing; cloud facilities; cloud
                 providers; co-scheduled applications; Computer crime;
                 cost efficiency; cryptography; data mining; Data
                 mining; Degradation; Interference; resource allocation;
                 resource flexibility; resource isolation primitives;
                 scheduling and task partitioning; security and privacy
                 protection; security vulnerabilities; Servers;
                 side-channel attacks; specialized contention signals;
                 Super (very large) computers; virtualized resources",
  number-of-cited-references = "21",
  research-areas = "Computer Science",
  times-cited =  "0",
  unique-id =    "Delimitrou:2016:SID",
  web-of-science-categories = "Computer Science, Hardware \&
                 Architecture",
}

@Article{Demirhan:2016:CRP,
  author =       "Haydar Demirhan and Nihan Bitirim",
  title =        "\pkg{CryptRndTest}: an {R} Package for Testing the
                 Cryptographic Randomness",
  journal =      j-R-JOURNAL,
  volume =       "8",
  number =       "1",
  pages =        "233--247",
  month =        aug,
  year =         "2016",
  DOI =          "https://doi.org/10.32614/rj-2016-016",
  ISSN =         "2073-4859",
  ISSN-L =       "2073-4859",
  bibdate =      "Fri May 21 06:58:41 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/rjournal.bib",
  URL =          "https://journal.r-project.org/archive/2016/RJ-2016-016",
  acknowledgement = ack-nhfb,
  fjournal =     "The R Journal",
  journal-URL =  "http://journal.r-project.org/",
}

@Article{Deng:2016:NCS,
  author =       "Jiang Deng and Chunxiang Xu and Huai Wu and Liju
                 Dong",
  title =        "A new certificateless signature with enhanced security
                 and aggregation version",
  journal =      j-CCPE,
  volume =       "28",
  number =       "4",
  pages =        "1124--1133",
  day =          "25",
  month =        mar,
  year =         "2016",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.3551",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Sun Apr 3 12:34:13 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "5 Jun 2015",
}

@Article{Diesburg:2016:TLA,
  author =       "Sarah Diesburg and Christopher Meyers and Mark
                 Stanovich and An-I Andy Wang and Geoff Kuenning",
  title =        "{TrueErase}: Leveraging an Auxiliary Data Path for
                 Per-File Secure Deletion",
  journal =      j-TOS,
  volume =       "12",
  number =       "4",
  pages =        "18:1--18:??",
  month =        aug,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2854882",
  ISSN =         "1553-3077 (print), 1553-3093 (electronic)",
  ISSN-L =       "1553-3077",
  bibdate =      "Sat Mar 25 07:00:07 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tos/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tos.bib",
  abstract =     "One important aspect of privacy is the ability to
                 securely delete sensitive data from electronic storage
                 in such a way that it cannot be recovered; we call this
                 action secure deletion. Short of physically destroying
                 the entire storage medium, existing software
                 secure-deletion solutions tend to be piecemeal at best
                 --- they may only work for one type of storage or file
                 system, may force the user to delete all files instead
                 of selected ones, may require the added complexities of
                 encryption and key storage, may require extensive
                 changes and additions to the computer's operating
                 system or storage firmware, and may not handle system
                 crashes gracefully. We present TrueErase, a holistic
                 secure-deletion framework for individual systems that
                 contain sensitive data. Through design, implementation,
                 verification, and evaluation on both a hard drive and
                 NAND flash, TrueErase shows that it is possible to
                 construct a per-file, secure-deletion framework that
                 can accommodate different storage media and legacy file
                 systems, require limited changes to legacy systems, and
                 handle common crash scenarios. TrueErase can serve as a
                 building block by cryptographic systems that securely
                 delete information by erasing encryption keys. The
                 overhead is dependent on spatial locality, number of
                 sensitive files, and workload (computational- or
                 I/O-bound).",
  acknowledgement = ack-nhfb,
  articleno =    "18",
  fjournal =     "ACM Transactions on Storage",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J960",
}

@Article{DiPietro:2016:CLD,
  author =       "Roberto {Di Pietro} and Flavio Lombardi and Antonio
                 Villani",
  title =        "{CUDA} Leaks: a Detailed Hack for {CUDA} and a
                 (Partial) Fix",
  journal =      j-TECS,
  volume =       "15",
  number =       "1",
  pages =        "15:1--15:??",
  month =        feb,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2801153",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Wed Jun 8 09:43:30 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tecs.bib",
  abstract =     "Graphics processing units (GPUs) are increasingly
                 common on desktops, servers, and embedded platforms. In
                 this article, we report on new security issues related
                 to CUDA, which is the most widespread platform for GPU
                 computing. In particular, details and proofs-of-concept
                 are provided about novel vulnerabilities to which CUDA
                 architectures are subject. We show how such
                 vulnerabilities can be exploited to cause severe
                 information leakage. As a case study, we experimentally
                 show how to exploit one of these vulnerabilities on a
                 GPU implementation of the AES encryption algorithm.
                 Finally, we also suggest software patches and
                 alternative approaches to tackle the presented
                 vulnerabilities.",
  acknowledgement = ack-nhfb,
  articleno =    "15",
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J840",
}

@Article{Dixon:2016:NTO,
  author =       "Lucas Dixon and Thomas Ristenpart and Thomas
                 Shrimpton",
  title =        "Network Traffic Obfuscation and Automated {Internet}
                 Censorship",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "6",
  pages =        "43--53",
  month =        nov # "\slash " # dec,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Feb 25 10:03:53 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/06/msp2016060043-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
}

@Article{Dolev:2016:MCG,
  author =       "Shlomi Dolev and Ephraim Korach and Ximing Li and Yin
                 Li and Galit Uzan",
  title =        "Magnifying computing gaps: Establishing encrypted
                 communication over unidirectional channels",
  journal =      j-THEOR-COMP-SCI,
  volume =       "636",
  number =       "??",
  pages =        "17--26",
  day =          "11",
  month =        jul,
  year =         "2016",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Wed Jun 1 09:20:45 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2015.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0304397516300718",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975/",
}

@Article{Dong:2016:EPP,
  author =       "Xiaolei Dong and Jun Zhou and Zhenfu Cao",
  title =        "Efficient privacy-preserving temporal and spacial data
                 aggregation for smart grid communications",
  journal =      j-CCPE,
  volume =       "28",
  number =       "4",
  pages =        "1145--1160",
  day =          "25",
  month =        mar,
  year =         "2016",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.3570",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Sun Apr 3 12:34:13 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "31 Jul 2015",
}

@TechReport{Dorre:2016:ELO,
  author =       "Felix D{\"o}rre and Vladimir Klebanov",
  title =        "Entropy Loss and Output Predictability in the
                 {Libgcrypt} {PRNG}",
  type =         "Report",
  number =       "CVE-2016-6313",
  institution =  "Karlsruhe Institute of Technology",
  address =      "Karlsruhe, Germany",
  pages =        "2",
  day =          "18",
  month =        aug,
  year =         "2016",
  bibdate =      "Thu Aug 18 07:56:29 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://formal.iti.kit.edu/~klebanov/pubs/libgcrypt-cve-2016-6313.pdf",
  abstract =     "In the following we describe a design flaw in the
                 mixing function of the Libgcrypt PRNG. Due to the flaw,
                 mixing the full entropy pool reduces the stored entropy
                 amount by at least 20 bytes. Furthermore, the flaw
                 makes a part of the PRNG output completely predictable.
                 This bug exists since 1998 in all GnuPG and Libgcrypt
                 versions and is tracked as CVE-2016-6313. A release
                 fixing the problem is available as of 2016-08-17.",
  acknowledgement = ack-nhfb,
}

@Article{Draziotis:2016:EDL,
  author =       "Konstantinos A. Draziotis",
  title =        "{(EC)DSA} lattice attacks based on {Coppersmith}'s
                 method",
  journal =      j-INFO-PROC-LETT,
  volume =       "116",
  number =       "8",
  pages =        "541--545",
  month =        aug,
  year =         "2016",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Thu May 19 07:58:41 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019016300436",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190/",
}

@Article{Duan:2016:SDC,
  author =       "Li Duan and Dongxi Liu and Yang Zhang and Shiping Chen
                 and Ren Ping Liu and Bo Cheng and Junliang Chen",
  title =        "Secure Data-Centric Access Control for Smart Grid
                 Services Based on Publish\slash Subscribe Systems",
  journal =      j-TOIT,
  volume =       "16",
  number =       "4",
  pages =        "23:1--23:??",
  month =        dec,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3007190",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Thu Dec 22 16:47:17 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "The communication systems in existing smart grids
                 mainly take the request/reply interaction model, in
                 which data access is under the direct control of data
                 producers. This tightly controlled interaction model is
                 not scalable to support complex interactions among
                 smart grid services. On the contrary, the
                 publish/subscribe system features a loose coupling
                 communication infrastructure and allows indirect,
                 anonymous and multicast interactions among smart grid
                 services. The publish/subscribe system can thus support
                 scalable and flexible collaboration among smart grid
                 services. However, the access is not under the direct
                 control of data producers, it might not be easy to
                 implement an access control scheme for a
                 publish/subscribe system. In this article, we propose a
                 Data-Centric Access Control Framework (DCACF) to
                 support secure access control in a publish/subscribe
                 model. This framework helps to build scalable smart
                 grid services, while keeping features of service
                 interactions and data confidentiality at the same time.
                 The data published in our DCACF is encrypted with a
                 fully homomorphic encryption scheme, which allows
                 in-grid homomorphic aggregation of the encrypted data.
                 The encrypted data is accompanied by Bloom-filter
                 encoded control policies and access credentials to
                 enable indirect access control. We have analyzed the
                 correctness and security of our DCACF and evaluated its
                 performance in a distributed environment.",
  acknowledgement = ack-nhfb,
  articleno =    "23",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Dubeuf:2016:EPA,
  author =       "Jeremy Dubeuf and David Hely and Vincent Beroulle",
  title =        "{ECDSA} Passive Attacks, Leakage Sources, and Common
                 Design Mistakes",
  journal =      j-TODAES,
  volume =       "21",
  number =       "2",
  pages =        "31:1--31:??",
  month =        jan,
  year =         "2016",
  CODEN =        "ATASFO",
  DOI =          "https://doi.org/10.1145/2820611",
  ISSN =         "1084-4309 (print), 1557-7309 (electronic)",
  ISSN-L =       "1084-4309",
  bibdate =      "Sat Feb 6 07:43:40 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/todaes/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/todaes.bib",
  abstract =     "Elliptic Curves Cryptography (ECC) tends to replace
                 RSA for public key cryptographic services. ECC is
                 involved in many secure schemes such as Elliptic Curve
                 Diffie--Hellman (ECDH) key agreement, Elliptic Curve
                 Integrated Encryption Scheme (ECIES), and Elliptic
                 Curve Digital Signature Algorithm (ECDSA). As for every
                 cryptosystem, implementation of such schemes may
                 jeopardize the inherent security provided by the
                 mathematical properties of the ECC. Unfortunate
                 implementation or algorithm choices may create serious
                 vulnerabilities. The elliptic curve scalar operation is
                 particularly sensitive among these schemes. This
                 article surveys passive attacks against well-spread
                 elliptic curve scalar multiplication algorithms
                 highlighting leakage sources and common mistakes that
                 can be used to attack the ECDSA scheme. Experimental
                 results are provided to illustrate and demonstrate the
                 effectiveness of each vulnerability. Finally, the
                 article describes the link between partial leakage and
                 lattice attack in order to understand and demonstrate
                 the impact of small leakages on the security of ECDSA.
                 An example of side channel and lattice attack
                 combination on NIST P-256 is provided in the case where
                 the elliptic curve scalar multiplication is not
                 protected against DPA/CPA and a controllable device is
                 not accessible.",
  acknowledgement = ack-nhfb,
  articleno =    "31",
  fjournal =     "ACM Transactions on Design Automation of Electronic
                 Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J776",
}

@Article{DuPont:2016:ECC,
  author =       "Quinn DuPont and Bradley Fidler",
  title =        "Edge Cryptography and the Codevelopment of Computer
                 Networks and Cybersecurity",
  journal =      j-IEEE-ANN-HIST-COMPUT,
  volume =       "38",
  number =       "4",
  pages =        "55--73",
  month =        "????",
  year =         "2016",
  CODEN =        "IAHCEX",
  DOI =          "https://doi.org/10.1109/MAHC.2016.49",
  ISSN =         "1058-6180 (print), 1934-1547 (electronic)",
  ISSN-L =       "1058-6180",
  bibdate =      "Thu Dec 8 06:37:03 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeeannhistcomput.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Annals of the History of Computing",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=85",
}

@Article{Eberz:2016:LLE,
  author =       "Simon Eberz and Kasper B. Rasmussen and Vincent
                 Lenders and Ivan Martinovic",
  title =        "Looks Like {Eve}: Exposing Insider Threats Using Eye
                 Movement Biometrics",
  journal =      j-TOPS,
  volume =       "19",
  number =       "1",
  pages =        "1:1--1:??",
  month =        aug,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2904018",
  ISSN =         "2471-2566 (print), 2471-2574 (electronic)",
  ISSN-L =       "2471-2566",
  bibdate =      "Mon Apr 3 09:09:38 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tops.bib",
  abstract =     "We introduce a novel biometric based on distinctive
                 eye movement patterns. The biometric consists of 20
                 features that allow us to reliably distinguish users
                 based on differences in these patterns. We leverage
                 this distinguishing power along with the ability to
                 gauge the users' task familiarity, that is, level of
                 knowledge, to address insider threats. In a controlled
                 experiment, we test how both time and task familiarity
                 influence eye movements and feature stability, and how
                 different subsets of features affect the classifier
                 performance. These feature subsets can be used to
                 tailor the eye movement biometric to different
                 authentication methods and threat models. Our results
                 show that eye movement biometrics support reliable and
                 stable continuous authentication of users. We
                 investigate different approaches in which an attacker
                 could attempt to use inside knowledge to mimic the
                 legitimate user. Our results show that while this
                 advance knowledge is measurable, it does not increase
                 the likelihood of successful impersonation. In order to
                 determine the time stability of our features, we repeat
                 the experiment twice within 2 weeks. The results
                 indicate that we can reliably authenticate users over
                 the entire period. We show that lower sampling rates
                 provided by low-cost hardware pose a challenge, but
                 that reliable authentication is possible even at the
                 rate of 50Hz commonly available with consumer-level
                 devices. In a second set of experiments, we evaluate
                 how our authentication system performs across a variety
                 of real-world tasks, including reading, writing, and
                 web browsing. We discuss the advantages and limitations
                 of our approach in detail and give practical insights
                 on the use of this biometric in a real-world
                 environment.",
  acknowledgement = ack-nhfb,
  articleno =    "1",
  fjournal =     "ACM Transactions on Privacy and Security (TOPS)",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J1547",
}

@Article{Ehdaie:2016:HCR,
  author =       "Mohammad Ehdaie and Nikos Alexiou and Mahmoud Ahmadian
                 and Mohammad Reza Aref and Panos Papadimitratos",
  title =        "{$2$D} Hash Chain robust Random Key Distribution
                 scheme",
  journal =      j-INFO-PROC-LETT,
  volume =       "116",
  number =       "5",
  pages =        "367--372",
  month =        may,
  year =         "2016",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Fri Feb 12 06:40:48 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019015002239",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190/",
}

@Article{Esiner:2016:FFB,
  author =       "Ertem Esiner and Adilet Kachkeev and Samuel Braunfeld
                 and Alptekin K{\"u}p{\c{c}}{\"u} and {\"O}znur
                 {\"O}zkasap",
  title =        "{FlexDPDP}: Flexlist-Based Optimized Dynamic Provable
                 Data Possession",
  journal =      j-TOS,
  volume =       "12",
  number =       "4",
  pages =        "23:1--23:??",
  month =        aug,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2943783",
  ISSN =         "1553-3077 (print), 1553-3093 (electronic)",
  ISSN-L =       "1553-3077",
  bibdate =      "Sat Mar 25 07:00:07 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tos/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tos.bib",
  abstract =     "With increasing popularity of cloud storage,
                 efficiently proving the integrity of data stored on an
                 untrusted server has become significant. Authenticated
                 skip lists and rank-based authenticated skip lists
                 (RBASL) have been used to provide support for provable
                 data update operations in cloud storage. However, in a
                 dynamic file scenario, an RBASL based on block indices
                 falls short when updates are not proportional to a
                 fixed block size; such an update to the file, even if
                 small, may result in $ O(n) $ updates on the data
                 structure for a file with n blocks. To overcome this
                 problem, we introduce FlexList, a flexible length-based
                 authenticated skip list. FlexList translates
                 variable-size updates to $ O(\lceil u / B \rceil) $
                 insertions, removals, or modifications, where u is the
                 size of the update and B is the (average) block size.
                 We further present various optimizations on the four
                 types of skip lists (regular, authenticated, rank-based
                 authenticated, and FlexList). We build such a structure
                 in $ O(n) $ time and parallelize this operation for the
                 first time. We compute one single proof to answer
                 multiple (non)membership queries and obtain efficiency
                 gains of 35\%, 35\%, and 40\% in terms of proof time,
                 energy, and size, respectively. We propose a method of
                 handling multiple updates at once, achieving efficiency
                 gains of up to 60\% at the server side and 90\% at the
                 client side. We also deployed our implementation of
                 FlexDPDP (dynamic provable data possession (DPDP) with
                 FlexList instead of RBASL) on PlanetLab, demonstrating
                 that FlexDPDP performs comparable to the most efficient
                 static storage scheme (provable data possession (PDP))
                 while providing dynamic data support.",
  acknowledgement = ack-nhfb,
  articleno =    "23",
  fjournal =     "ACM Transactions on Storage",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J960",
}

@Article{Everett:2016:SES,
  author =       "Cath Everett",
  title =        "Should encryption software be banned?",
  journal =      j-NETWORK-SECURITY,
  volume =       "2016",
  number =       "8",
  pages =        "14--17",
  month =        aug,
  year =         "2016",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(16)30078-2",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 17:01:35 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485816300782",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Evtyushkin:2016:UMC,
  author =       "Dmitry Evtyushkin and Dmitry Ponomarev and Nael
                 Abu-Ghazaleh",
  title =        "Understanding and Mitigating Covert Channels Through
                 Branch Predictors",
  journal =      j-TACO,
  volume =       "13",
  number =       "1",
  pages =        "10:1--10:??",
  month =        apr,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2870636",
  ISSN =         "1544-3566 (print), 1544-3973 (electronic)",
  ISSN-L =       "1544-3566",
  bibdate =      "Tue Apr 5 16:27:36 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/taco.bib",
  abstract =     "Covert channels through shared processor resources
                 provide secret communication between two malicious
                 processes: the trojan and the spy. In this article, we
                 classify, analyze, and compare covert channels through
                 dynamic branch prediction units in modern processors.
                 Through experiments on a real hardware platform, we
                 compare contention-based channel and the channel that
                 is based on exploiting the branch predictor's residual
                 state. We analyze these channels in SMT and
                 single-threaded environments under both clean and noisy
                 conditions. Our results show that the residual
                 state-based channel provides a cleaner signal and is
                 effective even in noisy execution environments with
                 another application sharing the same physical core with
                 the trojan and the spy. We also estimate the capacity
                 of the branch predictor covert channels and describe a
                 software-only mitigation technique that is based on
                 randomizing the state of the predictor tables on
                 context switches. We show that this protection
                 eliminates all covert channels through the branch
                 prediction unit with minimal impact on performance.",
  acknowledgement = ack-nhfb,
  articleno =    "10",
  fjournal =     "ACM Transactions on Architecture and Code Optimization
                 (TACO)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J924",
}

@Article{Fathimal:2016:SSS,
  author =       "P. Mohamed Fathimal and P. Arockia Jansi Rani",
  title =        "{$K$} out of {$N$} Secret Sharing Scheme for Multiple
                 Color Images with Steganography and Authentication",
  journal =      j-INT-J-IMAGE-GRAPHICS,
  volume =       "16",
  number =       "2",
  pages =        "1650010",
  month =        apr,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1142/S0219467816500108",
  ISSN =         "0219-4678",
  ISSN-L =       "0219-4678",
  bibdate =      "Thu May 5 06:44:22 MDT 2016",
  bibsource =    "http://ejournals.wspc.com.sg/ijig/ijig.shtml;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijig.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Image and Graphics (IJIG)",
  journal-URL =  "http://www.worldscientific.com/worldscinet/ijig",
}

@Article{Fay:2016:ICM,
  author =       "Robin Fay",
  title =        "Introducing the counter mode of operation to
                 {Compressed Sensing} based encryption",
  journal =      j-INFO-PROC-LETT,
  volume =       "116",
  number =       "4",
  pages =        "279--283",
  month =        apr,
  year =         "2016",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Tue Jan 5 11:59:16 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019015001945",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190/",
}

@Article{Fei:2016:PPA,
  author =       "Xiongwei Fei and Kenli Li and Wangdong Yang and Keqin
                 Li",
  title =        "Practical parallel {AES} algorithms on cloud for
                 massive users and their performance evaluation",
  journal =      j-CCPE,
  volume =       "28",
  number =       "16",
  pages =        "4246--4263",
  month =        nov,
  year =         "2016",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.3734",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Thu Nov 17 07:11:02 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
}

@Article{Fei:2016:SEF,
  author =       "Xiongwei Fei and Kenli Li and Wangdong Yang and Keqin
                 Li",
  title =        "A secure and efficient file protecting system based on
                 {SHA3} and parallel {AES}",
  journal =      j-PARALLEL-COMPUTING,
  volume =       "52",
  number =       "??",
  pages =        "106--132",
  month =        feb,
  year =         "2016",
  CODEN =        "PACOEJ",
  DOI =          "https://doi.org/10.1016/j.parco.2016.01.001",
  ISSN =         "0167-8191 (print), 1872-7336 (electronic)",
  ISSN-L =       "0167-8191",
  bibdate =      "Fri Feb 12 18:56:20 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/parallelcomputing.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167819116000028",
  acknowledgement = ack-nhfb,
  fjournal =     "Parallel Computing",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01678191/",
}

@Article{Florencio:2016:PSD,
  author =       "Dinei Flor{\^e}ncio and Cormac Herley and Paul C. {Van
                 Oorschot}",
  title =        "Pushing on string: the `don't care' region of password
                 strength",
  journal =      j-CACM,
  volume =       "59",
  number =       "11",
  pages =        "66--74",
  month =        nov,
  year =         "2016",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2934663",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Oct 31 16:06:16 MDT 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cacm2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://cacm.acm.org/magazines/2016/11/209115/fulltext",
  abstract =     "Enterprises that impose stringent password-composition
                 policies appear to suffer the same fate as those that
                 do not.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Folger:2016:TQH,
  author =       "Tim Folger",
  title =        "Technology: The Quantum Hack",
  journal =      j-SCI-AMER,
  volume =       "314",
  number =       "2",
  pages =        "48--55",
  month =        feb,
  year =         "2016",
  CODEN =        "SCAMAC",
  DOI =          "https://doi.org/10.1038/scientificamerican0216-48",
  ISSN =         "0036-8733 (print), 1946-7087 (electronic)",
  ISSN-L =       "0036-8733",
  bibdate =      "Tue Mar 8 06:46:07 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sciam2010.bib;
                 http://www.nature.com/scientificamerican",
  URL =          "http://www.nature.com/scientificamerican/journal/v314/n2/full/scientificamerican0216-48.html;
                 http://www.nature.com/scientificamerican/journal/v314/n2/pdf/scientificamerican0216-48.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Scientific American",
  journal-URL =  "http://www.nature.com/scientificamerican",
  keywords =     "quantum cryptography",
}

@Article{Frattolillo:2016:BFM,
  author =       "Franco Frattolillo",
  title =        "A Buyer-Friendly and Mediated Watermarking Protocol
                 for {Web} Context",
  journal =      j-TWEB,
  volume =       "10",
  number =       "2",
  pages =        "9:1--9:??",
  month =        may,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2856036",
  ISSN =         "1559-1131 (print), 1559-114X (electronic)",
  ISSN-L =       "1559-1131",
  bibdate =      "Wed May 25 17:02:04 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tweb.bib",
  abstract =     "Watermarking protocols are used in conjunction with
                 digital watermarking techniques to protect digital
                 copyright on the Internet. They define the schemes of
                 the web transactions by which buyers can purchase
                 protected digital content distributed by content
                 providers in a secure manner. Over the last few years,
                 significant examples of watermarking protocols have
                 been proposed in literature. However, a detailed
                 examination of such protocols has revealed a number of
                 problems that have to be addressed in order to make
                 them suited for current web context. Therefore, based
                 on the most relevant problems derived from literature,
                 this article identifies the main challenges posed by
                 the development of watermarking protocols for web
                 context and presents a watermarking protocol that
                 follows a new secure, buyer-centric and mediated design
                 approach able to meet such challenges.",
  acknowledgement = ack-nhfb,
  articleno =    "9",
  fjournal =     "ACM Transactions on the Web (TWEB)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1062",
}

@Article{Fu:2016:EPS,
  author =       "Zhangjie Fu and Kui Ren and Jiangang Shu and Xingming
                 Sun and Fengxiao Huang",
  title =        "Enabling Personalized Search over Encrypted Outsourced
                 Data with Efficiency Improvement",
  journal =      j-IEEE-TRANS-PAR-DIST-SYS,
  volume =       "27",
  number =       "9",
  pages =        "2546--2559",
  month =        sep,
  year =         "2016",
  CODEN =        "ITDSEO",
  DOI =          "https://doi.org/10.1109/TPDS.2015.2506573",
  ISSN =         "1045-9219 (print), 1558-2183 (electronic)",
  ISSN-L =       "1045-9219",
  bibdate =      "Wed Aug 10 09:25:16 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranspardistsys.bib",
  URL =          "https://www.computer.org/csdl/trans/td/2016/09/07349214-abs.html",
  abstract-URL = "https://www.computer.org/csdl/trans/td/2016/09/07349214-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://www.computer.org/tpds/archives.htm",
}

@Article{Garay:2016:MPA,
  author =       "Juan A. Garay and Vladimir Kolesnikov and Rae
                 Mclellan",
  title =        "{MAC} Precomputation with Applications to Secure
                 Memory",
  journal =      j-TOPS,
  volume =       "19",
  number =       "2",
  pages =        "6:1--6:??",
  month =        sep,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2943780",
  ISSN =         "2471-2566 (print), 2471-2574 (electronic)",
  ISSN-L =       "2471-2566",
  bibdate =      "Mon Apr 3 09:09:39 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tops.bib",
  abstract =     "We present Shallow MAC (ShMAC), a fixed-input-length
                 message authentication code that performs most of the
                 computation prior to the availability of the message.
                 Specifically, ShMAC's message-dependent computation is
                 much faster and smaller in hardware than the evaluation
                 of a pseudorandom permutation (PRP) and can be
                 implemented by a small shallow circuit, while its
                 precomputation consists of one PRP evaluation. A main
                 building block for ShMAC is the notion of strong
                 differential uniformity (SDU), which we introduce and
                 which may be of independent interest. We show an
                 efficient SDU construction built from previously
                 considered differentially uniform functions. Our main
                 motivating application is a system architecture where a
                 hardware-secured processor uses memory controlled by an
                 adversary. We also present in technical detail a novel,
                 efficient approach to encrypting and authenticating
                 memory and discuss the associated tradeoffs, while
                 paying special attention to minimizing hardware costs
                 and the reduction of Dynamic Random Access Memory
                 latency.",
  acknowledgement = ack-nhfb,
  articleno =    "6",
  fjournal =     "ACM Transactions on Privacy and Security (TOPS)",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J1547",
}

@Article{Gardiner:2016:SML,
  author =       "Joseph Gardiner and Shishir Nagaraja",
  title =        "On the Security of Machine Learning in Malware {C\&C}
                 Detection: a Survey",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "3",
  pages =        "59:1--59:??",
  month =        dec,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3003816",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Feb 9 09:25:05 MST 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "One of the main challenges in security today is
                 defending against malware attacks. As trends and
                 anecdotal evidence show, preventing these attacks,
                 regardless of their indiscriminate or targeted nature,
                 has proven difficult: intrusions happen and devices get
                 compromised, even at security-conscious organizations.
                 As a consequence, an alternative line of work has
                 focused on detecting and disrupting the individual
                 steps that follow an initial compromise and are
                 essential for the successful progression of the attack.
                 In particular, several approaches and techniques have
                 been proposed to identify the command and control (C8C)
                 channel that a compromised system establishes to
                 communicate with its controller. A major oversight of
                 many of these detection techniques is the design's
                 resilience to evasion attempts by the well-motivated
                 attacker. C8C detection techniques make widespread use
                 of a machine learning (ML) component. Therefore, to
                 analyze the evasion resilience of these detection
                 techniques, we first systematize works in the field of
                 C8C detection and then, using existing models from the
                 literature, go on to systematize attacks against the ML
                 components used in these approaches.",
  acknowledgement = ack-nhfb,
  articleno =    "59",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Garg:2016:CIO,
  author =       "Sanjam Garg and Craig Gentry and Shai Halevi and
                 Mariana Raykova and Amit Sahai and Brent Waters",
  title =        "Candidate Indistinguishability Obfuscation and
                 Functional Encryption for All Circuits",
  journal =      j-SIAM-J-COMPUT,
  volume =       "45",
  number =       "3",
  pages =        "882--929",
  month =        "????",
  year =         "2016",
  CODEN =        "SMJCAT",
  DOI =          "https://doi.org/10.1137/14095772X",
  ISSN =         "0097-5397 (print), 1095-7111 (electronic)",
  ISSN-L =       "0097-5397",
  bibdate =      "Fri Sep 23 11:12:14 MDT 2016",
  bibsource =    "http://epubs.siam.org/sam-bin/dbq/toclist/SICOMP/45/3;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/siamjcomput.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "SIAM Journal on Computing",
  journal-URL =  "http://epubs.siam.org/sicomp",
  onlinedate =   "January 2016",
}

@Article{Garg:2016:HSS,
  author =       "Sanjam Garg and Craig Gentry and Shai Halevi and
                 Mariana Raykova and Amit Sahai and Brent Waters",
  title =        "Hiding secrets in software: a cryptographic approach
                 to program obfuscation",
  journal =      j-CACM,
  volume =       "59",
  number =       "5",
  pages =        "113--120",
  month =        may,
  year =         "2016",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2902313",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 25 17:07:29 MDT 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cacm2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://cacm.acm.org/magazines/2016/5/201597/fulltext",
  abstract =     "Can we hide secrets in software? Can we obfuscate
                 programs---that is, make programs unintelligible while
                 preserving their functionality? What exactly do we mean
                 by ``unintelligible''? Why would we even want to do
                 this? In this article, we describe some rigorous
                 cryptographic answers to these quasi-philosophical
                 questions. We also discuss our recent ``candidate
                 indistinguishability obfuscation'' scheme and its
                 implications.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Ge:2016:DSR,
  author =       "Yongyong Ge and Yannan Li and Zhusong Liu",
  title =        "Delegation of signing rights for emerging {5G}
                 networks",
  journal =      j-CCPE,
  volume =       "28",
  number =       "4",
  pages =        "1193--1203",
  day =          "25",
  month =        mar,
  year =         "2016",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.3581",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Sun Apr 3 12:34:13 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "28 Aug 2015",
}

@Article{Ge:2016:KPA,
  author =       "Chunpeng Ge and Willy Susilo and Jiandong Wang and
                 Zhiqiu Huang and Liming Fang and Yongjun Ren",
  title =        "A Key-Policy Attribute-Based Proxy Re-Encryption
                 Without Random Oracles",
  journal =      j-COMP-J,
  volume =       "59",
  number =       "7",
  pages =        "970--982",
  month =        jul,
  year =         "2016",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxv100",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Aug 30 07:10:49 MDT 2016",
  bibsource =    "http://comjnl.oxfordjournals.org/content/59/7.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/59/7/970",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "November 12, 2015",
}

@Article{Gebotys:2016:PCP,
  author =       "Catherine H. Gebotys and Brian A. White and Edgar
                 Mateos",
  title =        "Preaveraging and Carry Propagate Approaches to
                 Side-Channel Analysis of {HMAC-SHA256}",
  journal =      j-TECS,
  volume =       "15",
  number =       "1",
  pages =        "4:1--4:??",
  month =        feb,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2794093",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Wed Jun 8 09:43:30 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tecs.bib",
  abstract =     "Although HMAC-SHA has been standardized for over a
                 decade, few published attacks on the single-cycle round
                 implementation exist. In this research, new attack
                 techniques are provided, for the first time, (1) to
                 help to discriminate between values of secret
                 intermediate variables within HMAC and (2) to reduce
                 the large word size complexity. Preaveraging and carry
                 propagate techniques are proposed using chosen
                 plaintexts and shown to significantly reduce the
                 complexity and runtimes for side-channel analysis of an
                 Altera FPGA platform. This research is important for
                 advancing side channel analysis of complex embedded
                 ASICs and ensuring secure implementations in future
                 embedded ubiquitous devices.",
  acknowledgement = ack-nhfb,
  articleno =    "4",
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J840",
}

@Article{Genkin:2016:PKE,
  author =       "Daniel Genkin and Lev Pachmanov and Itamar Pipman and
                 Adi Shamir and Eran Tromer",
  title =        "Physical key extraction attacks on {PCs}",
  journal =      j-CACM,
  volume =       "59",
  number =       "6",
  pages =        "70--79",
  month =        jun,
  year =         "2016",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2851486",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 25 17:07:29 MDT 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cacm2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://cacm.acm.org/magazines/2016/6/202646/fulltext",
  abstract =     "Computers broadcast their secrets via inadvertent
                 physical emanations that are easily measured and
                 exploited.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Gofman:2016:MBE,
  author =       "Mikhail I. Gofman and Sinjini Mitra",
  title =        "Multimodal biometrics for enhanced mobile device
                 security",
  journal =      j-CACM,
  volume =       "59",
  number =       "4",
  pages =        "58--65",
  month =        apr,
  year =         "2016",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2818990",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Apr 15 14:58:10 MDT 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cacm2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://cacm.acm.org/magazines/2016/4/200169/fulltext",
  abstract =     "Fusing information from multiple biometric traits
                 enhances authentication in mobile devices.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Gong:2016:ATI,
  author =       "Junqing Gong and Xiaolei Dong and Zhenfu Cao and Jie
                 Chen",
  title =        "Almost-Tight Identity Based Encryption Against
                 Selective Opening Attack",
  journal =      j-COMP-J,
  volume =       "59",
  number =       "11",
  pages =        "1669--1688",
  month =        nov,
  year =         "2016",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxw030",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Fri Nov 4 09:11:48 MDT 2016",
  bibsource =    "http://comjnl.oxfordjournals.org/content/59/11.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/59/11/1669",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "August 12, 2016",
}

@Article{Gong:2016:FSC,
  author =       "Wei Gong and Ivan Stojmenovic and Amiya Nayak and
                 Kebin Liu and Haoxiang Liu",
  title =        "Fast and scalable counterfeits estimation for
                 large-scale {RFID} systems",
  journal =      j-IEEE-TRANS-NETWORKING,
  volume =       "24",
  number =       "2",
  pages =        "1052--1064",
  month =        apr,
  year =         "2016",
  CODEN =        "IEANEP",
  ISSN =         "1063-6692 (print), 1558-2566 (electronic)",
  ISSN-L =       "1063-6692",
  bibdate =      "Tue Oct 18 12:04:13 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
  abstract =     "Many algorithms have been introduced to
                 deterministically authenticate Radio Frequency
                 Identification (RFID) tags, while little work has been
                 done to address scalability issue in batch
                 authentications. Deterministic approaches verify tags
                 one by one, and the communication overhead and time
                 cost grow linearly with increasing size of tags. We
                 design a fast and scalable counterfeits estimation
                 scheme, INformative Counting (INC), which achieves
                 sublinear authentication time and communication cost in
                 batch verifications. The key novelty of INC builds on
                 an FM-Sketch variant authentication synopsis that can
                 capture key counting information using only sublinear
                 space. With the help of this well-designed data
                 structure, INC is able to provide authentication
                 results with accurate estimates of the number of
                 counterfeiting tags and genuine tags, while previous
                 batch authentication methods merely provide 0/1 results
                 indicating the existence of counterfeits. We conduct
                 detailed theoretical analysis and extensive experiments
                 to examine this design and the results show that INC
                 significantly outperforms previous work in terms of
                 effectiveness and efficiency.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE\slash ACM Transactions on Networking",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J771",
}

@Article{Gong:2016:HES,
  author =       "Linming Gong and Shundong Li and Qing Mao and Daoshun
                 Wang and Jiawei Dou",
  title =        "A homomorphic encryption scheme with adaptive chosen
                 ciphertext security but without random oracle",
  journal =      j-THEOR-COMP-SCI,
  volume =       "609 (part 1)",
  number =       "??",
  pages =        "253--261",
  day =          "4",
  month =        jan,
  year =         "2016",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Fri Dec 4 06:41:42 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2015.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0304397515008725",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975/",
}

@Article{Gope:2016:EMA,
  author =       "Prosanta Gope and Tzonelih Hwang",
  title =        "An efficient mutual authentication and key agreement
                 scheme preserving strong anonymity of the mobile user
                 in global mobility networks",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "62",
  number =       "??",
  pages =        "1--8",
  month =        feb,
  year =         "2016",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Mon Jun 20 11:42:19 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804515002969",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Guerin:2016:TDU,
  author =       "Nilson Donizete {Guerin, Jr.} and Flavio {de Barros
                 Vidal} and Bruno Macchiavello",
  title =        "Text-dependent User Verification of Handwritten Words
                 and Signatures on Mobile Devices",
  journal =      j-COMP-J,
  volume =       "59",
  number =       "9",
  pages =        "1415--1425",
  month =        sep,
  year =         "2016",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxv113",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Sep 12 11:39:16 MDT 2016",
  bibsource =    "http://comjnl.oxfordjournals.org/content/59/9.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/59/9/1415",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "December 9, 2015",
}

@InProceedings{Gueron:2016:HIA,
  author =       "Shay Gueron and Sanu Mathew",
  title =        "Hardware Implementation of {AES} Using Area-Optimal
                 Polynomials for Composite-Field Representation {$
                 \mathrm {GF}(2^4)^2 $} of {$ \mathrm {GF}(2^8) $}",
  crossref =     "Montuschi:2016:ISC",
  pages =        "112--117",
  year =         "2016",
  DOI =          "https://doi.org/10.1109/ARITH.2016.32",
  bibdate =      "Fri Dec 16 15:17:20 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/fparith.bib",
  acknowledgement = ack-nhfb,
  keywords =     "ARITH-23",
}

@Article{Gueron:2016:MEG,
  author =       "Shay Gueron",
  title =        "Memory Encryption for General-Purpose Processors",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "6",
  pages =        "54--62",
  month =        nov # "\slash " # dec,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Feb 25 10:03:53 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/06/msp2016060054-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
}

@Article{Guin:2016:FCS,
  author =       "Ujjwal Guin and Qihang Shi and Domenic Forte and Mark
                 M. Tehranipoor",
  title =        "{FORTIS}: a Comprehensive Solution for Establishing
                 Forward Trust for Protecting {IPs} and {ICs}",
  journal =      j-TODAES,
  volume =       "21",
  number =       "4",
  pages =        "63:1--63:??",
  month =        sep,
  year =         "2016",
  CODEN =        "ATASFO",
  DOI =          "https://doi.org/10.1145/2893183",
  ISSN =         "1084-4309 (print), 1557-7309 (electronic)",
  ISSN-L =       "1084-4309",
  bibdate =      "Fri Sep 23 15:16:20 MDT 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/todaes/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/todaes.bib",
  abstract =     "With the advent of globalization in the semiconductor
                 industry, it is necessary to prevent unauthorized usage
                 of third-party IPs (3PIPs), cloning and unwanted
                 modification of 3PIPs, and unauthorized production of
                 ICs. Due to the increasing complexity of ICs,
                 system-on-chip (SoC) designers use various 3PIPs in
                 their design to reduce time-to-market and development
                 costs, which creates a trust issue between the SoC
                 designer and the IP owners. In addition, as the ICs are
                 fabricated around the globe, the SoC designers give
                 fabrication contracts to offshore foundries to
                 manufacture ICs and have little control over the
                 fabrication process, including the total number of
                 chips fabricated. Similarly, the 3PIP owners lack
                 control over the number of fabricated chips and/or the
                 usage of their IPs in an SoC. Existing research only
                 partially addresses the problems of IP piracy and IC
                 overproduction, and to the best of our knowledge, there
                 is no work that considers IP overuse. In this article,
                 we present a comprehensive solution for preventing IP
                 piracy and IC overproduction by assuring forward trust
                 between all entities involved in the SoC design and
                 fabrication process. We propose a novel design flow to
                 prevent IC overproduction and IP overuse. We use an
                 existing logic encryption technique to obfuscate the
                 netlist of an SoC or a 3PIP and propose a modification
                 to enable manufacturing tests before the activation of
                 chips which is absolutely necessary to prevent
                 overproduction. We have used asymmetric and symmetric
                 key encryption, in a fashion similar to Pretty Good
                 Privacy (PGP), to transfer keys from the SoC designer
                 or 3PIP owners to the chips. In addition, we also
                 propose to attach an IP digest (a cryptographic hash of
                 the entire IP) to the header of an IP to prevent
                 modification of the IP by the SoC designers. We have
                 shown that our approach is resistant to various attacks
                 with the cost of minimal area overhead.",
  acknowledgement = ack-nhfb,
  articleno =    "63",
  fjournal =     "ACM Transactions on Design Automation of Electronic
                 Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J776",
}

@Article{Gutierrez:2016:IDO,
  author =       "Christopher N. Gutierrez and Mohammed H. Almeshekah
                 and Eugene H. Spafford and Mikhail J. Atallah and Jeff
                 Avery",
  title =        "Inhibiting and Detecting Offline Password Cracking
                 Using {ErsatzPasswords}",
  journal =      j-TOPS,
  volume =       "19",
  number =       "3",
  pages =        "9:1--9:??",
  month =        dec,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2996457",
  ISSN =         "2471-2566 (print), 2471-2574 (electronic)",
  ISSN-L =       "2471-2566",
  bibdate =      "Mon Apr 3 09:09:39 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tops.bib",
  abstract =     "In this work, we present a simple, yet effective and
                 practical scheme to improve the security of stored
                 password hashes, increasing the difficulty to crack
                 passwords and exposing cracking attempts. We utilize a
                 hardware-dependent function (HDF), such as a physically
                 unclonable function (PUF) or a hardware security module
                 (HSM), at the authentication server to inhibit offline
                 password discovery. Additionally, a deception mechanism
                 is incorporated to alert administrators of cracking
                 attempts. Using an HDF to generate password hashes
                 hinders attackers from recovering the true passwords
                 without constant access to the HDF. Our scheme can
                 integrate with legacy systems without needing
                 additional servers, changing the structure of the
                 hashed password file, nor modifying client machines.
                 When using our scheme, the structure of the hashed
                 passwords file, e.g., etc/shadow or etc/master.passwd,
                 will appear no different than traditional hashed
                 password files.$^1$ However, when attackers exfiltrate
                 the hashed password file and attempt to crack it, the
                 passwords they will receive are ErsatzPasswords-``fake
                 passwords.'' The ErsatzPasswords scheme is flexible by
                 design, enabling it to be integrated into existing
                 authentication systems without changes to user
                 experience. The proposed scheme is integrated into the
                 pam\_unix module as well as two client/server
                 authentication schemes: Lightweight Directory Access
                 Protocol (LDAP) authentication and the Pythia
                 pseudorandom function (PRF) Service [Everspaugh et al.
                 2015]. The core library to support ErsatzPasswords
                 written in C and Python consists of 255 and 103 lines
                 of code, respectively. The integration of
                 ErsatzPasswords into each explored authentication
                 system required less than 100 lines of additional code.
                 Experimental evaluation of ErsatzPasswords shows an
                 increase in authentication latency on the order of
                 100ms, which maybe acceptable for real world systems.
                 We also describe a framework for implementing
                 ErsatzPasswords using a Trusted Platform Module
                 (TPM).",
  acknowledgement = ack-nhfb,
  articleno =    "9",
  fjournal =     "ACM Transactions on Privacy and Security (TOPS)",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J1547",
}

@Article{Gutman:2016:EAF,
  author =       "R. Gutman and C. J. Sammartino and T. C. Green and B.
                 T. Montague",
  title =        "Error adjustments for file linking methods using
                 encrypted unique client identifier {(eUCI)} with
                 application to recently released prisoners who are
                 {HIV+}",
  journal =      j-STAT-MED,
  volume =       "35",
  number =       "1",
  pages =        "115--129",
  day =          "15",
  month =        jan,
  year =         "2016",
  CODEN =        "SMEDDA",
  DOI =          "https://doi.org/10.1002/sim.6586",
  ISSN =         "0277-6715 (print), 1097-0258 (electronic)",
  ISSN-L =       "0277-6715",
  bibdate =      "Sat Jun 27 15:48:39 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/statmed2010.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "Stat. Med.",
  fjournal =     "Statistics in Medicine",
  journal-URL =  "https://onlinelibrary.wiley.com/journal/10970258",
  onlinedate =   "21 July 2015",
}

@Article{Han:2016:GGA,
  author =       "Jinsong Han and Chen Qian and Panlong Yang and Dan Ma
                 and Zhiping Jiang and Wei Xi and Jizhong Zhao",
  title =        "{GenePrint}: generic and accurate physical-layer
                 identification for {UHF RFID} tags",
  journal =      j-IEEE-TRANS-NETWORKING,
  volume =       "24",
  number =       "2",
  pages =        "846--858",
  month =        apr,
  year =         "2016",
  CODEN =        "IEANEP",
  ISSN =         "1063-6692 (print), 1558-2566 (electronic)",
  ISSN-L =       "1063-6692",
  bibdate =      "Tue Oct 18 12:04:13 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
  abstract =     "Physical-layer identification utilizes unique features
                 of wireless devices as their fingerprints, providing
                 authenticity and security guarantee. Prior
                 physical-layer identification techniques on radio
                 frequency identification (RFID) tags require nongeneric
                 equipments and are not fully compatible with existing
                 standards. In this paper, we propose a novel
                 physical-layer identification system, GenePrint, for
                 UHF passive tags. The GenePrint prototype system is
                 implemented by a commercial reader, a USRP-based
                 monitor, and off-the-shelf UHF passive tags. Our
                 solution is generic and completely compatible with the
                 existing standard, EPCglobal C1G2 specification.
                 GenePrint leverages the internal similarity among
                 pulses of tags' RN16 preamble signals to extract a
                 hardware feature as the fingerprint. We conduct
                 extensive experiments on over 10 000 RN16 preamble
                 signals from 150 off-the-shelf RFID tags. The results
                 show that GenePrint achieves a high identification
                 accuracy of 99.68\%+. The feature extraction of
                 GenePrint is resilient to various malicious attacks,
                 such as the feature replay attack.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE\slash ACM Transactions on Networking",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J771",
}

@Article{Hardesty:2016:SUC,
  author =       "Larry Hardesty",
  title =        "Secure, User-controlled Cryptographic System
                 Developed",
  journal =      j-SCI-COMPUT,
  volume =       "??",
  number =       "??",
  pages =        "??--??",
  day =          "22",
  month =        mar,
  year =         "2016",
  bibdate =      "Fri Mar 25 16:15:34 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.scientificcomputing.com/news/2016/03/secure-user-controlled-cryptographic-system-developed",
  acknowledgement = ack-nhfb,
  keywords =     "attribute-based encryption; key homomorphism; Sieve
                 cryptographic system",
}

@Book{Hastings:2016:SWS,
  author =       "Max Hastings",
  title =        "The Secret War: Spies, Ciphers, and Guerrillas
                 1939--1945",
  publisher =    "Harper",
  address =      "New York, NY",
  pages =        "xxvii + 610 + 32",
  year =         "2016",
  ISBN =         "0-06-225927-X (hardcover), 0-06-225928-8 (paperback),
                 0-06-244156-6",
  ISBN-13 =      "978-0-06-225927-1 (hardcover), 978-0-06-225928-8
                 (paperback), 978-0-06-244156-0",
  LCCN =         "D810.S7 H365 2017",
  bibdate =      "Wed Jan 2 07:39:53 MST 2019",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/master.bib",
  abstract =     "An examination of one of the most important yet
                 underexplored aspects of World War II --- intelligence
                 shows how espionage successes and failures by the
                 United States, Britain, Russia, Germany, and Japan
                 influenced the course of the war and its final
                 outcome.",
  acknowledgement = ack-nhfb,
  remark =       "First published in a different form in the United
                 Kingdom in 2015.",
  subject =      "World War, 1939--1945; Secret service; Underground
                 movements; Cryptography; Electronic intelligence;
                 Intelligence service; History; 20th century; Espionage;
                 Bletchley Park (Milton Keynes, England)",
  tableofcontents = "List of illustrations \\
                 Introduction \\
                 1: Before the deluge / 1 \\
                 Seekers after truth \\
                 The British: gentlemen and players \\
                 The Russians: temples of espionage \\
                 2: The storm breaks / 42 \\
                 The ``fiction flood'' \\
                 Shadowing Canaris \\
                 3: Miracles take a little longer: Bletchley / 68 \\
                 ``Tips'' and ``cillis'' \\
                 Flirting with America \\
                 4: The dogs that barked / 103 \\
                 ``Lucy's'' people \\
                 Sorge's warnings \\
                 The orchestra plays \\
                 The deaf man in the Kremlin \\
                 5: Divine winds / 135 \\
                 Mrs Ferguson's tea set \\
                 The Japanese \\
                 The man who won Midway \\
                 6: Muddling and groping: the Russians at war / 175 \\
                 Centre mobilis{\'e}s \\
                 The end of Sorge \\
                 The second source \\
                 Gourevitch takes a train \\
                 7: Britain's secret war machine / 195 \\
                 The sharp end \\
                 The brain \\
                 At sea \\
                 8: `Mars': the bloodiest deception / 222 \\
                 Gehlen \\
                 ``Agent Max'' \\
                 9: The orchestra's last concert / 238 \\
                 10: Guerrilla / 252 \\
                 Registers and raiders \\
                 SOE \\
                 11: Hoover's G-men, Donovan's wild men / 281 \\
                 Adventurers \\
                 Ivory towers \\
                 Allen Dulles: talking to Germany \\
                 12: Russia's partisans: terrorising both sides / 314
                 \\
                 13: Islands in the storm / 328 \\
                 The Abwehr's Irish jig \\
                 No man's land \\
                 14: A little help from their friends / 346 \\
                 ``It stinks, but somebody has to do it'' \\
                 American traitors \\
                 15: The knowledge factories / 385 \\
                 Agents \\
                 The jewel of sources \\
                 Production lines \\
                 Infernal machines \\
                 16: `Blunderhead': the English patient / 428 \\
                 17: Eclipse of the Abwehr / 444 \\
                 Hitler's Bletchleys \\
                 ``Cicero'' \\
                 The fantasists \\
                 The ``good'' Nazi \\
                 18: Battlefields / 480 \\
                 Wielding the Ultra wand \\
                 Suicide spies \\
                 Tarnished triumph \\
                 19: Black widows, few white knights / 501 \\
                 Fighting Japan \\
                 Fighting each other \\
                 The enemy: groping in the dark \\
                 20: `Enormoz' / 521 \\
                 21: Decoding victory / 533 \\
                 Acknowledgements \\
                 Notes and Sources \\
                 Bibliography \\
                 Index",
}

@InProceedings{Hastings:2016:WKR,
  author =       "Marcella Hastings and Joshua Fried and Nadia
                 Heninger",
  booktitle =    "{IMC'16: Proceedings of the 2016 Internet Measurement
                 Conference, November 2016}",
  title =        "Weak keys remain widespread in network devices",
  publisher =    pub-ACM,
  address =      pub-ACM:adr,
  pages =        "49--63",
  year =         "2016",
  DOI =          "https://doi.org/10.1145/2987443.2987486",
  bibdate =      "Fri Jul 29 07:53:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "In 2012, two academic groups reported having computed
                 the RSA private keys for 0.5\% of HTTPS hosts on the
                 internet, and traced the underlying issue to widespread
                 random number generation failures on networked devices.
                 The vulnerability was reported to dozens of vendors,
                 several of whom responded with security advisories, and
                 the Linux kernel was patched to fix a boottime entropy
                 hole that contributed to the failures.\par

                 In this paper, we measure the actions taken by vendors
                 and end users over time in response to the original
                 disclosure. We analyzed public internet-wide TLS scans
                 performed between July 2010 and May 2016 and extracted
                 81 million distinct RSA keys. We then computed the
                 pairwise common divisors for the entire set in order to
                 factor over 313,000 keys vulnerable to the flaw, and
                 fingerprinted implementations to study patching
                 behavior over time across vendors. We find that many
                 vendors appear to have never produced a patch, and
                 observed little to no patching behavior by end users of
                 affected devices. The number of vulnerable hosts
                 increased in the years after notification and public
                 disclosure, and several newly vulnerable
                 implementations have appeared since 2012. Vendor
                 notification, positive vendor responses, and even
                 vendor-produced public security advisories appear to
                 have little correlation with end-user security.",
  acknowledgement = ack-nhfb,
}

@Article{He:2016:STI,
  author =       "Kai He and Jian Weng and Robert H. Deng and Joseph K.
                 Liu",
  title =        "On the security of two identity-based conditional
                 proxy re-encryption schemes",
  journal =      j-THEOR-COMP-SCI,
  volume =       "652",
  number =       "??",
  pages =        "18--27",
  day =          "1",
  month =        nov,
  year =         "2016",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Wed Nov 23 16:45:18 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2015.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0304397516304443",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975/",
}

@Article{Hernandez-Becerril:2016:GIS,
  author =       "Rogelio Adrian Hernandez-Becerril and Ariana Guadalupe
                 Bucio-Ramirez and Mariko Nakano-Miyatake and Hector
                 Perez-Meana and Marco Pedro Ramirez-Tachiquin",
  title =        "A {GPU} implementation of secret sharing scheme based
                 on cellular automata",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "72",
  number =       "4",
  pages =        "1291--1311",
  month =        apr,
  year =         "2016",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-016-1646-6",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Mon May 30 09:17:38 MDT 2016",
  bibsource =    "http://link.springer.com/journal/11227/72/4;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  URL =          "http://link.springer.com/article/10.1007/s11227-016-1646-6",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Article{Hoffmann:2016:LBQb,
  author =       "Leah Hoffmann",
  title =        "Last byte: {Q\&A}: Finding new directions in
                 cryptography: {Whitfield Diffie} and {Martin Hellman}
                 on their meeting, their research, and the results that
                 billions use every day",
  journal =      j-CACM,
  volume =       "59",
  number =       "6",
  pages =        "112--ff",
  month =        jun,
  year =         "2016",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2911977",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 25 17:07:29 MDT 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/acm-turing-awards.bib;
                 https://www.math.utah.edu/pub/tex/bib/cacm2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://cacm.acm.org/magazines/2016/6/202666/fulltext",
  abstract =     "Whitfield Diffie and Martin Hellman on their meeting,
                 their research, and the results that billions use every
                 day.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Hu:2016:EWS,
  author =       "Changhui Hu and Lidong Han",
  title =        "Efficient wildcard search over encrypted data",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "5",
  pages =        "539--547",
  month =        oct,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0302-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:46 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib;
                 https://www.math.utah.edu/pub/tex/bib/string-matching.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0302-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
  keywords =     "Cloud computing; Searchable symmetric encryption;
                 Wildcard search",
}

@Article{Hu:2016:PBR,
  author =       "Yu-Chen Hu and Chun-Chi Lo and Wu-Lin Chen",
  title =        "Probability-based reversible image authentication
                 scheme for image demosaicking",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "62",
  number =       "??",
  pages =        "92--103",
  month =        sep,
  year =         "2016",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Tue May 31 08:45:28 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X1630070X",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X/",
}

@Article{Huang:2016:EDP,
  author =       "Shi-Yuan Huang and Chun-I Fan and Yi-Fan Tseng",
  title =        "Enabled\slash disabled predicate encryption in
                 clouds",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "62",
  number =       "??",
  pages =        "148--160",
  month =        sep,
  year =         "2016",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Tue May 31 08:45:28 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X15003921",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X/",
}

@Article{Hulsing:2016:MMT,
  author =       "Andreas H{\"u}lsing and Joost Rijneveld and Fang
                 Song",
  title =        "Mitigating Multi-target Attacks in Hash-Based
                 Signatures",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "9614",
  pages =        "387--416",
  year =         "2016",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-662-49384-7_15",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 31 16:25:12 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  URL =          "https://link.springer.com/chapter/10.1007/978-3-662-49384-7_15",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
  journal-URL =  "http://link.springer.com/bookseries/558",
  remark =       "Proc. 19th IACR Int l Conf. Practice and Theory in
                 Public-Key Cryptography (PKC 16)",
}

@Article{Hurlburt:2016:MBO,
  author =       "G. Hurlburt",
  title =        "Might the Blockchain Outlive {Bitcoin}?",
  journal =      j-IT-PRO,
  volume =       "18",
  number =       "2",
  pages =        "12--16",
  month =        mar,
  year =         "2016",
  CODEN =        "IPMAFM",
  DOI =          "https://doi.org/10.1109/MITP.2016.21",
  ISSN =         "1520-9202 (print), 1941-045x (electronic)",
  ISSN-L =       "1520-9202",
  bibdate =      "Thu Nov 30 15:24:52 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "{IT} Professional",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6294",
  keywords =     "Bitcoin; blockchain; blockchain Outlive {Bitcoin};
                 crypto-currency; Cryptography; cryptography; Internet
                 technologies; Market research; mathematical hashing
                 process; Online banking; open source; public domain
                 software; Roads; Sensors; World Wide Web",
}

@Article{Imanimehr:2016:HPR,
  author =       "Fatemeh Imanimehr and Mehran S. Fallah",
  title =        "How Powerful Are Run-Time Monitors with Static
                 Information?",
  journal =      j-COMP-J,
  volume =       "59",
  number =       "11",
  pages =        "1623--1636",
  month =        nov,
  year =         "2016",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxw022",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Fri Nov 4 09:11:48 MDT 2016",
  bibsource =    "http://comjnl.oxfordjournals.org/content/59/11.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/59/11/1623",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "July 15, 2016",
}

@InProceedings{Ingram:2016:AMB,
  author =       "C. Ingram and M. Morisse",
  booktitle =    "2016 49th Hawaii International Conference on System
                 Sciences (HICSS)",
  title =        "Almost an {MNC}: {Bitcoin} Entrepreneurs' Use of
                 Collective Resources and Decoupling to Build
                 Legitimacy",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "4083--4092",
  month =        jan,
  year =         "2016",
  DOI =          "https://doi.org/10.1109/HICSS.2016.507",
  ISSN =         "1530-1605",
  ISSN-L =       "1530-1605",
  bibdate =      "Thu Nov 30 15:24:52 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Bitcoin; broader {Bitcoin} community; Context;
                 cryptocurrencies; Cryptography; digital community;
                 electronic money; Europe; larger decentralised
                 community act; legislation; legitimacy; local
                 entrepreneur seeking mainstream legitimacy; MNC; Online
                 banking; open source community; organisational aspects;
                 Protocols; Stakeholders; {Bitcoin} entrepreneur",
}

@Article{Irshad:2016:EAM,
  author =       "Azeem Irshad and Muhammad Sher and Shehzad Ashraf
                 Chaudhary and Husnain Naqvi and Mohammad Sabzinejad
                 Farash",
  title =        "An efficient and anonymous multi-server authenticated
                 key agreement based on chaotic map without engaging
                 {Registration Centre}",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "72",
  number =       "4",
  pages =        "1623--1644",
  month =        apr,
  year =         "2016",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-016-1688-9",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Mon May 30 09:17:38 MDT 2016",
  bibsource =    "http://link.springer.com/journal/11227/72/4;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  URL =          "http://link.springer.com/article/10.1007/s11227-016-1688-9",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Article{Iyengar:2016:SPS,
  author =       "Anirudh Iyengar and Swaroop Ghosh and Kenneth Ramclam
                 and Jae-Won Jang and Cheng-Wei Lin",
  title =        "Spintronic {PUFs} for Security, Trust, and
                 Authentication",
  journal =      j-JETC,
  volume =       "13",
  number =       "1",
  pages =        "4:1--4:??",
  month =        dec,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2809781",
  ISSN =         "1550-4832",
  bibdate =      "Sat Apr 8 10:16:07 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jetc.bib",
  abstract =     "We propose spintronic physically unclonable functions
                 (PUFs) to exploit security-specific properties of
                 domain wall memory (DWM) for security, trust, and
                 authentication. We note that the nonlinear dynamics of
                 domain walls (DWs) in the physical magnetic system is
                 an untapped source of entropy that can be leveraged for
                 hardware security. The spatial and temporal randomness
                 in the physical system is employed in conjunction with
                 microscopic and macroscopic properties such as
                 stochastic DW motion, stochastic pinning/depinning, and
                 serial access to realize novel relay-PUF and memory-PUF
                 designs. The proposed PUFs show promising results ($
                 \approx $50\% interdie Hamming distance (HD) and 10\%
                 to 20\% intradie HD) in terms of randomness, stability,
                 and resistance to attacks. We have investigated
                 noninvasive attacks, such as machine learning and
                 magnetic field attack, and have assessed the PUFs
                 resilience.",
  acknowledgement = ack-nhfb,
  articleno =    "4",
  fjournal =     "ACM Journal on Emerging Technologies in Computing
                 Systems (JETC)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J967",
}

@Article{Jacobs:2016:STB,
  author =       "Todd A. Jacobs",
  title =        "Secure token-based authentication with {YubiKey 4}",
  journal =      j-LINUX-J,
  volume =       "2016",
  number =       "265",
  pages =        "1:1--1:??",
  month =        may,
  year =         "2016",
  CODEN =        "LIJOFX",
  ISSN =         "1075-3583 (print), 1938-3827 (electronic)",
  ISSN-L =       "1075-3583",
  bibdate =      "Tue Jun 7 18:42:43 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/linux-journal.bib",
  URL =          "http://dl.acm.org/ft_gateway.cfm?id=2953927",
  abstract =     "Busy Linux administrators often need to use insecure
                 terminals, such as a co-worker's desktop, to get their
                 jobs done. Todd A. Jacobs provides a modern look at
                 token-based authentication using YubiKey 4.",
  acknowledgement = ack-nhfb,
  articleno =    "1",
  fjournal =     "Linux Journal",
  journal-URL =  "http://portal.acm.org/citation.cfm?id=J508",
}

@Article{Jain:2016:APQ,
  author =       "Nitin Jain and Birgit Stiller and Imran Khan and
                 Dominique Elser and Christoph Marquardt and Gerd
                 Leuchs",
  title =        "Attacks on practical quantum key distribution systems
                 (and how to prevent them)",
  journal =      j-CONTEMP-PHYS,
  volume =       "57",
  number =       "3",
  pages =        "366--??",
  year =         "2016",
  CODEN =        "CTPHAF",
  DOI =          "https://doi.org/10.1080/00107514.2016.1148333",
  ISSN =         "0010-7514 (print), 1366-5812 (electronic)",
  ISSN-L =       "0010-7514",
  bibdate =      "Mon Sep 12 08:57:44 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/contempphys.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Contemporary Physics",
  journal-URL =  "http://www.tandfonline.com/loi/tcph20",
  onlinedate =   "09 Mar 2016",
}

@Article{Jho:2016:SSE,
  author =       "Nam-Su Jho and Ku-Young Chang and Dowon Hong and
                 Changho Seo",
  title =        "Symmetric searchable encryption with efficient range
                 query using multi-layered linked chains",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "72",
  number =       "11",
  pages =        "4233--4246",
  month =        nov,
  year =         "2016",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-015-1497-6",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Sat Jun 24 10:31:30 MDT 2017",
  bibsource =    "http://link.springer.com/journal/11227/72/11;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Article{Jiang:2016:CVI,
  author =       "Yijing Jiang and Shanyu Tang and Liping Zhang and
                 Muzhou Xiong and Yau Jim Yip",
  title =        "Covert Voice over {Internet} Protocol Communications
                 with Packet Loss Based on Fractal Interpolation",
  journal =      j-TOMCCAP,
  volume =       "12",
  number =       "4",
  pages =        "54:1--54:??",
  month =        aug,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2961053",
  ISSN =         "1551-6857 (print), 1551-6865 (electronic)",
  ISSN-L =       "1551-6857",
  bibdate =      "Thu Aug 25 07:28:05 MDT 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tomccap/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tomccap.bib",
  abstract =     "The last few years have witnessed an explosive growth
                 in the research of information hiding in multimedia
                 objects, but few studies have taken into account packet
                 loss in multimedia networks. As one of the most popular
                 real-time services in the Internet, Voice over Internet
                 Protocol (VoIP) contributes to a large part of network
                 traffic for its advantages of real time, high flow, and
                 low cost. So packet loss is inevitable in multimedia
                 networks and affects the performance of VoIP
                 communications. In this study, a fractal-based VoIP
                 steganographic approach was proposed to realize covert
                 VoIP communications in the presence of packet loss. In
                 the proposed scheme, secret data to be hidden were
                 divided into blocks after being encrypted with the
                 block cipher, and each block of the secret data was
                 then embedded into VoIP streaming packets. The VoIP
                 packets went through a packet-loss system based on
                 Gilbert model which simulates a real network situation.
                 And a prediction model based on fractal interpolation
                 was built to decide whether a VoIP packet was suitable
                 for data hiding. The experimental results indicated
                 that the speech quality degradation increased with the
                 escalating packet-loss level. The average variance of
                 speech quality metrics (PESQ score) between the
                 ``no-embedding'' speech samples and the
                 ``with-embedding'' stego-speech samples was about
                 0.717, and the variances narrowed with the increasing
                 packet-loss level. Both the average PESQ scores and the
                 SNR values of stego-speech samples and the
                 data-retrieving rates had almost the same varying
                 trends when the packet-loss level increased, indicating
                 that the success rate of the fractal prediction model
                 played an important role in the performance of covert
                 VoIP communications.",
  acknowledgement = ack-nhfb,
  articleno =    "54",
  fjournal =     "ACM Transactions on Multimedia Computing,
                 Communications, and Applications",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J961",
}

@Article{Jiang:2016:MAC,
  author =       "Shaoquan Jiang",
  title =        "On message authentication with a correlated setup",
  journal =      j-INFO-PROC-LETT,
  volume =       "116",
  number =       "4",
  pages =        "289--293",
  month =        apr,
  year =         "2016",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Tue Jan 5 11:59:16 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019015001908",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190/",
}

@Article{Jiang:2016:OOC,
  author =       "Peng Jiang and Yi Mu and Fuchun Guo and Xiaofen Wang
                 and Qiaoyan Wen",
  title =        "Online\slash Offline Ciphertext Retrieval on Resource
                 Constrained Devices",
  journal =      j-COMP-J,
  volume =       "59",
  number =       "7",
  pages =        "955--969",
  month =        jul,
  year =         "2016",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxv099",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Aug 30 07:10:49 MDT 2016",
  bibsource =    "http://comjnl.oxfordjournals.org/content/59/7.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/59/7/955",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "November 25, 2015",
}

@Article{Jiang:2016:PPT,
  author =       "Qi Jiang and Muhammad Khurram Khan and Xiang Lu and
                 Jianfeng Ma and Debiao He",
  title =        "A privacy preserving three-factor authentication
                 protocol for {e-Health} clouds",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "72",
  number =       "10",
  pages =        "3826--3849",
  month =        oct,
  year =         "2016",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-015-1610-x",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Sat Jun 24 10:31:29 MDT 2017",
  bibsource =    "http://link.springer.com/journal/11227/72/10;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  note =         "See comments \cite{Irshad:2017:CPP}.",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Article{Jiang:2016:UTC,
  author =       "Qi Jiang and Jianfeng Ma and Fushan Wei and Youliang
                 Tian and Jian Shen and Yuanyuan Yang",
  title =        "An untraceable temporal-credential-based two-factor
                 authentication scheme using {ECC} for wireless sensor
                 networks",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "76",
  number =       "??",
  pages =        "37--48",
  month =        dec,
  year =         "2016",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Thu Nov 3 11:43:14 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804516302302",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Joldzic:2016:TSA,
  author =       "Ognjen Joldzic and Zoran Djuric and Pavle Vuletic",
  title =        "A transparent and scalable anomaly-based {DoS}
                 detection method",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "104",
  number =       "??",
  pages =        "27--42",
  day =          "20",
  month =        jul,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Fri Jun 3 11:42:22 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1389128616301347",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286/",
}

@TechReport{Josefsson:2016:ECD,
  author =       "Simon Josefsson and Ilari Liusvaara",
  title =        "{Edwards-curve Digital Signature Algorithm (EdDSA)}",
  type =         "Internet Draft report",
  number =       "draft-irtf-cfrg-eddsa-05",
  institution =  "SJD AB",
  address =      "Stockholm 113 47, Sweden",
  day =          "21",
  month =        mar,
  year =         "2016",
  bibdate =      "Wed Jul 06 17:37:35 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://tools.ietf.org/html/draft-irtf-cfrg-eddsa-05",
  acknowledgement = ack-nhfb,
  remark-1 =     "This on-line report proposes parameters for, and
                 supplies a Python implementation of, code for
                 encrypting and decrypting the EdDSA algorithm, along
                 with numerous test cases.",
  remark-2 =     "The authors report ``Unlike many other curves used for
                 cryptographic applications, these formulas are
                 `complete': they are valid for all points on the curve,
                 with no exceptions. In particular, the denominators are
                 non-zero for all input points.''",
}

@Article{Kamp:2016:MEM,
  author =       "Poul-Henning Kamp",
  title =        "More encryption means less privacy",
  journal =      j-CACM,
  volume =       "59",
  number =       "4",
  pages =        "40--42",
  month =        apr,
  year =         "2016",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2890774",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Apr 15 14:58:10 MDT 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cacm2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://cacm.acm.org/magazines/2016/4/200167/fulltext",
  abstract =     "Retaining electronic privacy requires more political
                 engagement.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Kang:2016:DSA,
  author =       "Jungho Kang and Geunil Park and Jong Hyuk Park",
  title =        "Design of secure authentication scheme between devices
                 based on zero-knowledge proofs in home automation
                 service environments",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "72",
  number =       "11",
  pages =        "4319--4336",
  month =        nov,
  year =         "2016",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-016-1856-y",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Sat Jun 24 10:31:30 MDT 2017",
  bibsource =    "http://link.springer.com/journal/11227/72/11;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Article{Khalid:2016:RHL,
  author =       "Ayesha Khalid and Goutam Paul and Anupam Chattopadhyay
                 and Faezeh Abediostad and Syed Imad Ud Din and Muhammad
                 Hassan and Baishik Biswas and Prasanna Ravi",
  title =        "{RunStream}: a High-Level Rapid Prototyping Framework
                 for Stream Ciphers",
  journal =      j-TECS,
  volume =       "15",
  number =       "3",
  pages =        "61:1--61:??",
  month =        jul,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2891412",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Thu Jul 21 17:18:13 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tecs.bib",
  abstract =     "We present RunStream, a rapid prototyping framework
                 for realizing stream cipher implementations based on
                 algorithmic specifications and architectural
                 customizations desired by the users. In the dynamic
                 world of cryptography where newer recommendations are
                 frequently proposed, the need of such tools is
                 imperative. It carries out design validation and
                 generates an optimized software implementation and a
                 synthesizable Register Transfer Level Verilog
                 description. Our framework enables speedy benchmarking
                 against critical resources like area, throughput,
                 power, and latency and allows exploration of
                 alternatives. Using RunStream, we successfully
                 implemented various stream ciphers and benchmarked the
                 quality of results to be at par with published
                 hand-optimized implementations.",
  acknowledgement = ack-nhfb,
  articleno =    "61",
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J840",
}

@Article{Khamsemanan:2016:BBU,
  author =       "Nirattaya Khamsemanan and Rafail Ostrovsky and William
                 E. Skeith",
  title =        "On the Black-box Use of Somewhat Homomorphic
                 Encryption in NonInteractive Two-Party Protocols",
  journal =      j-SIAM-J-DISCR-MATH,
  volume =       "30",
  number =       "1",
  pages =        "266--295",
  month =        "????",
  year =         "2016",
  CODEN =        "SJDMEC",
  DOI =          "https://doi.org/10.1137/110858835",
  ISSN =         "0895-4801 (print), 1095-7146 (electronic)",
  ISSN-L =       "0895-4801",
  bibdate =      "Mon Jun 20 12:15:50 MDT 2016",
  bibsource =    "http://epubs.siam.org/sam-bin/dbq/toclist/SIDMA/30/1;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/siamjdiscrmath.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "SIAM Journal on Discrete Mathematics",
  journal-URL =  "http://epubs.siam.org/sidma",
  onlinedate =   "January 2016",
}

@Article{Khan:2016:BSW,
  author =       "Abid Khan and Farhana Jabeen and Farah Naz and Sabah
                 Suhail and Mansoor Ahmed and Sarfraz Nawaz",
  title =        "Buyer seller watermarking protocols issues and
                 challenges --- a survey",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "75",
  number =       "??",
  pages =        "317--334",
  month =        nov,
  year =         "2016",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Thu Nov 3 11:43:14 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804516301941",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Khedr:2016:SSH,
  author =       "Alhassan Khedr and Glenn Gulak and Vinod
                 Vaikuntanathan",
  title =        "{SHIELD}: Scalable Homomorphic Implementation of
                 Encrypted Data-Classifiers",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "65",
  number =       "9",
  pages =        "2848--2858",
  month =        "????",
  year =         "2016",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2015.2500576",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Wed Aug 10 09:04:52 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Kim:2016:DBM,
  author =       "Yonggon Kim and Ohmin Kwon and Jinsoo Jang and
                 Seongwook Jin and Hyeongboo Baek and Brent Byunghoon
                 Kang and Hyunsoo Yoon",
  title =        "On-demand bootstrapping mechanism for isolated
                 cryptographic operations on commodity accelerators",
  journal =      j-COMPUT-SECUR,
  volume =       "62",
  number =       "??",
  pages =        "33--48",
  month =        sep,
  year =         "2016",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2016.06.006",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:46 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404816300712",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kim:2016:EPE,
  author =       "Intae Kim and Seong Oun Hwang and Jong Hwan Park and
                 Chanil Park",
  title =        "An Efficient Predicate Encryption with Constant
                 Pairing Computations and Minimum Costs",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "65",
  number =       "10",
  pages =        "2947--2958",
  month =        "????",
  year =         "2016",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2016.2526000",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Tue Sep 13 06:19:58 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Kim:2016:MAS,
  author =       "Soon Seok Kim",
  title =        "Mutual authentication scheme between biosensor device
                 and data manager in healthcare environment",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "72",
  number =       "1",
  pages =        "177--184",
  month =        jan,
  year =         "2016",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-015-1536-3",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Thu Apr 7 12:01:24 MDT 2016",
  bibsource =    "http://link.springer.com/journal/11227/72/1;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  URL =          "http://link.springer.com/article/10.1007/s11227-015-1536-3",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Article{Kobayashi:2016:ASC,
  author =       "Kei Kobayashi and Yosuke Totani and Keisuke Utsu and
                 Hiroshi Ishii",
  title =        "Achieving secure communication over {MANET} using
                 secret sharing schemes",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "72",
  number =       "3",
  pages =        "1215--1225",
  month =        mar,
  year =         "2016",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-016-1657-3",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Thu Apr 7 12:01:25 MDT 2016",
  bibsource =    "http://link.springer.com/journal/11227/72/3;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  URL =          "http://link.springer.com/article/10.1007/s11227-016-1657-3",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Article{Koblitz:2016:RWE,
  author =       "Neal Koblitz and Alfred Menezes",
  title =        "A Riddle Wrapped in an Enigma",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "6",
  pages =        "34--42",
  month =        nov # "\slash " # dec,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Feb 25 10:03:53 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/06/msp2016060034-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
}

@Article{Kocabas:2016:ESM,
  author =       "Ovunc Kocabas and Tolga Soyata and Mehmet K. Aktas",
  title =        "Emerging security mechanisms for medical cyber
                 physical systems",
  journal =      j-TCBB,
  volume =       "13",
  number =       "3",
  pages =        "401--416",
  month =        may,
  year =         "2016",
  CODEN =        "ITCBCY",
  ISSN =         "1545-5963 (print), 1557-9964 (electronic)",
  ISSN-L =       "1545-5963",
  bibdate =      "Mon Aug 29 06:50:39 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcbb.bib",
  abstract =     "The following decade will witness a surge in remote
                 health-monitoring systems that are based on body-worn
                 monitoring devices. These Medical Cyber Physical
                 Systems (MCPS) will be capable of transmitting the
                 acquired data to a private or public cloud for storage
                 and processing. Machine learning algorithms running in
                 the cloud and processing this data can provide decision
                 support to healthcare professionals. There is no doubt
                 that the security and privacy of the medical data is
                 one of the most important concerns in designing an
                 MCPS. In this paper, we depict the general architecture
                 of an MCPS consisting of four layers: data acquisition,
                 data aggregation, cloud processing, and action. Due to
                 the differences in hardware and communication
                 capabilities of each layer, different encryption
                 schemes must be used to guarantee data privacy within
                 that layer. We survey conventional and emerging
                 encryption schemes based on their ability to provide
                 secure storage, data sharing, and secure computation.
                 Our detailed experimental evaluation of each scheme
                 shows that while the emerging encryption schemes enable
                 exciting new features such as secure sharing and secure
                 computation, they introduce several orders-of-magnitude
                 computational and storage overhead. We conclude our
                 paper by outlining future research directions to
                 improve the usability of the emerging encryption
                 schemes in an MCPS.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE/ACM Transactions on Computational Biology and
                 Bioinformatics",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J954",
}

@Article{Kubota:2016:SAV,
  author =       "Takahiro Kubota and Yoshihiko Kakutani and Go Kato and
                 Yasuhito Kawano and Hideki Sakurada",
  title =        "Semi-automated verification of security proofs of
                 quantum cryptographic protocols",
  journal =      j-J-SYMBOLIC-COMP,
  volume =       "73",
  number =       "??",
  pages =        "192--220",
  month =        mar # "\slash " # apr,
  year =         "2016",
  CODEN =        "JSYCEH",
  ISSN =         "0747-7171 (print), 1095-855X (electronic)",
  ISSN-L =       "0747-7171",
  bibdate =      "Fri Aug 28 06:46:33 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsymcomp.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0747717115000462",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Symbolic Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/07477171/",
}

@Article{Kumari:2016:APW,
  author =       "Shipra Kumari and Hari Om",
  title =        "Authentication protocol for wireless sensor networks
                 applications like safety monitoring in coal mines",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "104",
  number =       "??",
  pages =        "137--154",
  day =          "20",
  month =        jul,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Fri Jun 3 11:42:22 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1389128616301384",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286/",
}

@Article{Kumari:2016:UFM,
  author =       "Saru Kumari and Xiong Li and Fan Wu and Ashok Kumar
                 Das and Hamed Arshad and Muhammad Khurram Khan",
  title =        "A user friendly mutual authentication and key
                 agreement scheme for wireless sensor networks using
                 chaotic maps",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "63",
  number =       "??",
  pages =        "56--75",
  month =        oct,
  year =         "2016",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Wed Aug 24 08:13:41 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X16300930",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X/",
}

@Article{Kuo:2016:SDD,
  author =       "Wen-Chung Kuo and Chun-Cheng Wang and Hong-Ching Hou",
  title =        "Signed digit data hiding scheme",
  journal =      j-INFO-PROC-LETT,
  volume =       "116",
  number =       "2",
  pages =        "183--191",
  month =        feb,
  year =         "2016",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Sat Nov 28 07:11:23 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019015001404",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190/",
}

@Article{Labati:2016:BRA,
  author =       "Ruggero Donida Labati and Angelo Genovese and Enrique
                 Mu{\~n}oz and Vincenzo Piuri and Fabio Scotti and
                 Gianluca Sforza",
  title =        "Biometric Recognition in Automated Border Control: a
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "2",
  pages =        "24:1--24:??",
  month =        sep,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2933241",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Nov 8 16:12:56 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "The increasing demand for traveler clearance at
                 international border crossing points (BCPs) has
                 motivated research for finding more efficient
                 solutions. Automated border control (ABC) is emerging
                 as a solution to enhance the convenience of travelers,
                 the throughput of BCPs, and national security. This is
                 the first comprehensive survey on the biometric
                 techniques and systems that enable automatic identity
                 verification in ABC. We survey the biometric literature
                 relevant to identity verification and summarize the
                 best practices and biometric techniques applicable to
                 ABC, relying on real experience collected in the field.
                 Furthermore, we select some of the major biometric
                 issues raised and highlight the open research areas.",
  acknowledgement = ack-nhfb,
  articleno =    "24",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Lai:2016:GGB,
  author =       "Chengzhe Lai and Rongxing Lu and Dong Zheng and Hui Li
                 and Xuemin (Sherman) Shen",
  title =        "{GLARM}: Group-based lightweight authentication scheme
                 for resource-constrained machine to machine
                 communications",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "99",
  number =       "??",
  pages =        "66--81",
  day =          "22",
  month =        apr,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Tue Apr 5 07:16:46 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1389128616300238",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286/",
}

@Article{Lao:2016:BFD,
  author =       "Yingjie Lao and Qianying Tang and Chris H. Kim and
                 Keshab K. Parhi",
  title =        "Beat Frequency Detector-Based High-Speed True Random
                 Number Generators: Statistical Modeling and Analysis",
  journal =      j-JETC,
  volume =       "13",
  number =       "1",
  pages =        "9:1--9:??",
  month =        dec,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2866574",
  ISSN =         "1550-4832",
  bibdate =      "Sat Apr 8 10:16:07 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jetc/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jetc.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  abstract =     "True random number generators (TRNGs) are crucial
                 components for the security of cryptographic systems.
                 In contrast to pseudo--random number generators
                 (PRNGs), TRNGs provide higher security by extracting
                 randomness from physical phenomena. To evaluate a TRNG,
                 statistical properties of the circuit model and raw
                 bitstream should be studied. In this article, a model
                 for the beat frequency detector--based high-speed TRNG
                 (BFD-TRNG) is proposed. The parameters of the model are
                 extracted from the experimental data of a test chip. A
                 statistical analysis of the proposed model is carried
                 out to derive mean and variance of the counter values
                 of the TRNG. Our statistical analysis results show that
                 mean of the counter values is inversely proportional to
                 the frequency difference of the two ring oscillators
                 (ROSCs), whereas the dynamic range of the counter
                 values increases linearly with standard deviation of
                 environmental noise and decreases with increase of the
                 frequency difference. Without the measurements from the
                 test data, a model cannot be created; similarly,
                 without a model, performance of a TRNG cannot be
                 predicted. The key contribution of the proposed
                 approach lies in fitting the model to measured data and
                 the ability to use the model to predict performance of
                 BFD-TRNGs that have not been fabricated. Several novel
                 alternate BFD-TRNG architectures are also proposed;
                 these include parallel BFD, cascade BFD, and
                 parallel-cascade BFD. These TRNGs are analyzed using
                 the proposed model, and it is shown that the parallel
                 BFD structure requires less area per bit, whereas the
                 cascade BFD structure has a larger dynamic range while
                 maintaining the same mean of the counter values as the
                 original BFD-TRNG. It is shown that 3.25 M and 4 M
                 random bits can be obtained per counter value from
                 parallel BFD and parallel-cascade BFD, respectively,
                 where M counter values are computed in parallel.
                 Furthermore, the statistical analysis results
                 illustrate that BFD-TRNGs have better randomness and
                 less cost per bit than other existing ROSC-TRNG
                 designs. For example, it is shown that BFD-TRNGs
                 accumulate 150\% more jitter than the original
                 two-oscillator TRNG and that parallel BFD-TRNGs require
                 one-third power and one-half area for same number of
                 random bits for a specified period.",
  acknowledgement = ack-nhfb,
  articleno =    "9",
  fjournal =     "ACM Journal on Emerging Technologies in Computing
                 Systems (JETC)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J967",
}

@Article{Le:2016:ADS,
  author =       "Anh Le and Athina Markopoulou and Alexandros G.
                 Dimakis",
  title =        "Auditing for Distributed Storage Systems",
  journal =      j-IEEE-TRANS-NETWORKING,
  volume =       "24",
  number =       "4",
  pages =        "2182--2195",
  month =        aug,
  year =         "2016",
  CODEN =        "IEANEP",
  DOI =          "https://doi.org/10.1109/TNET.2015.2450761",
  ISSN =         "1063-6692 (print), 1558-2566 (electronic)",
  ISSN-L =       "1063-6692",
  bibdate =      "Fri Oct 28 17:19:55 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
  abstract =     "Distributed storage codes have recently received a lot
                 of attention in the community. Independently, another
                 body of work has proposed integrity-checking schemes
                 for cloud storage, none of which, however, is
                 customized for coding-based storage or can efficiently
                 support repair. In this work, we bridge the gap between
                 these two currently disconnected bodies of work. We
                 propose {\sf NC-Audit}, a novel cryptography-based
                 remote data integrity-checking scheme, designed
                 specifically for network-coding-based distributed
                 storage systems. {\sf NC-Audit} combines, for the first
                 time, the following desired properties: (1) efficient
                 checking of data integrity; (2) efficient support for
                 repairing failed nodes; and (3) protection against
                 information leakage when checking is performed by a
                 third party. The key ingredient of the design of {\sf
                 NC-Audit} is a novel combination of {\sf SpaceMac}, a
                 homomorphic message authentication code MAC scheme for
                 network coding, and {\sf NCrypt}, a novel
                 chosen-plaintext attack CPA secure encryption scheme
                 that preserves the correctness of {\sf SpaceMac}. Our
                 evaluation of {\sf NC-Audit} based on a real Java
                 implementation shows that the proposed scheme has
                 significantly lower overhead compared to the
                 state-of-the-art schemes for both auditing and
                 repairing of failed nodes.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE\slash ACM Transactions on Networking",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J771",
}

@Article{Ledin:2016:RME,
  author =       "George {Ledin, Jr.}",
  title =        "Review of: {{\booktitle{The Mathematics of Encryption:
                 An Elementary Introduction}} by Margaret Cozzens and
                 Steven J. Miller}",
  journal =      j-SIGACT,
  volume =       "47",
  number =       "3",
  pages =        "19--21",
  month =        sep,
  year =         "2016",
  CODEN =        "SIGNDM",
  DOI =          "https://doi.org/10.1145/2993749.2993755",
  ISSN =         "0163-5700 (print), 1943-5827 (electronic)",
  bibdate =      "Sat Mar 11 17:49:13 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGACT News",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J697",
}

@Article{Lee:2016:AGA,
  author =       "Hyung Tae Lee and San Ling and Huaxiong Wang",
  title =        "Analysis of {Gong} et al.'s {CCA2}-secure homomorphic
                 encryption",
  journal =      j-THEOR-COMP-SCI,
  volume =       "640",
  number =       "??",
  pages =        "104--114",
  day =          "9",
  month =        aug,
  year =         "2016",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Thu Jun 30 08:05:11 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2015.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S030439751630250X",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975/",
}

@Article{Lee:2016:CAM,
  author =       "Hyung Tae Lee and San Ling and Jae Hong Seo and
                 Huaxiong Wang",
  title =        "{CCA2} Attack and Modification of {Huang} et al.'s
                 Public Key Encryption with Authorized Equality Test",
  journal =      j-COMP-J,
  volume =       "59",
  number =       "11",
  pages =        "1689--1694",
  month =        nov,
  year =         "2016",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxw033",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Fri Nov 4 09:11:48 MDT 2016",
  bibsource =    "http://comjnl.oxfordjournals.org/content/59/11.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/59/11/1689",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "July 13, 2016",
}

@Article{Li:2016:BMA,
  author =       "Fuxiang Li and Fucai Zhou and Heqing Yuan and Zifeng
                 Xu and Qiang Wang",
  title =        "Bilinear-map accumulator-based verifiable intersection
                 operations on encrypted data in cloud",
  journal =      j-CCPE,
  volume =       "28",
  number =       "11",
  pages =        "3238--3253",
  day =          "10",
  month =        aug,
  year =         "2016",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.3783",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Tue Sep 13 08:30:11 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
}

@Article{Li:2016:CBK,
  author =       "Jiguo Li and Haiting Du and Yichen Zhang",
  title =        "Certificate-Based Key-Insulated Signature in the
                 Standard Model",
  journal =      j-COMP-J,
  volume =       "59",
  number =       "7",
  pages =        "1028--1039",
  month =        jul,
  year =         "2016",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxv115",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Aug 30 07:10:49 MDT 2016",
  bibsource =    "http://comjnl.oxfordjournals.org/content/59/7.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/59/7/1028",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "January 6, 2016",
}

@Article{Li:2016:DDA,
  author =       "Xinghua Li and Ermeng Wang and Weidong Yang and
                 Jianfeng Ma",
  title =        "{DALP}: a demand-aware location privacy protection
                 scheme in continuous location-based services",
  journal =      j-CCPE,
  volume =       "28",
  number =       "4",
  pages =        "1219--1236",
  day =          "25",
  month =        mar,
  year =         "2016",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.3613",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Sun Apr 3 12:34:13 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "6 Nov 2015",
}

@Article{Li:2016:IRI,
  author =       "Xinran Li and Chen-Hui Jin and Fang-Wei Fu",
  title =        "Improved Results of Impossible Differential
                 Cryptanalysis on Reduced {FOX}",
  journal =      j-COMP-J,
  volume =       "59",
  number =       "4",
  pages =        "541--548",
  month =        apr,
  year =         "2016",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxv073",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Mar 28 10:52:39 MDT 2016",
  bibsource =    "http://comjnl.oxfordjournals.org/content/59/4.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/59/4/541",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "September 4, 2015",
}

@Article{Li:2016:LRC,
  author =       "Jiguo Li and Meilin Teng and Yichen Zhang and Qihong
                 Yu",
  title =        "A Leakage-Resilient {CCA}-Secure Identity-Based
                 Encryption Scheme",
  journal =      j-COMP-J,
  volume =       "59",
  number =       "7",
  pages =        "1066--1075",
  month =        jul,
  year =         "2016",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxv128",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Aug 30 07:10:49 MDT 2016",
  bibsource =    "http://comjnl.oxfordjournals.org/content/59/7.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/59/7/1066",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "January 20, 2016",
}

@Article{Libert:2016:BRD,
  author =       "Beno{\^\i}t Libert and Marc Joye and Moti Yung",
  title =        "Born and raised distributively: Fully distributed
                 non-interactive adaptively-secure threshold signatures
                 with short shares",
  journal =      j-THEOR-COMP-SCI,
  volume =       "645",
  number =       "??",
  pages =        "1--24",
  day =          "13",
  month =        sep,
  year =         "2016",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Wed Aug 31 08:27:17 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2015.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0304397516001626",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975/",
}

@Article{Lim:2016:AKE,
  author =       "Hoon Wei Lim and Guomin Yang",
  title =        "Authenticated Key Exchange Protocols for Parallel
                 Network File Systems",
  journal =      j-IEEE-TRANS-PAR-DIST-SYS,
  volume =       "27",
  number =       "1",
  pages =        "92--105",
  month =        jan,
  year =         "2016",
  CODEN =        "ITDSEO",
  DOI =          "https://doi.org/10.1109/TPDS.2015.2388447",
  ISSN =         "1045-9219 (print), 1558-2183 (electronic)",
  ISSN-L =       "1045-9219",
  bibdate =      "Tue Dec 15 09:28:10 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranspardistsys.bib",
  URL =          "http://www.computer.org/csdl/trans/td/2016/01/07004049-abs.html",
  abstract-URL = "http://www.computer.org/csdl/trans/td/2016/01/07004049-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://www.computer.org/tpds/archives.htm",
}

@Article{Lin:2016:SCU,
  author =       "Jingqiang Lin and Bo Luo and Le Guan and Jiwu Jing",
  title =        "Secure Computing Using Registers and Caches: The
                 Problem, Challenges, and Solutions",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "6",
  pages =        "63--70",
  month =        nov # "\slash " # dec,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Feb 25 10:03:53 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/06/msp2016060063-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
}

@Article{Liu:2016:EPP,
  author =       "Joseph K. Liu and Willy Susilo and Tsz Hon Yuen and
                 Man Ho Au and Junbin Fang and Zoe L. Jiang and Jianying
                 Zhou",
  title =        "Efficient Privacy-Preserving Charging Station
                 Reservation System for Electric Vehicles",
  journal =      j-COMP-J,
  volume =       "59",
  number =       "7",
  pages =        "1040--1053",
  month =        jul,
  year =         "2016",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxv117",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Aug 30 07:10:49 MDT 2016",
  bibsource =    "http://comjnl.oxfordjournals.org/content/59/7.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/59/7/1040",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "January 6, 2016",
}

@Article{Liu:2016:EQD,
  author =       "Yang Liu and Zhu Cao and Cheng Wu and Daiji Fukuda and
                 Lixing You and Jiaqiang Zhong and Takayuki Numata and
                 Sijing Chen and Weijun Zhang and Sheng-Cai Shi and
                 Chao-Yang Lu and Zhen Wang and Xiongfeng Ma and Jingyun
                 Fan and Qiang Zhang and Jian-Wei Pan",
  title =        "Experimental quantum data locking",
  journal =      j-PHYS-REV-A,
  volume =       "94",
  number =       "2",
  pages =        "020301",
  month =        aug,
  year =         "2016",
  CODEN =        "PLRAAN",
  DOI =          "https://doi.org/10.1103/PhysRevA.94.020301",
  ISSN =         "1050-2947 (print), 1094-1622, 1538-4446, 1538-4519",
  ISSN-L =       "1050-2947",
  bibdate =      "Wed Sep 7 10:13:33 2016",
  bibsource =    "https://www.math.utah.edu/pub/bibnet/authors/s/shannon-claude-elwood.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://link.aps.org/doi/10.1103/PhysRevA.94.020301",
  acknowledgement = ack-nhfb,
  fjournal =     "Physical Review A (Atomic, Molecular, and Optical
                 Physics)",
  journal-URL =  "http://pra.aps.org/browse",
  pagecount =    "5",
  remark =       "See also \cite{Lum:2016:QEM}.",
}

@Article{Liu:2016:FIT,
  author =       "Joseph K. Liu and Sze Ling Yeo and Wun-She Yap and
                 Sherman S. M. Chow and Duncan S. Wong and Willy
                 Susilo",
  title =        "Faulty Instantiations of Threshold Ring Signature from
                 Threshold Proof-of-Knowledge Protocol",
  journal =      j-COMP-J,
  volume =       "59",
  number =       "7",
  pages =        "945--954",
  month =        jul,
  year =         "2016",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxv098",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Aug 30 07:10:49 MDT 2016",
  bibsource =    "http://comjnl.oxfordjournals.org/content/59/7.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/59/7/945",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "November 2, 2015",
}

@Article{Liu:2016:LCP,
  author =       "Guo-Qiang Liu and Chen-Hui Jin",
  title =        "Linear Cryptanalysis of {PRESENT}-like Ciphers with
                 Secret Permutation",
  journal =      j-COMP-J,
  volume =       "59",
  number =       "4",
  pages =        "549--558",
  month =        apr,
  year =         "2016",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxv074",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Mar 28 10:52:39 MDT 2016",
  bibsource =    "http://comjnl.oxfordjournals.org/content/59/4.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/59/4/549",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "September 18, 2015",
}

@Article{Liu:2016:LCR,
  author =       "Yu Liu and Kai Fu and Wei Wang and Ling Sun and Meiqin
                 Wang",
  title =        "Linear cryptanalysis of reduced-round {SPECK}",
  journal =      j-INFO-PROC-LETT,
  volume =       "116",
  number =       "3",
  pages =        "259--266",
  month =        mar,
  year =         "2016",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Mon Dec 21 18:30:17 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019015001891",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190/",
}

@Article{Liu:2016:NOP,
  author =       "Zheli Liu and Xiaofeng Chen and Jun Yang and Chunfu
                 Jia and Ilsun You",
  title =        "New order preserving encryption model for outsourced
                 databases in cloud environments",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "59",
  number =       "??",
  pages =        "198--207",
  month =        jan,
  year =         "2016",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Mon Feb 8 11:55:17 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804514001350",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Liu:2016:NSC,
  author =       "Fangfei Liu and Hao Wu and Kenneth Mai and Ruby B.
                 Lee",
  title =        "Newcache: Secure Cache Architecture Thwarting Cache
                 Side-Channel Attacks",
  journal =      j-IEEE-MICRO,
  volume =       "36",
  number =       "5",
  pages =        "8--16",
  month =        sep # "\slash " # oct,
  year =         "2016",
  CODEN =        "IEMIDZ",
  ISSN =         "0272-1732 (print), 1937-4143 (electronic)",
  ISSN-L =       "0272-1732",
  bibdate =      "Tue Nov 1 14:24:13 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeemicro.bib",
  URL =          "https://www.computer.org/csdl/mags/mi/2016/05/mmi2016050008-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://www.computer.org/csdl/mags/mi/index.html",
}

@Article{Liu:2016:PAB,
  author =       "Zhen Liu and Duncan S. Wong",
  title =        "Practical Attribute-Based Encryption: Traitor Tracing,
                 Revocation and Large Universe",
  journal =      j-COMP-J,
  volume =       "59",
  number =       "7",
  pages =        "983--1004",
  month =        jul,
  year =         "2016",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxv101",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Aug 30 07:10:49 MDT 2016",
  bibsource =    "http://comjnl.oxfordjournals.org/content/59/7.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/59/7/983",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "November 23, 2015",
}

@Article{Liu:2016:PPO,
  author =       "Ximeng Liu and Baodong Qin and Robert H. Deng and
                 Rongxing Lu and Jianfeng Ma",
  title =        "A Privacy-Preserving Outsourced Functional Computation
                 Framework Across Large-Scale Multiple Encrypted
                 Domains",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "65",
  number =       "12",
  pages =        "3567--3579",
  month =        "????",
  year =         "2016",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2016.2543220",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Thu Nov 10 05:41:07 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Lu:2016:PFC,
  author =       "Yang Lu and Jiguo Li",
  title =        "A pairing-free certificate-based proxy re-encryption
                 scheme for secure data sharing in public clouds",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "62",
  number =       "??",
  pages =        "140--147",
  month =        sep,
  year =         "2016",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Tue May 31 08:45:28 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X1500360X",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X/",
}

@Article{Lu:2016:PSC,
  author =       "Yang Lu and Jiguo Li",
  title =        "Provably secure certificateless proxy signature scheme
                 in the standard model",
  journal =      j-THEOR-COMP-SCI,
  volume =       "639",
  number =       "??",
  pages =        "42--59",
  day =          "1",
  month =        aug,
  year =         "2016",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Thu Jun 23 07:43:06 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2015.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0304397516301554",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975/",
}

@Article{Lukasiewycz:2016:SAO,
  author =       "Martin Lukasiewycz and Philipp Mundhenk and Sebastian
                 Steinhorst",
  title =        "Security-Aware Obfuscated Priority Assignment for
                 Automotive {CAN} Platforms",
  journal =      j-TODAES,
  volume =       "21",
  number =       "2",
  pages =        "32:1--32:??",
  month =        jan,
  year =         "2016",
  CODEN =        "ATASFO",
  DOI =          "https://doi.org/10.1145/2831232",
  ISSN =         "1084-4309 (print), 1557-7309 (electronic)",
  ISSN-L =       "1084-4309",
  bibdate =      "Sat Feb 6 07:43:40 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/todaes/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/todaes.bib",
  abstract =     "Security in automotive in-vehicle networks is an
                 increasing problem with the growing connectedness of
                 road vehicles. This article proposes a security-aware
                 priority assignment for automotive controller area
                 network (CAN) platforms with the aim of mitigating
                 scaling effects of attacks on vehicle fleets. CAN is
                 the dominating field bus in the automotive domain due
                 to its simplicity, low cost, and robustness. While
                 messages might be encrypted to enhance the security of
                 CAN systems, their priorities are usually identical for
                 automotive platforms, comprising generally a large
                 number of vehicle models. As a result, the identifier
                 uniquely defines which message is sent, allowing
                 attacks to scale across a fleet of vehicles with the
                 same platform. As a remedy, we propose a methodology
                 that is capable of determining obfuscated message
                 identifiers for each individual vehicle. Since
                 identifiers directly represent message priorities, the
                 approach has to take the resulting response time
                 variations into account while satisfying application
                 deadlines for each vehicle schedule separately. Our
                 approach relies on Quadratically Constrained Quadratic
                 Program (QCQP) solving in two stages, specifying first
                 a set of feasible fixed priorities and subsequently
                 bounded priorities for each message. With the obtained
                 bounds, obfuscated identifiers are determined, using a
                 very fast randomized sampling. The experimental
                 results, consisting of a large set of synthetic test
                 cases and a realistic case study, give evidence of the
                 efficiency of the proposed approach in terms of
                 scalability. The results also show that the diversity
                 of obtained identifiers is effectively optimized with
                 our approach, resulting in a very good obfuscation of
                 CAN messages in in-vehicle communication.",
  acknowledgement = ack-nhfb,
  articleno =    "32",
  fjournal =     "ACM Transactions on Design Automation of Electronic
                 Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J776",
}

@Article{Lum:2016:QEM,
  author =       "Daniel J. Lum and John C. Howell and M. S. Allman and
                 Thomas Gerrits and Varun B. Verma and Sae Woo Nam and
                 Cosmo Lupo and Seth Lloyd",
  title =        "Quantum enigma machine: Experimentally demonstrating
                 quantum data locking",
  journal =      j-PHYS-REV-A,
  volume =       "94",
  number =       "2",
  pages =        "022315",
  month =        aug,
  year =         "2016",
  CODEN =        "PLRAAN",
  DOI =          "https://doi.org/10.1103/PhysRevA.94.022315",
  ISSN =         "1050-2947 (print), 1094-1622, 1538-4446, 1538-4519",
  ISSN-L =       "1050-2947",
  bibdate =      "Wed Sep 7 09:59:24 2016",
  bibsource =    "https://www.math.utah.edu/pub/bibnet/authors/s/shannon-claude-elwood.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://link.aps.org/doi/10.1103/PhysRevA.94.022315",
  abstract =     "Shannon proved in 1949 that
                 information-theoretic-secure encryption is possible if
                 the encryption key is used only once, is random, and is
                 at least as long as the message itself.
                 Notwithstanding, when information is encoded in a
                 quantum system, the phenomenon of quantum data locking
                 allows one to encrypt a message with a shorter key and
                 still provide information-theoretic security. We
                 present one of the first feasible experimental
                 demonstrations of quantum data locking for direct
                 communication and propose a scheme for a quantum enigma
                 machine that encrypts 6 bits per photon (containing
                 messages, new encryption keys, and forward error
                 correction bits) with less than 6 bits per photon of
                 encryption key while remaining
                 information-theoretically secure.",
  acknowledgement = ack-nhfb,
  fjournal =     "Physical Review A (Atomic, Molecular, and Optical
                 Physics)",
  journal-URL =  "http://pra.aps.org/browse",
  pagecount =    "10",
}

@Article{Lychev:2016:RSI,
  author =       "Robert Lychev and Michael Schapira and Sharon
                 Goldberg",
  title =        "Rethinking security for {Internet} routing",
  journal =      j-CACM,
  volume =       "59",
  number =       "10",
  pages =        "48--57",
  month =        oct,
  year =         "2016",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2896817",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Sep 28 06:26:12 MDT 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cacm2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://cacm.acm.org/magazines/2016/10/207763/fulltext",
  abstract =     "Combine simple whitelisting technology, notably prefix
                 filtering, in most BGP-speaking routers with weaker
                 cryptographic protocols.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Book{Maffeo:2016:UNC,
  author =       "Steven E. Maffeo",
  title =        "{U.S. Navy} codebreakers, linguists, and intelligence
                 officers against {Japan}, 1910--1941: a biographical
                 dictionary",
  publisher =    "Rowan and Littlefield",
  address =      "Lanham, MD, USA",
  year =         "2016",
  ISBN =         "1-4422-5563-3, 1-4422-5564-1 (e-book)",
  ISBN-13 =      "978-1-4422-5563-0, 978-1-4422-5564-7 (e-book)",
  LCCN =         "D810.S7 M2535 2015eb",
  bibdate =      "Thu Dec 28 09:55:46 MST 2017",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "This unique reference presents 59 biographies of
                 people who were key to the sea services being
                 reasonably prepared to fight the Japanese Empire when
                 the Second World War broke out, and whose advanced work
                 proved crucial. These intelligence pioneers invented
                 techniques, procedures, and equipment from scratch, not
                 only allowing the United States to hold its own in the
                 Pacific despite the loss of most of its Fleet at Pearl
                 Harbor, but also laying the foundation of today's
                 intelligence methods and agencies.",
  acknowledgement = ack-nhfb,
  subject =      "Cryptographers; United States; Biography;
                 Dictionaries; Linguists; Intelligence officers; World
                 War, 1939--1945; Cryptography; Campaigns; Japan;
                 Biography and Autobiography; General; Technology and
                 Engineering; Marine and Naval; Military Science;
                 Cryptographers; Cryptography; Intelligence officers;
                 Linguists; Military campaigns",
  tableofcontents = "Acronyms and Abbreviations \\
                 Foreword \\
                 Author's Foreword \\
                 Acknowledgments \\
                 Introduction \\
                 Illustrations \\
                 The Scanners. Radio Direction Finders and Radio Traffic
                 Analysts \\
                 The Book Breakers. Cryptographers, Cryptanalysts, and
                 Codebreakers \\
                 The Blue Sky Merchants. Linguists, Translators, and
                 Intelligence Officers \\
                 The ``Hybrids''. Multiskilled and Multiproficient \\
                 Appendix A. What's a Code, and What's a Cipher? \\
                 Appendix B. Chronology of Select Highlights, U.S. Navy
                 Radio Intelligence, Pacific Area of Operations
                 1916--1941 \\
                 Appendix C. Directors of U.S. Naval Intelligence,
                 1909--1942 \\
                 Appendix D. Directors of U.S. Naval Communications
                 1912--1942 \\
                 Appendix E. U.S. Naval Attach{\'e}s in Tokyo,
                 1914--1941 \\
                 Appendix F. U.S. Navy, Office of the Chief of Naval
                 Operations, Section ``OP-20-G'' and Its Antecedents \\
                 Appendix G. Officers in Charge, Office of Naval
                 Communications, Code and Signal Section, ``Research
                 Desk'' (OP-20-GX) \\
                 Appendix H. Officers in Charge, Office of Naval
                 Communications, Code and Signal Section, Translation
                 Section (OP-20-GZ) \\
                 Appendix I. Growth of U.S. Navy Radio Intelligence \\
                 Appendix J. U.S. Naval Radio Intelligence, Primarily
                 Focused upon Japan, as of December 1941 \\
                 Appendix K. Station HYPO, Territory of Hawaii \\
                 Appendix L. U.S. Navy and U.S. Marine Corps Japanese
                 Language\slash Culture Officers Immersed in Japan,
                 1910--1941 \\
                 Appendix M. The ``On-the-Roof Gang'' \\
                 Appendix N. Operation VENGEANCE \\
                 Suggested Reading \\
                 Glossary \\
                 Index \\
                 About the Author",
}

@Article{Mailloux:2016:PSS,
  author =       "Logan O. Mailloux and Michael A. McEvilley and Stephen
                 Khou and John M. Pecarina",
  title =        "Putting the {`Systems'} in Security Engineering: An
                 Examination of {NIST Special Publication 800-160}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "4",
  pages =        "76--80",
  month =        jul # "\slash " # aug,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 08:21:28 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/04/msp2016040076-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
  keywords =     "National Institute of Standards and Technology (NIST)
                 Special Publication 800-160 Systems Security
                 Engineering: Considerations for a Multidisciplinary
                 Approach in the Engineering of Trustworthy Secure
                 Systems",
}

@Article{Mandal:2016:DIW,
  author =       "Kalikinkar Mandal and Xinxin Fan and Guang Gong",
  title =        "Design and Implementation of {Warbler} Family of
                 Lightweight Pseudorandom Number Generators for Smart
                 Devices",
  journal =      j-TECS,
  volume =       "15",
  number =       "1",
  pages =        "1:1--1:??",
  month =        feb,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2808230",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Wed Jun 8 09:43:30 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib;
                 https://www.math.utah.edu/pub/tex/bib/tecs.bib",
  abstract =     "With the advent of ubiquitous computing and the
                 Internet of Things (IoT), the security and privacy
                 issues for various smart devices such as
                 radio-frequency identification (RFID) tags and wireless
                 sensor nodes are receiving increased attention from
                 academia and industry. A number of lightweight
                 cryptographic primitives have been proposed to provide
                 security services for resource-constrained smart
                 devices. As one of the core primitives, a
                 cryptographically secure pseudorandom number generator
                 (PRNG) plays an important role for lightweight embedded
                 applications. The most existing PRNGs proposed for
                 smart devices employ true random number generators as a
                 component, which generally incur significant power
                 consumption and gate count in hardware. In this
                 article, we present Warbler family, a new pseudorandom
                 number generator family based on nonlinear feedback
                 shift registers (NLFSRs) with desirable randomness
                 properties. The design of the Warbler family is based
                 on the combination of modified de Bruijn blocks
                 together with a nonlinear feedback Welch-Gong (WG)
                 sequence generator, which enables us to precisely
                 characterize the randomness properties and to flexibly
                 adjust the security level of the resulting PRNG. Some
                 criteria for selecting parameters of the Warbler family
                 are proposed to offer the maximum level of security.
                 Two instances of the Warbler family are also described,
                 which feature two different security levels and are
                 dedicated to EPC C1 Gen2 RFID tags and wireless sensor
                 nodes, respectively. The security analysis shows that
                 the proposed instances not only can pass the
                 cryptographic statistical tests recommended by the EPC
                 C1 Gen2 standard and NIST but also are resistant to the
                 cryptanalytic attacks such as algebraic attacks, cube
                 attacks, time-memory-data tradeoff attacks,
                 Mihaljevi{\'c} et al.'s attacks, and weak internal
                 state and fault injection attacks. Our ASIC
                 implementations using a 65nm CMOS process demonstrate
                 that the proposed two lightweight instances of the
                 Warbler family can achieve good performance in terms of
                 speed and area and provide ideal solutions for securing
                 low-cost smart devices.",
  acknowledgement = ack-nhfb,
  articleno =    "1",
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J840",
}

@Article{Manimehalai:2016:NRR,
  author =       "P. Manimehalai and P. Arockia Jansi Rani",
  title =        "A New Robust Reversible Blind Watermarking in
                 Wavelet-Domain for Color Images",
  journal =      j-INT-J-IMAGE-GRAPHICS,
  volume =       "16",
  number =       "2",
  pages =        "1650006",
  month =        apr,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1142/S0219467816500066",
  ISSN =         "0219-4678",
  ISSN-L =       "0219-4678",
  bibdate =      "Thu May 5 06:44:22 MDT 2016",
  bibsource =    "http://ejournals.wspc.com.sg/ijig/ijig.shtml;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijig.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Image and Graphics (IJIG)",
  journal-URL =  "http://www.worldscientific.com/worldscinet/ijig",
}

@Article{Mazumdar:2016:CIS,
  author =       "Bodhisatwa Mazumdar and Sk. Subidh Ali and Ozgur
                 Sinanoglu",
  title =        "A Compact Implementation of {Salsa20} and Its Power
                 Analysis Vulnerabilities",
  journal =      j-TODAES,
  volume =       "22",
  number =       "1",
  pages =        "11:1--11:??",
  month =        dec,
  year =         "2016",
  CODEN =        "ATASFO",
  DOI =          "https://doi.org/10.1145/2934677",
  ISSN =         "1084-4309 (print), 1557-7309 (electronic)",
  ISSN-L =       "1084-4309",
  bibdate =      "Fri Jul 21 10:49:29 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/todaes/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/todaes.bib",
  abstract =     "In this article, we present a compact implementation
                 of the Salsa20 stream cipher that is targeted towards
                 lightweight cryptographic devices such as
                 radio-frequency identification (RFID) tags. The Salsa20
                 stream cipher, ann addition-rotation-XOR (ARX) cipher,
                 is used for high-security cryptography in NEON
                 instruction sets embedded in ARM Cortex A8 CPU
                 core-based tablets and smartphones. The existing
                 literature shows that although classical cryptanalysis
                 has been effective on reduced rounds of Salsa20, the
                 stream cipher is immune to software side-channel
                 attacks such as branch timing and cache timing attacks.
                 To the best of our knowledge, this work is the first to
                 perform hardware power analysis attacks, where we
                 evaluate the resistance of all eight keywords in the
                 proposed compact implementation of Salsa20. Our
                 technique targets the three subrounds of the first
                 round of the implemented Salsa20. The correlation power
                 analysis (CPA) attack has an attack complexity of
                 2$^{19}$. Based on extensive experiments on a compact
                 implementation of Salsa20, we demonstrate that all
                 these keywords can be recovered within 20,000 queries
                 on Salsa20. The attacks show a varying resilience of
                 the key words against CPA that has not yet been
                 observed in any stream or block cipher in the present
                 literature. This makes the architecture of this stream
                 cipher interesting from the side-channel analysis
                 perspective. Also, we propose a lightweight
                 countermeasure that mitigates the leakage in the power
                 traces as shown in the results of Welch's t -test
                 statistics. The hardware area overhead of the proposed
                 countermeasure is only 14\% and is designed with
                 compact implementation in mind.",
  acknowledgement = ack-nhfb,
  articleno =    "11",
  fjournal =     "ACM Transactions on Design Automation of Electronic
                 Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J776",
}

@Article{McGraw:2016:SBTd,
  author =       "Gary McGraw",
  title =        "{Silver Bullet} Talks with {Martin Hellman}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "4",
  pages =        "7--11",
  month =        jul # "\slash " # aug,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 08:21:28 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/04/msp2016040007.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{McGrew:2016:SMH,
  author =       "Daniel McGrew and Panos Kampanakis and Scott Fluhrer
                 and Stefan-Lukas Gazdag and Denis Butin and Johannes
                 Buchmann",
  title =        "State Management for Hash-Based Signatures",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "10074",
  pages =        "244--260",
  year =         "2016",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-319-49100-4_11",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 31 16:21:47 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  URL =          "https://link.springer.com/chapter/10.1007/978-3-319-49100-4_11",
  acknowledgement = ack-nhfb,
  fjournal =     "Lecture Notes in Computer Science",
  journal-URL =  "http://link.springer.com/bookseries/558",
  remark =       "Proceedings of the 3rd International Conference on
                 Security Standardization Research (SSR 16).",
}

@Article{Meiklejohn:2016:FBC,
  author =       "Sarah Meiklejohn and Marjori Pomarole and Grant Jordan
                 and Kirill Levchenko and Damon McCoy and Geoffrey M.
                 Voelker and Stefan Savage",
  title =        "A fistful of {Bitcoins}: characterizing payments among
                 men with no names",
  journal =      j-CACM,
  volume =       "59",
  number =       "4",
  pages =        "86--93",
  month =        apr,
  year =         "2016",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2896384",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Apr 15 14:58:10 MDT 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cacm2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://cacm.acm.org/magazines/2016/4/200174/fulltext",
  abstract =     "Bitcoin is a purely online virtual currency, unbacked
                 by either physical commodities or sovereign obligation;
                 instead, it relies on a combination of cryptographic
                 protection and a peer-to-peer protocol for witnessing
                 settlements. Consequently, Bitcoin has the unintuitive
                 property that while the ownership of money is
                 implicitly anonymous, its flow is globally visible. In
                 this paper we explore this unique characteristic
                 further, using heuristic clustering to group Bitcoin
                 wallets based on evidence of shared authority, and then
                 using re-identification attacks (i.e., empirical
                 purchasing of goods and services) to classify the
                 operators of those clusters. From this analysis, we
                 consider the challenges for those seeking to use
                 Bitcoin for criminal or fraudulent purposes at scale.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@InProceedings{Meloni:2016:RDR,
  author =       "Nicolas M{\'e}loni and M. Anwar Hasan",
  title =        "Random Digit Representation of Integers",
  crossref =     "Montuschi:2016:ISC",
  pages =        "118--125",
  year =         "2016",
  DOI =          "https://doi.org/10.1109/ARITH.2016.11",
  bibdate =      "Fri Dec 16 15:17:20 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/fparith.bib",
  acknowledgement = ack-nhfb,
  keywords =     "ARITH-23; modular exponentiation",
}

@Article{Mendez:2016:PES,
  author =       "Alejandro P{\'e}rez M{\'e}ndez and Rafael Mar{\'\i}n
                 L{\'o}pez and Gabriel L{\'o}pez Mill{\'a}n",
  title =        "Providing efficient {SSO} to cloud service access in
                 {AAA}-based identity federations",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "58",
  number =       "??",
  pages =        "13--28",
  month =        may,
  year =         "2016",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Sat Feb 6 07:32:03 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X15003854",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X/",
}

@Article{Miao:2016:RAS,
  author =       "Yinbin Miao and Jianfeng Ma and Zhiquan Liu",
  title =        "Revocable and anonymous searchable encryption in
                 multi-user setting",
  journal =      j-CCPE,
  volume =       "28",
  number =       "4",
  pages =        "1204--1218",
  day =          "25",
  month =        mar,
  year =         "2016",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.3608",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Sun Apr 3 12:34:13 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "7 Oct 2015",
}

@Article{Michael:2016:RNI,
  author =       "K. Michael",
  title =        "{RFID\slash NFC} Implants for {Bitcoin} Transactions",
  journal =      "IEEE Consumer Electronics Magazine",
  volume =       "5",
  number =       "3",
  pages =        "103--106",
  month =        jul,
  year =         "2016",
  DOI =          "https://doi.org/10.1109/MCE.2016.2556900",
  ISSN =         "2162-2248 (print), 2162-2256 (electronic)",
  ISSN-L =       "2162-2248",
  bibdate =      "Thu Nov 30 15:24:52 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  keywords =     "biological identity; biomedical communication;
                 Biometrics; Cryptography; embedded implant; Implants;
                 Interviews; Near field communication; near-field
                 communication; near-field communication platform; NFC
                 implants; Privacy; radiofrequency identification;
                 Radiofrequency identification; RFID implants; {Bitcoin}
                 transactions",
}

@Article{Miller:2016:RPS,
  author =       "Carl A. Miller and Yaoyun Shi",
  title =        "Robust Protocols for Securely Expanding Randomness and
                 Distributing Keys Using Untrusted Quantum Devices",
  journal =      j-J-ACM,
  volume =       "63",
  number =       "4",
  pages =        "33:1--33:??",
  month =        nov,
  year =         "2016",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/2885493",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  bibdate =      "Mon Apr 3 09:29:48 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Randomness is a vital resource for modern-day
                 information processing, especially for cryptography. A
                 wide range of applications critically rely on abundant,
                 high-quality random numbers generated securely. Here,
                 we show how to expand a random seed at an exponential
                 rate without trusting the underlying quantum devices.
                 Our approach is secure against the most general
                 adversaries, and has the following new features:
                 cryptographic level of security, tolerating a constant
                 level of imprecision in devices, requiring only unit
                 size quantum memory (for each device component) in an
                 honest implementation, and allowing a large natural
                 class of constructions for the protocol. In conjunction
                 with a recent work by Chung et al. [2014], it also
                 leads to robust unbounded expansion using just 2
                 multipart devices. When adapted for distributing
                 cryptographic keys, our method achieves, for the first
                 time, exponential expansion combined with cryptographic
                 security and noise tolerance. The proof proceeds by
                 showing that the R{\'e}nyi divergence of the outputs of
                 the protocol (for a specific bounding operator)
                 decreases linearly as the protocol iterates. At the
                 heart of the proof are a new uncertainty principle on
                 quantum measurements and a method for simulating
                 trusted measurements with untrusted devices.",
  acknowledgement = ack-nhfb,
  articleno =    "33",
  fjournal =     "Journal of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J401",
}

@Article{Min:2016:RSC,
  author =       "Byungho Min and Vijay Varadharajan",
  title =        "Rethinking Software Component Security: Software
                 Component Level Integrity and Cross Verification",
  journal =      j-COMP-J,
  volume =       "59",
  number =       "11",
  pages =        "1735--1748",
  month =        nov,
  year =         "2016",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxw047",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Fri Nov 4 09:11:48 MDT 2016",
  bibsource =    "http://comjnl.oxfordjournals.org/content/59/11.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/59/11/1735",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "August 10, 2016",
}

@Article{Mishra:2016:AFP,
  author =       "Abhishek Mishra and Parv Venkitasubramaniam",
  title =        "Anonymity and fairness in packet scheduling: a
                 quantitative tradeoff",
  journal =      j-IEEE-TRANS-NETWORKING,
  volume =       "24",
  number =       "2",
  pages =        "688--702",
  month =        apr,
  year =         "2016",
  CODEN =        "IEANEP",
  ISSN =         "1063-6692 (print), 1558-2566 (electronic)",
  ISSN-L =       "1063-6692",
  bibdate =      "Tue Oct 18 12:04:13 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
  abstract =     "Fairness among multiple users sharing a common
                 resource is an important criterion in the design and
                 evaluation of scheduling algorithms in networks.
                 Anonymous networking, where sources of transmitted
                 packets are undecipherable to an eavesdropper, requires
                 packets arriving at routers from multiple sources to be
                 randomly reordered prior to transmission, which works
                 against the notion of temporal fairness in packet
                 scheduling. Consequently, it is important to understand
                 the relationship between temporal fairness and
                 achievable anonymity. In this paper, this relationship
                 is investigated for three fair scheduling paradigms:
                 First-Come--First-Serve (FCFS), Fair Queuing, and the
                 Proportional Method. Using an information-theoretic
                 metric for anonymity and a common temporal fairness
                 index that measures the degree of out-of-order
                 transmissions, the anonymity achievable under these
                 scheduling paradigms is characterized and their
                 anonymity-fairness tradeoffs are compared. The FCFS and
                 Fair Queuing algorithms have little inherent anonymity,
                 and a significant improvement in anonymity is achieved
                 by relaxing their respective fairness paradigms. The
                 analysis of the relaxed FCFS criterion, in particular,
                 is accomplished by modeling the problem as a stochastic
                 control system that is solved using dynamic
                 programming. The proportional method of scheduling,
                 while unpopular in networks today, is shown to
                 outperform the other fair scheduling algorithms when
                 trading temporal fairness for anonymity, and is also
                 proven to be asymptotically optimal as the buffer size
                 of the scheduler is increased.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE\slash ACM Transactions on Networking",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J771",
}

@Article{Monz:2016:RSS,
  author =       "Thomas Monz and Daniel Nigg and Esteban A. Martinez
                 and Matthias F. Brandl and Philipp Schindler and
                 Richard Rines and Shannon X. Wang and Isaac L. Chuang
                 and Rainer Blatt",
  title =        "Realization of a scalable {Shor} algorithm",
  journal =      "Science",
  volume =       "351",
  number =       "6277",
  pages =        "1068--1070",
  day =          "4",
  month =        mar,
  year =         "2016",
  DOI =          "https://doi.org/10.1126/science.aad9480",
  ISSN =         "0036-8075",
  bibdate =      "Tue Mar 8 11:07:15 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://science.sciencemag.org/content/351/6277/1068",
  acknowledgement = ack-nhfb,
  eprint =       "http://science.sciencemag.org/content/351/6277/1068.full.pdf",
  keywords =     "large integer factorization; quantum cryptography;
                 Schor's algorithm",
}

@Article{Muftic:2016:BCC,
  author =       "Sead Muftic",
  title =        "{BIX} Certificates: Cryptographic Tokens for Anonymous
                 Transactions Based on Certificates Public Ledger",
  journal =      "Ledger",
  volume =       "1",
  number =       "??",
  pages =        "19--37",
  month =        "????",
  year =         "2016",
  DOI =          "https://doi.org/10.5195/ledger.2016.27",
  ISSN =         "2379-5980",
  bibdate =      "Fri Jan 19 06:12:08 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.ledgerjournal.org/ojs/index.php/ledger/article/view/27",
  acknowledgement = ack-nhfb,
  fjournal =     "Ledger",
  journal-URL =  "http://www.ledgerjournal.org/ojs/index.php/ledger",
}

@Article{Munoz-Hernandez:2016:EES,
  author =       "Mario Diego Munoz-Hernandez and Miguel
                 Morales-Sandoval and Jose Juan Garcia-Hernandez",
  title =        "An End-to-End Security Approach for Digital Document
                 Management",
  journal =      j-COMP-J,
  volume =       "59",
  number =       "7",
  pages =        "1076--1090",
  month =        jul,
  year =         "2016",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxw002",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Aug 30 07:10:49 MDT 2016",
  bibsource =    "http://comjnl.oxfordjournals.org/content/59/7.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/59/7/1076",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "January 31, 2016",
}

@Article{Murdoch:2016:IDP,
  author =       "Steven J. Murdoch",
  title =        "Insecure by Design: Protocols for Encrypted Phone
                 Calls",
  journal =      j-COMPUTER,
  volume =       "49",
  number =       "3",
  pages =        "25--33",
  month =        mar,
  year =         "2016",
  CODEN =        "CPTRB4",
  DOI =          "https://doi.org/10.1109/MC.2016.70",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Tue Mar 22 07:09:43 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computer2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.computer.org/csdl/mags/co/2016/03/mco2016030025-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/co/2016/03/mco2016030025-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
}

@Article{Naccache:2016:FHE,
  author =       "David Naccache",
  title =        "Fully Homomorphic Encryption: Computations with a
                 Blindfold",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "1",
  pages =        "63--67",
  month =        jan # "\slash " # feb,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2016.8",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Jun 8 08:40:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security {\&} Privacy",
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
}

@Article{Nafea:2016:HMB,
  author =       "Ohoud Nafea and Sanaa Ghouzali and Wadood Abdul and
                 Emad-ul-Haq Qazi",
  title =        "Hybrid Multi-Biometric Template Protection Using
                 Watermarking",
  journal =      j-COMP-J,
  volume =       "59",
  number =       "9",
  pages =        "1392--1407",
  month =        sep,
  year =         "2016",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxv107",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Sep 12 11:39:16 MDT 2016",
  bibsource =    "http://comjnl.oxfordjournals.org/content/59/9.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/59/9/1392",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "December 10, 2015",
}

@Article{Nedjah:2016:PYP,
  author =       "Nadia Nedjah and Luiza de Macedo Mourelle and Chao
                 Wang",
  title =        "A Parallel Yet Pipelined Architecture for Efficient
                 Implementation of the {Advanced Encryption Standard}
                 Algorithm on Reconfigurable Hardware",
  journal =      j-INT-J-PARALLEL-PROG,
  volume =       "44",
  number =       "6",
  pages =        "1102--1117",
  month =        dec,
  year =         "2016",
  CODEN =        "IJPPE5",
  DOI =          "https://doi.org/10.1007/s10766-016-0408-7",
  ISSN =         "0885-7458 (print), 1573-7640 (electronic)",
  ISSN-L =       "0885-7458",
  bibdate =      "Tue Sep 20 10:50:01 MDT 2016",
  bibsource =    "http://link.springer.com/journal/10766/44/6;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjparallelprogram.bib",
  URL =          "http://link.springer.com/article/10.1007/s10766-016-0408-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Parallel Programming",
  journal-URL =  "http://link.springer.com/journal/10766",
}

@Article{Obert:2016:PAE,
  author =       "James Obert and Inna Pivkina and Hong Huang and
                 Huiping Cao",
  title =        "Proactively applied encryption in multipath networks",
  journal =      j-COMPUT-SECUR,
  volume =       "58",
  number =       "??",
  pages =        "106--124",
  month =        may,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:45 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815001960",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Olson:2016:SIT,
  author =       "Lena E. Olson and Simha Sethumadhavan and Mark D.
                 Hill",
  title =        "Security Implications of Third-Party Accelerators",
  journal =      j-IEEE-COMPUT-ARCHIT-LETT,
  volume =       "15",
  number =       "1",
  pages =        "50--53",
  month =        jan # "\slash " # jun,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/LCA.2015.2445337",
  ISSN =         "1556-6056 (print), 1556-6064 (electronic)",
  ISSN-L =       "1556-6056",
  bibdate =      "Thu Jun 20 17:18:18 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeecomputarchitlett.bib",
  abstract =     "Third-party accelerators offer system designers high
                 performance and low energy without the market delay of
                 in-house development. However, complex third-party
                 accelerators may include vulnerabilities due to design
                 flaws or malicious intent that are hard to expose
                 during verification. Rather than react to each new
                 vulnerability, it is better to proactively build
                 defenses for classes of attacks. To inspire future work
                 on defenses, this paper develops a taxonomy of
                 accelerator vulnerabilities. We consider the cross
                 product of threat types (confidentiality, integrity,
                 and availability) with risk categories (configuration,
                 computation, termination, accelerator memory accesses,
                 system memory accesses, microarchitecture/coherence,
                 exceptions/interrupts, and power), as well as whether
                 processes can be vulnerable only if they use the
                 offending accelerator (accelerator-scope threat) or
                 even when running in the same system (system-scope
                 threat). Our taxonomy draws attention to a grave
                 problem that needs immediate attention from computer
                 architects.",
  acknowledgement = ack-nhfb,
  affiliation =  "Olson, LE (Reprint Author), Univ Wisconsin, Dept Comp
                 Sci, 1210 W Dayton St, Madison, WI 53706 USA. Olson,
                 Lena E.; Hill, Mark D., Univ Wisconsin, Dept Comp Sci,
                 1210 W Dayton St, Madison, WI 53706 USA. Sethumadhavan,
                 Simha, Columbia Univ, Dept Comp Sci, New York, NY 10026
                 USA.",
  author-email = "lena@cs.wisc.edu simha@cs.columbia.edu
                 markhill@cs.wisc.edu",
  da =           "2019-06-20",
  doc-delivery-number = "DY1XQ",
  eissn =        "1556-6064",
  fjournal =     "IEEE Computer Architecture Letters",
  funding-acknowledgement = "NSF [1054844]; Alfred P. Sloan Foundation;
                 [FA8750-10-2-0253]; [FA8650-11-C-7190]",
  funding-text = "This work is supported through grants
                 FA8750-10-2-0253, FA8650-11-C-7190, NSF 1054844 and the
                 Alfred P. Sloan Foundation. Opinions, findings,
                 conclusions and recommendations expressed in this
                 material are those of the authors and may not reflect
                 the views of the funding entities. The authors thank
                 Eric Sedlar, Dan Gibson, Multifacet, and UW-Madison
                 Computer Architecture Affiliates for valuable
                 feedback.",
  journal-iso =  "IEEE Comput. Archit. Lett.",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=10208",
  keywords =     "accelerator architectures; accelerator
                 vulnerabilities; accelerator-scope threat; Coherence;
                 computer architecture; Computer bugs; Computer
                 security; Cryptography; Hardware; malicious intent;
                 market delay; Registers; risk categories; risk
                 management; system-scope threat; Taxonomy; third-party
                 accelerators",
  number-of-cited-references = "20",
  oa =           "Bronze",
  research-areas = "Computer Science",
  times-cited =  "5",
  unique-id =    "Olson:2016:SIT",
  web-of-science-categories = "Computer Science, Hardware \&
                 Architecture",
}

@Article{Onica:2016:CPP,
  author =       "Emanuel Onica and Pascal Felber and Hugues Mercier and
                 Etienne Rivi{\`e}re",
  title =        "Confidentiality-Preserving Publish\slash Subscribe: a
                 Survey",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "2",
  pages =        "27:1--27:??",
  month =        sep,
  year =         "2016",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/2940296",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Nov 8 16:12:56 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "Publish/subscribe (pub/sub) is an attractive
                 communication paradigm for large-scale distributed
                 applications running across multiple administrative
                 domains. Pub/sub allows event-based information
                 dissemination based on constraints on the nature of the
                 data rather than on pre-established communication
                 channels. It is a natural fit for deployment in
                 untrusted environments such as public clouds linking
                 applications across multiple sites. However, pub/sub in
                 untrusted environments leads to major confidentiality
                 concerns stemming from the content-centric nature of
                 the communications. This survey classifies and analyzes
                 different approaches to confidentiality preservation
                 for pub/sub, from applications of trust and access
                 control models to novel encryption techniques. It
                 provides an overview of the current challenges posed by
                 confidentiality concerns and points to future research
                 directions in this promising field.",
  acknowledgement = ack-nhfb,
  articleno =    "27",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Orencik:2016:MKS,
  author =       "Cengiz Orencik and Ayse Selcuk and Erkay Savas and
                 Murat Kantarcio{\u{g}}lu",
  title =        "Multi-keyword search over encrypted data with scoring
                 and search pattern obfuscation",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "3",
  pages =        "251--269",
  month =        jun,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0294-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:45 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib;
                 https://www.math.utah.edu/pub/tex/bib/string-matching.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0294-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
  keywords =     "Efficiency Scoring; Encrypted cloud data; Privacy
                 preservation; Secure search",
}

@Misc{Ormond:2016:CPR,
  author =       "Jim Ormond",
  title =        "Cryptography Pioneers Receive {ACM A. M. Turing
                 Award}: {Diffie} and {Hellman}'s Invention of
                 Public-Key Cryptography and Digital Signatures
                 Revolutionized Computer Security and Made {Internet}
                 Commerce Possible",
  howpublished = "Web document",
  day =          "1",
  month =        mar,
  year =         "2016",
  bibdate =      "Tue Mar 01 11:55:25 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/acm-turing-awards.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.acm.org/media-center/2016/march/turing-award-2015",
  acknowledgement = ack-nhfb,
}

@Article{Osborn:2016:SSR,
  author =       "Emma Osborn and Andrew Simpson",
  title =        "On Safety and Security Requirements in Emerging
                 Ubiquitous Computing Models",
  journal =      j-COMP-J,
  volume =       "59",
  number =       "4",
  pages =        "570--591",
  month =        apr,
  year =         "2016",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxv085",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Mar 28 10:52:39 MDT 2016",
  bibsource =    "http://comjnl.oxfordjournals.org/content/59/4.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/59/4/570",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "October 14, 2015",
}

@Article{Pal:2016:ACC,
  author =       "Jiban K. Pal",
  title =        "Administering a cryptology centre by means of
                 scientometric indicators",
  journal =      j-COLLNET-J-SCIENTOMETRICS-INF-MANAGE,
  volume =       "10",
  number =       "1",
  pages =        "97--123",
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1080/09737766.2016.1177947",
  ISSN =         "0973-7766 (print), 2168-930X (electronic)",
  ISSN-L =       "0973-7766",
  bibdate =      "Mon Jun 20 14:27:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/collnet-j-scientometrics-inf-manage.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Collnet Journal of Scientometrics and Information
                 Management",
}

@Article{Papamanthou:2016:AHT,
  author =       "Charalampos Papamanthou and Roberto Tamassia and Nikos
                 Triandopoulos",
  title =        "Authenticated Hash Tables Based on Cryptographic
                 Accumulators",
  journal =      j-ALGORITHMICA,
  volume =       "74",
  number =       "2",
  pages =        "664--712",
  month =        feb,
  year =         "2016",
  CODEN =        "ALGOEJ",
  DOI =          "https://doi.org/10.1007/s00453-014-9968-3",
  ISSN =         "0178-4617 (print), 1432-0541 (electronic)",
  ISSN-L =       "0178-4617",
  bibdate =      "Thu Apr 7 10:40:27 MDT 2016",
  bibsource =    "http://link.springer.com/journal/453/74/2;
                 https://www.math.utah.edu/pub/tex/bib/algorithmica.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  URL =          "http://link.springer.com/article/10.1007/s00453-014-9968-3",
  acknowledgement = ack-nhfb,
  fjournal =     "Algorithmica",
  journal-URL =  "http://link.springer.com/journal/453",
}

@Article{Parno:2016:PNP,
  author =       "Bryan Parno and Jon Howell and Craig Gentry and
                 Mariana Raykova",
  title =        "{Pinocchio}: nearly practical verifiable computation",
  journal =      j-CACM,
  volume =       "59",
  number =       "2",
  pages =        "103--112",
  month =        feb,
  year =         "2016",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2856449",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Feb 16 15:45:15 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cacm2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://cacm.acm.org/magazines/2016/2/197429/fulltext",
  abstract =     "To instill greater confidence in computations
                 outsourced to the cloud, clients should be able to
                 verify the correctness of the results returned. To this
                 end, we introduce Pinocchio, a built system for
                 efficiently verifying general computations while
                 relying only on cryptographic assumptions. With
                 Pinocchio, the client creates a public evaluation key
                 to describe her computation; this setup is proportional
                 to evaluating the computation once. The worker then
                 evaluates the computation on a particular input and
                 uses the evaluation key to produce a proof of
                 correctness. The proof is only 288 bytes, regardless of
                 the computation performed or the size of the IO. Anyone
                 can check the proof using a public verification key.
                 Crucially, our evaluation on seven applications
                 demonstrates that Pinocchio is efficient in practice
                 too. Pinocchio's verification time is a fixed 10 ms
                 plus 0.4--15 $ \mu $ s per IO element: 5--7 orders of
                 magnitude less than previous work; indeed Pinocchio is
                 the first general-purpose system to demonstrate
                 verification cheaper than native execution (for some
                 apps). The worker's proof effort is still expensive,
                 but Pinocchio reduces it by 19 $ \times $ --60 $ \times
                 $ relative to prior work. As an additional feature,
                 Pinocchio allows the worker to include private inputs
                 in the computation and prove that she performed the
                 computation correctly without revealing any information
                 about the private inputs to the client. Finally, to aid
                 development, Pinocchio provides an end-to-end toolchain
                 that compiles a subset of C into programs that
                 implement the verifiable computation {protocol.$<$}!--
                 END_PAGE_1 --{$>$}",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Paul:2016:TSO,
  author =       "G. Paul and A. Chattopadhyay",
  title =        "Three Snakes in One Hole: The First Systematic
                 Hardware Accelerator Design for {SOSEMANUK} with
                 Optional Serpent and {SNOW 2.0} Modes",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "65",
  number =       "2",
  pages =        "640--653",
  month =        "????",
  year =         "2016",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2015.2435775",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Tue Jan 19 07:06:51 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
  keywords =     "cryptography; hardware acceleration; Serpent stream
                 cipher; SNOW 2.0 stream cipher; SOSEMANUK eSTREAM
                 stream cipher",
}

@Article{Pereira:2016:SHB,
  author =       "Geovandro C. C. F. Pereira and Cassius Puodzius and
                 Paulo S. L. M. Barreto",
  title =        "Shorter hash-based signatures",
  journal =      j-J-SYST-SOFTW,
  volume =       "116",
  number =       "??",
  pages =        "95--100",
  month =        jun,
  year =         "2016",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Thu May 19 08:19:12 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0164121215001466",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212/",
}

@Article{Phuc:2016:SAS,
  author =       "Tran Song Dat Phuc and Changhoon Lee",
  title =        "Security analysis of {SDDO}-based block cipher for
                 wireless sensor network",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "72",
  number =       "9",
  pages =        "3619--3628",
  month =        sep,
  year =         "2016",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-015-1589-3",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Tue Sep 20 10:45:03 MDT 2016",
  bibsource =    "http://link.springer.com/journal/11227/72/9;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  URL =          "http://link.springer.com/article/10.1007/s11227-015-1589-3",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Article{Premnath:2016:SPC,
  author =       "Sriram Nandha Premnath and Zygmunt J. Haas",
  title =        "Supporting Privacy of Computations in Mobile Big Data
                 Systems",
  journal =      j-FUTURE-INTERNET,
  volume =       "8",
  number =       "2",
  pages =        "17",
  day =          "10",
  month =        may,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi8020017",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:55 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/8/2/17",
  abstract =     "Cloud computing systems enable clients to rent and
                 share computing resources of third party platforms, and
                 have gained widespread use in recent years. Numerous
                 varieties of mobile, small-scale devices such as
                 smartphones, red e-health devices, etc., across users,
                 are connected to one another through the massive
                 internetwork of vastly powerful servers on the cloud.
                 While mobile devices store ``private information'' of
                 users such as location, payment, health data, etc.,
                 they may also contribute ``semi-public information''
                 (which may include crowdsourced data such as transit,
                 traffic, nearby points of interests, etc.) for data
                 analytics. In such a scenario, a mobile device may seek
                 to obtain the result of a computation, which may depend
                 on its private inputs, crowdsourced data from other
                 mobile devices, and/or any ``public inputs'' from other
                 servers on the Internet. We demonstrate a new method of
                 delegating real-world computations of
                 resource-constrained mobile clients using an encrypted
                 program known as the garbled circuit. Using the garbled
                 version of a mobile client's inputs, a server in the
                 cloud executes the garbled circuit and returns the
                 resulting garbled outputs. Our system assures privacy
                 of the mobile client's input data and output of the
                 computation, and also enables the client to verify that
                 the evaluator actually performed the computation. We
                 analyze the complexity of our system. We measure the
                 time taken to construct the garbled circuit as well as
                 evaluate it for varying number of servers. Using
                 real-world data, we evaluate our system for a
                 practical, privacy preserving search application that
                 locates the nearest point of interest for the mobile
                 client to demonstrate feasibility.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Security in Cloud Computing and Big
                 Data.",
}

@Article{Qi:2016:SID,
  author =       "Saiyu Qi and Yuanqing Zheng and Mo Li and Yunhao Liu
                 and Jinli Qiu",
  title =        "Scalable Industry Data Access Control in
                 {RFID}-Enabled Supply Chain",
  journal =      j-IEEE-TRANS-NETWORKING,
  volume =       "24",
  number =       "6",
  pages =        "3551--3564",
  month =        dec,
  year =         "2016",
  CODEN =        "IEANEP",
  DOI =          "https://doi.org/10.1109/TNET.2016.2536626",
  ISSN =         "1063-6692 (print), 1558-2566 (electronic)",
  ISSN-L =       "1063-6692",
  bibdate =      "Sat Jan 21 07:15:40 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
  abstract =     "By attaching RFID tags to products, supply chain
                 participants can identify products and create product
                 data to record the product particulars in transit.
                 Participants along the supply chain share their product
                 data to enable information exchange and support
                 critical decisions in production operations. Such an
                 information sharing essentially requires a data access
                 control mechanism when the product data relate to
                 sensitive business issues. However, existing access
                 control solutions are ill-suited to the RFID-enabled
                 supply chain, as they are not scalable in handling a
                 huge number of tags, introduce vulnerability to the
                 product data, and perform poorly to support privilege
                 revocation of product data. We present a new scalable
                 industry data access control system that addresses
                 these limitations. Our system provides an item-level
                 data access control mechanism that defines and enforces
                 access policies based on both the participants' role
                 attributes and the products' RFID tag attributes. Our
                 system further provides an item-level privilege
                 revocation mechanism by allowing the participants to
                 delegate encryption updates in revocation operation
                 without disclosing the underlying data contents. We
                 design a new updatable encryption scheme and integrate
                 it with ciphertext policy-attribute-based encryption to
                 implement the key components of our system.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE\slash ACM Transactions on Networking",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J771",
}

@Article{Qi:2016:SPR,
  author =       "Saiyu Qi and Yuanqing Zheng and Mo Li and Li Lu and
                 Yunhao Liu",
  title =        "Secure and Private {RFID}-Enabled Third-Party Supply
                 Chain Systems",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "65",
  number =       "11",
  pages =        "3413--3426",
  month =        nov,
  year =         "2016",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2016.2538260",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Tue Oct 11 05:14:24 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Qiang:2016:SCF,
  author =       "Weizhong Qiang and Kang Zhang and Weiqi Dai and Hai
                 Jin",
  title =        "Secure cryptographic functions via
                 virtualization-based outsourced computing",
  journal =      j-CCPE,
  volume =       "28",
  number =       "11",
  pages =        "3149--3163",
  day =          "10",
  month =        aug,
  year =         "2016",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.3706",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Tue Sep 13 08:30:11 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
}

@Article{Qin:2016:STI,
  author =       "Zhen Qin and Chen Yuan and Yilei Wang and Hu Xiong",
  title =        "On the security of two identity-based signature
                 schemes based on pairings",
  journal =      j-INFO-PROC-LETT,
  volume =       "116",
  number =       "6",
  pages =        "416--418",
  month =        jun,
  year =         "2016",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Sat Mar 5 10:14:41 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019016300096",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190/",
}

@Article{Qin:2016:VTQ,
  author =       "Huawang Qin and Yuewei Dai",
  title =        "Verifiable $ (t, n) $ threshold quantum secret sharing
                 using $d$-dimensional {Bell} state",
  journal =      j-INFO-PROC-LETT,
  volume =       "116",
  number =       "5",
  pages =        "351--355",
  month =        may,
  year =         "2016",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Fri Feb 12 06:40:48 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019016000077",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190/",
}

@Article{Rahulamathavan:2016:UCA,
  author =       "Yogachandran Rahulamathavan and Suresh Veluru and
                 Jinguang Han and Fei Li and Muttukrishnan Rajarajan and
                 Rongxing Lu",
  title =        "User Collusion Avoidance Scheme for Privacy-Preserving
                 Decentralized Key-Policy Attribute-Based Encryption",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "65",
  number =       "9",
  pages =        "2939--2946",
  month =        "????",
  year =         "2016",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2015.2510646",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Wed Aug 10 09:04:52 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Rana:2016:DBV,
  author =       "Shuvendu Rana and Arijit Sur",
  title =        "Depth-Based View-Invariant Blind {$3$D} Image
                 Watermarking",
  journal =      j-TOMCCAP,
  volume =       "12",
  number =       "4",
  pages =        "48:1--48:??",
  month =        aug,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2957751",
  ISSN =         "1551-6857 (print), 1551-6865 (electronic)",
  ISSN-L =       "1551-6857",
  bibdate =      "Thu Aug 25 07:28:05 MDT 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tomccap/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tomccap.bib",
  abstract =     "With the huge advance in Internet technology as well
                 as the availability of low-cost 3D display devices, 3D
                 image transmission has become popular in recent times.
                 Since watermarking has become regarded as a potential
                 Digital Rights Management (DRM) tools in the past
                 decade, 3D image watermarking is an emerging research
                 topic. With the introduction of the Depth Image-Based
                 Rendering (DIBR) technique, 3D image watermarking is a
                 more challenging task, especially for synthetic view
                 generation. In this article, synthetic view generation
                 is regarded as a potential attack, and a blind
                 watermarking scheme is proposed that can resist it. In
                 the proposed scheme, the watermark is embedded into the
                 low-pass filtered dependent view region of 3D images.
                 Block Discrete Cosine Transformation (DCT) is used for
                 spatial-filtration of the dependent view region to find
                 the DC coefficient with horizontally shifted coherent
                 regions from the left and right view to make the scheme
                 robust against synthesis view attack. A comprehensive
                 set of experiments have been carried out to justify the
                 robustness of the proposed scheme over related existing
                 schemes with respect to Stereo JPEG compression and
                 different noise addition attacks.",
  acknowledgement = ack-nhfb,
  articleno =    "48",
  fjournal =     "ACM Transactions on Multimedia Computing,
                 Communications, and Applications",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J961",
}

@Article{Rankin:2016:HSP,
  author =       "Kyle Rankin",
  title =        "Hack and \slash: Preseeding full disk encryption",
  journal =      j-LINUX-J,
  volume =       "2016",
  number =       "261",
  pages =        "5:1--5:??",
  month =        jan,
  year =         "2016",
  CODEN =        "LIJOFX",
  ISSN =         "1075-3583 (print), 1938-3827 (electronic)",
  ISSN-L =       "1075-3583",
  bibdate =      "Tue Jun 7 18:42:42 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/linux-journal.bib",
  URL =          "http://dl.acm.org/ft_gateway.cfm?id=2903198",
  acknowledgement = ack-nhfb,
  articleno =    "5",
  fjournal =     "Linux Journal",
  journal-URL =  "http://portal.acm.org/citation.cfm?id=J508",
}

@Article{Razaque:2016:TDP,
  author =       "Abdul Razaque and Syed S. Rizvi",
  title =        "Triangular data privacy-preserving model for
                 authenticating all key stakeholders in a cloud
                 environment",
  journal =      j-COMPUT-SECUR,
  volume =       "62",
  number =       "??",
  pages =        "328--347",
  month =        sep,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:46 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404816300979",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Book{Reardon:2016:SDD,
  author =       "Joel Reardon",
  title =        "Secure Data Deletion",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xvii + 203 + 32",
  year =         "2016",
  DOI =          "https://doi.org/10.1007/978-3-319-28778-2",
  ISBN =         "3-319-28778-8 (e-book), 3-319-28777-X",
  ISBN-13 =      "978-3-319-28778-2 (e-book), 978-3-319-28777-5",
  ISSN =         "1619-7100 (print), 2197-845X (electronic)",
  ISSN-L =       "1619-7100",
  LCCN =         "QA76.9.D3 R4223 2016",
  bibdate =      "Sat Jun 10 08:34:36 MDT 2017",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  series =       "Information security and cryptography",
  URL =          "http://www.springerlink.com/content/978-3-319-28778-2",
  abstract =     "This book is the first to develop a systematized
                 approach for the comparison and evaluation of secure
                 deletion solutions. The book focuses on novel secure
                 deletion solutions targeting specific real-world
                 environments where secure deletion is problematic:
                 mobile storage and remote storage. The author surveys
                 related work, organizes existing solutions in terms of
                 their interfaces, presents a taxonomy of adversaries
                 differing in their capabilities, and then builds a
                 system and adversarial model based on the survey of
                 related work. The book is useful for both academics,
                 researchers and graduate students, and for
                 practitioners who may integrate its results into
                 deployed systems.",
  acknowledgement = ack-nhfb,
  author-dates = "1983--",
  shorttableofcontents = "Part I. Introduction and background \\
                 Introduction \\
                 Related work on secure deletion \\
                 System model and security goal \\
                 Part II. Secure deletion for mobile storage \\
                 Flash memory: background and related work \\
                 User-level secure deletion on log-structured file
                 systems \\
                 Data node encrypted file system \\
                 UBIFSec: adding DNEFS to UBIFS \\
                 Part III. Secure deletion for remote storage \\
                 Cloud storage: background and related work \\
                 Secure data deletion from persistent media \\
                 B-tree-based secure deletion \\
                 Robust key management for secure data deletion \\
                 Part IV. Conclusions \\
                 Conclusion and future work",
  subject =      "Database management; Database security; Computer
                 security; Data encryption (Computer science); Computer
                 Hardware; Computer Science; Data Structures, Cryptology
                 and Information Theory; Electronics and
                 Microelectronics, Instrumentation; Security Science and
                 Technology; COMPUTERS; Desktop Applications; Databases;
                 General; System Administration; Storage and Retrieval;
                 Computer security; Data encryption (Computer science);
                 Database management; Database security.",
  tableofcontents = "Acknowledgments \\
                 Contents \\
                 Acronyms \\
                 Part I \\
                 Introduction and Background \\
                 1 Introduction \\
                 1.1 Organization and Structure \\
                 2 RelatedWork on Secure Deletion \\
                 2.1 Introduction \\
                 2.2 RelatedWork \\
                 2.2.1 Layers and Interfaces \\
                 2.2.2 Physical-Layer and Controller-Layer Sanitization
                 \\
                 2.2.3 User-Level Solutions \\
                 2.2.4 File-System-Level Solutions with In-Place Updates
                 \\
                 2.2.5 Cross-layer Solutions \\
                 2.2.6 Summary \\
                 2.3 Adversarial Model \\
                 2.3.1 Classes of Adversarial Capabilities \\
                 2.3.2 Summary \\
                 2.4 Analysis of Solutions \\
                 2.4.1 Classes of Environmental Assumptions \\
                 2.4.2 Classes of Behavioural Properties 2.4.3 Summary 3
                 System Model and Security Goal \\
                 3.1 Introduction \\
                 3.2 System Model \\
                 3.3 Storage Medium Models \\
                 3.4 Adversarial Model \\
                 3.5 Security Goal \\
                 Part II Secure Deletion for Mobile Storage \\
                 4 Flash Memory: Background and Related Work \\
                 4.1 Overview \\
                 4.2 Flash Memory \\
                 4.2.1 In-Place Updates and Log-Structured File Systems
                 \\
                 4.2.2 Flash Translation Layer \\
                 4.2.3 Flash File Systems \\
                 4.2.4 Generalizations to Other Media \\
                 4.3 RelatedWork for Flash Secure Deletion \\
                 4.4 Summary \\
                 5 User-Level Secure Deletion on Log-Structured File
                 Systems \\
                 5.1 Introduction \\
                 5.2 System and Adversarial Model 5.3 YAFFS 5.4 Data
                 Deletion in Existing Log-Structured File Systems \\
                 5.4.1 Instrumented YAFFS \\
                 5.4.2 Simulating Larger Storage Media \\
                 5.5 User-Space Secure Deletion \\
                 5.5.1 Purging \\
                 5.5.2 Ballooning \\
                 5.5.3 Hybrid Solution: Ballooning with Purging \\
                 5.6 Experimental Evaluation \\
                 5.6.1 Experimental Results \\
                 5.7 Summary \\
                 5.8 Research Questions \\
                 6 Data Node Encrypted File System \\
                 6.1 Introduction \\
                 6.2 System and Adversarial Model \\
                 6.3 DNEFS's Design \\
                 6.3.1 Key Storage Area \\
                 6.3.2 Keystore \\
                 6.3.3 Clocked Keystore Implementation \\
                 6.3.4 Clock Operation: KSA Update \\
                 6.3.5 Key-State Map \\
                 6.3.6 Summary 6.4 Extensions and Optimizations 6.4.1
                 Granularity Trade-off \\
                 6.4.2 KSA Update Policies \\
                 6.4.3 KSA Organization \\
                 6.4.4 Improving Reliability \\
                 6.4.5 Encrypted File System \\
                 6.5 Summary \\
                 6.6 Research Questions \\
                 7 UBIFSec: Adding DNEFS to UBIFS \\
                 7.1 Introduction \\
                 7.2 System and Adversarial Model \\
                 7.3 Background \\
                 7.3.1 MTD and UBI Layers \\
                 7.3.2 UBIFS \\
                 7.4 UBIFSec Design \\
                 7.4.1 Key Storage Area \\
                 7.4.2 Key-State Map \\
                 7.4.3 Summary \\
                 7.5 Experimental Validation \\
                 7.5.1 Android Implementation \\
                 7.5.2 Wear Analysis \\
                 7.5.3 Power Consumption \\
                 7.5.4 Throughput Analysis \\
                 7.5.5 Timing Analysis \\
                 7.6 Conclusions 7.7 Practitioner's Notes Part III
                 Secure Deletion for Remote Storage \\
                 8 Cloud Storage: Background and Related Work \\
                 8.1 Introduction \\
                 8.2 Persistent Storage \\
                 8.2.1 Securely Deleting and Persistent Combination \\
                 8.2.2 Cloud Storage \\
                 8.3 Related Work \\
                 8.4 Summary \\
                 9 Secure Data Deletion from Persistent Media \\
                 9.1 Introduction \\
                 9.2 System and Adversarial Model \\
                 9.3 Graph Theory Background \\
                 9.4 Graph-Theoretic Model of Key Disclosure \\
                 9.4.1 Key Disclosure Graph \\
                 9.4.2 Secure Deletion \\
                 9.5 Shadowing Graph Mutations \\
                 9.5.1 Mangrove Preservation \\
                 9.5.2 Shadowing Graph Mutation Chains",
  xxISSN =       "2197-845X",
}

@Article{Ren:2016:IBE,
  author =       "Yanli Ren and Ning Ding and Xinpeng Zhang and Haining
                 Lu and Dawu Gu",
  title =        "Identity-Based Encryption with Verifiable Outsourced
                 Revocation",
  journal =      j-COMP-J,
  volume =       "59",
  number =       "11",
  pages =        "1659--1668",
  month =        nov,
  year =         "2016",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxw029",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Fri Nov 4 09:11:48 MDT 2016",
  bibsource =    "http://comjnl.oxfordjournals.org/content/59/11.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/59/11/1659",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "July 13, 2016",
}

@Article{Rogaway:2016:POP,
  author =       "Phillip Rogaway",
  title =        "Practice-Oriented Provable Security and the Social
                 Construction of Cryptography",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "6",
  pages =        "10--17",
  month =        nov # "\slash " # dec,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Feb 25 10:03:53 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/06/msp2016060010-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
}

@Article{Saeed:2016:IID,
  author =       "Ahmed Saeed and Ali Ahmadinia and Abbas Javed and Hadi
                 Larijani",
  title =        "Intelligent Intrusion Detection in Low-Power {IoTs}",
  journal =      j-TOIT,
  volume =       "16",
  number =       "4",
  pages =        "27:1--27:??",
  month =        dec,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2990499",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Thu Dec 22 16:47:17 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Security and privacy of data are one of the prime
                 concerns in today's Internet of Things (IoT).
                 Conventional security techniques like signature-based
                 detection of malware and regular updates of a signature
                 database are not feasible solutions as they cannot
                 secure such systems effectively, having limited
                 resources. Programming languages permitting immediate
                 memory accesses through pointers often result in
                 applications having memory-related errors, which may
                 lead to unpredictable failures and security
                 vulnerabilities. Furthermore, energy efficient IoT
                 devices running on batteries cannot afford the
                 implementation of cryptography algorithms as such
                 techniques have significant impact on the system power
                 consumption. Therefore, in order to operate IoT in a
                 secure manner, the system must be able to detect and
                 prevent any kind of intrusions before the network
                 (i.e., sensor nodes and base station) is destabilised
                 by the attackers. In this article, we have presented an
                 intrusion detection and prevention mechanism by
                 implementing an intelligent security architecture using
                 random neural networks (RNNs). The application's source
                 code is also instrumented at compile time in order to
                 detect out-of-bound memory accesses. It is based on
                 creating tags, to be coupled with each memory
                 allocation and then placing additional tag checking
                 instructions for each access made to the memory. To
                 validate the feasibility of the proposed security
                 solution, it is implemented for an existing IoT system
                 and its functionality is practically demonstrated by
                 successfully detecting the presence of any suspicious
                 sensor node within the system operating range and
                 anomalous activity in the base station with an accuracy
                 of 97.23\%. Overall, the proposed security solution has
                 presented a minimal performance overhead.",
  acknowledgement = ack-nhfb,
  articleno =    "27",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Sakai:2016:CDN,
  author =       "Yusuke Sakai and Keita Emura and Jacob C. N. Schuldt
                 and Goichiro Hanaoka and Kazuo Ohta",
  title =        "Constructions of dynamic and non-dynamic threshold
                 public-key encryption schemes with decryption
                 consistency",
  journal =      j-THEOR-COMP-SCI,
  volume =       "630",
  number =       "??",
  pages =        "95--116",
  day =          "30",
  month =        may,
  year =         "2016",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Sat Apr 30 08:01:06 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2015.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0304397516300317",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975/",
}

@Article{Sakai:2016:NCS,
  author =       "K. Sakai and M. Sun and W. Ku and T. H. Lai",
  title =        "A Novel Coding Scheme for Secure Communications in
                 Distributed {RFID} Systems",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "65",
  number =       "2",
  pages =        "409--421",
  month =        feb,
  year =         "2016",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2015.2423671",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Tue Jan 19 07:06:51 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Saleh:2016:PED,
  author =       "Eyad Saleh and Ahmad Alsa'deh and Ahmad Kayed and
                 Christoph Meinel",
  title =        "Processing Over Encrypted Data: Between Theory and
                 Practice",
  journal =      j-SIGMOD,
  volume =       "45",
  number =       "3",
  pages =        "5--16",
  month =        sep,
  year =         "2016",
  CODEN =        "SRECD8",
  DOI =          "https://doi.org/10.1145/3022860.3022862",
  ISSN =         "0163-5808 (print), 1943-5835 (electronic)",
  ISSN-L =       "0163-5808",
  bibdate =      "Wed Dec 7 07:09:19 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigmod.bib",
  abstract =     "Data encryption is a common approach to protect the
                 confidentiality of users' data. However, when
                 computation is required, the data must be decrypted
                 before processing. The decryption-for-processing
                 approach causes critical threats. For instance, a
                 compromised server may lead to the leakage of data or
                 cryptographic keys. On the other hand, data owners are
                 concerned since the data is beyond their control. Thus,
                 they look for mechanisms to achieve strong data
                 protection. Accordingly, alternatives for protecting
                 data become essential. Consequently, the trend of
                 processing over encrypted data starts to arise along
                 with a rapidly growing literature. This paper surveys
                 applications, tools, building blocks, and approaches
                 that can be used to directly process encrypted data
                 (i.e., without decrypting it). The purpose of this
                 survey is to provide an overview of existing systems
                 and approaches that can be used to process encrypted
                 data, discuss commercial usage of such systems, and to
                 analyze the current developments in this area",
  acknowledgement = ack-nhfb,
  fjournal =     "SIGMOD Record (ACM Special Interest Group on
                 Management of Data)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J689",
}

@Article{Sanchez-Garcia:2016:SSA,
  author =       "J. S{\'a}nchez-Garc{\'\i}a and J. M.
                 Garc{\'\i}a-Campos and D. G. Reina and S. L. Toral and
                 F. Barrero",
  title =        "{On-siteDriverID}: a secure authentication scheme
                 based on {Spanish} {eID} cards for vehicular ad hoc
                 networks",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "64",
  number =       "??",
  pages =        "50--60",
  month =        nov,
  year =         "2016",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Wed Aug 24 08:13:41 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X16301121",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X/",
}

@Article{Savage:2016:NKP,
  author =       "Neil Savage",
  title =        "News: The key to privacy",
  journal =      j-CACM,
  volume =       "59",
  number =       "6",
  pages =        "12--14",
  month =        jun,
  year =         "2016",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2911979",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed May 25 17:07:29 MDT 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cacm2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://cacm.acm.org/magazines/2016/6/202654/fulltext",
  abstract =     "40 years ago, Whitfield Diffie and Martin E. Hellman
                 introduced the public key cryptography used to secure
                 today's online transactions.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Saxena:2016:API,
  author =       "Neetesh Saxena and Santiago Grijalva and Narendra S.
                 Chaudhari",
  title =        "Authentication Protocol for an {IoT}-Enabled {LTE}
                 Network",
  journal =      j-TOIT,
  volume =       "16",
  number =       "4",
  pages =        "25:1--25:??",
  month =        dec,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2981547",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Thu Dec 22 16:47:17 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "The Evolved Packet System-based Authentication and Key
                 Agreement (EPS-AKA) protocol of the long-term evolution
                 (LTE) network does not support Internet of Things (IoT)
                 objects and has several security limitations, including
                 transmission of the object's (user/device) identity and
                 key set identifier in plaintext over the network,
                 synchronization, large overhead, limited identity
                 privacy, and security attack vulnerabilities. In this
                 article, we propose a new secure and efficient AKA
                 protocol for the LTE network that supports secure and
                 efficient communications among various IoT devices as
                 well as among the users. Analysis shows that our
                 protocol is secure, efficient, and privacy preserved,
                 and reduces bandwidth consumption during
                 authentication.",
  acknowledgement = ack-nhfb,
  articleno =    "25",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Schneider:2016:DEE,
  author =       "D. Schneider",
  title =        "Don't expect encrypted e-mail in 2016",
  journal =      j-IEEE-SPECTRUM,
  volume =       "53",
  number =       "1",
  pages =        "42--43",
  month =        jan,
  year =         "2016",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.2016.7367464",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 07:02:09 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Companies; cryptography; e-mail message; Electronic
                 mail; electronic mail; Encryption; end-to-end
                 encryption; Google; information security; prototype
                 software; social networking (online); software
                 prototyping; Yahoo",
}

@Article{Schneider:2016:MSI,
  author =       "D. Schneider",
  title =        "\$100 million {SETI} initiative starts listening for
                 {E.T.}",
  journal =      j-IEEE-SPECTRUM,
  volume =       "53",
  number =       "1",
  pages =        "41--42",
  month =        jan,
  year =         "2016",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.2016.7367463",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 07:02:09 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Breakthrough Listen; Encryption; extraterrestrial
                 life; Extraterrestrial phenomena; Google; Investments;
                 Observatories; radio observations; radiosources
                 (astronomical); search for extraterrestrial
                 intelligence; SETI initiative; star system;
                 Telescopes",
}

@Article{Schneier:2016:CHT,
  author =       "Bruce Schneier",
  title =        "Cryptography Is Harder than It Looks",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "1",
  pages =        "87--88",
  month =        jan # "\slash " # feb,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Jun 8 08:40:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security {\&} Privacy",
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
}

@Article{Seo:2016:RHI,
  author =       "Jae Hong Seo and Keita Emura",
  title =        "Revocable hierarchical identity-based encryption via
                 history-free approach",
  journal =      j-THEOR-COMP-SCI,
  volume =       "615",
  number =       "??",
  pages =        "45--60",
  day =          "15",
  month =        feb,
  year =         "2016",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Sat Jan 9 12:26:44 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2015.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0304397515011354",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975/",
}

@Article{Serwadda:2016:TRR,
  author =       "Abdul Serwadda and Vir V. Phoha and Zibo Wang and
                 Rajesh Kumar and Diksha Shukla",
  title =        "Toward Robotic Robbery on the Touch Screen",
  journal =      j-TISSEC,
  volume =       "18",
  number =       "4",
  pages =        "14:1--14:??",
  month =        may,
  year =         "2016",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/2898353",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Sat May 21 08:19:26 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tissec.bib",
  abstract =     "Despite the tremendous amount of research fronting the
                 use of touch gestures as a mechanism of continuous
                 authentication on smart phones, very little research
                 has been conducted to evaluate how these systems could
                 behave if attacked by sophisticated adversaries. In
                 this article, we present two Lego-driven robotic
                 attacks on touch-based authentication: a population
                 statistics-driven attack and a user-tailored attack.
                 The population statistics-driven attack is based on
                 patterns gleaned from a large population of users,
                 whereas the user-tailored attack is launched based on
                 samples stolen from the victim. Both attacks are
                 launched by a Lego robot that is trained on how to
                 swipe on the touch screen. Using seven verification
                 algorithms and a large dataset of users, we show that
                 the attacks cause the system's mean false acceptance
                 rate (FAR) to increase by up to fivefold relative to
                 the mean FAR seen under the standard zero-effort
                 impostor attack. The article demonstrates the threat
                 that robots pose to touch-based authentication and
                 provides compelling evidence as to why the zero-effort
                 attack should cease to be used as the benchmark for
                 touch-based authentication systems.",
  acknowledgement = ack-nhfb,
  articleno =    "14",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@Article{Sethumadhavan:2016:HEP,
  author =       "Simha Sethumadhavan",
  title =        "Hardware-Enforced Privacy",
  journal =      j-COMPUTER,
  volume =       "49",
  number =       "10",
  pages =        "10",
  month =        oct,
  year =         "2016",
  CODEN =        "CPTRB4",
  DOI =          "https://doi.org/10.1109/MC.2016.318",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Tue Oct 25 06:11:19 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computer2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.computer.org/csdl/mags/co/2016/10/mco2016100010.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/cga",
}

@Article{Severance:2016:BSB,
  author =       "Charles Severance",
  title =        "{Bruce Schneier}: Building Cryptographic Systems",
  journal =      j-COMPUTER,
  volume =       "49",
  number =       "4",
  pages =        "13--15",
  month =        apr,
  year =         "2016",
  CODEN =        "CPTRB4",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Tue Apr 19 06:21:54 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computer2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.computer.org/csdl/mags/co/2016/04/mco2016040013.html",
  abstract-URL = "http://www.computer.org/csdl/mags/co/2016/04/mco2016040013-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
}

@Article{Shen:2016:RMM,
  author =       "Wuqiang Shen and Shaohua Tang",
  title =        "{RGB}, a Mixed Multivariate Signature Scheme",
  journal =      j-COMP-J,
  volume =       "59",
  number =       "4",
  pages =        "439--451",
  month =        apr,
  year =         "2016",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxv056",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Mar 28 10:52:39 MDT 2016",
  bibsource =    "http://comjnl.oxfordjournals.org/content/59/4.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/59/4/439",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "August 7, 2015",
}

@Article{Shivani:2016:PVC,
  author =       "Shivendra Shivani and Suneeta Agarwal",
  title =        "Progressive Visual Cryptography with Unexpanded
                 Meaningful Shares",
  journal =      j-TOMCCAP,
  volume =       "12",
  number =       "4",
  pages =        "50:1--50:??",
  month =        aug,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2935618",
  ISSN =         "1551-6857 (print), 1551-6865 (electronic)",
  ISSN-L =       "1551-6857",
  bibdate =      "Thu Aug 25 07:28:05 MDT 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tomccap/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tomccap.bib",
  abstract =     "The traditional $k$-out-of-$n$ Visual Cryptography
                 (VC) scheme is the conception of ``all or nothing'' for
                 $n$ participants to share a secret image. The original
                 secret image can be visually revealed only when a
                 subset of $k$ or more shares are superimposed together,
                 but if the number of stacked shares are less than $k$,
                 nothing will be revealed. On the other hand, a
                 Progressive Visual Cryptography (PVC) scheme differs
                 from the traditional VC with respect to decoding. In
                 PVC, clarity and contrast of the decoded secret image
                 will be increased progressively with the number of
                 stacked shares. Much of the existing state-of-the-art
                 research on PVC has problems with pixel expansion and
                 random pattern of the shares. In this article, a novel
                 scheme of progressive visual cryptography with four or
                 more number of unexpanded as well as meaningful shares
                 has been proposed. For this, a novel and efficient
                 Candidate Block Replacement preprocessing approach and
                 a basis matrix creation algorithm have also been
                 introduced. The proposed method also eliminates many
                 unnecessary encryption constraints like a predefined
                 codebook for encoding and decoding the secret image,
                 restriction on the number of participants, and so on.
                 From the experiments, it is observed that the
                 reconstruction probability of black pixels in the
                 decoded image corresponding to the black pixel in the
                 secret image is always 1, whereas that of white pixels
                 is 0.5 irrespective of the meaningful contents visible
                 in the shares, thus ensuring the value of contrast to
                 always be 50\%. Therefore, a reconstructed image can be
                 easily identified by a human visual system without any
                 computation.",
  acknowledgement = ack-nhfb,
  articleno =    "50",
  fjournal =     "ACM Transactions on Multimedia Computing,
                 Communications, and Applications",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J961",
}

@Article{Siad:2016:NFI,
  author =       "A. Siad and M. Amara",
  title =        "A new framework for implementing identity-based
                 cryptosystems",
  journal =      j-J-SYST-SOFTW,
  volume =       "118",
  number =       "??",
  pages =        "36--48",
  month =        aug,
  year =         "2016",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Thu Jun 9 06:36:58 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0164121216300346",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212/",
}

@Article{Sirer:2016:TPS,
  author =       "Emin G{\"u}n Sirer",
  title =        "Technical Perspective: The state (and security) of the
                 {Bitcoin} economy",
  journal =      j-CACM,
  volume =       "59",
  number =       "4",
  pages =        "85--85",
  month =        apr,
  year =         "2016",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2896382",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Apr 15 14:58:10 MDT 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cacm2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://cacm.acm.org/magazines/2016/4/200172/fulltext",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Book{Smart:2016:CMS,
  author =       "Nigel P. (Nigel Paul) Smart",
  title =        "Cryptography Made Simple",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xii + 481 + 119",
  year =         "2016",
  DOI =          "https://doi.org/10.1007/978-3-319-21936-3",
  ISBN =         "3-319-21935-9 (hardcover), 3-319-21936-7 (e-book)",
  ISBN-13 =      "978-3-319-21935-6 (hardcover), 978-3-319-21936-3
                 (e-book)",
  ISSN =         "1619-7100 (print), 2197-845X (electronic)",
  ISSN-L =       "1619-7100",
  LCCN =         "QA76.9.A25; QA76.9.D35 S63 2016",
  bibdate =      "Sat Jun 10 08:34:34 MDT 2017",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  series =       "Information Security and Cryptography",
  URL =          "http://link.springer.com/10.1007/978-3-319-21936-3",
  abstract =     "In this introductory textbook the author explains the
                 key topics in cryptography. He takes a modern approach,
                 where defining what is meant by ``secure'' is as
                 important as creating something that achieves that
                 goal, and security definitions are central to the
                 discussion throughout. The chapters in Part 1 offer a
                 brief introduction to the mathematical foundations:
                 modular arithmetic, groups, finite fields, and
                 probability; primality testing and factoring; discrete
                 logarithms; elliptic curves; and lattices. Part 2 of
                 the book shows how historical ciphers were broken, thus
                 motivating the design of modern cryptosystems since the
                 1960s; this part also includes a chapter on
                 information-theoretic security. Part 3 covers the core
                 aspects of modern cryptography: the definition of
                 security; modern stream ciphers; block ciphers and
                 modes of operation; hash functions, message
                 authentication codes, and key derivation functions; the
                 ``naive'' RSA algorithm; public key encryption and
                 signature algorithms; cryptography based on
                 computational complexity; and certificates, key
                 transport and key agreement. Finally, Part 4 addresses
                 advanced protocols, where the parties may have
                 different or even conflicting security goals: secret
                 sharing schemes; commitments and oblivious transfer;
                 zero-knowledge proofs; and secure multi-party
                 computation. The author balances a largely non-rigorous
                 style -- many proofs are sketched only -- with
                 appropriate formality and depth. For example, he uses
                 the terminology of groups and finite fields so that the
                 reader can understand both the latest academic research
                 and ``real-world'' documents such as application
                 programming interface descriptions and cryptographic
                 standards. The text employs colour to distinguish
                 between public and private information, and all
                 chapters include summaries and suggestions for further
                 reading. This is a suitable textbook for advanced
                 undergraduate and graduate students in computer
                 science, mathematics and engineering, and for
                 self-study by professionals in information security.
                 While the appendix summarizes most of the basic algebra
                 and notation required, it is assumed that the reader
                 has a basic knowledge of discrete mathematics,
                 probability, and elementary calculus..",
  acknowledgement = ack-nhfb,
  author-dates = "1967--",
  subject =      "Computer science; Data structures (Computer science);
                 Mathematics; System safety; Data Structures, Cryptology
                 and Information Theory; Mathematics of Computing;
                 Security Science and Technology; Discrete Mathematics;
                 Computer science; Mathematics; Data structures
                 (Computer science); System safety.",
  tableofcontents = "Modular Arithmetic, Groups, Finite Fields and
                 Probability \\
                 Elliptic Curves \\
                 Historical Ciphers \\
                 The Enigma Machine \\
                 Information Theoretic Security \\
                 Historical Stream Ciphers \\
                 Modern Stream Ciphers \\
                 Block Ciphers \\
                 Symmetric Key Distribution \\
                 Hash Functions and Message Authentication Codes \\
                 Basic Public Key Encryption Algorithms \\
                 Primality Testing and Factoring \\
                 Discrete Logarithms \\
                 Key Exchange and Signature Schemes \\
                 Implementation Issues \\
                 Obtaining Authentic Public Keys \\
                 Attacks on Public Key Schemes \\
                 Definitions of Security \\
                 Complexity Theoretic Approaches \\
                 Provable Security: With Random Oracles \\
                 Hybrid Encryption \\
                 Provable Security: Without Random Oracles \\
                 Secret Sharing Schemes \\
                 Commitments and Oblivious Transfer \\
                 Zero-Knowledge Proofs \\
                 Secure Multiparty Computation",
}

@Article{Sodsong:2016:DPB,
  author =       "Wasuwee Sodsong and Jingun Hong and Seongwook Chung
                 and Yeongkyu Lim and Shin-Dug Kim and Bernd
                 Burgstaller",
  title =        "Dynamic partitioning-based {JPEG} decompression on
                 heterogeneous multicore architectures",
  journal =      j-CCPE,
  volume =       "28",
  number =       "2",
  pages =        "517--536",
  month =        feb,
  year =         "2016",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.3620",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Tue Feb 9 06:13:21 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/datacompression.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "14 Aug 2015",
}

@Article{Song:2016:IAR,
  author =       "Yang Song and Arun Venkataramani and Lixin Gao",
  title =        "Identifying and Addressing Reachability and Policy
                 Attacks in {``Secure'' BGP}",
  journal =      j-IEEE-TRANS-NETWORKING,
  volume =       "24",
  number =       "5",
  pages =        "2969--2982",
  month =        oct,
  year =         "2016",
  CODEN =        "IEANEP",
  DOI =          "https://doi.org/10.1109/TNET.2015.2503642",
  ISSN =         "1063-6692 (print), 1558-2566 (electronic)",
  ISSN-L =       "1063-6692",
  bibdate =      "Sat Jan 21 07:15:39 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
  abstract =     "BGP is known to have many security vulnerabilities due
                 to the very nature of its underlying assumptions of
                 trust among independently operated networks. Most prior
                 efforts have focused on attacks that can be addressed
                 using traditional cryptographic techniques to ensure
                 authentication or integrity, e.g., BGPSec and related
                 works. Although augmenting BGP with authentication and
                 integrity mechanisms is critical, they are, by design,
                 far from sufficient to prevent attacks based on
                 manipulating the complex BGP protocol itself. In this
                 paper, we identify two serious attacks on two of the
                 most fundamental goals of BGP --- to ensure
                 reachability and to enable ASes to pick routes
                 available to them according to their routing policies
                 --- even in the presence of BGPSec-like mechanisms. Our
                 key contributions are to 1 formalize a series of
                 critical security properties, 2 experimentally validate
                 using commodity router implementations that BGP fails
                 to achieve those properties, 3 quantify the extent of
                 these vulnerabilities in the Internet's AS topology,
                 and 4 propose simple modifications to provably ensure
                 that those properties are satisfied. Our experiments
                 show that, using our attacks, a single malicious AS can
                 cause thousands of other ASes to become disconnected
                 from thousands of other ASes for arbitrarily long,
                 while our suggested modifications almost completely
                 eliminate such attacks.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE\slash ACM Transactions on Networking",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J771",
}

@Article{Song:2016:IBS,
  author =       "Lingwei Song and Jinxia Wei and Licheng Wang and
                 Chenlei Cao and Xinxin Niu",
  title =        "Identity-based storage management and integrity verify
                 protocol for secure outsourcing in multi-cloud",
  journal =      j-CCPE,
  volume =       "28",
  number =       "6",
  pages =        "1930--1945",
  day =          "25",
  month =        apr,
  year =         "2016",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.3662",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Wed Jun 8 06:47:19 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
}

@Article{Spafford:2016:SE,
  author =       "Eugene H. Spafford",
  title =        "The strength of encryption",
  journal =      j-CACM,
  volume =       "59",
  number =       "3",
  pages =        "5--5",
  month =        mar,
  year =         "2016",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2889284",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Feb 29 14:09:08 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://cacm.acm.org/magazines/2016/3/198867/fulltext",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Strizhov:2016:SPS,
  author =       "Mikhail Strizhov and Zachary Osman and Indrajit Ray",
  title =        "Substring Position Search over Encrypted Cloud Data
                 Supporting Efficient Multi-User Setup",
  journal =      j-FUTURE-INTERNET,
  volume =       "8",
  number =       "3",
  pages =        "28",
  day =          "04",
  month =        jul,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi8030028",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:55 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/8/3/28",
  abstract =     "Existing Searchable Encryption (SE) solutions are able
                 to handle simple Boolean search queries, such as single
                 or multi-keyword queries, but cannot handle substring
                 search queries over encrypted data that also involve
                 identifying the position of the substring within the
                 document. These types of queries are relevant in areas
                 such as searching DNA data. In this paper, we propose a
                 tree-based Substring Position Searchable Symmetric
                 Encryption (SSP-SSE) to overcome the existing gap. Our
                 solution efficiently finds occurrences of a given
                 substring over encrypted cloud data. Specifically, our
                 construction uses the position heap tree data structure
                 and achieves asymptotic efficiency comparable to that
                 of an unencrypted position heap tree. Our encryption
                 takes O (k n) time, and the resulting ciphertext is of
                 size O (k n), where k is a security parameter and n is
                 the size of stored data. The search takes O (m 2 + o c
                 c) time and three rounds of communication, where m is
                 the length of the queried substring and o c c is the
                 number of occurrences of the substring in the document
                 collection. We prove that the proposed scheme is secure
                 against chosen-query attacks that involve an adaptive
                 adversary. Finally, we extend SSP-SSE to the multi-user
                 setting where an arbitrary group of cloud users can
                 submit substring queries to search the encrypted
                 data.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Security in Cloud Computing and Big
                 Data.",
}

@Article{Su:2016:PSN,
  author =       "Shenghui Su and Tao Xie and Shuwang L{\"u}",
  title =        "A provably secure non-iterative hash function
                 resisting birthday attack",
  journal =      j-THEOR-COMP-SCI,
  volume =       "654",
  number =       "??",
  pages =        "128--142",
  day =          "22",
  month =        nov,
  year =         "2016",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Wed Nov 23 16:45:19 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2015.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0304397516001547",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975/",
}

@Article{Su:2016:SSP,
  author =       "Shenghui Su and Shuwang L{\"u} and Maozhi Xu and Tao
                 Xie",
  title =        "A semantically secure public key cryptoscheme using
                 bit-pair shadows",
  journal =      j-THEOR-COMP-SCI,
  volume =       "654",
  number =       "??",
  pages =        "113--127",
  day =          "22",
  month =        nov,
  year =         "2016",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Wed Nov 23 16:45:19 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2015.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0304397516300561",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975/",
}

@Article{Sucasas:2016:APP,
  author =       "Victor Sucasas and Georgios Mantas and Firooz B.
                 Saghezchi and Ayman Radwan and Jonathan Rodriguez",
  title =        "An autonomous privacy-preserving authentication scheme
                 for intelligent transportation systems",
  journal =      j-COMPUT-SECUR,
  volume =       "60",
  number =       "??",
  pages =        "193--205",
  month =        jul,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:46 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404816300463",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Sun:2016:NEB,
  author =       "Shuliang Sun",
  title =        "A novel edge based image steganography with $ 2^k $
                 correction and {Huffman} encoding",
  journal =      j-INFO-PROC-LETT,
  volume =       "116",
  number =       "2",
  pages =        "93--99",
  month =        feb,
  year =         "2016",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Sat Nov 28 07:11:23 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019015001738",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190/",
}

@Article{Sun:2016:RSP,
  author =       "Shi-Feng Sun and Joseph K. Liu and Yu Yu and Baodong
                 Qin and Dawu Gu",
  title =        "{RKA}-Secure Public Key Encryptions Against
                 Efficiently Invertible Functions",
  journal =      j-COMP-J,
  volume =       "59",
  number =       "11",
  pages =        "1637--1658",
  month =        nov,
  year =         "2016",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxw025",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Fri Nov 4 09:11:48 MDT 2016",
  bibsource =    "http://comjnl.oxfordjournals.org/content/59/11.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/59/11/1637",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "August 18, 2016",
}

@Article{Sun:2016:TCA,
  author =       "Yanming Sun and Min Chen and Abel Bacchus and Xiaodong
                 Lin",
  title =        "Towards collusion-attack-resilient group key
                 management using one-way function tree",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "104",
  number =       "??",
  pages =        "16--26",
  day =          "20",
  month =        jul,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Fri Jun 3 11:42:22 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1389128616301128",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286/",
}

@Article{Susilo:2016:EDT,
  author =       "Willy Susilo and Fuchun Guo and Yi Mu",
  title =        "Efficient dynamic threshold identity-based encryption
                 with constant-size ciphertext",
  journal =      j-THEOR-COMP-SCI,
  volume =       "609 (part 1)",
  number =       "??",
  pages =        "49--59",
  day =          "4",
  month =        jan,
  year =         "2016",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Fri Dec 4 06:41:42 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2015.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0304397515008087",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975/",
}

@Article{Tan:2016:BIB,
  author =       "Chik How Tan and Theo Fanuela Prabowo and Duc-Phong
                 Le",
  title =        "Breaking an {ID}-based encryption based on discrete
                 logarithm and factorization problems",
  journal =      j-INFO-PROC-LETT,
  volume =       "116",
  number =       "2",
  pages =        "116--119",
  month =        feb,
  year =         "2016",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Sat Nov 28 07:11:23 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019015001696",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190/",
}

@Article{Tan:2016:CCA,
  author =       "Syh-Yuan Tan and Wun-She Yap",
  title =        "Cryptanalysis of a {CP--ABE} scheme with policy in
                 normal forms",
  journal =      j-INFO-PROC-LETT,
  volume =       "116",
  number =       "7",
  pages =        "492--495",
  month =        jul,
  year =         "2016",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Tue Apr 5 08:01:06 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019016300126",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190/",
}

@Article{Tan:2016:ESE,
  author =       "Jingweijia Tan and Zhi Li and Mingsong Chen and Xin
                 Fu",
  title =        "Exploring Soft-Error Robust and Energy-Efficient
                 Register File in {GPGPUs} using Resistive Memory",
  journal =      j-TODAES,
  volume =       "21",
  number =       "2",
  pages =        "34:1--34:??",
  month =        jan,
  year =         "2016",
  CODEN =        "ATASFO",
  DOI =          "https://doi.org/10.1145/2827697",
  ISSN =         "1084-4309 (print), 1557-7309 (electronic)",
  ISSN-L =       "1084-4309",
  bibdate =      "Sat Feb 6 07:43:40 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/todaes/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/todaes.bib",
  abstract =     "The increasing adoption of graphics processing units
                 (GPUs) for high-performance computing raises the
                 reliability challenge, which is generally ignored in
                 traditional GPUs. GPUs usually support thousands of
                 parallel threads and require a sizable register file.
                 Such large register file is highly susceptible to soft
                 errors and power-hungry. Although ECC has been adopted
                 to register file in modern GPUs, it causes considerable
                 power overhead, which further increases the power
                 stress. Thus, an energy-efficient soft-error protection
                 mechanism is more desirable. Besides its extremely low
                 leakage power consumption, resistive memory (e.g.,
                 spin-transfer torque RAM) is also immune to the
                 radiation induced soft errors due to its magnetic field
                 based storage. In this article, we propose to LEverage
                 reSistive memory to enhance the Soft-error robustness
                 and reduce the power consumption (LESS) of registers in
                 the General-Purpose computing on GPUs (GPGPUs). Since
                 resistive memory experiences longer write latency
                 compared to SRAM, we explore the unique characteristics
                 of GPGPU applications to obtain the win-win gains:
                 achieving the near-full soft-error protection for the
                 register file, and meanwhile substantially reducing the
                 energy consumption with negligible performance
                 degradation. Our experimental results show that LESS is
                 able to mitigate the registers soft-error vulnerability
                 by 86\% and achieve 61\% energy savings with negligible
                 (e.g., 1\%) performance degradation.",
  acknowledgement = ack-nhfb,
  articleno =    "34",
  fjournal =     "ACM Transactions on Design Automation of Electronic
                 Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J776",
}

@Article{Teh:2016:STD,
  author =       "Pin Shen Teh and Ning Zhang and Andrew Beng Jin Teoh
                 and Ke Chen",
  title =        "A survey on touch dynamics authentication in mobile
                 devices",
  journal =      j-COMPUT-SECUR,
  volume =       "59",
  number =       "??",
  pages =        "210--235",
  month =        jun,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:45 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404816300256",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Tezcan:2016:IID,
  author =       "Cihangir Tezcan and Ali Aydin Sel{\c{c}}uk",
  title =        "Improved improbable differential attacks on {ISO}
                 standard {CLEFIA}: Expansion technique revisited",
  journal =      j-INFO-PROC-LETT,
  volume =       "116",
  number =       "2",
  pages =        "136--143",
  month =        feb,
  year =         "2016",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Sat Nov 28 07:11:23 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019015001659",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190/",
}

@Article{Theofanos:2016:SUE,
  author =       "Mary Theofanos and Simson Garfinkel and Yee-Yin
                 Choong",
  title =        "Secure and Usable Enterprise Authentication: Lessons
                 from the Field",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "5",
  pages =        "14--21",
  month =        sep # "\slash " # oct,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 08:21:29 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/05/msp2016050014-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
}

@Article{Tian:2016:IBS,
  author =       "Miaomiao Tian and Liusheng Huang",
  title =        "Identity-based Signatures from Lattices: Simpler,
                 Faster, Shorter",
  journal =      j-FUND-INFO,
  volume =       "145",
  number =       "2",
  pages =        "171--187",
  month =        "????",
  year =         "2016",
  CODEN =        "FUMAAJ",
  DOI =          "https://doi.org/10.3233/FI-2016-1353",
  ISSN =         "0169-2968 (print), 1875-8681 (electronic)",
  ISSN-L =       "0169-2968",
  bibdate =      "Thu Sep 29 07:10:36 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/fundinfo2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Fundamenta Informaticae",
  journal-URL =  "http://content.iospress.com/journals/fundamenta-informaticae",
}

@Article{Tolba:2016:GMA,
  author =       "Mohamed Tolba and Amr M. Youssef",
  title =        "Generalized {MitM} attacks on full {TWINE}",
  journal =      j-INFO-PROC-LETT,
  volume =       "116",
  number =       "2",
  pages =        "128--135",
  month =        feb,
  year =         "2016",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Sat Nov 28 07:11:23 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019015001660",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190/",
}

@Article{Tomb:2016:AVR,
  author =       "Aaron Tomb",
  title =        "Automated Verification of Real-World Cryptographic
                 Implementations",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "6",
  pages =        "26--33",
  month =        nov # "\slash " # dec,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Feb 25 10:03:53 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/06/msp2016060026-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
}

@Article{Trost:2016:OPC,
  author =       "William R. Trost and Guangwu Xu",
  title =        "On the Optimal Pre-Computation of Window {NAF} for
                 {Koblitz} Curves",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "65",
  number =       "9",
  pages =        "2918--2924",
  month =        sep,
  year =         "2016",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2015.2493517",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Wed Aug 10 09:04:52 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Tschorsch:2016:BBT,
  author =       "F. Tschorsch and B. Scheuermann",
  title =        "{Bitcoin} and Beyond: A Technical Survey on
                 Decentralized Digital Currencies",
  journal =      "IEEE Communications Surveys Tutorials",
  volume =       "18",
  number =       "3",
  pages =        "2084--2123",
  month =        "Third Quarter",
  year =         "2016",
  DOI =          "https://doi.org/10.1109/COMST.2016.2535718",
  ISSN =         "1553-877X",
  ISSN-L =       "1553-877X",
  bibdate =      "Thu Nov 30 15:24:52 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Altcoins; billion dollar economy; blockchain;
                 Contracts; cryptocurrencies; Cryptography;
                 decentralized digital currency; design space
                 exploration; digital currencies; distributed consensus;
                 electronic money; Internet; Online banking; Protocols;
                 Space exploration; survey; tutorial; Tutorials;
                 {Bitcoin}; {Bitcoin} protocol",
}

@Article{vanVredendaal:2016:RMM,
  author =       "Christine van Vredendaal",
  title =        "Reduced memory meet-in-the-middle attack against the
                 {NTRU} private key",
  journal =      j-LMS-J-COMPUT-MATH,
  volume =       "19",
  number =       "A",
  pages =        "43--57",
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1112/S1461157016000206",
  ISSN =         "1461-1570",
  bibdate =      "Fri Mar 31 08:49:52 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lms-j-comput-math.bib",
  URL =          "https://www.cambridge.org/core/product/2FD6898DA25DD88B007F12A56421BA73",
  acknowledgement = ack-nhfb,
  ajournal =     "LMS J. Comput. Math.",
  fjournal =     "LMS Journal of Computation and Mathematics",
  journal-URL =  "http://journals.cambridge.org/action/displayJournal?jid=JCM",
  onlinedate =   "26 August 2016",
}

@Article{Vassilev:2016:ESU,
  author =       "Apostol Vassilev and Robert Staples",
  title =        "Entropy as a Service: Unlocking Cryptography's Full
                 Potential",
  journal =      j-COMPUTER,
  volume =       "49",
  number =       "9",
  pages =        "98--102",
  month =        sep,
  year =         "2016",
  CODEN =        "CPTRB4",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Tue Oct 25 06:11:19 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computer2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.computer.org/csdl/mags/co/2016/09/mco2016090098-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/cga",
}

@Article{Vatajelu:2016:SMB,
  author =       "Elena Ioana Vatajelu and Giorgio {Di Natale} and Mario
                 Barbareschi and Lionel Torres and Marco Indaco and
                 Paolo Prinetto",
  title =        "{STT--MRAM}-Based {PUF} Architecture Exploiting
                 Magnetic Tunnel Junction Fabrication-Induced
                 Variability",
  journal =      j-JETC,
  volume =       "13",
  number =       "1",
  pages =        "5:1--5:??",
  month =        dec,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2790302",
  ISSN =         "1550-4832",
  bibdate =      "Sat Apr 8 10:16:07 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jetc.bib",
  abstract =     "Physically Unclonable Functions (PUFs) are emerging
                 cryptographic primitives used to implement low-cost
                 device authentication and secure secret key generation.
                 Weak PUF's (i.e., devices able to generate a single
                 signature or to deal with a limited number of
                 challenges) are widely discussed in literature. One of
                 the most investigated solutions today is based on
                 SRAMs. However, the rapid development of low-power,
                 high-density, high-performance SoCs has pushed the
                 embedded memories to their limits and opened the field
                 to the development of emerging memory technologies. The
                 Spin-Transfer-Torque Magnetic Random Access Memory
                 (STT-MRAM) has emerged as a promising choice for
                 embedded memories due to its reduced read/write latency
                 and high CMOS integration capability. In this article,
                 we propose an innovative PUF design based on STT-MRAM
                 memory. We exploit the high variability affecting the
                 electrical resistance of the Magnetic Tunnel Junction
                 (MTJ) device in anti-parallel magnetization. We will
                 demonstrate that the proposed solution is robust,
                 unclonable, and unpredictable.",
  acknowledgement = ack-nhfb,
  articleno =    "5",
  fjournal =     "ACM Journal on Emerging Technologies in Computing
                 Systems (JETC)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J967",
}

@Article{Veloudis:2016:NPH,
  author =       "Simeon Veloudis and Nimal Nissanke",
  title =        "A Novel Permission Hierarchy for {RBAC} for Dealing
                 with {SoD} in {MAC} Models",
  journal =      j-COMP-J,
  volume =       "59",
  number =       "4",
  pages =        "462--492",
  month =        apr,
  year =         "2016",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxv060",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Mar 28 10:52:39 MDT 2016",
  bibsource =    "http://comjnl.oxfordjournals.org/content/59/4.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/59/4/462",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "August 25, 2015",
}

@Article{Venkataramani:2016:DHC,
  author =       "Guru Venkataramani and Jie Chen and Milos
                 Doroslovacki",
  title =        "Detecting Hardware Covert Timing Channels",
  journal =      j-IEEE-MICRO,
  volume =       "36",
  number =       "5",
  pages =        "17--27",
  month =        sep # "\slash " # oct,
  year =         "2016",
  CODEN =        "IEMIDZ",
  ISSN =         "0272-1732 (print), 1937-4143 (electronic)",
  ISSN-L =       "0272-1732",
  bibdate =      "Tue Nov 1 14:24:13 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeemicro.bib",
  URL =          "https://www.computer.org/csdl/mags/mi/2016/05/mmi2016050017-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://www.computer.org/csdl/mags/mi/index.html",
}

@Article{Wagner:2016:TPF,
  author =       "David Wagner",
  title =        "Technical Perspective: Fairness and the coin flip",
  journal =      j-CACM,
  volume =       "59",
  number =       "4",
  pages =        "75--75",
  month =        apr,
  year =         "2016",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2898429",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Apr 15 14:58:10 MDT 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cacm2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://cacm.acm.org/magazines/2016/4/200173/fulltext",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Wang:2016:DRS,
  author =       "Zhen Wang and Mark Karpovsky and Lake Bu",
  title =        "Design of Reliable and Secure Devices Realizing
                 {Shamir}'s Secret Sharing",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "65",
  number =       "8",
  pages =        "2443--2455",
  month =        "????",
  year =         "2016",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2015.2485220",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Mon Jul 11 18:58:52 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers -",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Wang:2016:LLE,
  author =       "Mingzhong Wang and Dan Liu and Liehuang Zhu and
                 Yongjun Xu and Fei Wang",
  title =        "{LESPP}: lightweight and efficient strong privacy
                 preserving authentication scheme for secure {VANET}
                 communication",
  journal =      j-COMPUTING,
  volume =       "98",
  number =       "7",
  pages =        "685--708",
  month =        jul,
  year =         "2016",
  CODEN =        "CMPTA2",
  DOI =          "https://doi.org/10.1007/s00607-014-0393-x",
  ISSN =         "0010-485X (print), 1436-5057 (electronic)",
  ISSN-L =       "0010-485X",
  bibdate =      "Fri Feb 9 14:54:05 MST 2018",
  bibsource =    "http://link.springer.com/journal/607/98/7;
                 https://www.math.utah.edu/pub/tex/bib/computing.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computing",
  journal-URL =  "http://link.springer.com/journal/607",
}

@Article{Wang:2016:SAP,
  author =       "Minqian Wang and Zhenfeng Zhang and Cheng Chen",
  title =        "Security analysis of a privacy-preserving
                 decentralized ciphertext-policy attribute-based
                 encryption scheme",
  journal =      j-CCPE,
  volume =       "28",
  number =       "4",
  pages =        "1237--1245",
  day =          "25",
  month =        mar,
  year =         "2016",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.3623",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Sun Apr 3 12:34:13 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "18 Aug 2015",
}

@Article{Wang:2016:SEP,
  author =       "Xinlei Wang and Amit Pande and Jindan Zhu and Prasant
                 Mohapatra",
  title =        "{STAMP}: Enabling Privacy-Preserving Location Proofs
                 for Mobile Users",
  journal =      j-IEEE-TRANS-NETWORKING,
  volume =       "24",
  number =       "6",
  pages =        "3276--3289",
  month =        dec,
  year =         "2016",
  CODEN =        "IEANEP",
  DOI =          "https://doi.org/10.1109/TNET.2016.2515119",
  ISSN =         "1063-6692 (print), 1558-2566 (electronic)",
  ISSN-L =       "1063-6692",
  bibdate =      "Sat Jan 21 07:15:40 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
  abstract =     "Location-based services are quickly becoming immensely
                 popular. In addition to services based on users'
                 current location, many potential services rely on
                 users' location history, or their spatial-temporal
                 provenance. Malicious users may lie about their
                 spatial-temporal provenance without a carefully
                 designed security system for users to prove their past
                 locations. In this paper, we present the
                 Spatial-Temporal provenance Assurance with Mutual
                 Proofs STAMP scheme. STAMP is designed for ad-hoc
                 mobile users generating location proofs for each other
                 in a distributed setting. However, it can easily
                 accommodate trusted mobile users and wireless access
                 points. STAMP ensures the integrity and
                 non-transferability of the location proofs and protects
                 users' privacy. A semi-trusted Certification Authority
                 is used to distribute cryptographic keys as well as
                 guard users against collusion by a light-weight
                 entropy-based trust evaluation approach. Our prototype
                 implementation on the Android platform shows that STAMP
                 is low-cost in terms of computational and storage
                 resources. Extensive simulation experiments show that
                 our entropy-based trust model is able to achieve high $
                 > 0.9 $ collusion detection accuracy.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE\slash ACM Transactions on Networking",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J771",
}

@Article{Wang:2016:SHI,
  author =       "Wei Wang and Peng Xu and Hui Li and Laurence Tianruo
                 Yang",
  title =        "Secure hybrid-indexed search for high efficiency over
                 keyword searchable ciphertexts",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "55",
  number =       "??",
  pages =        "353--361",
  month =        feb,
  year =         "2016",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Fri Dec 4 07:08:16 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X14001484",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X/",
}

@Article{Wang:2016:SSS,
  author =       "Xianfang Wang and Jian Gao and Fang-Wei Fu",
  title =        "Secret Sharing Schemes from Linear Codes over {$ F_p +
                 \nu F_p $}",
  journal =      j-INT-J-FOUND-COMP-SCI,
  volume =       "27",
  number =       "5",
  pages =        "595--??",
  month =        aug,
  year =         "2016",
  CODEN =        "IFCSEN",
  DOI =          "https://doi.org/10.1142/S0129054116500180",
  ISSN =         "0129-0541",
  ISSN-L =       "0129-0541",
  bibdate =      "Mon Oct 3 08:23:43 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijfcs.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Foundations of Computer
                 Science (IJFCS)",
  journal-URL =  "http://www.worldscientific.com/loi/ijfcs",
}

@Article{Wei:2016:APS,
  author =       "Jiannan Wei and Guomin Yang and Yi Mu and Kaitai
                 Liang",
  title =        "Anonymous Proxy Signature with Hierarchical
                 Traceability",
  journal =      j-COMP-J,
  volume =       "59",
  number =       "4",
  pages =        "559--569",
  month =        apr,
  year =         "2016",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxv080",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Mar 28 10:52:39 MDT 2016",
  bibsource =    "http://comjnl.oxfordjournals.org/content/59/4.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/59/4/559",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "September 28, 2015",
}

@Article{Wei:2016:PAB,
  author =       "Jianghong Wei and Xinyi Huang and Wenfen Liu and
                 Xuexian Hu",
  title =        "Practical Attribute-based Signature: Traceability and
                 Revocability",
  journal =      j-COMP-J,
  volume =       "59",
  number =       "11",
  pages =        "1714--1734",
  month =        nov,
  year =         "2016",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxw045",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Fri Nov 4 09:11:48 MDT 2016",
  bibsource =    "http://comjnl.oxfordjournals.org/content/59/11.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/59/11/1714",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "July 29, 2016",
}

@Article{Wess:2016:JWM,
  author =       "Jane Wess",
  title =        "{John Wallis} (1616--1703). {Mathematics}, Music
                 Theory, and Cryptography in 17th Century {Oxford}.
                 {Oxford University Mathematical Institute, 9 June
                 2016}",
  journal =      j-BSHM-BULL,
  volume =       "31",
  number =       "3",
  pages =        "252--253",
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1080/17498430.2016.1215868",
  ISSN =         "1749-8430 (print), 1749-8341 (electronic)",
  ISSN-L =       "1749-8341",
  bibdate =      "Tue Jun 20 11:40:34 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bshm.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.tandfonline.com/doi/full/10.1080/17498430.2016.1215868",
  acknowledgement = ack-nhfb,
  ajournal =     "BSHM Bull.",
  fjournal =     "BSHM Bulletin: Journal of the British Society for the
                 History of Mathematics",
  journal-URL =  "http://www.tandfonline.com/loi/tbsh20",
  onlinedate =   "31 Oct 2016",
}

@Article{Won:2016:PAA,
  author =       "Jongho Won and Chris Y. T. Ma and David K. Y. Yau and
                 Nageswara S. V. Rao",
  title =        "Privacy-assured aggregation protocol for smart
                 metering: a proactive fault-tolerant approach",
  journal =      j-IEEE-TRANS-NETWORKING,
  volume =       "24",
  number =       "3",
  pages =        "1661--1674",
  month =        jun,
  year =         "2016",
  CODEN =        "IEANEP",
  ISSN =         "1063-6692 (print), 1558-2566 (electronic)",
  ISSN-L =       "1063-6692",
  bibdate =      "Fri Sep 9 11:16:43 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
  abstract =     "Smart meters are integral to demand response in
                 emerging smart grids, by reporting the electricity
                 consumption of users to serve application needs. But
                 reporting real-time usage information for individual
                 households raises privacy concerns. Existing techniques
                 to guarantee differential privacy (DP) of smart meter
                 users either are not fault tolerant or achieve
                 (possibly partial) fault tolerance at high
                 communication overheads. In this paper, we propose a
                 fault-tolerant protocol for smart metering that can
                 handle general communication failures while ensuring DP
                 with significantly improved efficiency and lower errors
                 compared with the state of the art. Our protocol
                 handles fail-stop faults proactively by using a novel
                 design of future ciphertexts, and distributes trust
                 among the smart meters by sharing secret keys among
                 them. We prove the DP properties of our protocol and
                 analyze its advantages in fault tolerance, accuracy,
                 and communication efficiency relative to competing
                 techniques. We illustrate our analysis by simulations
                 driven by real-world traces of electricity
                 consumption.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE\slash ACM Transactions on Networking",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J771",
}

@Article{Wu:2016:BPK,
  author =       "Qianhong Wu and Yang Sun and Bo Qin and Jiankun Hu and
                 Weiran Liu and Jianwei Liu and Yong Ding",
  title =        "Batch Public Key Cryptosystem with batch
                 multi-exponentiation",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "62",
  number =       "??",
  pages =        "196--204",
  month =        sep,
  year =         "2016",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Tue May 31 08:45:28 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X15003933",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X/",
}

@Article{Wu:2016:CBE,
  author =       "Q. Wu and B. Qin and L. Zhang and J. Domingo-Ferrer
                 and O. Farras and J. A. Manjon",
  title =        "Contributory Broadcast Encryption with Efficient
                 Encryption and Short Ciphertexts",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "65",
  number =       "2",
  pages =        "466--479",
  month =        "????",
  year =         "2016",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2015.2419662",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Tue Jan 19 07:06:51 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Wu:2016:LTN,
  author =       "Felix Wu",
  title =        "Law and Technology: No easy answers in the fight over
                 {iPhone} decryption",
  journal =      j-CACM,
  volume =       "59",
  number =       "9",
  pages =        "20--22",
  month =        sep,
  year =         "2016",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/2971325",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Aug 25 18:05:32 MDT 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cacm2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://cacm.acm.org/magazines/2016/9/206250/fulltext",
  abstract =     "A look at the legal background and future
                 possibilities for an issue that is likely to reoccur.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Xia:2016:SDM,
  author =       "Zhihua Xia and Xinhui Wang and Xingming Sun and Qian
                 Wang",
  title =        "A Secure and Dynamic Multi-Keyword Ranked Search
                 Scheme over Encrypted Cloud Data",
  journal =      j-IEEE-TRANS-PAR-DIST-SYS,
  volume =       "27",
  number =       "2",
  pages =        "340--352",
  month =        feb,
  year =         "2016",
  CODEN =        "ITDSEO",
  DOI =          "https://doi.org/10.1109/TPDS.2015.2401003",
  ISSN =         "1045-9219 (print), 1558-2183 (electronic)",
  ISSN-L =       "1045-9219",
  bibdate =      "Tue Jan 19 07:28:23 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranspardistsys.bib",
  URL =          "http://www.computer.org/csdl/trans/td/2016/02/07039216-abs.html",
  abstract-URL = "http://www.computer.org/csdl/trans/td/2016/02/07039216-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://www.computer.org/tpds/archives.htm",
}

@Article{Xiang:2016:EMP,
  author =       "Xinyin Xiang and Hui Li and Mingyu Wang and Xingwen
                 Zhao",
  title =        "Efficient multi-party concurrent signature from
                 lattices",
  journal =      j-INFO-PROC-LETT,
  volume =       "116",
  number =       "8",
  pages =        "497--502",
  month =        aug,
  year =         "2016",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Thu May 19 07:58:41 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019016300138",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190/",
}

@Article{Xiao:2016:REM,
  author =       "Chen Xiao and Lifeng Wang and Mengjiao Zhu and Wendong
                 Wang",
  title =        "A resource-efficient multimedia encryption scheme for
                 embedded video sensing system based on unmanned
                 aircraft",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "59",
  number =       "??",
  pages =        "117--125",
  month =        jan,
  year =         "2016",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Mon Feb 8 11:55:17 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804515001654",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Xu:2016:CCP,
  author =       "Jie Xu and Qiaoyan Wen and Wenmin Li and Zhengping
                 Jin",
  title =        "Circuit Ciphertext-Policy Attribute-Based Hybrid
                 Encryption with Verifiable Delegation in Cloud
                 Computing",
  journal =      j-IEEE-TRANS-PAR-DIST-SYS,
  volume =       "27",
  number =       "1",
  pages =        "119--129",
  month =        jan,
  year =         "2016",
  CODEN =        "ITDSEO",
  DOI =          "https://doi.org/10.1109/TPDS.2015.2392752",
  ISSN =         "1045-9219 (print), 1558-2183 (electronic)",
  ISSN-L =       "1045-9219",
  bibdate =      "Tue Dec 15 09:28:10 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranspardistsys.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib",
  note =         "See comments \cite{Xiong:2017:CCC}.",
  URL =          "http://www.computer.org/csdl/trans/td/2016/01/07010954-abs.html",
  abstract-URL = "http://www.computer.org/csdl/trans/td/2016/01/07010954-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://www.computer.org/tpds/archives.htm",
}

@Article{Xu:2016:CIB,
  author =       "P. Xu and T. Jiao and Q. Wu and W. Wang and H. Jin",
  title =        "Conditional Identity-Based Broadcast Proxy
                 Re-Encryption and Its Application to Cloud Email",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "65",
  number =       "1",
  pages =        "66--79",
  month =        "????",
  year =         "2016",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2015.2417544",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Tue Dec 15 09:36:24 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Yagan:2016:WSN,
  author =       "Osman Yagan and Armand M. Makowski",
  title =        "Wireless Sensor Networks Under the Random Pairwise Key
                 Predistribution Scheme: Can Resiliency Be Achieved With
                 Small Key Rings?",
  journal =      j-IEEE-TRANS-NETWORKING,
  volume =       "24",
  number =       "6",
  pages =        "3383--3396",
  month =        dec,
  year =         "2016",
  CODEN =        "IEANEP",
  DOI =          "https://doi.org/10.1109/TNET.2016.2527742",
  ISSN =         "1063-6692 (print), 1558-2566 (electronic)",
  ISSN-L =       "1063-6692",
  bibdate =      "Sat Jan 21 07:15:40 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
  abstract =     "We investigate the resiliency of wireless sensor
                 networks against sensor capture attacks when the
                 network uses the random pairwise key distribution
                 scheme of Chan et al. We present conditions on the
                 model parameters so that the network is: 1 unassailable
                 and 2 unsplittable, both with high probability, as the
                 number $n$ of sensor nodes becomes large. Both notions
                 are defined against an adversary who has unlimited
                 computing resources and full knowledge of the network
                 topology, but can only capture a negligible fraction $
                 o n$ of sensors. We also show that the number of
                 cryptographic keys needed to ensure unassailability and
                 unsplittability under the pairwise key predistribution
                 scheme is an order of magnitude smaller than it is
                 under the key predistribution scheme of Eschenauer and
                 Gligor.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE\slash ACM Transactions on Networking",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J771",
}

@Article{Yan:2016:DEB,
  author =       "Zheng Yan and Wenxiu Ding and Xixun Yu and Haiqi Zhu
                 and Robert H. Deng",
  title =        "Deduplication on Encrypted Big Data in Cloud",
  journal =      j-IEEE-TRANS-BIG-DATA,
  volume =       "2",
  number =       "2",
  pages =        "138--150",
  month =        "????",
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/TBDATA.2016.2587659",
  ISSN =         "2332-7790",
  ISSN-L =       "2332-7790",
  bibdate =      "Tue Oct 25 08:33:01 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetransbigdata.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Big Data",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6687317",
}

@Article{Yang:2016:EBB,
  author =       "Ching-Nung Yang and Cheng-Hua Chen and Song-Ruei Cai",
  title =        "Enhanced {Boolean}-based multi secret image sharing
                 scheme",
  journal =      j-J-SYST-SOFTW,
  volume =       "116",
  number =       "??",
  pages =        "22--34",
  month =        jun,
  year =         "2016",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Thu May 19 08:19:12 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0164121215000205",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212/",
}

@Article{Yang:2016:ECV,
  author =       "Ching-Nung Yang and Li-Zhe Sun and Song-Ruei Cai",
  title =        "Extended color visual cryptography for black and white
                 secret image",
  journal =      j-THEOR-COMP-SCI,
  volume =       "609 (part 1)",
  number =       "??",
  pages =        "143--161",
  day =          "4",
  month =        jan,
  year =         "2016",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Fri Dec 4 06:41:42 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2015.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0304397515008452",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975/",
}

@Article{Yang:2016:EHA,
  author =       "Xu Yang and Xinyi Huang and Joseph K. Liu",
  title =        "Efficient handover authentication with user anonymity
                 and untraceability for Mobile Cloud Computing",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "62",
  number =       "??",
  pages =        "190--195",
  month =        sep,
  year =         "2016",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Tue May 31 08:45:28 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X15003088",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X/",
}

@Article{Yang:2016:EPA,
  author =       "Guangyang Yang and Jia Yu and Wenting Shen and
                 Qianqian Su and Zhangjie Fu and Rong Hao",
  title =        "Enabling public auditing for shared data in cloud
                 storage supporting identity privacy and traceability",
  journal =      j-J-SYST-SOFTW,
  volume =       "113",
  number =       "??",
  pages =        "130--139",
  month =        mar,
  year =         "2016",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Thu Jan 21 14:55:20 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S016412121500268X",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212/",
}

@Article{Yang:2016:IHA,
  author =       "Xu Yang and Xinyi Huang and Jinguang Han and Chunhua
                 Su",
  title =        "Improved handover authentication and key
                 pre-distribution for wireless mesh networks",
  journal =      j-CCPE,
  volume =       "28",
  number =       "10",
  pages =        "2978--2990",
  month =        jul,
  year =         "2016",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.3544",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Tue Sep 13 08:30:11 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
}

@Article{Yang:2016:TCP,
  author =       "Baijian Justin Yang and Brian Kirk",
  title =        "{Try-CybSI}: A Platform for Trying Out Cybersecurity",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "4",
  pages =        "74--75",
  month =        jul # "\slash " # aug,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 08:21:28 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/04/msp2016040074-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Yassein:2016:FSB,
  author =       "M. B. Yassein and Y. Khamayseh and M. AbuJazoh",
  title =        "Feature Selection for Black Hole Attacks",
  journal =      j-J-UCS,
  volume =       "22",
  number =       "4",
  pages =        "521--??",
  month =        "????",
  year =         "2016",
  CODEN =        "????",
  ISSN =         "0948-695X (print), 0948-6968 (electronic)",
  ISSN-L =       "0948-6968",
  bibdate =      "Wed Sep 7 16:47:24 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jucs.bib",
  URL =          "http://www.jucs.org/jucs_22_4/feature_selection_for_black",
  acknowledgement = ack-nhfb,
  fjournal =     "J.UCS: Journal of Universal Computer Science",
  journal-URL =  "http://www.jucs.org/jucs",
}

@Article{Ye:2016:IEA,
  author =       "Guodong Ye and Xiaoling Huang",
  title =        "An Image Encryption Algorithm Based on Autoblocking
                 and Electrocardiography",
  journal =      j-IEEE-MULTIMEDIA,
  volume =       "23",
  number =       "2",
  pages =        "64--71",
  month =        apr # "\slash " # jun,
  year =         "2016",
  CODEN =        "IEMUE4",
  DOI =          "https://doi.org/10.1109/MMUL.2015.72",
  ISSN =         "1070-986X (print), 1941-0166 (electronic)",
  ISSN-L =       "1070-986X",
  bibdate =      "Wed Jun 8 08:28:55 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeemultimedia.bib",
  URL =          "https://www.computer.org/csdl/mags/mu/2016/02/mmu2016020064-abs.html",
  abstract-URL = "https://www.computer.org/csdl/mags/mu/2016/02/mmu2016020064-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://www.computer.org/multimedia/",
}

@Article{Yi:2016:IPA,
  author =       "Xun Yi and Fang-Yu Rao and Zahir Tari and Feng Hao and
                 Elisa Bertino and Ibrahim Khalil and Albert Y. Zomaya",
  title =        "{ID2S} Password-Authenticated Key Exchange Protocols",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "65",
  number =       "12",
  pages =        "3687--3701",
  month =        "????",
  year =         "2016",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2016.2553031",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Thu Nov 10 05:41:07 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Yi:2016:VSF,
  author =       "Haibo Yi and Shaohua Tang",
  title =        "Very Small {FPGA} Processor for Multivariate
                 Signatures",
  journal =      j-COMP-J,
  volume =       "59",
  number =       "7",
  pages =        "1091--1101",
  month =        jul,
  year =         "2016",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxw008",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Aug 30 07:10:49 MDT 2016",
  bibsource =    "http://comjnl.oxfordjournals.org/content/59/7.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/59/7/1091",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "February 17, 2016",
}

@Article{Yu:2016:CBE,
  author =       "Qihong Yu and Jiguo Li and Yichen Zhang and Wei Wu and
                 Xinyi Huang and Yang Xiang",
  title =        "Certificate-based encryption resilient to key
                 leakage",
  journal =      j-J-SYST-SOFTW,
  volume =       "116",
  number =       "??",
  pages =        "101--112",
  month =        jun,
  year =         "2016",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Thu May 19 08:19:12 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0164121215001326",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212/",
}

@Article{Yu:2016:CDI,
  author =       "Yong Yu and Liang Xue and Man Ho Au and Willy Susilo
                 and Jianbing Ni and Yafang Zhang and Athanasios V.
                 Vasilakos and Jian Shen",
  title =        "Cloud data integrity checking with an identity-based
                 auditing mechanism from {RSA}",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "62",
  number =       "??",
  pages =        "85--91",
  month =        sep,
  year =         "2016",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Tue May 31 08:45:28 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X16300164",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X/",
}

@Article{Yu:2016:DNF,
  author =       "Jiangshan Yu and Vincent Cheval and Mark Ryan",
  title =        "{DTKI}: a New Formalized {PKI} with Verifiable Trusted
                 Parties",
  journal =      j-COMP-J,
  volume =       "59",
  number =       "11",
  pages =        "1695--1713",
  month =        nov,
  year =         "2016",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxw039",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Fri Nov 4 09:11:48 MDT 2016",
  bibsource =    "http://comjnl.oxfordjournals.org/content/59/11.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/59/11/1695",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "July 20, 2016",
}

@Article{Yu:2016:SSD,
  author =       "Yong Yu and Jianbing Ni and Qi Xia and Xiaofen Wang
                 and Haomiao Yang and Xiaosong Zhang",
  title =        "{SDIVIP$^2$}: shared data integrity verification with
                 identity privacy preserving in mobile clouds",
  journal =      j-CCPE,
  volume =       "28",
  number =       "10",
  pages =        "2877--2888",
  month =        jul,
  year =         "2016",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.3484",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Tue Sep 13 08:30:11 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
}

@Article{Zenger:2016:AKE,
  author =       "Christian T. Zenger and Mario Pietersz and Jan Zimmer
                 and Jan-Felix Posielek and Thorben Lenze and Christof
                 Paar",
  title =        "Authenticated key establishment for low-resource
                 devices exploiting correlated random channels",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "109 (part 1)",
  number =       "??",
  pages =        "105--123",
  day =          "9",
  month =        nov,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Wed Nov 23 16:15:16 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1389128616301943",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286/",
}

@Article{Zhang:2016:CAH,
  author =       "Leyou Zhang and Yi Mu and Qing Wu",
  title =        "Compact Anonymous Hierarchical Identity-Based
                 Encryption with Constant Size Private Keys",
  journal =      j-COMP-J,
  volume =       "59",
  number =       "4",
  pages =        "452--461",
  month =        apr,
  year =         "2016",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxv059",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Mar 28 10:52:39 MDT 2016",
  bibsource =    "http://comjnl.oxfordjournals.org/content/59/4.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/59/4/452",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "August 13, 2015",
}

@Article{Zhang:2016:DEP,
  author =       "Rui Zhang and Rui Xue and Ting Yu and Ling Liu",
  title =        "Dynamic and Efficient Private Keyword Search over
                 Inverted Index-Based Encrypted Data",
  journal =      j-TOIT,
  volume =       "16",
  number =       "3",
  pages =        "21:1--21:??",
  month =        aug,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2940328",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Thu Nov 17 08:48:51 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Querying over encrypted data is gaining increasing
                 popularity in cloud-based data hosting services.
                 Security and efficiency are recognized as two important
                 and yet conflicting requirements for querying over
                 encrypted data. In this article, we propose an
                 efficient private keyword search (EPKS) scheme that
                 supports binary search and extend it to dynamic
                 settings (called DEPKS ) for inverted index--based
                 encrypted data. First, we describe our approaches of
                 constructing a searchable symmetric encryption (SSE)
                 scheme that supports binary search. Second, we present
                 a novel framework for EPKS and provide its formal
                 security definitions in terms of plaintext privacy and
                 predicate privacy by modifying Shen et al.'s security
                 notions [Shen et al. 2009]. Third, built on the
                 proposed framework, we design an EPKS scheme whose
                 complexity is logarithmic in the number of keywords.
                 The scheme is based on the groups of prime order and
                 enjoys strong notions of security, namely statistical
                 plaintext privacy and statistical predicate privacy.
                 Fourth, we extend the EPKS scheme to support dynamic
                 keyword and document updates. The extended scheme not
                 only maintains the properties of logarithmic-time
                 search efficiency and plaintext privacy and predicate
                 privacy but also has fewer rounds of communications for
                 updates compared to existing dynamic search encryption
                 schemes. We experimentally evaluate the proposed EPKS
                 and DEPKS schemes and show that they are significantly
                 more efficient in terms of both keyword search
                 complexity and communication complexity than existing
                 randomized SSE schemes.",
  acknowledgement = ack-nhfb,
  articleno =    "21",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Zhang:2016:EEA,
  author =       "Liping Zhang and Shanyu Tang and Shaohui Zhu",
  title =        "An energy efficient authenticated key agreement
                 protocol for {SIP}-based green {VoIP} networks",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "59",
  number =       "??",
  pages =        "126--133",
  month =        jan,
  year =         "2016",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Mon Feb 8 11:55:17 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804515001666",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Zhang:2016:PAG,
  author =       "Yuexin Zhang and Yang Xiang and Xinyi Huang",
  title =        "Password-Authenticated Group Key Exchange: a
                 Cross-Layer Design",
  journal =      j-TOIT,
  volume =       "16",
  number =       "4",
  pages =        "24:1--24:??",
  month =        dec,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2955095",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Thu Dec 22 16:47:17 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Two-party password-authenticated key exchange (2PAKE)
                 protocols provide a natural mechanism for secret key
                 establishment in distributed applications, and they
                 have been extensively studied in past decades. However,
                 only a few efforts have been made so far to design
                 password-authenticated group key exchange (GPAKE)
                 protocols. In a 2PAKE or GPAKE protocol, it is assumed
                 that short passwords are preshared among users. This
                 assumption, however, would be impractical in certain
                 applications. Motivated by this observation, this
                 article presents a GPAKE protocol without the password
                 sharing assumption. To obtain the passwords, wireless
                 devices, such as smart phones, tablets, and laptops,
                 are used to extract short secrets at the physical
                 layer. Using the extracted secrets, users in our
                 protocol can establish a group key at higher layers
                 with light computation consumptions. Thus, our GPAKE
                 protocol is a cross-layer design. Additionally, our
                 protocol is a compiler, that is, our protocol can
                 transform any provably secure 2PAKE protocol into a
                 GPAKE protocol with only one more round of
                 communications. Besides, the proposed protocol is
                 proved secure in the standard model.",
  acknowledgement = ack-nhfb,
  articleno =    "24",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Zhang:2016:PPV,
  author =       "Lei Zhang and Chuanyan Hu and Qianhong Wu and Josep
                 Domingo-Ferrer and Bo Qin",
  title =        "Privacy-Preserving Vehicular Communication
                 Authentication with Hierarchical Aggregation and Fast
                 Response",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "65",
  number =       "8",
  pages =        "2562--2574",
  month =        "????",
  year =         "2016",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2015.2485225",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Mon Jul 11 18:58:52 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers -",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Zhang:2016:SBA,
  author =       "Yue Zhang and Jing Qin and Lihua Du",
  title =        "A secure biometric authentication based on {PEKS}",
  journal =      j-CCPE,
  volume =       "28",
  number =       "4",
  pages =        "1111--1123",
  day =          "25",
  month =        mar,
  year =         "2016",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.3539",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Sun Apr 3 12:34:13 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "5 Jun 2015",
}

@Article{Zhang:2016:TLT,
  author =       "Mingwu Zhang and Yi Mu",
  title =        "Token-Leakage Tolerant and Vector Obfuscated {IPE} and
                 Application in Privacy-Preserving Two-Party Point\slash
                 Polynomial Evaluations",
  journal =      j-COMP-J,
  volume =       "59",
  number =       "4",
  pages =        "493--507",
  month =        apr,
  year =         "2016",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxv065",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Mar 28 10:52:39 MDT 2016",
  bibsource =    "http://comjnl.oxfordjournals.org/content/59/4.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/59/4/493",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "August 26, 2015",
}

@Article{Zheng:2016:EUV,
  author =       "Nan Zheng and Aaron Paloski and Haining Wang",
  title =        "An Efficient User Verification System Using
                 Angle-Based Mouse Movement Biometrics",
  journal =      j-TISSEC,
  volume =       "18",
  number =       "3",
  pages =        "11:1--11:??",
  month =        apr,
  year =         "2016",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/2893185",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Fri Apr 15 13:02:47 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tissec.bib",
  abstract =     "Biometric authentication verifies a user based on its
                 inherent, unique characteristics-who you are. In
                 addition to physiological biometrics, behavioral
                 biometrics has proven very useful in authenticating a
                 user. Mouse dynamics, with their unique patterns of
                 mouse movements, is one such behavioral biometric. In
                 this article, we present a user verification system
                 using mouse dynamics, which is transparent to users and
                 can be naturally applied for continuous
                 reauthentication. The key feature of our system lies in
                 using much more fine-grained (point-by-point)
                 angle-based metrics of mouse movements for user
                 verification. These new metrics are relatively unique
                 from person to person and independent of a computing
                 platform. Moreover, we utilize support vector machines
                 (SVMs) for quick and accurate classification. Our
                 technique is robust across different operating
                 platforms, and no specialized hardware is required. The
                 efficacy of our approach is validated through a series
                 of experiments, which are based on three sets of user
                 mouse movement data collected in controllable
                 environments and in the field. Our experimental results
                 show that the proposed system can verify a user in an
                 accurate and timely manner, with minor induced system
                 overhead.",
  acknowledgement = ack-nhfb,
  articleno =    "11",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

@Article{Zhou:2016:HFD,
  author =       "Peng Zhou and Xiaojing Gu and Rocky K. C. Chang",
  title =        "Harvesting File Download Exploits in the {Web}: a
                 Hacker's View",
  journal =      j-COMP-J,
  volume =       "59",
  number =       "4",
  pages =        "522--540",
  month =        apr,
  year =         "2016",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxv072",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Mar 28 10:52:39 MDT 2016",
  bibsource =    "http://comjnl.oxfordjournals.org/content/59/4.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/59/4/522",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "September 6, 2015",
}

@Article{Zhou:2016:IBP,
  author =       "Yunya Zhou and Hua Deng and Qianhong Wu and Bo Qin and
                 Jianwei Liu and Yong Ding",
  title =        "Identity-based proxy re-encryption version 2: Making
                 mobile access easy in cloud",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "62",
  number =       "??",
  pages =        "128--139",
  month =        sep,
  year =         "2016",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Tue May 31 08:45:28 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X15003076",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X/",
}

@Article{Zhou:2016:SRB,
  author =       "Lan Zhou and Vijay Varadharajan and K. Gopinath",
  title =        "A Secure Role-Based Cloud Storage System For Encrypted
                 Patient-Centric Health Records",
  journal =      j-COMP-J,
  volume =       "59",
  number =       "11",
  pages =        "1593--1611",
  month =        nov,
  year =         "2016",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxw019",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Fri Nov 4 09:11:48 MDT 2016",
  bibsource =    "http://comjnl.oxfordjournals.org/content/59/11.toc;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://comjnl.oxfordjournals.org/content/59/11/1593",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  onlinedate =   "July 13, 2016",
}

@Article{Zhu:2016:SCI,
  author =       "Youwen Zhu and Zhiqiu Huang and Tsuyoshi Takagi",
  title =        "Secure and controllable {$k$-NN} query over encrypted
                 cloud data with key confidentiality",
  journal =      j-J-PAR-DIST-COMP,
  volume =       "89",
  number =       "??",
  pages =        "1--12",
  month =        mar,
  year =         "2016",
  CODEN =        "JPDCER",
  ISSN =         "0743-7315 (print), 1096-0848 (electronic)",
  ISSN-L =       "0743-7315",
  bibdate =      "Thu Feb 11 09:00:16 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jpardistcomp.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0743731515002105",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Parallel and Distributed Computing",
  journal-URL =  "http://www.sciencedirect.com/science/journal/07437315/",
}

@Article{Aga:2017:ISM,
  author =       "Shaizeen Aga and Satish Narayanasamy",
  title =        "{InvisiMem}: Smart Memory Defenses for Memory Bus Side
                 Channel",
  journal =      j-COMP-ARCH-NEWS,
  volume =       "45",
  number =       "2",
  pages =        "94--106",
  month =        may,
  year =         "2017",
  CODEN =        "CANED2",
  DOI =          "https://doi.org/10.1145/3140659.3080232",
  ISSN =         "0163-5964 (print), 1943-5851 (electronic)",
  ISSN-L =       "0163-5964",
  bibdate =      "Fri Sep 15 11:09:14 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigarch.bib",
  abstract =     "A practically feasible low-overhead hardware design
                 that provides strong defenses against memory bus side
                 channel remains elusive. This paper observes that smart
                 memory, memory with compute capability and a packetized
                 interface, can dramatically simplify this problem.
                 InvisiMem expands the trust base to include the logic
                 layer in the smart memory to implement cryptographic
                 primitives, which aid in addressing several memory bus
                 side channel vulnerabilities efficiently. This allows
                 the secure host processor to send encrypted addresses
                 over the untrusted memory bus, and thereby eliminates
                 the need for expensive address obfuscation techniques
                 based on Oblivious RAM (ORAM). In addition, smart
                 memory enables efficient solutions for ensuring
                 freshness without using expensive Merkle trees, and
                 mitigates memory bus timing channel using constant
                 heart-beat packets. We demonstrate that InvisiMem
                 designs have one to two orders of magnitude of lower
                 overheads for performance, space, energy, and memory
                 bandwidth, compared to prior solutions.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGARCH Computer Architecture News",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J89",
}

@Article{Ahir:2017:LAR,
  author =       "Prashant Ahir and Mehran Mozaffari-Kermani and Reza
                 Azarderakhsh",
  title =        "Lightweight Architectures for Reliable and Fault
                 Detection {Simon} and {Speck} Cryptographic Algorithms
                 on {FPGA}",
  journal =      j-TECS,
  volume =       "16",
  number =       "4",
  pages =        "109:1--109:??",
  month =        aug,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3055514",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Mon Aug 14 18:53:33 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tecs.bib",
  abstract =     "The widespread use of sensitive and constrained
                 applications necessitates lightweight (low-power and
                 low-area) algorithms developed for constrained
                 nano-devices. However, nearly all of such algorithms
                 are optimized for platform-based performance and may
                 not be useful for diverse and flexible applications.
                 The National Security Agency (NSA) has proposed two
                 relatively recent families of lightweight ciphers, that
                 is, Simon and Speck, designed as efficient ciphers on
                 both hardware and software platforms. This article
                 proposes concurrent error detection schemes to provide
                 reliable architectures for these two families of
                 lightweight block ciphers. The research work on
                 analyzing the reliability of these algorithms and
                 providing fault diagnosis approaches has not been
                 undertaken to date to the best of our knowledge. The
                 main aim of the proposed reliable architectures is to
                 provide high error coverage while maintaining
                 acceptable area and power consumption overheads. To
                 achieve this, we propose a variant of recomputing with
                 encoded operands. These low-complexity schemes are
                 suited for low-resource applications such as sensitive,
                 constrained implantable and wearable medical devices.
                 We perform fault simulations for the proposed
                 architectures by developing a fault model framework.
                 The architectures are simulated and analyzed on recent
                 field-programmable grate array (FPGA) platforms, and it
                 is shown that the proposed schemes provide high error
                 coverage. The proposed low-complexity concurrent error
                 detection schemes are a step forward toward more
                 reliable architectures for Simon and Speck algorithms
                 in lightweight, secure applications.",
  acknowledgement = ack-nhfb,
  articleno =    "109",
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J840",
}

@Article{Ahmed:2017:IRD,
  author =       "Kareem Ahmed and Ibrahim El-Henawy",
  title =        "Increasing robustness of {Data Encryption Standard} by
                 integrating {DNA} cryptography",
  journal =      j-INT-J-COMPUT-APPL,
  volume =       "39",
  number =       "2",
  pages =        "91--105",
  year =         "2017",
  DOI =          "https://doi.org/10.1080/1206212X.2017.1289690",
  ISSN =         "1206-212X (print), 1925-7074 (electronic)",
  ISSN-L =       "1206-212X",
  bibdate =      "Sat Apr 21 17:31:06 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijca.bib",
  URL =          "https://www.tandfonline.com/doi/full/10.1080/1206212X.2017.1289690",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Computer Applications",
  journal-URL =  "https://www.tandfonline.com/loi/tjca20",
  online-date =  "22 Feb 2017",
}

@Article{Al-Tariq:2017:SFP,
  author =       "Abdullah Al-Tariq and Abu Raihan Mostofa Kamal and Md.
                 Abdul Hamid and M. Abdullah-Al-Wadud and Mohammad
                 Mehedi Hassan and Sk Md. Mizanur Rahman",
  title =        "A scalable framework for protecting user identity and
                 access pattern in untrusted {Web} server using forward
                 secrecy, public key encryption and {Bloom} filter",
  journal =      j-CCPE,
  volume =       "29",
  number =       "23",
  pages =        "??--??",
  day =          "10",
  month =        dec,
  year =         "2017",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.3863",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Sat Dec 30 09:11:59 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
}

@Article{Alabdulatif:2017:PPA,
  author =       "Abdulatif Alabdulatif and Heshan Kumarage and Ibrahim
                 Khalil and Xun Yi",
  title =        "Privacy-preserving anomaly detection in cloud with
                 lightweight homomorphic encryption",
  journal =      j-J-COMP-SYS-SCI,
  volume =       "90",
  number =       "??",
  pages =        "28--45",
  month =        dec,
  year =         "2017",
  CODEN =        "JCSSBM",
  DOI =          "https://doi.org/10.1016/j.jcss.2017.03.001",
  ISSN =         "0022-0000 (print), 1090-2724 (electronic)",
  ISSN-L =       "0022-0000",
  bibdate =      "Tue Jan 29 15:27:38 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsyssci.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0022000017300284",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer and System Sciences",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00220000",
}

@Article{Altaf:2017:LHL,
  author =       "Muhammad Shoaib Bin Altaf and David A. Wood",
  title =        "{LogCA}: a High-Level Performance Model for Hardware
                 Accelerators",
  journal =      j-COMP-ARCH-NEWS,
  volume =       "45",
  number =       "2",
  pages =        "375--388",
  month =        may,
  year =         "2017",
  CODEN =        "CANED2",
  DOI =          "https://doi.org/10.1145/3140659.3080216",
  ISSN =         "0163-5964 (print), 1943-5851 (electronic)",
  ISSN-L =       "0163-5964",
  bibdate =      "Fri Sep 15 11:09:14 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigarch.bib",
  abstract =     "With the end of Dennard scaling, architects have
                 increasingly turned to special-purpose hardware
                 accelerators to improve the performance and energy
                 efficiency for some applications. Unfortunately,
                 accelerators don't always live up to their expectations
                 and may under-perform in some situations. Understanding
                 the factors which effect the performance of an
                 accelerator is crucial for both architects and
                 programmers early in the design stage. Detailed models
                 can be highly accurate, but often require low-level
                 details which are not available until late in the
                 design cycle. In contrast, simple analytical models can
                 provide useful insights by abstracting away low-level
                 system details. In this paper, we propose LogCA---a
                 high-level performance model for hardware accelerators.
                 LogCA helps both programmers and architects identify
                 performance bounds and design bottlenecks early in the
                 design cycle, and provide insight into which
                 optimizations may alleviate these bottlenecks. We
                 validate our model across a variety of kernels, ranging
                 from sub-linear to super-linear complexities on both
                 on-chip and off-chip accelerators. We also describe the
                 utility of LogCA using two retrospective case studies.
                 First, we discuss the evolution of interface design in
                 SUN/Oracle's encryption accelerators. Second, we
                 discuss the evolution of memory interface design in
                 three different GPU architectures. In both cases, we
                 show that the adopted design optimizations for these
                 machines are similar to LogCA's suggested
                 optimizations. We argue that architects and programmers
                 can use insights from these retrospective studies for
                 improving future designs.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGARCH Computer Architecture News",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J89",
}

@InProceedings{Alwen:2017:TPA,
  author =       "Jo{\"e}l Alwen and Jeremiah Blocki",
  editor =       "{IEEE}",
  booktitle =    "{Proceedings 2nd IEEE European Symposium on Security
                 and Privacy, 26--28 April 2017, Paris, France}",
  title =        "Towards Practical Attacks on {Argon2i} and Balloon
                 Hashing",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "142--157",
  year =         "2017",
  DOI =          "https://doi.org/10.1109/EuroSP.2017.47",
  ISBN =         "1-5090-5761-7",
  ISBN-13 =      "978-1-5090-5761-0",
  LCCN =         "????",
  bibdate =      "Wed Feb 19 09:17:05 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  note =         "IEEE Computer Society Order Number E6100. See
                 \cite{Biryukov:2016:ANG,Boneh:2016:BHP}.",
  URL =          "https://ieeexplore.ieee.org/document/7961977",
  acknowledgement = ack-nhfb,
  remark =       "From the abstract: ``The algorithm Argon2i-B of
                 Biryukov, Dinu and Khovratovich is currently being
                 considered by the IRTF (Internet Research Task Force)
                 as a new de-facto standard for password hashing. An
                 older version (Argon2i-A) of the same algorithm was
                 chosen as the winner of the recent Password Hashing
                 Competition. An important competitor to Argon2i-B is
                 the recently introduced Balloon Hashing (BH) algorithm
                 of Corrigan-Gibs, Boneh and Schechter.'' NetBSD 9.0
                 includes a package for Argon2.",
}

@Article{Ambrosin:2017:OBB,
  author =       "Moreno Ambrosin and Paolo Braca and Mauro Conti and
                 Riccardo Lazzeretti",
  title =        "{ODIN}: Obfuscation-Based Privacy-Preserving Consensus
                 Algorithm for Decentralized Information Fusion in Smart
                 Device Networks",
  journal =      j-TOIT,
  volume =       "18",
  number =       "1",
  pages =        "6:1--6:??",
  month =        dec,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3137573",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Fri Dec 22 18:09:06 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "The large spread of sensors and smart devices in urban
                 infrastructures are motivating research in the area of
                 the Internet of Things (IoT) to develop new services
                 and improve citizens' quality of life. Sensors and
                 smart devices generate large amounts of measurement
                 data from sensing the environment, which is used to
                 enable services such as control of power consumption or
                 traffic density. To deal with such a large amount of
                 information and provide accurate measurements, service
                 providers can adopt information fusion, which given the
                 decentralized nature of urban deployments can be
                 performed by means of consensus algorithms. These
                 algorithms allow distributed agents to (iteratively)
                 compute linear functions on the exchanged data, and
                 take decisions based on the outcome, without the need
                 for the support of a central entity. However, the use
                 of consensus algorithms raises several security
                 concerns, especially when private or security critical
                 information is involved in the computation. In this
                 article we propose ODIN, a novel algorithm allowing
                 information fusion over encrypted data. ODIN is a
                 privacy-preserving extension of the popular consensus
                 gossip algorithm, which prevents distributed agents
                 from having direct access to the data while they
                 iteratively reach consensus; agents cannot access even
                 the final consensus value but can only retrieve partial
                 information (e.g., a binary decision). ODIN uses
                 efficient additive obfuscation and proxy re-encryption
                 during the update steps and garbled circuits to make
                 final decisions on the obfuscated consensus. We discuss
                 the security of our proposal and show its
                 practicability and efficiency on real-world
                 resource-constrained devices, developing a prototype
                 implementation for Raspberry Pi devices.",
  acknowledgement = ack-nhfb,
  articleno =    "6",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Anada:2017:CGS,
  author =       "Hiroaki Anada and Junpei Kawamoto and Chenyutao Ke and
                 Kirill Morozov and Kouichi Sakurai",
  title =        "Cross-group secret sharing scheme for secure usage of
                 cloud storage over different providers and regions",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "73",
  number =       "10",
  pages =        "4275--4301",
  month =        oct,
  year =         "2017",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-017-2009-7",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Mon Oct 2 11:08:36 MDT 2017",
  bibsource =    "http://link.springer.com/journal/11227/73/10;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Misc{Anonymous:2017:BA,
  author =       "Anonymous",
  title =        "{BitErrant} attack",
  howpublished = "Web site",
  day =          "6",
  month =        mar,
  year =         "2017",
  bibdate =      "Wed Mar 08 08:41:50 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  note =         "The story describes how SHA-1 collision attacks could
                 lead to bogus, and malware, file downloads via
                 BitTorrent: the obvious solution, which should have
                 been adopted long ago, is to use multiple checksum
                 algorithms, and require all to match before concluding
                 that two files are in fact identical.",
  URL =          "http://biterrant.io/",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:2017:BRM,
  author =       "Anonymous",
  title =        "Book Review: {{\booktitle{The Mathematics of
                 Secrets}}, by Joshua Holden. Princeton University
                 Press. ISBN 978-0-691-14175-6}",
  journal =      j-NETWORK-SECURITY,
  volume =       "2017",
  number =       "3",
  pages =        "4--4",
  month =        mar,
  year =         "2017",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(17)30024-7",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 17:01:43 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485817300247",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Misc{Anonymous:2017:CCS,
  author =       "Anonymous",
  title =        "Cybernetica Case Study: Solving the {Estonian}
                 {ID}-card Case",
  howpublished = "Web news story.",
  day =          "13",
  month =        dec,
  year =         "2017",
  bibdate =      "Tue Jan 16 06:58:04 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  note =         "The story describes a poor choice of generating large
                 (about 1024 bits) primes $p$ and $q$ that led to
                 crackable RSA cryptography. The solution for Estonia
                 was to switch to elliptic-curve cryptography that was
                 also supported by the cards.",
  URL =          "https://cyber.ee/en/news/cybernetica-case-study-solving-the-estonian-id-card-case/",
  acknowledgement = ack-nhfb,
}

@Article{Anonymous:2017:HDQ,
  author =       "Anonymous",
  title =        "High-Dimensional Quantum Encryption Performed in
                 Real-World City Conditions for First Time",
  journal =      j-SCI-COMPUT,
  volume =       "??",
  number =       "??",
  pages =        "??--??",
  day =          "24",
  month =        aug,
  year =         "2017",
  CODEN =        "SCHRCU",
  ISSN =         "1930-5753 (print), 1930-6156 (electronic)",
  ISSN-L =       "1930-5753",
  bibdate =      "Mon Aug 28 12:23:34 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.scientificcomputing.com/news/2017/08/high-dimensional-quantum-encryption-performed-real-world-city-conditions-first-time",
  acknowledgement = ack-nhfb,
  fjournal =     "Scientific Computing",
  journal-URL =  "http://digital.scientificcomputing.com/scientificcomputing/",
}

@Article{Anonymous:2017:MBH,
  author =       "Anonymous",
  title =        "Mathematician Breaks Down How to Defend Against
                 Quantum Computing Attacks",
  journal =      j-RES-DEV,
  volume =       "??",
  number =       "??",
  pages =        "??--??",
  day =          "2",
  month =        feb,
  year =         "2017",
  CODEN =        "REDEEA",
  ISSN =         "0746-9179",
  bibdate =      "Tue Feb 28 15:53:14 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.rdmag.com/news/2017/02/mathematician-breaks-down-how-defend-against-quantum-computing-attacks",
  acknowledgement = ack-nhfb,
  fjournal =     "Research \& Development",
}

@Misc{Anonymous:2017:RV,
  author =       "Anonymous",
  title =        "{ROCA} vulnerability",
  howpublished = "Wikipedia article.",
  month =        oct,
  year =         "2017",
  bibdate =      "Wed Oct 25 18:07:09 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  note =         "The ROCA vulnerability affects millions of smartcards,
                 and devices using TPM (Trusted Platform Modules). It
                 allows recovery of the private key from knowledge of
                 the RSA public key, and thus, facilitates malicious
                 cloning of the cards, and decrypting of some encrypted
                 filesystems.",
  URL =          "https://en.wikipedia.org/wiki/ROCA_vulnerability",
  acknowledgement = ack-nhfb,
  keywords =     "Return of the Coppersmith Attack (ROCA)",
}

@Article{Antonopoulos:2017:DIS,
  author =       "Timos Antonopoulos and Paul Gazzillo and Michael Hicks
                 and Eric Koskinen and Tachio Terauchi and Shiyi Wei",
  title =        "Decomposition instead of self-composition for proving
                 the absence of timing channels",
  journal =      j-SIGPLAN,
  volume =       "52",
  number =       "6",
  pages =        "362--375",
  month =        jun,
  year =         "2017",
  CODEN =        "SINODQ",
  DOI =          "https://doi.org/10.1145/3140587.3062378",
  ISSN =         "0362-1340 (print), 1523-2867 (print), 1558-1160
                 (electronic)",
  ISSN-L =       "0362-1340",
  bibdate =      "Sat Sep 16 10:18:17 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigplan2010.bib",
  abstract =     "We present a novel approach to proving the absence of
                 timing channels. The idea is to partition the program's
                 execution traces in such a way that each partition
                 component is checked for timing attack resilience by a
                 time complexity analysis and that per-component
                 resilience implies the resilience of the whole program.
                 We construct a partition by splitting the program
                 traces at secret-independent branches. This ensures
                 that any pair of traces with the same public input has
                 a component containing both traces. Crucially, the
                 per-component checks can be normal safety properties
                 expressed in terms of a single execution. Our approach
                 is thus in contrast to prior approaches, such as
                 self-composition, that aim to reason about multiple $
                 (k \geq 2) $ executions at once. We formalize the above
                 as an approach called quotient partitioning,
                 generalized to any k -safety property, and prove it to
                 be sound. A key feature of our approach is a
                 demand-driven partitioning strategy that uses a
                 regex-like notion called trails to identify sets of
                 execution traces, particularly those influenced by
                 tainted (or secret) data. We have applied our technique
                 in a prototype implementation tool called Blazer, based
                 on WALA, PPL, and the brics automaton library. We have
                 proved timing-channel freedom of (or synthesized an
                 attack specification for) 24 programs written in Java
                 bytecode, including 6 classic examples from the
                 literature and 6 examples extracted from the DARPA STAC
                 challenge problems.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGPLAN Notices",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J706",
  remark =       "PLDI '17 conference proceedings.",
}

@Article{Applebaum:2017:AC,
  author =       "Benny Applebaum and Jonathan Avron and Chris Brzuska",
  title =        "Arithmetic Cryptography",
  journal =      j-J-ACM,
  volume =       "64",
  number =       "2",
  pages =        "10:1--10:??",
  month =        jun,
  year =         "2017",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/3046675",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  bibdate =      "Fri Sep 8 08:45:18 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We study the possibility of computing cryptographic
                 primitives in a fully black-box arithmetic model over a
                 finite field $F$. In this model, the input to a
                 cryptographic primitive (e.g., encryption scheme) is
                 given as a sequence of field elements, the honest
                 parties are implemented by arithmetic circuits that
                 make only a black-box use of the underlying field, and
                 the adversary has a full (non-black-box) access to the
                 field. This model captures many standard
                 information-theoretic constructions. We prove several
                 positive and negative results in this model for various
                 cryptographic tasks. On the positive side, we show
                 that, under coding-related intractability assumptions,
                 computational primitives like commitment schemes,
                 public-key encryption, oblivious transfer, and general
                 secure two-party computation can be implemented in this
                 model. On the negative side, we prove that garbled
                 circuits, additively homomorphic encryption, and secure
                 computation with low online complexity cannot be
                 achieved in this model. Our results reveal a
                 qualitative difference between the standard Boolean
                 model and the arithmetic model, and explain, in
                 retrospect, some of the limitations of previous
                 constructions.",
  acknowledgement = ack-nhfb,
  articleno =    "10",
  fjournal =     "Journal of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J401",
}

@Article{Artemenko:2017:PGO,
  author =       "Sergei Artemenko and Ronen Shaltiel",
  title =        "Pseudorandom Generators with Optimal Seed Length for
                 Non-{Boolean} Poly-Size Circuits",
  journal =      j-TOCT,
  volume =       "9",
  number =       "2",
  pages =        "6:1--6:??",
  month =        may,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3018057",
  ISSN =         "1942-3454 (print), 1942-3462 (electronic)",
  ISSN-L =       "1942-3454",
  bibdate =      "Mon Jul 24 17:35:50 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toct/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib;
                 https://www.math.utah.edu/pub/tex/bib/toct.bib",
  abstract =     "A sampling procedure for a distribution $P$ over $ \{
                 0, 1 \}^l$ is a function $ C : \{ 0, 1 \}^n \to \{ 0, 1
                 \}^l$ such that the distribution $ C(U_n)$ (obtained by
                 applying $C$ on the uniform distribution $ U_n$) is the
                 ``desired distribution'' $P$. Let $ n > r \geq l =
                 n^{\Omega (1)}$. An $ \epsilon - n b$-PRG (defined by
                 Dubrov and Ishai [2006]) is a function $ G : \{ 0, 1
                 \}^r \to \{ 0, 1 \}^n$ such that for every $ C : \{ 0,
                 1 \}^n \to \{ 0, 1 \}^l$ in some class of ``interesting
                 sampling procedures,'' '$ C(U_r) = C(G (U_r))$ is $
                 \epsilon $-close to $ C(U_n)$ in statistical distance.
                 We construct poly-time computable nb-PRGs with $ r = O
                 (l)$ for poly-size circuits relying on the assumption
                 that there exists $ \beta > 0$ and a problem $L$ in $ E
                 = {\rm DTIME}(2^{O(n)})$ such that for every large
                 enough n, nondeterministic circuits of size $ 2^{ \beta
                 n}$ that have NP-gates cannot solve $L$ on inputs of
                 length $n$. This assumption is a scaled nonuniform
                 analog of (the widely believed) EXP /= $ \Sigma_2^P$,
                 and similar assumptions appear in various contexts in
                 derandomization. Previous nb-PRGs of Dubrov and Ishai
                 have $ r = \Omega (l^2)$ and are based on very strong
                 cryptographic assumptions or, alternatively, on
                 nonstandard assumptions regarding incompressibility of
                 functions on random inputs. When restricting to
                 poly-size circuits $ C : \{ 0, 1 \}^n \to \{ 0, 1 \}^l$
                 with Shannon entropy $ H(C(U_n)) \leq k$, for $ l > k =
                 n^{\Omega (1)}$, our nb-PRGs have $ r = O (k)$. The
                 nb-PRGs of Dubrov and Ishai use seed length $ r =
                 \Omega (k^2)$ and require that the probability
                 distribution of $ C(U_n)$ is efficiently computable.
                 Our nb-PRGs follow from a notion of ``conditional
                 PRGs,'' which may be of independent interest. These are
                 PRGs where $ G(U_r)$ remains pseudorandom even when
                 conditioned on a ``large'' event $ \{ A(G(U_r)) = 1 \}
                 $, for an arbitrary poly-size circuit $A$. A related
                 notion was considered by Shaltiel and Umans [2005] in a
                 different setting, and our proofs use ideas from that
                 paper, as well as ideas of Dubrov and Ishai. We also
                 give an unconditional construction of poly-time
                 computable nb-PRGs for $ \poly (n)$-size, depth $d$
                 circuits $ C : \{ 0, 1 \}^n \to \{ 0, 1 \}^l$ with $ r
                 = O(l \cdot \log^{d + O (1)} n)$. This improves upon
                 the previous work of Dubrov and Ishai that has $ r \geq
                 l^2$. This result follows by adapting a recent PRG
                 construction of Trevisan and Xue [2013] to the case of
                 nb-PRGs. We also show that this PRG can be implemented
                 by a uniform family of constant-depth circuits with
                 slightly increased seed length.",
  acknowledgement = ack-nhfb,
  articleno =    "6",
  fjournal =     "ACM Transactions on Computation Theory",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1190",
}

@Article{Aste:2017:BTF,
  author =       "Tomaso Aste and Paolo Tasca and Tiziana {Di Matteo}",
  title =        "Blockchain Technologies: The Foreseeable Impact on
                 Society and Industry",
  journal =      j-COMPUTER,
  volume =       "50",
  number =       "9",
  pages =        "18--28",
  month =        sep,
  year =         "2017",
  CODEN =        "CPTRB4",
  DOI =          "https://doi.org/10.1109/MC.2017.3571064",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Mon Oct 2 08:46:55 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/computer2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.computer.org/csdl/mags/co/2017/09/mco2017090018-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
}

@Article{At:2017:LAU,
  author =       "Nuray At and Jean-Luc Beuchat and Eiji Okamoto and
                 Ismail San and Teppei Yamazaki",
  title =        "A low-area unified hardware architecture for the {AES}
                 and the cryptographic hash function {Gr{\o}stl}",
  journal =      j-J-PAR-DIST-COMP,
  volume =       "106",
  number =       "??",
  pages =        "106--120",
  month =        aug,
  year =         "2017",
  CODEN =        "JPDCER",
  ISSN =         "0743-7315 (print), 1096-0848 (electronic)",
  ISSN-L =       "0743-7315",
  bibdate =      "Sat Aug 19 13:10:31 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/jpardistcomp.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0743731517300485",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Parallel and Distributed Computing",
  journal-URL =  "http://www.sciencedirect.com/science/journal/07437315",
}

@Article{Ateniese:2017:LCS,
  author =       "Giuseppe Ateniese and Giuseppe Bianchi and Angelo T.
                 Capossele and Chiara Petrioli and Dora Spenza",
  title =        "Low-Cost Standard Signatures for Energy-Harvesting
                 Wireless Sensor Networks",
  journal =      j-TECS,
  volume =       "16",
  number =       "3",
  pages =        "64:1--64:??",
  month =        jul,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2994603",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Mon Jul 24 09:51:12 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tecs.bib",
  abstract =     "This work is motivated by a general question: can
                 micro-scale energy-harvesting techniques be exploited
                 to support low-cost standard security solutions on
                 resource-constrained devices? We focus on guaranteeing
                 integrity and authentication in Internet of Things
                 (IoT) and Wireless Sensor Network (WSN) applications.
                 In this article, we propose techniques to make ECDSA
                 signatures low cost and implementable on
                 resource-constrained devices. By combining
                 precomputation techniques and energy-harvesting
                 capabilities of modern sensor nodes, we achieve
                 significant improvement over prior works. In addition,
                 we show that the cost of ECDSA signatures can be
                 reduced by up to a factor 10 by using harvesting-aware
                 optimizations.",
  acknowledgement = ack-nhfb,
  articleno =    "64",
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J840",
}

@Article{Attasena:2017:SSC,
  author =       "Varunya Attasena and J{\'e}r{\^o}me Darmont and Nouria
                 Harbi",
  title =        "Secret sharing for cloud data security: a survey",
  journal =      j-VLDB-J,
  volume =       "26",
  number =       "5",
  pages =        "657--681",
  month =        oct,
  year =         "2017",
  CODEN =        "VLDBFR",
  DOI =          "https://doi.org/10.1007/s00778-017-0470-9",
  ISSN =         "1066-8888 (print), 0949-877X (electronic)",
  ISSN-L =       "1066-8888",
  bibdate =      "Mon Oct 2 16:14:05 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/vldbj.bib",
  abstract =     "Cloud computing helps reduce costs, increase business
                 agility and deploy solutions with a high return on
                 investment for many types of applications. However,
                 data security is of premium importance to many users
                 and often restrains their adoption of cloud
                 technologies. Various approaches, i.e., data
                 encryption, anonymization, replication and
                 verification, help enforce different facets of data
                 security. Secret sharing is a particularly interesting
                 cryptographic technique. Its most advanced variants
                 indeed simultaneously enforce data privacy,
                 availability and integrity, while allowing computation
                 on encrypted data. The aim of this paper is thus to
                 wholly survey secret sharing schemes with respect to
                 data security, data access and costs in the
                 pay-as-you-go paradigm.",
  acknowledgement = ack-nhfb,
  fjournal =     "VLDB Journal: Very Large Data Bases",
  journal-URL =  "http://portal.acm.org/toc.cfm?id=J869",
}

@Book{Aumasson:2017:SCP,
  author =       "Jean-Philippe Aumasson and Matthew D. Green",
  title =        "Serious Cryptography: a Practical Introduction to
                 Modern Encryption",
  publisher =    pub-NO-STARCH,
  address =      pub-NO-STARCH:adr,
  pages =        "xxii + 282",
  year =         "2018",
  ISBN =         "1-59327-826-8 paperback",
  ISBN-13 =      "978-1-59327-826-7 paperback",
  LCCN =         "QA76.9.A25 A96 2018",
  bibdate =      "Wed Mar 25 08:47:40 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 z3950.loc.gov:7090/Voyager",
  URL =          "https://nostarch.com/seriouscrypto",
  acknowledgement = ack-nhfb,
  remark =       "Foreword by Matthew D. Green",
  subject =      "Data encryption (Computer science)",
  tableofcontents = "Foreword by Matthew D. Green / xv \\
                 Preface / xvii \\
                 Abbreviations / xxi \\
                 1: Encryption / 1 \\
                 2: Randomness / 21 \\
                 3: Cryptographic Security / 39 \\
                 4: Block Ciphers / 53 \\
                 5: Stream Ciphers / 77 \\
                 6: Hash Functions / 105 \\
                 7: Keyed Hashing / 127 \\
                 8: Authenticated Encryption / 145 \\
                 9: Hard Problems / 163 \\
                 10: RSA / 181 \\
                 11: Diffie--Hellman / 201 \\
                 12: Elliptic Curves / 217 \\
                 13: TLS / 235 \\
                 14: Quantum and Post-Quantum / 251 \\
                 Index / 271",
}

@Article{Austrin:2017:ICT,
  author =       "Per Austrin and Kai-Min Chung and Mohammad Mahmoody
                 and Rafael Pass and Karn Seth",
  title =        "On the Impossibility of Cryptography with Tamperable
                 Randomness",
  journal =      j-ALGORITHMICA,
  volume =       "79",
  number =       "4",
  pages =        "1052--1101",
  month =        dec,
  year =         "2017",
  CODEN =        "ALGOEJ",
  DOI =          "https://doi.org/10.1007/s00453-016-0219-7",
  ISSN =         "0178-4617 (print), 1432-0541 (electronic)",
  ISSN-L =       "0178-4617",
  bibdate =      "Mon Oct 2 10:42:20 MDT 2017",
  bibsource =    "http://link.springer.com/journal/453/79/4;
                 https://www.math.utah.edu/pub/tex/bib/algorithmica.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Algorithmica",
  journal-URL =  "http://link.springer.com/journal/453",
}

@Article{Awad:2017:OLO,
  author =       "Amro Awad and Yipeng Wang and Deborah Shands and Yan
                 Solihin",
  title =        "{ObfusMem}: a Low-Overhead Access Obfuscation for
                 Trusted Memories",
  journal =      j-COMP-ARCH-NEWS,
  volume =       "45",
  number =       "2",
  pages =        "107--119",
  month =        may,
  year =         "2017",
  CODEN =        "CANED2",
  DOI =          "https://doi.org/10.1145/3140659.3080230",
  ISSN =         "0163-5964 (print), 1943-5851 (electronic)",
  ISSN-L =       "0163-5964",
  bibdate =      "Fri Sep 15 11:09:14 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigarch.bib",
  abstract =     "Trustworthy software requires strong privacy and
                 security guarantees from a secure trust base in
                 hardware. While chipmakers provide hardware support for
                 basic security and privacy primitives such as enclaves
                 and memory encryption. these primitives do not address
                 hiding of the memory access pattern, information about
                 which may enable attacks on the system or reveal
                 characteristics of sensitive user data.
                 State-of-the-art approaches to protecting the access
                 pattern are largely based on Oblivious RAM (ORAM).
                 Unfortunately, current ORAM implementations suffer from
                 very significant practicality and overhead concerns,
                 including roughly an order of magnitude slowdown, more
                 than 100\% memory capacity overheads, and the potential
                 for system deadlock. Memory technology trends are
                 moving towards 3D and 2.5D integration, enabling
                 significant logic capabilities and sophisticated memory
                 interfaces. Leveraging the trends, we propose a new
                 approach to access pattern obfuscation, called
                 ObfusMem. ObfusMem adds the memory to the trusted
                 computing base and incorporates cryptographic engines
                 within the memory. ObfusMem encrypts commands and
                 addresses on the memory bus, hence the access pattern
                 is cryptographically obfuscated from external
                 observers. Our evaluation shows that ObfusMem incurs an
                 overhead of 10.9\% on average, which is about an order
                 of magnitude faster than ORAM implementations.
                 Furthermore, ObfusMem does not incur capacity overheads
                 and does not amplify writes. We analyze and compare the
                 security protections provided by ObfusMem and ORAM, and
                 highlight their differences.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGARCH Computer Architecture News",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J89",
}

@Article{Azimpourkivi:2017:CBT,
  author =       "Mozhgan Azimpourkivi and Umut Topkara and Bogdan
                 Carbunar",
  title =        "Camera Based Two Factor Authentication Through Mobile
                 and Wearable Devices",
  journal =      j-IMWUT,
  volume =       "1",
  number =       "3",
  pages =        "1--37",
  month =        sep,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3131904",
  ISSN =         "2474-9567 (electronic)",
  bibdate =      "Thu Jan 23 12:36:57 MST 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/imwut.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3131904",
  abstract =     "We introduce Pixie, a novel, camera based two factor
                 authentication solution for mobile and wearable
                 devices. A quick and familiar user action of snapping a
                 photo is sufficient for Pixie to simultaneously perform
                 a graphical password authentication and \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "35",
  fjournal =     "Proceedings of the ACM on Interactive, Mobile,
                 Wearable and Ubiquitous Technologies (IMWUT)",
  journal-URL =  "https://dl.acm.org/loi/imwut",
}

@Article{Bag:2017:BBW,
  author =       "S. Bag and S. Ruj and K. Sakurai",
  title =        "{Bitcoin} Block Withholding Attack: Analysis and
                 Mitigation",
  journal =      "IEEE Transactions on Information Forensics and
                 Security",
  volume =       "12",
  number =       "8",
  pages =        "1967--1978",
  month =        aug,
  year =         "2017",
  DOI =          "https://doi.org/10.1109/TIFS.2016.2623588",
  ISSN =         "1556-6013 (print), 1556-6021 (electronic)",
  ISSN-L =       "1556-6013",
  bibdate =      "Thu Nov 30 15:24:52 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  keywords =     "Bitcoin block withholding attack; block withholding
                 attack; BWH attack; commitment schemes; Computational
                 modeling; cryptographic commitment schemes;
                 Cryptography; cryptography; Electronic mail; electronic
                 money; Games; hash function; mining pool; Online
                 banking; pool attacks; Protocols; rogue miners; rogue
                 pool administrators; selfish miner; selfish {Bitcoin}
                 miner; sponsored block withholding attack; Statistical
                 analysis; {Bitcoin} mining; {Bitcoin} protocol",
}

@Article{Bailis:2017:RPC,
  author =       "Peter Bailis and Arvind Narayanan and Andrew Miller
                 and Song Han",
  title =        "Research for Practice: Cryptocurrencies, Blockchains,
                 and Smart Contracts; Hardware for Deep Learning",
  journal =      j-CACM,
  volume =       "60",
  number =       "5",
  pages =        "48--51",
  month =        may,
  year =         "2017",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/3024928",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sat May 27 15:08:46 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/cacm2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://cacm.acm.org/magazines/2017/5/216321/fulltext",
  abstract =     "Expert-curated guides to the best of CS research.",
  acknowledgement = ack-nhfb,
  acmid =        "3024928",
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
  pagecount =    "4",
}

@Article{Balsa:2017:TIC,
  author =       "Ero Balsa and Cristina P{\'e}rez-Sol{\`a} and Claudia
                 Diaz",
  title =        "Towards Inferring Communication Patterns in Online
                 Social Networks",
  journal =      j-TOIT,
  volume =       "17",
  number =       "3",
  pages =        "32:1--32:??",
  month =        jul,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3093897",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Mon Jul 24 17:19:26 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "The separation between the public and private spheres
                 on online social networks is known to be, at best,
                 blurred. On the one hand, previous studies have shown
                 how it is possible to infer private attributes from
                 publicly available data. On the other hand, no
                 distinction exists between public and private data when
                 we consider the ability of the online social network
                 (OSN) provider to access them. Even when OSN users go
                 to great lengths to protect their privacy, such as by
                 using encryption or communication obfuscation,
                 correlations between data may render these solutions
                 useless. In this article, we study the relationship
                 between private communication patterns and publicly
                 available OSN data. Such a relationship informs both
                 privacy-invasive inferences as well as OSN
                 communication modelling, the latter being key toward
                 developing effective obfuscation tools. We propose an
                 inference model based on Bayesian analysis and
                 evaluate, using a real social network dataset, how
                 archetypal social graph features can lead to inferences
                 about private communication. Our results indicate that
                 both friendship graph and public traffic data may not
                 be informative enough to enable these inferences, with
                 time analysis having a non-negligible impact on their
                 precision.",
  acknowledgement = ack-nhfb,
  articleno =    "32",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Book{Beebe:2017:MFC,
  author =       "Nelson H. F. Beebe",
  title =        "The Mathematical-Function Computation Handbook:
                 Programming Using the {MathCW} Portable Software
                 Library",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xxxvi + 1114",
  year =         "2017",
  DOI =          "https://doi.org/10.1007/978-3-319-64110-2",
  ISBN =         "3-319-64109-3 (hardcover), 3-319-64110-7 (e-book)",
  ISBN-13 =      "978-3-319-64109-6 (hardcover), 978-3-319-64110-2
                 (e-book)",
  LCCN =         "QA75.5-76.95",
  bibdate =      "Sat Jul 15 19:34:43 MDT 2017",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/bibnet/authors/b/beebe-nelson-h-f.bib;
                 https://www.math.utah.edu/pub/tex/bib/axiom.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/elefunt.bib;
                 https://www.math.utah.edu/pub/tex/bib/fparith.bib;
                 https://www.math.utah.edu/pub/tex/bib/maple-extract.bib;
                 https://www.math.utah.edu/pub/tex/bib/master.bib;
                 https://www.math.utah.edu/pub/tex/bib/mathematica.bib;
                 https://www.math.utah.edu/pub/tex/bib/matlab.bib;
                 https://www.math.utah.edu/pub/tex/bib/mupad.bib;
                 https://www.math.utah.edu/pub/tex/bib/numana2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib;
                 https://www.math.utah.edu/pub/tex/bib/redbooks.bib;
                 https://www.math.utah.edu/pub/tex/bib/utah-math-dept-books.bib",
  URL =          "http://www.springer.com/us/book/9783319641096",
  acknowledgement = ack-nhfb,
  ORCID-numbers = "Beebe, Nelson H. F./0000-0001-7281-4263",
  tableofcontents = "List of figures / xxv \\
                 List of tables / xxxi \\
                 Quick start / xxxv \\
                 1: Introduction / 1 \\
                 1.1: Programming conventions / 2 \\
                 1.2: Naming conventions / 4 \\
                 1.3: Library contributions and coverage / 5 \\
                 1.4: Summary / 6 \\
                 2: Iterative solutions and other tools / 7 \\
                 2.1: Polynomials and Taylor series / 7 \\
                 2.2: First-order Taylor series approximation / 8 \\
                 2.3: Second-order Taylor series approximation / 9 \\
                 2.4: Another second-order Taylor series approximation /
                 9 \\
                 2.5: Convergence of second-order methods / 10 \\
                 2.6: Taylor series for elementary functions / 10 \\
                 2.7: Continued fractions / 12 \\
                 2.8: Summation of continued fractions / 17 \\
                 2.9: Asymptotic expansions / 19 \\
                 2.10: Series inversion / 20 \\
                 2.11: Summary / 22 \\
                 3: Polynomial approximations / 23 \\
                 3.1: Computation of odd series / 23 \\
                 3.2: Computation of even series / 25 \\
                 3.3: Computation of general series / 25 \\
                 3.4: Limitations of Cody\slash Waite polynomials / 28
                 \\
                 3.5: Polynomial fits with Maple / 32 \\
                 3.6: Polynomial fits with Mathematica / 33 \\
                 3.7: Exact polynomial coefficients / 42 \\
                 3.8: Cody\slash Waite rational polynomials / 43 \\
                 3.9: Chebyshev polynomial economization / 43 \\
                 3.10: Evaluating Chebyshev polynomials / 48 \\
                 3.11: Error compensation in Chebyshev fits / 50 \\
                 3.12: Improving Chebyshev fits / 51 \\
                 3.13: Chebyshev fits in rational form / 52 \\
                 3.14: Chebyshev fits with Mathematica / 56 \\
                 3.15: Chebyshev fits for function representation / 57
                 \\
                 3.16: Extending the library / 57 \\
                 3.17: Summary and further reading / 58 \\
                 4: Implementation issues / 61 \\
                 4.1: Error magnification / 61 \\
                 4.2: Machine representation and machine epsilon / 62
                 \\
                 4.3: IEEE 754 arithmetic / 63 \\
                 4.4: Evaluation order in C / 64 \\
                 4.5: The {\tt volatile} type qualifier / 65 \\
                 4.6: Rounding in floating-point arithmetic / 66 \\
                 4.7: Signed zero / 69 \\
                 4.8: Floating-point zero divide / 70 \\
                 4.9: Floating-point overflow / 71 \\
                 4.10: Integer overflow / 72 \\
                 4.11: Floating-point underflow / 77 \\
                 4.12: Subnormal numbers / 78 \\
                 4.13: Floating-point inexact operation / 79 \\
                 4.14: Floating-point invalid operation / 79 \\
                 4.15: Remarks on NaN tests / 80 \\
                 4.16: Ulps --- units in the last place / 81 \\
                 4.17: Fused multiply-add / 85 \\
                 4.18: Fused multiply-add and polynomials / 88 \\
                 4.19: Significance loss / 89 \\
                 4.20: Error handling and reporting / 89 \\
                 4.21: Interpreting error codes / 93 \\
                 4.22: C99 changes to error reporting / 94 \\
                 4.23: Error reporting with threads / 95 \\
                 4.24: Comments on error reporting / 95 \\
                 4.25: Testing function implementations / 96 \\
                 4.26: Extended data types on Hewlett--Packard HP-UX
                 IA-64 / 100 \\
                 4.27: Extensions for decimal arithmetic / 101 \\
                 4.28: Further reading / 103 \\
                 4.29: Summary / 104 \\
                 5: The floating-point environment / 105 \\
                 5.1: IEEE 754 and programming languages / 105 \\
                 5.2: IEEE 754 and the mathcw library / 106 \\
                 5.3: Exceptions and traps / 106 \\
                 5.4: Access to exception flags and rounding control /
                 107 \\
                 5.5: The environment access pragma / 110 \\
                 5.6: Implementation of exception-flag and
                 rounding-control access / 110 \\
                 5.7: Using exception flags: simple cases / 112 \\
                 5.8: Using rounding control / 115 \\
                 5.9: Additional exception flag access / 116 \\
                 5.10: Using exception flags: complex case / 120 \\
                 5.11: Access to precision control / 123 \\
                 5.12: Using precision control / 126 \\
                 5.13: Summary / 127 \\
                 6: Converting floating-point values to integers / 129
                 \\
                 6.1: Integer conversion in programming languages / 129
                 \\
                 6.2: Programming issues for conversions to integers /
                 130 \\
                 6.3: Hardware out-of-range conversions / 131 \\
                 6.4: Rounding modes and integer conversions / 132 \\
                 6.5: Extracting integral and fractional parts / 132 \\
                 6.6: Truncation functions / 135 \\
                 6.7: Ceiling and floor functions / 136 \\
                 6.8: Floating-point rounding functions with fixed
                 rounding / 137 \\
                 6.9: Floating-point rounding functions: current
                 rounding / 138 \\
                 6.10: Floating-point rounding functions without {\em
                 inexact\/} exception / 139 \\
                 6.11: Integer rounding functions with fixed rounding /
                 140 \\
                 6.12: Integer rounding functions with current rounding
                 / 142 \\
                 6.13: Remainder / 143 \\
                 6.14: Why the remainder functions are hard / 144 \\
                 6.15: Computing {\tt fmod} / 146 \\
                 6.16: Computing {\tt remainder} / 148 \\
                 6.17: Computing {\tt remquo} / 150 \\
                 6.18: Computing one remainder from the other / 152 \\
                 6.19: Computing the remainder in nonbinary bases / 155
                 \\
                 6.20: Summary / 156 \\
                 7: Random numbers / 157 \\
                 7.1: Guidelines for random-number software / 157 \\
                 7.2: Creating generator seeds / 158 \\
                 7.3: Random floating-point values / 160 \\
                 7.4: Random integers from floating-point generator /
                 165 \\
                 7.5: Random integers from an integer generator / 166
                 \\
                 7.6: Random integers in ascending order / 168 \\
                 7.7: How random numbers are generated / 169 \\
                 7.8: Removing generator bias / 178 \\
                 7.9: Improving a poor random number generator / 178 \\
                 7.10: Why long periods matter / 179 \\
                 7.11: Inversive congruential generators / 180 \\
                 7.12: Inversive congruential generators, revisited /
                 189 \\
                 7.13: Distributions of random numbers / 189 \\
                 7.14: Other distributions / 195 \\
                 7.15: Testing random-number generators / 196 \\
                 7.16: Applications of random numbers / 202 \\
                 7.17: The \textsf {mathcw} random number routines / 208
                 \\
                 7.18: Summary, advice, and further reading / 214 \\
                 8: Roots / 215 \\
                 8.1: Square root / 215 \\
                 8.2: Hypotenuse and vector norms / 222 \\
                 8.3: Hypotenuse by iteration / 227 \\
                 8.4: Reciprocal square root / 233 \\
                 8.5: Cube root / 237 \\
                 8.6: Roots in hardware / 240 \\
                 8.7: Summary / 242 \\
                 9: Argument reduction / 243 \\
                 9.1: Simple argument reduction / 243 \\
                 9.2: Exact argument reduction / 250 \\
                 9.3: Implementing exact argument reduction / 253 \\
                 9.4: Testing argument reduction / 265 \\
                 9.5: Retrospective on argument reduction / 265 \\
                 10: Exponential and logarithm / 267 \\
                 10.1: Exponential functions / 267 \\
                 10.2: Exponential near zero / 273 \\
                 10.3: Logarithm functions / 282 \\
                 10.4: Logarithm near one / 290 \\
                 10.5: Exponential and logarithm in hardware / 292 \\
                 10.6: Compound interest and annuities / 294 \\
                 10.7: Summary / 298 \\
                 11: Trigonometric functions / 299 \\
                 11.1: Sine and cosine properties / 299 \\
                 11.2: Tangent properties / 302 \\
                 11.3: Argument conventions and units / 304 \\
                 11.4: Computing the cosine and sine / 306 \\
                 11.5: Computing the tangent / 310 \\
                 11.6: Trigonometric functions in degrees / 313 \\
                 11.7: Trigonometric functions in units of $ \pi $ / 315
                 \\
                 11.8: Computing the cosine and sine together / 320 \\
                 11.9: Inverse sine and cosine / 323 \\
                 11.10: Inverse tangent / 331 \\
                 11.11: Inverse tangent, take two / 336 \\
                 11.12: Trigonometric functions in hardware / 338 \\
                 11.13: Testing trigonometric functions / 339 \\
                 11.14: Retrospective on trigonometric functions / 340
                 \\
                 12: Hyperbolic functions / 341 \\
                 12.1: Hyperbolic functions / 341 \\
                 12.2: Improving the hyperbolic functions / 345 \\
                 12.3: Computing the hyperbolic functions together / 348
                 \\
                 12.4: Inverse hyperbolic functions / 348 \\
                 12.5: Hyperbolic functions in hardware / 350 \\
                 12.6: Summary / 352 \\
                 13: Pair-precision arithmetic / 353 \\
                 13.1: Limitations of pair-precision arithmetic / 354
                 \\
                 13.2: Design of the pair-precision software interface /
                 355 \\
                 13.3: Pair-precision initialization / 356 \\
                 13.4: Pair-precision evaluation / 357 \\
                 13.5: Pair-precision high part / 357 \\
                 13.6: Pair-precision low part / 357 \\
                 13.7: Pair-precision copy / 357 \\
                 13.8: Pair-precision negation / 358 \\
                 13.9: Pair-precision absolute value / 358 \\
                 13.10: Pair-precision sum / 358 \\
                 13.11: Splitting numbers into pair sums / 359 \\
                 13.12: Premature overflow in splitting / 362 \\
                 13.13: Pair-precision addition / 365 \\
                 13.14: Pair-precision subtraction / 367 \\
                 13.15: Pair-precision comparison / 368 \\
                 13.16: Pair-precision multiplication / 368 \\
                 13.17: Pair-precision division / 371 \\
                 13.18: Pair-precision square root / 373 \\
                 13.19: Pair-precision cube root / 377 \\
                 13.20: Accuracy of pair-precision arithmetic / 379 \\
                 13.21: Pair-precision vector sum / 384 \\
                 13.22: Exact vector sums / 385 \\
                 13.23: Pair-precision dot product / 385 \\
                 13.24: Pair-precision product sum / 386 \\
                 13.25: Pair-precision decimal arithmetic / 387 \\
                 13.26: Fused multiply-add with pair precision / 388 \\
                 13.27: Higher intermediate precision and the FMA / 393
                 \\
                 13.28: Fused multiply-add without pair precision / 395
                 \\
                 13.29: Fused multiply-add with multiple precision / 401
                 \\
                 13.30: Fused multiply-add, Boldo/\penalty
                 \exhyphenpenalty Melquiond style / 403 \\
                 13.31: Error correction in fused multiply-add / 406 \\
                 13.32: Retrospective on pair-precision arithmetic / 407
                 \\
                 14: Power function / 411 \\
                 14.1: Why the power function is hard to compute / 411
                 \\
                 14.2: Special cases for the power function / 412 \\
                 14.3: Integer powers / 414 \\
                 14.4: Integer powers, revisited / 420 \\
                 14.5: Outline of the power-function algorithm / 421 \\
                 14.6: Finding $a$ and $p$ / 423 \\
                 14.7: Table searching / 424 \\
                 14.8: Computing $\log_n(g/a)$ / 426 \\
                 14.9: Accuracy required for $\log_n(g/a)$ / 429 \\
                 14.10: Exact products / 430 \\
                 14.11: Computing $w$, $w_1$ and $w_2$ / 433 \\
                 14.12: Computing $n^{w_2}$ / 437 \\
                 14.13: The choice of $q$ / 438 \\
                 14.14: Testing the power function / 438 \\
                 14.15: Retrospective on the power function / 440 \\
                 15: Complex arithmetic primitives / 441 \\
                 15.1: Support macros and type definitions / 442 \\
                 15.2: Complex absolute value / 443 \\
                 15.3: Complex addition / 445 \\
                 15.4: Complex argument / 445 \\
                 15.5: Complex conjugate / 446 \\
                 15.6: Complex conjugation symmetry / 446 \\
                 15.7: Complex conversion / 448 \\
                 15.8: Complex copy / 448 \\
                 15.9: Complex division: C99 style / 449 \\
                 15.10: Complex division: Smith style / 451 \\
                 15.11: Complex division: Stewart style / 452 \\
                 15.12: Complex division: Priest style / 453 \\
                 15.13: Complex division: avoiding subtraction loss /
                 455 \\
                 15.14: Complex imaginary part / 456 \\
                 15.15: Complex multiplication / 456 \\
                 15.16: Complex multiplication: error analysis / 458 \\
                 15.17: Complex negation / 459 \\
                 15.18: Complex projection / 460 \\
                 15.19: Complex real part / 460 \\
                 15.20: Complex subtraction / 461 \\
                 15.21: Complex infinity test / 462 \\
                 15.22: Complex NaN test / 462 \\
                 15.23: Summary / 463 \\
                 16: Quadratic equations / 465 \\
                 16.1: Solving quadratic equations / 465 \\
                 16.2: Root sensitivity / 471 \\
                 16.3: Testing a quadratic-equation solver / 472 \\
                 16.4: Summary / 474 \\
                 17: Elementary functions in complex arithmetic / 475
                 \\
                 17.1: Research on complex elementary functions / 475
                 \\
                 17.2: Principal values / 476 \\
                 17.3: Branch cuts / 476 \\
                 17.4: Software problems with negative zeros / 478 \\
                 17.5: Complex elementary function tree / 479 \\
                 17.6: Series for complex functions / 479 \\
                 17.7: Complex square root / 480 \\
                 17.8: Complex cube root / 485 \\
                 17.9: Complex exponential / 487 \\
                 17.10: Complex exponential near zero / 492 \\
                 17.11: Complex logarithm / 495 \\
                 17.12: Complex logarithm near one / 497 \\
                 17.13: Complex power / 500 \\
                 17.14: Complex trigonometric functions / 502 \\
                 17.15: Complex inverse trigonometric functions / 504
                 \\
                 17.16: Complex hyperbolic functions / 509 \\
                 17.17: Complex inverse hyperbolic functions / 514 \\
                 17.18: Summary / 520 \\
                 18: The Greek functions: gamma, psi, and zeta / 521 \\
                 18.1: Gamma and log-gamma functions / 521 \\
                 18.2: The {\tt psi} and {\tt psiln} functions / 536 \\
                 18.3: Polygamma functions / 547 \\
                 18.4: Incomplete gamma functions / 560 \\
                 18.5: A Swiss diversion: Bernoulli and Euler / 568 \\
                 18.6: An Italian excursion: Fibonacci numbers / 575 \\
                 18.7: A German gem: the Riemann zeta function / 579 \\
                 18.8: Further reading / 590 \\
                 18.9: Summary / 591 \\
                 19: Error and probability functions / 593 \\
                 19.1: Error functions / 593 \\
                 19.2: Scaled complementary error function / 598 \\
                 19.3: Inverse error functions / 600 \\
                 19.4: Normal distribution functions and inverses / 610
                 \\
                 19.5: Summary / 617 \\
                 20: Elliptic integral functions / 619 \\
                 20.1: The arithmetic-geometric mean / 619 \\
                 20.2: Elliptic integral functions of the first kind /
                 624 \\
                 20.3: Elliptic integral functions of the second kind /
                 627 \\
                 20.4: Elliptic integral functions of the third kind /
                 630 \\
                 20.5: Computing $K(m)$ and $K'(m)$ / 631 \\
                 20.6: Computing $E(m)$ and $E'(m)$ / 637 \\
                 20.7: Historical algorithms for elliptic integrals /
                 643 \\
                 20.8: Auxiliary functions for elliptic integrals / 645
                 \\
                 20.9: Computing the elliptic auxiliary functions / 648
                 \\
                 20.10: Historical elliptic functions / 650 \\
                 20.11: Elliptic functions in software / 652 \\
                 20.12: Applications of elliptic auxiliary functions /
                 653 \\
                 20.13: Elementary functions from elliptic auxiliary
                 functions / 654 \\
                 20.14: Computing elementary functions via $R_C(x,y)$ /
                 655 \\
                 20.15: Jacobian elliptic functions / 657 \\
                 20.16: Inverses of Jacobian elliptic functions / 664
                 \\
                 20.17: The modulus and the nome / 668 \\
                 20.18: Jacobian theta functions / 673 \\
                 20.19: Logarithmic derivatives of the Jacobian theta
                 functions / 675 \\
                 20.20: Neville theta functions / 678 \\
                 20.21: Jacobian Eta, Theta, and Zeta functions / 679
                 \\
                 20.22: Weierstrass elliptic functions / 682 \\
                 20.23: Weierstrass functions by duplication / 689 \\
                 20.24: Complete elliptic functions, revisited / 690 \\
                 20.25: Summary / 691 \\
                 21: Bessel functions / 693 \\
                 21.1: Cylindrical Bessel functions / 694 \\
                 21.2: Behavior of $J_n(x)$ and $Y_n(x)$ / 695 \\
                 21.3: Properties of $J_n(z)$ and $Y_n(z)$ / 697 \\
                 21.4: Experiments with recurrences for $J_0(x)$ / 705
                 \\
                 21.5: Computing $J_0(x)$ and $J_1(x)$ / 707 \\
                 21.6: Computing $J_n(x)$ / 710 \\
                 21.7: Computing $Y_0(x)$ and $Y_1(x)$ / 713 \\
                 21.8: Computing $Y_n(x)$ / 715 \\
                 21.9: Improving Bessel code near zeros / 716 \\
                 21.10: Properties of $I_n(z)$ and $K_n(z)$ / 718 \\
                 21.11: Computing $I_0(x)$ and $I_1(x)$ / 724 \\
                 21.12: Computing $K_0(x)$ and $K_1(x)$ / 726 \\
                 21.13: Computing $I_n(x)$ and $K_n(x)$ / 728 \\
                 21.14: Properties of spherical Bessel functions / 731
                 \\
                 21.15: Computing $j_n(x)$ and $y_n(x)$ / 735 \\
                 21.16: Improving $j_1(x)$ and $y_1(x)$ / 740 \\
                 21.17: Modified spherical Bessel functions / 743 \\
                 21.18: Software for Bessel-function sequences / 755 \\
                 21.19: Retrospective on Bessel functions / 761 \\
                 22: Testing the library / 763 \\
                 22.1: Testing {\tt tgamma} and {\tt lgamma} / 765 \\
                 22.2: Testing {\tt psi} and {\tt psiln} / 768 \\
                 22.3: Testing {\tt erf} and {\tt erfc} / 768 \\
                 22.4: Testing cylindrical Bessel functions / 769 \\
                 22.5: Testing exponent/\penalty \exhyphenpenalty
                 significand manipulation / 769 \\
                 22.6: Testing inline assembly code / 769 \\
                 22.7: Testing with Maple / 770 \\
                 22.8: Testing floating-point arithmetic / 773 \\
                 22.9: The Berkeley Elementary Functions Test Suite /
                 774 \\
                 22.10: The AT\&T floating-point test package / 775 \\
                 22.11: The Antwerp test suite / 776 \\
                 22.12: Summary / 776 \\
                 23: Pair-precision elementary functions / 777 \\
                 23.1: Pair-precision integer power / 777 \\
                 23.2: Pair-precision machine epsilon / 779 \\
                 23.3: Pair-precision exponential / 780 \\
                 23.4: Pair-precision logarithm / 787 \\
                 23.5: Pair-precision logarithm near one / 793 \\
                 23.6: Pair-precision exponential near zero / 793 \\
                 23.7: Pair-precision base-$n$ exponentials / 795 \\
                 23.8: Pair-precision trigonometric functions / 796 \\
                 23.9: Pair-precision inverse trigonometric functions /
                 801 \\
                 23.10: Pair-precision hyperbolic functions / 804 \\
                 23.11: Pair-precision inverse hyperbolic functions /
                 808 \\
                 23.12: Summary / 808 \\
                 24: Accuracy of the Cody\slash Waite algorithms / 811
                 \\
                 25: Improving upon the Cody\slash Waite algorithms /
                 823 \\
                 25.1: The Bell Labs libraries / 823 \\
                 25.2: The {Cephes} library / 823 \\
                 25.3: The {Sun} libraries / 824 \\
                 25.4: Mathematical functions on EPIC / 824 \\
                 25.5: The GNU libraries / 825 \\
                 25.6: The French libraries / 825 \\
                 25.7: The NIST effort / 826 \\
                 25.8: Commercial mathematical libraries / 826 \\
                 25.9: Mathematical libraries for decimal arithmetic /
                 826 \\
                 25.10: Mathematical library research publications / 826
                 \\
                 25.11: Books on computing mathematical functions / 827
                 \\
                 25.12: Summary / 828 \\
                 26: Floating-point output / 829 \\
                 26.1: Output character string design issues / 830 \\
                 26.2: Exact output conversion / 831 \\
                 26.3: Hexadecimal floating-point output / 832 \\
                 26.4: Octal floating-point output / 850 \\
                 26.5: Binary floating-point output / 851 \\
                 26.6: Decimal floating-point output / 851 \\
                 26.7: Accuracy of output conversion / 865 \\
                 26.8: Output conversion to a general base / 865 \\
                 26.9: Output conversion of Infinity / 866 \\
                 26.10: Output conversion of NaN / 866 \\
                 26.11: Number-to-string conversion / 867 \\
                 26.12: The {\tt printf} family / 867 \\
                 26.13: Summary / 878 \\
                 27: Floating-point input / 879 \\
                 27.1: Binary floating-point input / 879 \\
                 27.2: Octal floating-point input / 894 \\
                 27.3: Hexadecimal floating-point input / 895 \\
                 27.4: Decimal floating-point input / 895 \\
                 27.5: Based-number input / 899 \\
                 27.6: General floating-point input / 900 \\
                 27.7: The {\tt scanf} family / 901 \\
                 27.8: Summary / 910 \\
                 A: Ada interface / 911 \\
                 A.1: Building the Ada interface / 911 \\
                 A.2: Programming the Ada interface / 912 \\
                 A.3: Using the Ada interface / 915 \\
                 B: C\# interface / 917 \\
                 B.1: C\# on the CLI virtual machine / 917 \\
                 B.2: Building the C\# interface / 918 \\
                 B.3: Programming the C\# interface / 920 \\
                 B.4: Using the C\# interface / 922 \\
                 C: C++ interface / 923 \\
                 C.1: Building the C++ interface / 923 \\
                 C.2: Programming the C++ interface / 924 \\
                 C.3: Using the C++ interface / 925 \\
                 D: Decimal arithmetic / 927 \\
                 D.1: Why we need decimal floating-point arithmetic /
                 927 \\
                 D.2: Decimal floating-point arithmetic design issues /
                 928 \\
                 D.3: How decimal and binary arithmetic differ / 931 \\
                 D.4: Initialization of decimal floating-point storage /
                 935 \\
                 D.5: The {\tt <decfloat.h>} header file / 936 \\
                 D.6: Rounding in decimal arithmetic / 936 \\
                 D.7: Exact scaling in decimal arithmetic / 937 \\
                 E: Errata in the Cody\slash Waite book / 939 \\
                 F: Fortran interface / 941 \\
                 F.1: Building the Fortran interface / 943 \\
                 F.2: Programming the Fortran interface / 944 \\
                 F.3: Using the Fortran interface / 945 \\
                 H: Historical floating-point architectures / 947 \\
                 H.1: CDC family / 949 \\
                 H.2: Cray family / 952 \\
                 H.3: DEC PDP-10 / 953 \\
                 H.4: DEC PDP-11 and VAX / 956 \\
                 H.5: General Electric 600 series / 958 \\
                 H.6: IBM family / 959 \\
                 H.7: Lawrence Livermore S-1 Mark IIA / 965 \\
                 H.8: Unusual floating-point systems / 966 \\
                 H.9: Historical retrospective / 967 \\
                 I: Integer arithmetic / 969 \\
                 I.1: Memory addressing and integers / 971 \\
                 I.2: Representations of signed integers / 971 \\
                 I.3: Parity testing / 975 \\
                 I.4: Sign testing / 975 \\
                 I.5: Arithmetic exceptions / 975 \\
                 I.6: Notations for binary numbers / 977 \\
                 I.7: Summary / 978 \\
                 J: Java interface / 979 \\
                 J.1: Building the Java interface / 979 \\
                 J.2: Programming the Java MathCW class / 980 \\
                 J.3: Programming the Java C interface / 982 \\
                 J.4: Using the Java interface / 985 \\
                 L: Letter notation / 987 \\
                 P: Pascal interface / 989 \\
                 P.1: Building the Pascal interface / 989 \\
                 P.2: Programming the Pascal MathCW module / 990 \\
                 P.3: Using the Pascal module interface / 993 \\
                 P.4: Pascal and numeric programming / 994 \\
                 Bibliography / 995 \\
                 Author/editor index / 1039 \\
                 Function and macro index / 1049 \\
                 Subject index / 1065 \\
                 Colophon / 1115",
}

@Article{Ben-Sasson:2017:SZK,
  author =       "Eli Ben-Sasson and Alessandro Chiesa and Eran Tromer
                 and Madars Virza",
  title =        "Scalable Zero Knowledge Via Cycles of Elliptic
                 Curves",
  journal =      j-ALGORITHMICA,
  volume =       "79",
  number =       "4",
  pages =        "1102--1160",
  month =        dec,
  year =         "2017",
  CODEN =        "ALGOEJ",
  DOI =          "https://doi.org/10.1007/s00453-016-0221-0",
  ISSN =         "0178-4617 (print), 1432-0541 (electronic)",
  ISSN-L =       "0178-4617",
  bibdate =      "Mon Oct 2 10:42:20 MDT 2017",
  bibsource =    "http://link.springer.com/journal/453/79/4;
                 https://www.math.utah.edu/pub/tex/bib/algorithmica.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Algorithmica",
  journal-URL =  "http://link.springer.com/journal/453",
}

@Article{Berghel:2017:ELR,
  author =       "Hal Berghel",
  title =        "{Equifax} and the Latest Round of Identity Theft
                 Roulette",
  journal =      j-COMPUTER,
  volume =       "50",
  number =       "12",
  pages =        "72--76",
  month =        dec,
  year =         "2017",
  CODEN =        "CPTRB4",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Sat Dec 23 07:58:37 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computer2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.computer.org/csdl/mags/co/2017/12/mco2017120072.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
}

@Misc{Bernstein:2017:SCS,
  author =       "Daniel J. Bernstein and Tanja Lange",
  title =        "{SafeCurves}: choosing safe curves for elliptic-curve
                 cryptography",
  howpublished = "Web site.",
  day =          "22",
  month =        jan,
  year =         "2017",
  bibdate =      "Fri Feb 15 10:19:25 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://safecurves.cr.yp.to/",
  acknowledgement = ack-nhfb,
  keywords =     "ANSI X9.62 (1999); ANSI X9.63 (2001); ANSSI FRP256V1
                 (2011); Brainpool (2005); IEEE P1363 (2000); NIST FIPS
                 186-2 (2000); NSA Suite B (2005); SEC 2 (2000)",
}

@Misc{Bernstein:2017:SRD,
  author =       "Daniel J. Bernstein and Joachim Breitner and Daniel
                 Genkin and Leon Groot Bruinderink and Nadia Heninger
                 and Tanja Lange and Christine van Vredendaal and Yuval
                 Yarom",
  title =        "Sliding right into disaster: Left-to-right sliding
                 windows leak",
  pages =        "21",
  day =          "28",
  month =        jun,
  year =         "2017",
  bibdate =      "Tue Jul 11 16:54:57 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://eprint.iacr.org/2017/627.pdf",
  abstract =     "It is well known that constant-time implementations of
                 modular exponentiation cannot use sliding windows.
                 However, software libraries such as Libgcrypt, used by
                 GnuPG, continue to use sliding windows. It is widely
                 believed that, even if the complete pattern of
                 squarings and multiplications is observed through a
                 side-channel attack, the number of exponent bits leaked
                 is not sufficient to carry out a full key-recovery
                 attack against RSA. Specifically, 4-bit sliding windows
                 leak only 40\% of the bits, and 5-bit sliding windows
                 leak only 33\% of the bits.\par

                 In this paper we demonstrate a complete break of
                 RSA-1024 as implemented in Libgcrypt. Our attack makes
                 essential use of the fact that Libgcrypt uses the
                 left-to-right method for computing the sliding-window
                 expansion. We show for the first time that the
                 direction of the encoding matters: the pattern of
                 squarings and multiplications in left-to-right sliding
                 windows leaks significantly more information about the
                 exponent than right-to-left. We show how to extend the
                 Heninger--Shacham algorithm for partial key
                 reconstruction to make use of this information and
                 obtain a very efficient full key recovery for RSA-1024.
                 For RSA-2048 our attack is efficient for 13\% of
                 keys.",
  acknowledgement = ack-nhfb,
  keywords =     "cache attack; collision entropy; Flush+Reload;
                 left-to-right sliding windows; RSA-CRT",
  remark =       "Security hole was fixed in libgcrypt-1.7.8, released
                 29 June 2017.",
}

@Article{Bestavros:2017:PSU,
  author =       "Azer Bestavros and Andrei Lapets and Mayank Varia",
  title =        "Privacy and security: User-centric distributed
                 solutions for privacy-preserving analytics",
  journal =      j-CACM,
  volume =       "60",
  number =       "2",
  pages =        "37--39",
  month =        feb,
  year =         "2017",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/3029603",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Feb 17 17:20:17 MST 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cacm2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://cacm.acm.org/magazines/2017/2/212427/fulltext",
  abstract =     "How can cryptography empower users with sensitive data
                 to access large-scale computing platforms in a
                 privacy-preserving manner?",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Beurdouche:2017:MSU,
  author =       "Benjamin Beurdouche and Karthikeyan Bhargavan and
                 Antoine Delignat-Lavaud and C{\'e}dric Fournet and
                 Markulf Kohlweiss and Alfredo Pironti and Pierre-Yves
                 Strub and Jean Karim Zinzindohoue",
  title =        "A messy state of the union: taming the composite state
                 machines of {TLS}",
  journal =      j-CACM,
  volume =       "60",
  number =       "2",
  pages =        "99--107",
  month =        feb,
  year =         "2017",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/3023357",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Feb 17 17:20:17 MST 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cacm2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://cacm.acm.org/magazines/2017/2/212438/fulltext",
  abstract =     "The Transport Layer Security (TLS) protocol supports
                 various authentication modes, key exchange methods, and
                 protocol extensions. Confusingly, each combination may
                 prescribe a different message sequence between the
                 client and the server, and thus a key challenge for TLS
                 implementations is to define a composite state machine
                 that correctly handles these combinations. If the state
                 machine is too restrictive, the implementation may fail
                 to interoperate with others; if it is too liberal, it
                 may allow unexpected message sequences that break the
                 security of the protocol. We systematically test
                 popular TLS implementations and find unexpected
                 transitions in many of their state machines that have
                 stayed hidden for years. We show how some of these
                 flaws lead to critical security vulnerabilities, such
                 as FREAK. While testing can help find such bugs, formal
                 verification can prevent them entirely. To this end, we
                 implement and formally verify a new composite state
                 machine for OpenSSL, a popular TLS library.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Biswas:2017:SAT,
  author =       "Arnab Kumar Biswas",
  title =        "Source Authentication Techniques for Network-on-Chip
                 Router Configuration Packets",
  journal =      j-JETC,
  volume =       "13",
  number =       "2",
  pages =        "28:1--28:??",
  month =        mar,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2996194",
  ISSN =         "1550-4832",
  bibdate =      "Sat Apr 8 10:16:07 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jetc.bib",
  abstract =     "It is known that maliciously configured
                 Network-on-Chip routers can enable an attacker to
                 launch different attacks inside a Multiprocessor
                 System-on-Chip. A source authentication mechanism for
                 router configuration packets can prevent such
                 vulnerability. This ensures that a router is configured
                 by the configuration packets sent only by a trusted
                 configuration source. Conventional method like Secure
                 Hash Algorithm-3 (SHA-3) can provide required source
                 authentication in a router but with a router area
                 overhead of 1355.25\% compared to a normal router area.
                 We propose eight source authentication mechanisms that
                 can achieve similar level of security as SHA-3 for a
                 router configuration perspective without causing
                 significant area and power increase. Moreover, the
                 processing time of our proposed techniques is 1/100th
                 of SHA-3 implementation. Most of our proposed
                 techniques use different timing channel watermarking
                 methods to transfer source authentication data to the
                 receiver router. We also propose the Individual
                 packet-based stream authentication technique and
                 combinations of this technique with timing channel
                 watermarking techniques. It is shown that, among all of
                 our proposed techniques, maximum router area increment
                 required is 28.32\% compared to a normal router.",
  acknowledgement = ack-nhfb,
  articleno =    "28",
  fjournal =     "ACM Journal on Emerging Technologies in Computing
                 Systems (JETC)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J967",
}

@Article{Biswas:2017:STC,
  author =       "Arnab Kumar Biswas and Dipak Ghosal and Shishir
                 Nagaraja",
  title =        "A Survey of Timing Channels and Countermeasures",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "1",
  pages =        "6:1--6:??",
  month =        apr,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3023872",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jul 24 18:12:19 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "A timing channel is a communication channel that can
                 transfer information to a receiver/decoder by
                 modulating the timing behavior of an entity. Examples
                 of this entity include the interpacket delays of a
                 packet stream, the reordering packets in a packet
                 stream, or the resource access time of a cryptographic
                 module. Advances in the information and coding theory
                 and the availability of high-performance computing
                 systems interconnected by high-speed networks have
                 spurred interest in and development of various types of
                 timing channels. With the emergence of complex timing
                 channels, novel detection and prevention techniques are
                 also being developed to counter them. In this article,
                 we provide a detailed survey of timing channels broadly
                 categorized into network timing channel, in which
                 communicating entities are connected by a network, and
                 in-system timing channel, in which the communicating
                 entities are within a computing system. This survey
                 builds on the last comprehensive survey by Zander et
                 al. [2007] and considers all three canonical
                 applications of timing channels, namely, covert
                 communication, timing side channel, and network flow
                 watermarking. We survey the theoretical foundations,
                 the implementation, and the various detection and
                 prevention techniques that have been reported in
                 literature. Based on the analysis of the current
                 literature, we discuss potential future research
                 directions both in the design and application of timing
                 channels and their detection and prevention
                 techniques.",
  acknowledgement = ack-nhfb,
  articleno =    "6",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Bitansky:2017:VGB,
  author =       "Nir Bitansky and Ran Canetti and Yael Tauman Kalai and
                 Omer Paneth",
  title =        "On Virtual Grey Box Obfuscation for General Circuits",
  journal =      j-ALGORITHMICA,
  volume =       "79",
  number =       "4",
  pages =        "1014--1051",
  month =        dec,
  year =         "2017",
  CODEN =        "ALGOEJ",
  DOI =          "https://doi.org/10.1007/s00453-016-0218-8",
  ISSN =         "0178-4617 (print), 1432-0541 (electronic)",
  ISSN-L =       "0178-4617",
  bibdate =      "Mon Oct 2 10:42:20 MDT 2017",
  bibsource =    "http://link.springer.com/journal/453/79/4;
                 https://www.math.utah.edu/pub/tex/bib/algorithmica.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Algorithmica",
  journal-URL =  "http://link.springer.com/journal/453",
}

@Article{Boche:2017:CQA,
  author =       "Holger Boche and Minglai Cai and Christian Deppe and
                 Janis N{\"o}tzel",
  title =        "Classical-quantum arbitrarily varying wiretap channel:
                 Secret message transmission under jamming attacks",
  journal =      j-J-MATH-PHYS,
  volume =       "58",
  number =       "10",
  pages =        "102203",
  month =        oct,
  year =         "2017",
  CODEN =        "JMAPAQ",
  DOI =          "https://doi.org/10.1063/1.5005947",
  ISSN =         "0022-2488 (print), 1089-7658 (electronic), 1527-2427",
  ISSN-L =       "0022-2488",
  bibdate =      "Mon Mar 4 07:27:42 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jmathphys2015.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Physics",
  journal-URL =  "http://jmp.aip.org/",
}

@Article{Borcea:2017:PEE,
  author =       "Cristian Borcea and Arnab `Bobby'' Deb Gupta and Yuriy
                 Polyakov and Kurt Rohloff and Gerard Ryan",
  title =        "{PICADOR}: End-to-end encrypted Publish--Subscribe
                 information distribution with proxy re-encryption",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "71",
  number =       "??",
  pages =        "177--191",
  month =        jun,
  year =         "2017",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Thu Mar 9 14:20:18 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X16303983",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Bouraoui:2017:HAE,
  author =       "Hasna Bouraoui and Chadlia Jerad and Anupam
                 Chattopadhyay and Nejib Ben Hadj-Alouane",
  title =        "Hardware Architectures for Embedded Speaker
                 Recognition Applications: a Survey",
  journal =      j-TECS,
  volume =       "16",
  number =       "3",
  pages =        "78:1--78:??",
  month =        jul,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2975161",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Mon Jul 24 09:51:12 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tecs.bib",
  abstract =     "Authentication technologies based on biometrics, such
                 as speaker recognition, are attracting more and more
                 interest thanks to the elevated level of security
                 offered by these technologies. Despite offering many
                 advantages, such as remote use and low vulnerability,
                 speaker recognition applications are constrained by the
                 heavy computational effort and the hard real-time
                 constraints. When such applications are run on an
                 embedded platform, the problem becomes more
                 challenging, as additional constraints inherent to this
                 specific domain are added. In the literature, different
                 hardware architectures were used/designed for
                 implementing a process with a focus on a given
                 particular metric. In this article, we give a survey of
                 the state-of-the-art works on implementations of
                 embedded speaker recognition applications. Our aim is
                 to provide an overview of the different approaches
                 dealing with acceleration techniques oriented towards
                 speaker and speech recognition applications and attempt
                 to identify the past, current, and future research
                 trends in the area. Indeed, on the one hand, many
                 flexible solutions were implemented, using either
                 General Purpose Processors or Digital Signal
                 Processors. In general, these types of solutions suffer
                 from low area and energy efficiency. On the other hand,
                 high-performance solutions were implemented on
                 Application Specific Integrated Circuits or Field
                 Programmable Gate Arrays but at the expense of
                 flexibility. Based on the available results, we compare
                 the application requirements vis-{\`a}-vis the
                 performance achieved by the systems. This leads to the
                 projection of new research trends that can be
                 undertaken in the future.",
  acknowledgement = ack-nhfb,
  articleno =    "78",
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J840",
}

@Article{Brandenburger:2017:DTC,
  author =       "Marcus Brandenburger and Christian Cachin and Nikola
                 Knezevi{\'c}",
  title =        "Don't Trust the Cloud, Verify: Integrity and
                 Consistency for Cloud Object Stores",
  journal =      j-TOPS,
  volume =       "20",
  number =       "3",
  pages =        "8:1--8:??",
  month =        aug,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3079762",
  ISSN =         "2471-2566 (print), 2471-2574 (electronic)",
  ISSN-L =       "2471-2566",
  bibdate =      "Sat Dec 23 09:59:06 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tops.bib",
  abstract =     "Cloud services have turned remote computation into a
                 commodity and enable convenient online collaboration.
                 However, they require that clients fully trust the
                 service provider in terms of confidentiality,
                 integrity, and availability. Toward reducing this
                 dependency, this article introduces VICOS, a protocol
                 for verification of integrity and consistency for cloud
                 object storage that enables a group of mutually
                 trusting clients to detect data integrity and
                 consistency violations for a cloud object storage
                 service. It aims at services where multiple clients
                 cooperate on data stored remotely on a potentially
                 misbehaving service. VICOS enforces the consistency
                 notion of fork-linearizability, supports wait-free
                 client semantics for most operations, and reduces the
                 computation and communication overhead compared to
                 previous protocols. VICOS is based on a generic
                 authenticated data structure. Moreover, its operations
                 cover the hierarchical name space of a cloud object
                 store, supporting a real-world interface and not only a
                 simplistic abstraction. A prototype of VICOS that works
                 with the key-value store interface of commodity cloud
                 storage services has been implemented, and an
                 evaluation demonstrates its advantage compared to
                 existing systems.",
  acknowledgement = ack-nhfb,
  articleno =    "8",
  fjournal =     "ACM Transactions on Privacy and Security (TOPS)",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J1547",
}

@Misc{Brook:2017:LSR,
  author =       "Chris Brook",
  title =        "{\tt libgcrypt} `Sliding Right' Attack Allows Recovery
                 of {RSA-1024} Keys",
  howpublished = "Web blog.",
  day =          "5",
  month =        jul,
  year =         "2017",
  bibdate =      "Tue Jul 11 17:00:32 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  note =         "See \cite{Bernstein:2017:SRD}.",
  URL =          "https://threatpost.com/libgcrypt-sliding-right-attack-allows-recovery-of-rsa-1024-keys/126675/",
  abstract =     "The cryptographic library Libgcrypt is vulnerable to a
                 local side-channel attack; something researchers warn
                 could allow full key recovery for RSA-1024.",
  acknowledgement = ack-nhfb,
  remark =       "Security hole was fixed in libgcrypt-1.7.8, released
                 29 June 2017.",
}

@Article{Buchmann:2017:PCS,
  author =       "Johannes Buchmann and Kristin Lauter and Michele
                 Mosca",
  title =        "Postquantum Cryptography --- State of the Art",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "4",
  pages =        "12--13",
  month =        jul # "\slash " # aug,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Aug 29 06:15:10 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/04/msp2017040012.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Buchmann:2017:PCU,
  author =       "Johannes Buchmann and Kristin Lauter and Michele
                 Mosca",
  title =        "Postquantum Cryptography --- State of the Art",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "4",
  pages =        "12--13",
  month =        jul # "\slash " # aug,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Aug 29 06:15:10 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/04/msp2017040012.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
}

@Article{Bunder:2017:GAR,
  author =       "Martin Bunder and Abderrahmane Nitaj and Willy Susilo
                 and Joseph Tonien",
  title =        "A generalized attack on {RSA} type cryptosystems",
  journal =      j-THEOR-COMP-SCI,
  volume =       "704",
  number =       "??",
  pages =        "74--81",
  day =          "15",
  month =        dec,
  year =         "2017",
  CODEN =        "TCSCDI",
  DOI =          "https://doi.org/10.1016/j.tcs.2017.09.009",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Wed Nov 15 12:07:50 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2015.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0304397517306643",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{Butin:2017:HBS,
  author =       "Denis Butin",
  title =        "Hash-Based Signatures: State of Play",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "4",
  pages =        "37--43",
  month =        jul # "\slash " # aug,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2017.3151334",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Aug 29 06:15:10 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/04/msp2017040037-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Calzavara:2017:SWJ,
  author =       "Stefano Calzavara and Riccardo Focardi and Marco
                 Squarcina and Mauro Tempesta",
  title =        "Surviving the {Web}: a Journey into {Web} Session
                 Security",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "1",
  pages =        "13:1--13:??",
  month =        apr,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3038923",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Mon Jul 24 18:12:19 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "In this article, we survey the most common attacks
                 against web sessions, that is, attacks that target
                 honest web browser users establishing an authenticated
                 session with a trusted web application. We then review
                 existing security solutions that prevent or mitigate
                 the different attacks by evaluating them along four
                 different axes: protection, usability, compatibility,
                 and ease of deployment. We also assess several
                 defensive solutions that aim at providing robust
                 safeguards against multiple attacks. Based on this
                 survey, we identify five guidelines that, to different
                 extents, have been taken into account by the designers
                 of the different proposals we reviewed. We believe that
                 these guidelines can be helpful for the development of
                 innovative solutions approaching web security in a more
                 systematic and comprehensive way.",
  acknowledgement = ack-nhfb,
  articleno =    "13",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Chailloux:2017:PLQ,
  author =       "Andr{\'e} Chailloux and Iordanis Kerenidis",
  title =        "Physical Limitations of Quantum Cryptographic
                 Primitives or Optimal Bounds for Quantum Coin Flipping
                 and Bit Commitment",
  journal =      j-SIAM-J-COMPUT,
  volume =       "46",
  number =       "5",
  pages =        "1647--1677",
  month =        "????",
  year =         "2017",
  CODEN =        "SMJCAT",
  DOI =          "https://doi.org/10.1137/15M1010853",
  ISSN =         "0097-5397 (print), 1095-7111 (electronic)",
  ISSN-L =       "0097-5397",
  bibdate =      "Wed Oct 9 17:50:39 MDT 2019",
  bibsource =    "http://epubs.siam.org/sam-bin/dbq/toclist/SICOMP/46/5;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/siamjcomput.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "SIAM Journal on Computing",
  journal-URL =  "http://epubs.siam.org/sicomp",
  onlinedate =   "January 2017",
}

@Article{Chatterjee:2017:IPB,
  author =       "Sanjit Chatterjee and Alfred Menezes and Francisco
                 Rodr{\'\i}guez-Henr{\'\i}quez",
  title =        "On Instantiating Pairing-Based Protocols with Elliptic
                 Curves of Embedding Degree One",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "66",
  number =       "6",
  pages =        "1061--1070",
  month =        jun,
  year =         "2017",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2016.2633340",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Thu Jun 8 10:37:11 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  URL =          "http://ieeexplore.ieee.org/document/7762073/",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Chatterjee:2017:PBS,
  author =       "Urbi Chatterjee and Rajat Subhra Chakraborty and
                 Debdeep Mukhopadhyay",
  title =        "A {PUF}-Based Secure Communication Protocol for
                 {IoT}",
  journal =      j-TECS,
  volume =       "16",
  number =       "3",
  pages =        "67:1--67:??",
  month =        jul,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3005715",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Mon Jul 24 09:51:12 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tecs.bib",
  abstract =     "Security features are of paramount importance for the
                 Internet of Things (IoT), and implementations are
                 challenging given the resource-constrained IoT setup.
                 We have developed a lightweight identity-based
                 cryptosystem suitable for IoT to enable secure
                 authentication and message exchange among the devices.
                 Our scheme employs a Physically Unclonable Function
                 (PUF) to generate the public identity of each device,
                 which is used as the public key for each device for
                 message encryption. We have provided formal proofs of
                 security in the Session Key Security and Universally
                 Composable Framework of the proposed protocol, which
                 demonstrates the resilience of the scheme against
                 passive and active attacks. We have demonstrated the
                 setup required for the protocol implementation and
                 shown that the proposed protocol implementation incurs
                 low hardware and software overhead.",
  acknowledgement = ack-nhfb,
  articleno =    "67",
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J840",
}

@Article{Chen:2017:CSQ,
  author =       "Lidong Chen",
  title =        "Cryptography Standards in Quantum Time: New Wine in an
                 Old Wineskin?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "4",
  pages =        "51--57",
  month =        jul # "\slash " # aug,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2017.3151339",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Aug 29 06:15:10 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/04/msp2017040051-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
}

@Article{Chen:2017:LAA,
  author =       "Min Chen and Shigang Chen and Yuguang Fang",
  title =        "Lightweight Anonymous Authentication Protocols for
                 {RFID} Systems",
  journal =      j-IEEE-TRANS-NETWORKING,
  volume =       "25",
  number =       "3",
  pages =        "1475--1488",
  month =        jun,
  year =         "2017",
  CODEN =        "IEANEP",
  DOI =          "https://doi.org/10.1109/TNET.2016.2631517",
  ISSN =         "1063-6692 (print), 1558-2566 (electronic)",
  ISSN-L =       "1063-6692",
  bibdate =      "Tue Oct 3 16:29:32 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
  abstract =     "Radio-frequency identification RFID technologies are
                 making their way into retail products, library books,
                 debit cards, passports, driver licenses, car plates,
                 medical devices, and so on. The widespread use of tags
                 in traditional ways of deployment raises a privacy
                 concern: they make their carriers trackable. To protect
                 the privacy of the tag carriers, we need to invent new
                 mechanisms that keep the usefulness of tags while doing
                 so anonymously. Many tag applications, such as toll
                 payment, require authentication. This paper studies the
                 problem of anonymous authentication. Since low-cost
                 tags have extremely limited hardware resource, we
                 propose an asymmetric design principle that pushes most
                 complexity to more powerful RFID readers. With this
                 principle, we develop a lightweight technique that
                 generates dynamic tokens for anonymous authentication.
                 Instead of implementing complicated and
                 hardware-intensive cryptographic hash functions, our
                 authentication protocol only requires tags to perform
                 several simple and hardware-efficient operations such
                 as bitwise XOR, one-bit left circular shift, and bit
                 flip. The theoretical analysis and randomness tests
                 demonstrate that our protocol can ensure the privacy of
                 the tags. Moreover, our protocol reduces the
                 communication overhead and online computation overhead
                 to $ O1 $ per authentication for both tags and readers,
                 which compares favorably with the prior art.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE\slash ACM Transactions on Networking",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J771",
}

@Article{Chen:2017:PGF,
  author =       "Yajing Chen and Shengshuo Lu and Cheng Fu and David
                 Blaauw and Ronald {Dreslinski, Jr.} and Trevor Mudge
                 and Hun-Seok Kim",
  title =        "A Programmable {Galois} Field Processor for the
                 {Internet of Things}",
  journal =      j-COMP-ARCH-NEWS,
  volume =       "45",
  number =       "2",
  pages =        "55--68",
  month =        may,
  year =         "2017",
  CODEN =        "CANED2",
  DOI =          "https://doi.org/10.1145/3140659.3080227",
  ISSN =         "0163-5964 (print), 1943-5851 (electronic)",
  ISSN-L =       "0163-5964",
  bibdate =      "Fri Sep 15 11:09:14 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigarch.bib",
  abstract =     "This paper investigates the feasibility of a unified
                 processor architecture to enable error coding
                 flexibility and secure communication in low power
                 Internet of Things (IoT) wireless networks. Error
                 coding flexibility for wireless communication allows
                 IoT applications to exploit the large tradeoff space in
                 data rate, link distance and energy-efficiency. As a
                 solution, we present a light-weight Galois Field (GF)
                 processor to enable energy-efficient block coding and
                 symmetric/asymmetric cryptography kernel processing for
                 a wide range of GF sizes (2m, m = 2, 3, ..., 233) and
                 arbitrary irreducible polynomials. Program directed
                 connections among primitive GF arithmetic units enable
                 dynamically configured parallelism to efficiently
                 perform either four-way SIMD 5- to 8-bit GF operations,
                 including multiplicative inverse, or a wide bit-width
                 (e.g., 32-bit) GF product in a single cycle. To
                 illustrate our ideas, we synthesized our GF processor
                 in a 28nm technology. Compared to a baseline software
                 implementation optimized for a general purpose ARM M0+
                 processor, our processor exhibits a 5-20 x speedup for
                 a range of error correction codes and
                 symmetric/asymmetric cryptography applications.
                 Additionally, our proposed GF processor consumes 431 $
                 \mu $W at 0.9V and 100MHz, and achieves 35.5pJ/b energy
                 efficiency while executing AES operations at 12.2Mbps.
                 We achieve this within an area of 0.01mm2.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGARCH Computer Architecture News",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J89",
}

@Article{Chen:2017:SIE,
  author =       "Chin-Ling Chen and Jungpil Shin and Yu-Ting Tsai and
                 Aniello Castiglione and Francesco Palmieri",
  title =        "Securing Information Exchange in {VANETs} by Using
                 Pairing-Based Cryptography",
  journal =      j-INT-J-FOUND-COMP-SCI,
  volume =       "28",
  number =       "6",
  pages =        "781--??",
  month =        sep,
  year =         "2017",
  CODEN =        "IFCSEN",
  DOI =          "https://doi.org/10.1142/S0129054117400184",
  ISSN =         "0129-0541",
  ISSN-L =       "0129-0541",
  bibdate =      "Fri Feb 9 11:49:58 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijfcs.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Foundations of Computer
                 Science (IJFCS)",
  journal-URL =  "http://www.worldscientific.com/loi/ijfcs",
}

@Article{Chen:2017:VME,
  author =       "Jiageng Chen and Rashed Mazumder and Atsuko Miyaji and
                 Chunhua Su",
  title =        "Variable message encryption through blockcipher
                 compression function",
  journal =      j-CCPE,
  volume =       "29",
  number =       "7",
  pages =        "??--??",
  day =          "10",
  month =        apr,
  year =         "2017",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.3956",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Fri Mar 31 19:12:52 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/datacompression.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
}

@Article{Cheng:2017:ISK,
  author =       "Longwang Cheng and Wei Li and Li Zhou and Chunsheng
                 Zhu and Jibo Wei and Yantao Guo",
  title =        "Increasing secret key capacity of {OFDM} systems: a
                 geometric program approach",
  journal =      j-CCPE,
  volume =       "29",
  number =       "16",
  pages =        "",
  day =          "25",
  month =        aug,
  year =         "2017",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.3966",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Mon Jul 24 08:22:39 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
}

@Article{Choo:2017:EDF,
  author =       "Kim-Kwang Raymond Choo and Yunsi Fei and Yang Xiang
                 and Yu Yu",
  title =        "Embedded Device Forensics and Security",
  journal =      j-TECS,
  volume =       "16",
  number =       "2",
  pages =        "50:1--50:??",
  month =        apr,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3015662",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Mon Jul 24 09:51:12 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tecs.bib",
  abstract =     "While the increasing digitalization of our society and
                 amalgamation of embedded devices into the
                 ever-increasing facets of our daily life (e.g., in
                 smart and intelligent vehicles, smart cities and smart
                 nations, and critical infrastructure sectors) have
                 resulted in improved productivity and quality of life,
                 the trend has also resulted in a trend of increasing
                 frequency and sophistication of cyber exploitation and
                 cyber threats. Hence, there is a need for coordinated
                 efforts from the research community to address
                 resulting concerns using both cryptographic and
                 non-cryptographic solutions, such as those presented in
                 this special section.",
  acknowledgement = ack-nhfb,
  articleno =    "50",
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J840",
}

@TechReport{Cohney:2017:PSR,
  author =       "Shaanan Cohney and Matthew D. Green and Nadia
                 Heninger",
  title =        "Practical state recovery attacks against legacy {RNG}
                 implementations",
  type =         "Report",
  institution =  "University of Pennsylvania and The Johns Hopkins
                 University",
  address =      "College Park, PA and Baltimore, MD",
  pages =        "15",
  day =          "23",
  month =        oct,
  year =         "2017",
  bibdate =      "Thu Oct 26 07:52:23 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "https://duhkattack.com/paper.pdf",
  abstract =     "The ANSI X9.17/X9.31 random number generator is a
                 pseudorandom number generator design based on a block
                 cipher and updated using the current time. First
                 standardized in 1985, variants of this PRNG design were
                 incorporated into numerous cryptographic standards over
                 the next three decades. It remained on the list of FIPS
                 140-1 and 140-2 approved random number generation
                 algorithms until January 2016. The design uses a static
                 key with the specified block cipher to produce
                 pseudo-random output. It has been known since at least
                 1998 that the key must remain secret in order for the
                 random number generator to be secure. However, neither
                 the FIPS 140-2 standardization process in 2001 or
                 NIST's update of the algorithm in 2005 appear to have
                 specified any process for key generation.\par

                 We performed a systematic study of publicly available
                 FIPS 140-2 certifications for hundreds of products that
                 implemented the ANSI X9.31 random number generator, and
                 found twelve whose certification documents use of
                 static hard-coded keys in source code, leaving them
                 vulnerable to an attacker who can learn this key from
                 the source code or binary. In order to demonstrate the
                 practicality of this attack, we develop a full passive
                 decryption attack against FortiGate VPN gateway
                 products using FortiOS version 4. Private key recovery
                 requires a few seconds of computation. We measured the
                 prevalence of this vulnerability on the visible
                 Internet using active scans and find that we are able
                 to recover the random number generator state for 21\%
                 of HTTPS hosts serving a default Fortinet product
                 certificate, and 97\% of hosts with metadata
                 identifying FortiOSv4. We successfully demonstrate full
                 private key recovery in the wild against a subset of
                 these hosts that accept IPsec connections.",
  acknowledgement = ack-nhfb,
}

@Book{Collie:2017:CBI,
  author =       "Craig Collie",
  title =        "Code Breakers: Inside the Shadow World of Signals
                 Intelligence in {Australia}'s Two {Bletchley Parks}",
  publisher =    "Allen and Unwin",
  address =      "Sydney, NSW, Australia",
  pages =        "ix + 389 + 16",
  year =         "2017",
  ISBN =         "1-74269-977-4 (e-book), 1-74331-210-5 (paperback)",
  ISBN-13 =      "978-1-74269-977-6 (e-book), 978-1-74331-210-0
                 (paperback)",
  LCCN =         "D810.C88",
  bibdate =      "Tue Apr 9 06:28:27 MDT 2024",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "The extraordinary untold story of the brilliant men
                 and women who cracked the Japanese codes from Australia
                 during World War II. At the height of World War II in
                 the Pacific, two secret organisations existed in
                 Australia to break the Japanese military codes. They
                 were peopled by brilliant and idiosyncratic
                 cryptographers with achievements in mathematics and the
                 classics. These men patiently and carefully deciphered
                 the Japanese signals, ultimately making a significant
                 contribution to the victories at Midway, Coral Sea and
                 Milne Bay. But this is more than a story of codes. It
                 is an extraordinary exploration of a unique group of
                 men and their intense personal rivalries. It is also
                 the story of a fierce inter-national and inter-service
                 political battle for control of war-changing
                 intelligence between a group of Australian
                 cryptographers based at the Monterey apartment block in
                 Melbourne's Albert Park with strong connections to
                 British Naval Intelligence and General MacArthur's
                 counter group allied to the US military that eventually
                 established its headquarters in suburban Brisbane. What
                 happened between these two groups would have
                 consequences for intelligence services in the years to
                 follow. Code Breakers brings this surprising and very
                 secret world and the men who operated in it to rich
                 life for the first time.",
  acknowledgement = ack-nhfb,
  subject =      "World War, 1939--1945; Cryptography; Secret service;
                 Australia; Electronic intelligence; Guerre mondiale,
                 1939-1945; Cryptographie; Service secret; Australie;
                 Renseignement {\'e}lectronique; History; Cryptography;
                 Electronic intelligence; Secret service; Australia",
  tableofcontents = "List of maps \\
                 Abbreviations \\
                 Relationship of Allied code-breaking units diagram \\
                 1: Burn the codes and ciphers \\
                 2: Pioneer of the code breaker's craft \\
                 3: Special Intelligence Bureau \\
                 4: The road to Corregidor \\
                 5: Scramble to safety \\
                 6: The turning of the tide \\
                 7: Midway \\
                 8: Central Bureau \\
                 9: The Water TransportCode broken \\
                 10: The admiral's itinerary \\
                 11: Buried treasure \\
                 12: The front line and the back room \\
                 13: A new world, a new enemy \\
                 Pic section \\
                 Coding and Decoding Japan's Military Messages \\
                 Glossary of technical terms \\
                 Cast of characters \\
                 Acknowledgements \\
                 Notes \\
                 Bibliography \\
                 Index",
}

@Article{Constantin:2017:SHF,
  author =       "Lucian Constantin",
  title =        "The {SHA1} hash function is now completely unsafe:
                 Researchers have achieved the first practical {SHA-1}
                 collision, generating two {PDF} files with the same
                 signature",
  journal =      j-COMPUTERWORLD,
  volume =       "??",
  number =       "??",
  pages =        "??--??",
  day =          "23",
  month =        feb,
  year =         "2017",
  CODEN =        "CMPWAB",
  ISSN =         "0010-4841",
  bibdate =      "Thu Sep 03 14:26:31 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  URL =          "https://www.computerworld.com/article/3173616/the-sha1-hash-function-is-now-completely-unsafe.html",
  abstract =     "Security researchers have achieved the first
                 real-world collision attack against the SHA-1 hash
                 function, producing two different PDF files with the
                 same SHA-1 signature. This shows that the algorithm's
                 use for security-sensitive functions should be
                 discontinued as soon as possible.",
  acknowledgement = ack-nhfb,
  fjournal =     "ComputerWorld",
  remark =       "From the article: ``it was one of the largest
                 computations ever completed: the equivalent processing
                 power of 6,500 years of single-CPU computations and 110
                 years of single-GPU computations.''",
}

@Article{Crampton:2017:CEI,
  author =       "Jason Crampton and Naomi Farley and Gregory Gutin and
                 Mark Jones and Bertram Poettering",
  title =        "Cryptographic enforcement of information flow policies
                 without public information via tree partitions",
  journal =      j-J-COMP-SECUR,
  volume =       "25",
  number =       "6",
  pages =        "511--535",
  month =        "????",
  year =         "2017",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-16863",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 23 05:47:13 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Datta:2017:SFH,
  author =       "Pratish Datta and Ratna Dutta and Sourav
                 Mukhopadhyay",
  title =        "Strongly full-hiding inner product encryption",
  journal =      j-THEOR-COMP-SCI,
  volume =       "667",
  number =       "??",
  pages =        "16--50",
  day =          "8",
  month =        mar,
  year =         "2017",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Wed Feb 15 08:03:13 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2015.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0304397516307526",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975/",
}

@Article{DeCapitanidiVimercati:2017:AMM,
  author =       "Sabrina {De Capitani di Vimercati} and Sara Foresti
                 and Sushil Jajodia and Giovanni Livraga and Stefano
                 Paraboschi and Pierangela Samarati",
  title =        "An authorization model for multi provider queries",
  journal =      j-PROC-VLDB-ENDOWMENT,
  volume =       "11",
  number =       "3",
  pages =        "256--268",
  month =        nov,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.14778/3157794.3157796",
  ISSN =         "2150-8097",
  bibdate =      "Mon Dec 11 16:07:56 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/vldbe.bib",
  abstract =     "We present a novel approach for the specification and
                 enforcement of authorizations that enables controlled
                 data sharing for collaborative queries in the cloud.
                 Data authorities can establish authorizations
                 regulating access to their data distinguishing three
                 visibility levels (no visibility, encrypted visibility,
                 and plaintext visibility). Authorizations are enforced
                 in the query execution by possibly restricting
                 operation assignments to other parties and by adjusting
                 visibility of data on-the-fly. Our approach enables
                 users and data authorities to fully enjoy the benefits
                 and economic savings of the competitive open cloud
                 market, while maintaining control over data.",
  acknowledgement = ack-nhfb,
  fjournal =     "Proceedings of the VLDB Endowment",
  journal-URL =  "http://portal.acm.org/citation.cfm?id=J1174",
}

@Article{Deng:2017:LLH,
  author =       "Zhaoxia Deng and Ariel Feldman and Stuart A. Kurtz and
                 Frederic T. Chong",
  title =        "Lemonade from Lemons: Harnessing Device Wearout to
                 Create Limited-Use Security Architectures",
  journal =      j-COMP-ARCH-NEWS,
  volume =       "45",
  number =       "2",
  pages =        "361--374",
  month =        may,
  year =         "2017",
  CODEN =        "CANED2",
  DOI =          "https://doi.org/10.1145/3140659.3080226",
  ISSN =         "0163-5964 (print), 1943-5851 (electronic)",
  ISSN-L =       "0163-5964",
  bibdate =      "Fri Sep 15 11:09:14 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigarch.bib",
  abstract =     "Most architectures are designed to mitigate the
                 usually undesirable phenomenon of device wearout. We
                 take a contrarian view and harness this phenomenon to
                 create hardware security mechanisms that resist attacks
                 by statistically enforcing an upper bound on hardware
                 uses, and consequently attacks. For example, let us
                 assume that a user may log into a smartphone a maximum
                 of 50 times a day for 5 years, resulting in
                 approximately 91,250 legitimate uses. If we assume at
                 least 8-character passwords and we require login (and
                 retrieval of the storage decryption key) to traverse
                 hardware that wears out in 91,250 uses, then an
                 adversary has a negligible chance of successful
                 brute-force attack before the hardware wears out, even
                 assuming real-world password cracking by professionals.
                 M-way replication of our hardware and periodic
                 re-encryption of storage can increase the daily usage
                 bound by a factor of M. The key challenge is to achieve
                 practical statistical bounds on both minimum and
                 maximum uses for an architecture, given that individual
                 devices can vary widely in wearout characteristics. We
                 introduce techniques for architecturally controlling
                 these bounds and perform a design space exploration for
                 three use cases: a limited-use connection, a
                 limited-use targeting system and one-time pads. These
                 techniques include decision trees, parallel structures,
                 Shamir's secret-sharing mechanism, Reed--Solomon codes,
                 and module replication. We explore the cost in area,
                 energy and latency of using these techniques to achieve
                 system-level usage targets given device-level wearout
                 distributions. With redundant encoding, for example, we
                 can improve exponential sensitivity to device lifetime
                 variation to linear sensitivity, reducing the total
                 number of NEMS devices by 4 orders of magnitude to
                 about 0.8 million for limited-use connections (compared
                 with 4 billion if without redundant encoding).",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGARCH Computer Architecture News",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J89",
}

@Article{Ding:2017:CSM,
  author =       "Jintai Ding and Albrecht Petzoldt",
  title =        "Current State of Multivariate Cryptography",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "4",
  pages =        "28--36",
  month =        jul # "\slash " # aug,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2017.3151328",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Aug 29 06:15:10 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/04/msp2017040028-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
}

@Article{Dinur:2017:IGA,
  author =       "Itai Dinur and Ga{\"e}tan Leurent",
  title =        "Improved Generic Attacks Against Hash-Based {MACs} and
                 {HAIFA}",
  journal =      j-ALGORITHMICA,
  volume =       "79",
  number =       "4",
  pages =        "1161--1195",
  month =        dec,
  year =         "2017",
  CODEN =        "ALGOEJ",
  DOI =          "https://doi.org/10.1007/s00453-016-0236-6",
  ISSN =         "0178-4617 (print), 1432-0541 (electronic)",
  ISSN-L =       "0178-4617",
  bibdate =      "Mon Oct 2 10:42:20 MDT 2017",
  bibsource =    "http://link.springer.com/journal/453/79/4;
                 https://www.math.utah.edu/pub/tex/bib/algorithmica.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Algorithmica",
  journal-URL =  "http://link.springer.com/journal/453",
}

@Article{Dodis:2017:HEY,
  author =       "Yevgeniy Dodis and Adi Shamir and Noah
                 Stephens-Davidowitz and Daniel Wichs",
  title =        "How to Eat Your Entropy and Have it Too: Optimal
                 Recovery Strategies for Compromised {RNGs}",
  journal =      j-ALGORITHMICA,
  volume =       "79",
  number =       "4",
  pages =        "1196--1232",
  month =        dec,
  year =         "2017",
  CODEN =        "ALGOEJ",
  DOI =          "https://doi.org/10.1007/s00453-016-0239-3",
  ISSN =         "0178-4617 (print), 1432-0541 (electronic)",
  ISSN-L =       "0178-4617",
  bibdate =      "Mon Oct 2 10:42:20 MDT 2017",
  bibsource =    "http://link.springer.com/journal/453/79/4;
                 https://www.math.utah.edu/pub/tex/bib/algorithmica.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Algorithmica",
  journal-URL =  "http://link.springer.com/journal/453",
  keywords =     "Fortuna RNG algorithm; Random number generator; RNG;
                 State compromise",
}

@Article{Doychev:2017:RAS,
  author =       "Goran Doychev and Boris K{\"o}pf",
  title =        "Rigorous analysis of software countermeasures against
                 cache attacks",
  journal =      j-SIGPLAN,
  volume =       "52",
  number =       "6",
  pages =        "406--421",
  month =        jun,
  year =         "2017",
  CODEN =        "SINODQ",
  DOI =          "https://doi.org/10.1145/3140587.3062388",
  ISSN =         "0362-1340 (print), 1523-2867 (print), 1558-1160
                 (electronic)",
  ISSN-L =       "0362-1340",
  bibdate =      "Sat Sep 16 10:18:17 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigplan2010.bib",
  abstract =     "CPU caches introduce variations into the execution
                 time of programs that can be exploited by adversaries
                 to recover private information about users or
                 cryptographic keys. Establishing the security of
                 countermeasures against this threat often requires
                 intricate reasoning about the interactions of program
                 code, memory layout, and hardware architecture and has
                 so far only been done for restricted cases. In this
                 paper we devise novel techniques that provide support
                 for bit-level and arithmetic reasoning about memory
                 accesses in the presence of dynamic memory allocation.
                 These techniques enable us to perform the first
                 rigorous analysis of widely deployed software
                 countermeasures against cache attacks on modular
                 exponentiation, based on executable code.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGPLAN Notices",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J706",
  remark =       "PLDI '17 conference proceedings.",
}

@Article{Drosatos:2017:PET,
  author =       "George Drosatos and Aimilia Tasidou and Pavlos S.
                 Efraimidis",
  title =        "Privacy-Enhanced Television Audience Measurements",
  journal =      j-TOIT,
  volume =       "17",
  number =       "1",
  pages =        "10:1--10:??",
  month =        mar,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3009969",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Mon Jul 24 17:19:25 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/toit/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "Internet-enabled television systems (SmartTVs) are a
                 development that introduces these devices into the
                 interconnected environment of the Internet of Things.
                 We propose a privacy-preserving application for
                 computing Television Audience Measurement (TAM)
                 ratings. SmartTVs communicate over the Internet to
                 calculate aggregate measurements. Contemporary
                 cryptographic building blocks are utilized to ensure
                 the privacy of the participating individuals and the
                 validity of the computed TAM ratings. Additionally,
                 user compensation capabilities are introduced to bring
                 some of the company profits back to the data owners. A
                 prototype implementation is developed on an
                 Android-based SmartTV platform and experimental results
                 illustrate the feasibility of the approach.",
  acknowledgement = ack-nhfb,
  articleno =    "10",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Dutta:2017:EFC,
  author =       "Tanima Dutta and Hari Prabhat Gupta",
  title =        "An Efficient Framework for Compressed Domain
                 Watermarking in {$P$} Frames of High-Efficiency Video
                 Coding ({HEVC})-Encoded Video",
  journal =      j-TOMCCAP,
  volume =       "13",
  number =       "1",
  pages =        "12:1--12:??",
  month =        jan,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3002178",
  ISSN =         "1551-6857 (print), 1551-6865 (electronic)",
  ISSN-L =       "1551-6857",
  bibdate =      "Wed Jan 18 17:18:28 MST 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tomccap/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/datacompression.bib;
                 https://www.math.utah.edu/pub/tex/bib/tomccap.bib",
  abstract =     "Digital watermarking has received much attention in
                 recent years as a promising solution to copyright
                 protection. Video watermarking in compressed domain has
                 gained importance since videos are stored and
                 transmitted in a compressed format. This decreases the
                 overhead to fully decode and re-encode the video for
                 embedding and extraction of the watermark. High
                 Efficiency Video Coding (HEVC/H.265) is the latest and
                 most efficient video compression standard and a
                 successor to H.264 Advanced Video Coding. In this
                 article, we propose a robust watermarking framework for
                 HEVC-encoded video using informed detector. A readable
                 watermark is embedded invisibly in P frames for better
                 perceptual quality. Our framework imposes security and
                 robustness by selecting appropriate blocks using a
                 random key and the spatio-temporal characteristics of
                 the compressed video. A detail analysis of the
                 strengths of different compressed domain features is
                 performed for implementing the watermarking framework.
                 We experimentally demonstrate the utility of the
                 proposed work. The results show that the proposed work
                 effectively limits the increase in video bitrate and
                 degradation in perceptual quality. The proposed
                 framework is robust against re-encoding and image
                 processing attacks.",
  acknowledgement = ack-nhfb,
  articleno =    "12",
  fjournal =     "ACM Transactions on Multimedia Computing,
                 Communications, and Applications",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J961",
}

@Article{Edwards:2017:NSQ,
  author =       "Chris Edwards",
  title =        "News: Secure quantum communications",
  journal =      j-CACM,
  volume =       "60",
  number =       "2",
  pages =        "15--17",
  month =        feb,
  year =         "2017",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/3022179",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Feb 17 17:20:17 MST 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cacm2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://cacm.acm.org/magazines/2017/2/212424/fulltext",
  abstract =     "Data locking experiments provide stepping stones to a
                 possible future in quantum cryptography.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Ermis:2017:KAP,
  author =       "Orhan Ermis and Serif Bahtiyar and Emin Anarim and M.
                 Ufuk {\c{C}}aglayan",
  title =        "A key agreement protocol with partial backward
                 confidentiality",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "129 (part 1)",
  number =       "??",
  pages =        "159--177",
  day =          "24",
  month =        dec,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Wed Nov 22 06:05:46 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1389128617303596",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286/",
}

@Article{Esiner:2017:QRI,
  author =       "Ertem Esiner and Anwitaman Datta",
  title =        "On query result integrity over encrypted data",
  journal =      j-INFO-PROC-LETT,
  volume =       "122",
  number =       "??",
  pages =        "34--39",
  month =        jun,
  year =         "2017",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Mon Mar 27 21:15:48 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019017300327",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Essex:2017:DDU,
  author =       "Aleksander Essex",
  title =        "Detecting the Detectable: Unintended Consequences of
                 Cryptographic Election Verification",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "3",
  pages =        "30--38",
  month =        may # "\slash " # jun,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2017.69",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 25 21:35:08 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/03/msp2017030030-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
}

@Article{Eyal:2017:BTT,
  author =       "Ittay Eyal",
  title =        "Blockchain Technology: Transforming Libertarian
                 Cryptocurrency Dreams to Finance and Banking
                 Realities",
  journal =      j-COMPUTER,
  volume =       "50",
  number =       "9",
  pages =        "38--49",
  month =        sep,
  year =         "2017",
  CODEN =        "CPTRB4",
  DOI =          "https://doi.org/10.1109/MC.2017.3571042",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Mon Oct 2 08:46:55 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/computer2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.computer.org/csdl/mags/co/2017/09/mco2017090038-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
}

@Book{Fagone:2017:WWS,
  author =       "Jason Fagone",
  title =        "The woman who smashed codes: a true story of love,
                 spies, and the unlikely heroine who outwitted
                 {America}'s enemies",
  publisher =    "Dey Street Books",
  address =      "New York, New York",
  pages =        "xvi + 444",
  year =         "2017",
  ISBN =         "0-06-243048-3 (hardcover)",
  ISBN-13 =      "978-0-06-243048-9 (hardcover)",
  LCCN =         "Z103.4.U6",
  bibdate =      "Fri Dec 22 09:19:43 MST 2017",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/master.bib",
  abstract =     "In 1916, at the height of World War I, brilliant
                 Shakespeare expert Elizebeth Smith went to work for an
                 eccentric tycoon on his estate outside Chicago. The
                 tycoon had close ties to the U.S. government, and he
                 soon asked Elizebeth to apply her language skills to an
                 exciting new venture: code-breaking. There she met the
                 man who would become her husband, groundbreaking
                 cryptologist William Friedman. Though she and Friedman
                 are in many ways the ``Adam and Eve'' of the NSA,
                 Elizebeth's story, incredibly, has never been told. In
                 \booktitle{The Woman Who Smashed Codes}, Jason Fagone
                 chronicles the life of this extraordinary woman, who
                 played an integral role in our nation's history for
                 forty years. After World War I, Smith used her talents
                 to catch gangsters and smugglers during Prohibition,
                 then accepted a covert mission to discover and expose
                 Nazi spy rings that were spreading like wildfire across
                 South America, advancing ever closer to the United
                 States. As World War II raged, Elizebeth fought a
                 highly classified battle of wits against Hitler's
                 Reich, cracking multiple versions of the Enigma machine
                 used by German spies. Meanwhile, inside an Army vault
                 in Washington, William worked furiously to break
                 Purple, the Japanese version of Enigma --- and
                 eventually succeeded, at a terrible cost to his
                 personal life. Fagone unveils America's code-breaking
                 history through the prism of Smith's life, bringing
                 into focus the unforgettable events and colorful
                 personalities that would help shape modern
                 intelligence.",
  acknowledgement = ack-nhfb,
  subject =      "Friedman, Elizebeth; Friedman, Elizebeth,;
                 Cryptographers; United States; Biography; Cryptography;
                 History; Cryptographers; Cryptography; Riverbank
                 Laboratories",
  subject-dates = "Elizebeth Smith Friedman (1892--1980); William
                 Frederick Friedman (1891--1969)",
  tableofcontents = "Author's note: Prying eyes \\
                 Fabyan \\
                 Unbelievable, yet it was there \\
                 Bacon's ghost \\
                 He who fears is half dead \\
                 The escape plot \\
                 Target practice \\
                 Grandmother died \\
                 Magic \\
                 The Hauptsturmf{\"u}hrer and the Funkmeister \\
                 Circuit 3-N \\
                 The doll lady \\
                 Hitler's lair \\
                 Epilogue: Girl cryptanalyst and all that",
}

@Article{Fan:2017:SSP,
  author =       "Jingyuan Fan and Chaowen Guan and Kui Ren and Yong Cui
                 and Chunming Qiao",
  title =        "{SPABox}: Safeguarding Privacy During Deep Packet
                 Inspection at a {MiddleBox}",
  journal =      j-IEEE-TRANS-NETWORKING,
  volume =       "25",
  number =       "6",
  pages =        "3753--3766",
  month =        dec,
  year =         "2017",
  CODEN =        "IEANEP",
  DOI =          "https://doi.org/10.1109/TNET.2017.2753044",
  ISSN =         "1063-6692 (print), 1558-2566 (electronic)",
  ISSN-L =       "1063-6692",
  bibdate =      "Thu Jan 18 06:52:57 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
  abstract =     "Widely used over the Internet to encrypt traffic,
                 HTTPS provides secure and private data communication
                 between clients and servers. However, to cope with
                 rapidly changing and sophisticated security attacks,
                 network operators often deploy middleboxes to perform
                 deep packet inspection DPI to detect attacks and
                 potential security breaches, using techniques ranging
                 from simple keyword matching to more advanced machine
                 learning and data mining analysis. But this creates a
                 problem: how can middleboxes, which employ DPI, work
                 over HTTPS connections with encrypted traffic while
                 preserving privacy? In this paper, we present SPABox, a
                 middlebox-based system that supports both keyword-based
                 and data analysis-based DPI functions over encrypted
                 traffic. SPABox preserves privacy by using a novel
                 protocol with a limited connection setup overhead. We
                 implement SPABox on a standard server and show that
                 SPABox is practical for both long-lived and short-lived
                 connection. Compared with the state-of-the-art Blindbox
                 system, SPABox is more than five orders of magnitude
                 faster and requires seven orders of magnitude less
                 bandwidth for connection setup while SPABox can achieve
                 a higher security level.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE\slash ACM Transactions on Networking",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J771",
}

@Article{Farras:2017:IRN,
  author =       "Oriol Farr{\`a}s and Torben Brandt Hansen and Tarik
                 Kaced and Carles Padr{\'o}",
  title =        "On the Information Ratio of Non-perfect Secret Sharing
                 Schemes",
  journal =      j-ALGORITHMICA,
  volume =       "79",
  number =       "4",
  pages =        "987--1013",
  month =        dec,
  year =         "2017",
  CODEN =        "ALGOEJ",
  DOI =          "https://doi.org/10.1007/s00453-016-0217-9",
  ISSN =         "0178-4617 (print), 1432-0541 (electronic)",
  ISSN-L =       "0178-4617",
  bibdate =      "Mon Oct 2 10:42:20 MDT 2017",
  bibsource =    "http://link.springer.com/journal/453/79/4;
                 https://www.math.utah.edu/pub/tex/bib/algorithmica.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Algorithmica",
  journal-URL =  "http://link.springer.com/journal/453",
}

@Article{Fathi-Vajargah:2017:IMC,
  author =       "Behrouz Fathi-Vajargah and Mohadeseh Kanafchian",
  title =        "Improved {Markov} Chain {Monte Carlo} method for
                 cryptanalysis substitution-transposition cipher",
  journal =      j-MONTE-CARLO-METHODS-APPL,
  volume =       "23",
  number =       "2",
  pages =        "147--??",
  month =        jun,
  year =         "2017",
  CODEN =        "MCMAC6",
  DOI =          "https://doi.org/10.1515/mcma-2017-0108",
  ISSN =         "0929-9629 (print), 1569-3961 (electronic)",
  ISSN-L =       "0929-9629",
  bibdate =      "Fri Mar 8 15:35:32 MST 2019",
  bibsource =    "http://www.degruyter.com/view/j/mcma.2017.23.issue-2/issue-files/mcma.2017.23.issue-2.xml;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/mcma.bib",
  URL =          "https://www.degruyter.com/view/j/mcma.2017.23.issue-2/mcma-2017-0108/mcma-2017-0108.xml",
  acknowledgement = ack-nhfb,
  fjournal =     "Monte Carlo Methods and Applications",
  journal-URL =  "http://www.degruyter.com/view/j/mcma",
}

@Article{Fernandes:2017:ITS,
  author =       "Earlence Fernandes and Amir Rahmati and Kevin Eykholt
                 and Atul Prakash",
  title =        "{Internet of Things} Security Research: A Rehash of
                 Old Ideas or New Intellectual Challenges?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "4",
  pages =        "79--84",
  month =        jul # "\slash " # aug,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2017.3151346",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Aug 29 06:15:10 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/04/msp2017040079-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Fiore:2017:PGP,
  author =       "Dario Fiore and Mar{\'\i}a Isabel Gonz{\'a}lez Vasco
                 and Claudio Soriente",
  title =        "Partitioned Group Password-Based Authenticated Key
                 Exchange",
  journal =      j-COMP-J,
  volume =       "60",
  number =       "12",
  pages =        "1912--1922",
  day =          "1",
  month =        dec,
  year =         "2017",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxx078",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Jan 8 08:15:52 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://academic.oup.com/comjnl/article/60/12/1912/4210211",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Fu:2017:DFA,
  author =       "Shan Fu and Guoai Xu and Juan Pan and Zongyue Wang and
                 An Wang",
  title =        "Differential Fault Attack on {ITUbee} Block Cipher",
  journal =      j-TECS,
  volume =       "16",
  number =       "2",
  pages =        "54:1--54:??",
  month =        apr,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2967610",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Mon Jul 24 09:51:12 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tecs.bib",
  abstract =     "Differential Fault Attack (DFA) is a powerful
                 cryptanalytic technique to retrieve secret keys by
                 exploiting the faulty ciphertexts generated during
                 encryption procedure. This article proposes a novel DFA
                 attack that is effective on ITUbee, a software-oriented
                 block cipher for resource-constrained devices.
                 Different from other DFA, our attack makes use of not
                 only faulty values, but also differences between
                 fault-free intermediate values corresponding to 2
                 plaintexts, which combine traditional differential
                 analysis with DFA. The possible injection positions
                 with different number of faults are discussed. The most
                 efficient attack takes 2$^{25}$ round function
                 operations with 4 faults, which is achieved in a few
                 seconds on a PC.",
  acknowledgement = ack-nhfb,
  articleno =    "54",
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J840",
}

@Article{Gai:2017:SCI,
  author =       "Keke Gai and Meikang Qiu and Houcine Hassan",
  title =        "Secure cyber incident analytics framework using {Monte
                 Carlo} simulations for financial cybersecurity
                 insurance in cloud computing",
  journal =      j-CCPE,
  volume =       "29",
  number =       "7",
  pages =        "??--??",
  day =          "10",
  month =        apr,
  year =         "2017",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.3856",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Fri Mar 31 19:12:52 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
}

@Article{Gaj:2017:DCR,
  author =       "Sibaji Gaj and Aditya Kanetkar and Arijit Sur and
                 Prabin Kumar Bora",
  title =        "Drift-Compensated Robust Watermarking Algorithm for
                 {H.265\slash HEVC} Video Stream",
  journal =      j-TOMCCAP,
  volume =       "13",
  number =       "1",
  pages =        "11:1--11:??",
  month =        jan,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3009910",
  ISSN =         "1551-6857 (print), 1551-6865 (electronic)",
  ISSN-L =       "1551-6857",
  bibdate =      "Wed Jan 18 17:18:28 MST 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tomccap/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/datacompression.bib;
                 https://www.math.utah.edu/pub/tex/bib/tomccap.bib",
  abstract =     "It has been observed in the recent literature that the
                 drift error due to watermarking degrades the visual
                 quality of the embedded video. The existing drift error
                 handling strategies for recent video standards such as
                 H.264 may not be directly applicable for upcoming
                 high-definition video standards (such as High
                 Efficiency Video Coding (HEVC)) due to different
                 compression architecture. In this article, a compressed
                 domain watermarking scheme is proposed for H.265/HEVC
                 bit stream that can handle drift error propagation both
                 for intra- and interprediction process. Additionally,
                 the proposed scheme shows adequate robustness against
                 recompression attack as well as common image processing
                 attacks while maintaining decent visual quality. A
                 comprehensive set of experiments has been carried out
                 to justify the efficacy of the proposed scheme over the
                 existing literature.",
  acknowledgement = ack-nhfb,
  articleno =    "11",
  fjournal =     "ACM Transactions on Multimedia Computing,
                 Communications, and Applications",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J961",
}

@Article{Garay:2017:SIA,
  author =       "Juan A. Garay and Rafail Ostrovsky",
  title =        "Special Issue: Algorithmic Tools in Cryptography",
  journal =      j-ALGORITHMICA,
  volume =       "79",
  number =       "4",
  pages =        "985--986",
  month =        dec,
  year =         "2017",
  CODEN =        "ALGOEJ",
  DOI =          "https://doi.org/10.1007/s00453-017-0368-3",
  ISSN =         "0178-4617 (print), 1432-0541 (electronic)",
  ISSN-L =       "0178-4617",
  bibdate =      "Mon Oct 2 10:42:20 MDT 2017",
  bibsource =    "http://link.springer.com/journal/453/79/4;
                 https://www.math.utah.edu/pub/tex/bib/algorithmica.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/s00453-017-0368-3.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Algorithmica",
  journal-URL =  "http://link.springer.com/journal/453",
}

@Article{Garg:2017:IDI,
  author =       "Sanjam Garg and Craig Gentry and Shai Halevi and
                 Daniel Wichs",
  title =        "On the Implausibility of Differing-Inputs Obfuscation
                 and Extractable Witness Encryption with Auxiliary
                 Input",
  journal =      j-ALGORITHMICA,
  volume =       "79",
  number =       "4",
  pages =        "1353--1373",
  month =        dec,
  year =         "2017",
  CODEN =        "ALGOEJ",
  DOI =          "https://doi.org/10.1007/s00453-017-0276-6",
  ISSN =         "0178-4617 (print), 1432-0541 (electronic)",
  ISSN-L =       "0178-4617",
  bibdate =      "Mon Oct 2 10:42:20 MDT 2017",
  bibsource =    "http://link.springer.com/journal/453/79/4;
                 https://www.math.utah.edu/pub/tex/bib/algorithmica.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Algorithmica",
  journal-URL =  "http://link.springer.com/journal/453",
}

@Article{Glowacz:2017:IDW,
  author =       "Andrzej Glowacz and Marcin Pietro{\'n}",
  title =        "Implementation of Digital Watermarking Algorithms in
                 Parallel Hardware Accelerators",
  journal =      j-INT-J-PARALLEL-PROG,
  volume =       "45",
  number =       "5",
  pages =        "1108--1127",
  month =        oct,
  year =         "2017",
  CODEN =        "IJPPE5",
  DOI =          "https://doi.org/10.1007/s10766-016-0459-9",
  ISSN =         "0885-7458 (print), 1573-7640 (electronic)",
  ISSN-L =       "0885-7458",
  bibdate =      "Sat Nov 18 09:27:28 MST 2017",
  bibsource =    "http://link.springer.com/journal/10766/45/5;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjparallelprogram.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Parallel Programming",
  journal-URL =  "http://link.springer.com/journal/10766",
}

@Article{Gonzalez-Manzano:2017:EHE,
  author =       "L. Gonz{\'a}lez-Manzano and Jos{\'e} M. de Fuentes and
                 P. Peris-Lopez and C. Camara",
  title =        "{Encryption by Heart (EbH)} --- Using {ECG} for
                 time-invariant symmetric key generation",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "77",
  number =       "??",
  pages =        "136--148",
  month =        dec,
  year =         "2017",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Sat Sep 23 09:33:17 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X16307798",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Granado-Criado:2017:HCH,
  author =       "Jos{\'e} M. Granado-Criado and Miguel A.
                 Vega-Rodr{\'\i}guez",
  title =        "Hardware coprocessors for high-performance symmetric
                 cryptography",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "73",
  number =       "6",
  pages =        "2456--2482",
  month =        jun,
  year =         "2017",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-016-1929-y",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Sat Jun 24 10:31:33 MDT 2017",
  bibsource =    "http://link.springer.com/journal/11227/73/6;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Misc{Green:2017:SSE,
  author =       "Matthew Green",
  title =        "The strange story of ``Extended Random''",
  howpublished = "Web news story",
  day =          "19",
  month =        dec,
  year =         "2017",
  bibdate =      "Tue Jan 16 07:02:05 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  note =         "Discussion of suspected NSA-supported back door in the
                 2007 NIST standard for the Dual Elliptic-Curve default
                 random number generator, and the associated RSA
                 cryptographic library BSAFE. There is evidence that the
                 back door exists in some older Canon laser printers.",
  URL =          "https://blog.cryptographyengineering.com/2017/12/19/the-strange-story-of-extended-random/",
  acknowledgement = ack-nhfb,
}

@Article{Grigoriev:2017:YMP,
  author =       "Dima Grigoriev and Laszlo B. Kish and Vladimir
                 Shpilrain",
  title =        "{Yao}'s Millionaires' Problem and Public-Key
                 Encryption Without Computational Assumptions",
  journal =      j-INT-J-FOUND-COMP-SCI,
  volume =       "28",
  number =       "4",
  pages =        "379--??",
  month =        jun,
  year =         "2017",
  CODEN =        "IFCSEN",
  DOI =          "https://doi.org/10.1142/S012905411750023X",
  ISSN =         "0129-0541",
  ISSN-L =       "0129-0541",
  bibdate =      "Sat Dec 16 08:38:07 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijfcs.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Foundations of Computer
                 Science (IJFCS)",
  journal-URL =  "http://www.worldscientific.com/loi/ijfcs",
}

@Article{Groza:2017:LCL,
  author =       "Bogdan Groza and Stefan Murvay and Anthony {Van
                 Herrewege} and Ingrid Verbauwhede",
  title =        "{LiBrA--CAN}: Lightweight Broadcast Authentication for
                 Controller Area Networks",
  journal =      j-TECS,
  volume =       "16",
  number =       "3",
  pages =        "90:1--90:??",
  month =        jul,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3056506",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Mon Jul 24 09:51:12 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tecs.bib",
  abstract =     "Despite realistic concerns, security is still absent
                 from vehicular buses such as the widely used Controller
                 Area Network (CAN). We design an efficient protocol
                 based on efficient symmetric primitives, taking
                 advantage of two innovative procedures: splitting keys
                 between nodes and mixing authentication tags. This
                 results in a higher security level when compromised
                 nodes are in the minority, a realistic assumption for
                 automotive networks. Experiments are performed on
                 state-of-the-art Infineon TriCore controllers,
                 contrasted with low-end Freescale S12X cores, while
                 simulations are provided for the recently released
                 CAN-FD standard. To gain compatibility with existent
                 networks, we also discuss a solution based on CAN+.",
  acknowledgement = ack-nhfb,
  articleno =    "90",
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J840",
}

@Article{Gu:2017:IBM,
  author =       "Ke Gu and Weijia Jia and Jianming Zhang",
  title =        "Identity-Based Multi-Proxy Signature Scheme in the
                 Standard Model",
  journal =      j-FUND-INFO,
  volume =       "150",
  number =       "2",
  pages =        "179--210",
  month =        "????",
  year =         "2017",
  CODEN =        "FUMAAJ",
  DOI =          "https://doi.org/10.3233/FI-2017-1464",
  ISSN =         "0169-2968 (print), 1875-8681 (electronic)",
  ISSN-L =       "0169-2968",
  bibdate =      "Sat Mar 11 09:46:17 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/fundinfo2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Fundamenta Informaticae",
  journal-URL =  "http://content.iospress.com/journals/fundamenta-informaticae",
}

@Article{Guha:2017:RTS,
  author =       "Krishnendu Guha and Debasri Saha and Amlan
                 Chakrabarti",
  title =        "Real-Time {SoC} Security against Passive Threats Using
                 Crypsis Behavior of Geckos",
  journal =      j-JETC,
  volume =       "13",
  number =       "3",
  pages =        "41:1--41:??",
  month =        may,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3014166",
  ISSN =         "1550-4832 (print), 1550-4840 (electronic)",
  ISSN-L =       "1550-4832",
  bibdate =      "Tue Jul 11 17:10:31 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/jetc/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jetc.bib",
  abstract =     "The rapid evolution of the embedded era has witnessed
                 globalization for the design of SoC architectures in
                 the semiconductor design industry. Though issues of
                 cost and stringent marketing deadlines have been
                 resolved in such a methodology, yet the root of
                 hardware trust has been evicted. Malicious circuitry,
                 a.k.a. Hardware Trojan Horse (HTH), is inserted by
                 adversaries in the less trusted phases of design. A HTH
                 remains dormant during testing but gets triggered at
                 runtime to cause sudden active and passive attacks. In
                 this work, we focus on the runtime passive threats
                 based on the parameter delay. Nature-inspired
                 algorithms offer an alternative to the conventional
                 techniques for solving complex problems in the domain
                 of computer science. However, most are optimization
                 techniques and none is dedicated to security. We seek
                 refuge to the crypsis behavior exhibited by geckos in
                 nature to generate a runtime security technique for SoC
                 architectures, which can bypass runtime passive threats
                 of a HTH. An adaptive security intellectual property
                 (IP) that works on the proposed security principles is
                 designed. Embedded timing analysis is used for
                 experimental validation. Low area and power overhead of
                 our proposed security IP over standard benchmarks and
                 practical crypto SoC architectures as obtained in
                 experimental results supports its applicability for
                 practical implementations.",
  acknowledgement = ack-nhfb,
  articleno =    "41",
  fjournal =     "ACM Journal on Emerging Technologies in Computing
                 Systems (JETC)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J967",
}

@Article{Guo:2017:EMD,
  author =       "Jianting Guo and Peijia Zheng and Jiwu Huang",
  title =        "An Efficient Motion Detection and Tracking Scheme for
                 Encrypted Surveillance Videos",
  journal =      j-TOMM,
  volume =       "13",
  number =       "4",
  pages =        "61:1--61:??",
  month =        oct,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3131342",
  ISSN =         "1551-6857 (print), 1551-6865 (electronic)",
  ISSN-L =       "1551-6857",
  bibdate =      "Sat Dec 23 10:49:23 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tomccap.bib",
  abstract =     "Performing detection on surveillance videos
                 contributes significantly to the goals of safety and
                 security. However, performing detection on unprotected
                 surveillance video may reveal the privacy of innocent
                 people in the video. Therefore, striking a proper
                 balance between maintaining personal privacy while
                 enhancing the feasibility of detection is an important
                 issue. One promising solution to this problem is to
                 encrypt the surveillance videos and perform detection
                 on the encrypted videos. Most existing encrypted signal
                 processing methods focus on still images or small data
                 volumes; however, because videos are typically much
                 larger, investigating how to process encrypted videos
                 is a significant challenge. In this article, we propose
                 an efficient motion detection and tracking scheme for
                 encrypted H.264/AVC video bitstreams, which does not
                 require the previous decryption on the encrypted video.
                 The main idea is to first estimate motion information
                 from the bitstream structure and codeword length and,
                 then, propose a region update (RU) algorithm to deal
                 with the loss and error drifting of motion caused by
                 the video encryption. The RU algorithm is designed
                 based on the prior knowledge that the object motion in
                 the video is continuous in space and time. Compared to
                 the existing scheme, which is based on video encryption
                 that occurs at the pixel level, the proposed scheme has
                 the advantages of requiring only a small storage of the
                 encrypted video and has a low computational cost for
                 both encryption and detection. Experimental results
                 show that our scheme performs better regarding
                 detection accuracy and execution speed. Moreover, the
                 proposed scheme can work with more than one
                 format-compliant video encryption method, provided that
                 the positions of the macroblocks can be extracted from
                 the encrypted video bitstream. Due to the coupling of
                 video stream encryption and detection algorithms, our
                 scheme can be directly connected to the video stream
                 output (e.g., surveillance cameras) without requiring
                 any camera modifications.",
  acknowledgement = ack-nhfb,
  articleno =    "61",
  fjournal =     "ACM Transactions on Multimedia Computing,
                 Communications, and Applications",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J961",
}

@Article{Haigh:2017:HRC,
  author =       "Thomas Haigh",
  title =        "Historical reflections: Colossal genius: {Tutte},
                 {Flowers}, and a bad imitation of {Turing}",
  journal =      j-CACM,
  volume =       "60",
  number =       "1",
  pages =        "29--35",
  month =        jan,
  year =         "2017",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/3018994",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Dec 21 11:53:09 MST 2016",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/bibnet/authors/t/turing-alan-mathison.bib;
                 https://www.math.utah.edu/pub/tex/bib/cacm2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://cacm.acm.org/magazines/2017/1/211102/fulltext",
  abstract =     "Reflections on pioneering code-breaking efforts.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Hamlin:2017:NMC,
  author =       "Nathan Hamlin",
  title =        "Number in Mathematical Cryptography",
  journal =      j-OPEN-J-DISCRETE-MATH,
  volume =       "7",
  number =       "1",
  pages =        "13--31",
  month =        jan,
  year =         "2017",
  DOI =          "https://doi.org/10.4236/ojdm.2017.71003",
  ISSN =         "2161-7635 (print), 2161-7643 (electronic)",
  ISSN-L =       "2161-7635",
  bibdate =      "Tue Feb 28 15:45:03 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.scirp.org/Journal/PaperInformation.aspx?PaperID=73743",
  abstract =     "With the challenge of quantum computing ahead, an
                 analysis of number and representation adequate to the
                 task is needed. Some clarifications on the
                 combinatorial nature of representation are presented
                 here; this is related to the foundations of digital
                 representations of integers, and is thus also of
                 interest in clarifying what numbers are and how they
                 are used in pure and applied mathematics. The author
                 hopes this work will help mathematicians and computer
                 scientists better understand the nature of the
                 Generalized Knapsack Code, a lattice-based code which
                 the author believes to be particularly promising, and
                 the use of number in computing in general.",
  acknowledgement = ack-nhfb,
  fjournal =     "Open Journal of Discrete Mathematics",
  journal-URL =  "http://www.scirp.org/journal/OJDM/",
  remark =       "See press report \cite{Anonymous:2017:MBH}",
}

@Article{Harvey:2017:FPM,
  author =       "David Harvey and Joris {Van Der Hoeven} and
                 Gr{\'e}goire Lecerf",
  title =        "Faster Polynomial Multiplication over Finite Fields",
  journal =      j-J-ACM,
  volume =       "63",
  number =       "6",
  pages =        "52:1--52:??",
  month =        feb,
  year =         "2017",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/3005344",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  bibdate =      "Mon Apr 3 09:29:49 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "Polynomials over finite fields play a central role in
                 algorithms for cryptography, error correcting codes,
                 and computer algebra. The complexity of multiplying
                 such polynomials is still a major open problem. Let $p$
                 be a prime, and let $ M_p(n)$ denote the bit complexity
                 of multiplying two polynomials in $ F_p[X]$ of degree
                 less than $n$. For $n$ large compared to $p$, we
                 establish the bound $ M_p(n) = O(n \log n {8^{\log
                 *}}^n \log p)$, where $ \log^* n = \{ \min k \epsilon N
                 : \log \ldots {}^k \times \ldots \log n \leq 1 \} $
                 stands for the iterated logarithm. This improves on the
                 previously best known bound $ M_p(n) = O(n \log n \log
                 \log n \log p)$, which essentially goes back to the
                 1970s.",
  acknowledgement = ack-nhfb,
  articleno =    "52",
  fjournal =     "Journal of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J401",
}

@Article{Hasan:2017:UAF,
  author =       "Ragib Hasan and Rasib Khan",
  title =        "Unified authentication factors and fuzzy service
                 access using interaction provenance",
  journal =      j-COMPUT-SECUR,
  volume =       "67",
  number =       "??",
  pages =        "211--231",
  month =        jun,
  year =         "2017",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:49 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404817300408",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{He:2017:AHA,
  author =       "Debiao He and Sherali Zeadally and Libing Wu and
                 Huaqun Wang",
  title =        "Analysis of handover authentication protocols for
                 mobile wireless networks using identity-based public
                 key cryptography",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "128",
  number =       "??",
  pages =        "154--163",
  day =          "9",
  month =        dec,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Mon Oct 30 06:00:14 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1389128616304285",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286/",
}

@Article{He:2017:APP,
  author =       "Jingsha He and Qi Xiao and Peng He and Muhammad Salman
                 Pathan",
  title =        "An Adaptive Privacy Protection Method for Smart Home
                 Environments Using Supervised Learning",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "1",
  pages =        "7",
  day =          "05",
  month =        mar,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9010007",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:56 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/1/7",
  abstract =     "In recent years, smart home technologies have started
                 to be widely used, bringing a great deal of convenience
                 to people's daily lives. At the same time, privacy
                 issues have become particularly prominent. Traditional
                 encryption methods can no longer meet the needs of
                 privacy protection in smart home applications, since
                 attacks can be launched even without the need for
                 access to the cipher. Rather, attacks can be
                 successfully realized through analyzing the frequency
                 of radio signals, as well as the timestamp series, so
                 that the daily activities of the residents in the smart
                 home can be learnt. Such types of attacks can achieve a
                 very high success rate, making them a great threat to
                 users' privacy. In this paper, we propose an adaptive
                 method based on sample data analysis and supervised
                 learning (SDASL), to hide the patterns of daily
                 routines of residents that would adapt to dynamically
                 changing network loads. Compared to some existing
                 solutions, our proposed method exhibits advantages such
                 as low energy consumption, low latency, strong
                 adaptability, and effective privacy protection.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Security and Privacy in Wireless and
                 Mobile Networks.",
}

@Article{Hellegren:2017:HCD,
  author =       "Z. Isadora Hellegren",
  title =        "A history of crypto-discourse: encryption as a site of
                 struggles to define {Internet} freedom",
  journal =      j-INTERNET-HIST,
  volume =       "1",
  number =       "4",
  pages =        "285--311",
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1080/24701475.2017.1387466",
  ISSN =         "2470-1483",
  ISSN-L =       "2470-1483",
  bibdate =      "Tue Aug 29 08:11:01 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/internet-hist.bib",
  URL =          "http://www.tandfonline.com/doi/full/10.1080/24701475.2017.1387466",
  acknowledgement = ack-nhfb,
  ajournal =     "Internet Hist.",
  fjournal =     "Internet Histories",
  journal-URL =  "https://www.tandfonline.com/loi/rint20",
}

@Article{Hellman:2017:TLC,
  author =       "Martin E. Hellman",
  title =        "{Turing Lecture}: Cybersecurity, Nuclear Security,
                 {Alan Turing}, and Illogical Logic",
  journal =      j-CACM,
  volume =       "60",
  number =       "12",
  pages =        "52--59",
  month =        dec,
  year =         "2017",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Wed Nov 29 18:47:03 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/bibnet/authors/t/turing-alan-mathison.bib;
                 https://www.math.utah.edu/pub/tex/bib/cacm2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://cacm.acm.org/magazines/2017/12/223042-cybersecurity-nuclear-security-alan-turing-and-illogical-logic",
  abstract =     "Cyber deterrence, like nuclear deterrence, depends on
                 our adversaries being rational enough to be deterred by
                 our threats but us not by theirs.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Hetzelt:2017:SAE,
  author =       "Felicitas Hetzelt and Robert Buhren",
  title =        "Security Analysis of Encrypted Virtual Machines",
  journal =      j-SIGPLAN,
  volume =       "52",
  number =       "7",
  pages =        "129--142",
  month =        jul,
  year =         "2017",
  CODEN =        "SINODQ",
  DOI =          "https://doi.org/10.1145/3140607.3050763",
  ISSN =         "0362-1340 (print), 1523-2867 (print), 1558-1160
                 (electronic)",
  ISSN-L =       "0362-1340",
  bibdate =      "Sat Sep 16 10:18:17 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigplan2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  abstract =     "Cloud computing has become indispensable in today's
                 computer landscape. The flexibility it offers for
                 customers as well as for providers has become a crucial
                 factor for large parts of the computer industry.
                 Virtualization is the key technology that allows for
                 sharing of hardware resources among different
                 customers. The controlling software component, called
                 hypervisor, provides a virtualized view of the computer
                 resources and ensures separation of different guest
                 virtual machines. However, this important cornerstone
                 of cloud computing is not necessarily trustworthy or
                 bug-free. To mitigate this threat AMD introduced Secure
                 Encrypted Virtualization, short SEV, which
                 transparently encrypts a virtual machines memory. In
                 this paper we analyse to what extend the proposed
                 features can resist a malicious hypervisor and discuss
                 the tradeoffs imposed by additional protection
                 mechanisms. To do so, we developed a model of SEV's
                 security capabilities based on the available
                 documentation as actual silicon implementations are not
                 yet on the market. We found that the first proposed
                 version of SEV is not up to the task owing to three
                 design shortcomings. First the virtual machine control
                 block is not encrypted and handled directly by the
                 hypervisor, allowing it to bypass VM memory encryption
                 by executing conveniently chosen gadgets. Secondly, the
                 general purpose registers are not encrypted upon
                 vmexit, leaking potentially sensitive data. Finally,
                 the control over the nested pagetables allows a
                 malicious hypervisor to closely monitor the execution
                 state of a VM and attack it with memory replay
                 attacks.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGPLAN Notices",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J706",
  remark =       "VEE '17 conference proceedings.",
}

@Article{Heys:2017:SCF,
  author =       "Howard M. Heys",
  title =        "Statistical Cipher Feedback of Stream Ciphers",
  journal =      j-COMP-J,
  volume =       "60",
  number =       "12",
  pages =        "1839--1851",
  day =          "1",
  month =        dec,
  year =         "2017",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxx068",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Jan 8 08:15:52 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://academic.oup.com/comjnl/article/60/12/1839/3959607",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Homer:2017:RCS,
  author =       "Steve Homer",
  title =        "Review of {{\booktitle{Crypto School}} by Joachim von
                 zur Gathen}",
  journal =      j-SIGACT,
  volume =       "48",
  number =       "3",
  pages =        "10--13",
  month =        sep,
  year =         "2017",
  CODEN =        "SIGNDM",
  DOI =          "https://doi.org/10.1145/3138860.3138864",
  ISSN =         "0163-5700 (print), 1943-5827 (electronic)",
  ISSN-L =       "0163-5700",
  bibdate =      "Sat Sep 16 11:34:08 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGACT News",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J697",
}

@Article{Hu:2017:ATE,
  author =       "Jingwei Hu and Ray C. C. Cheung",
  title =        "Area-Time Efficient Computation of {Niederreiter}
                 Encryption on {QC-MDPC} Codes for Embedded Hardware",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "66",
  number =       "8",
  pages =        "1313--1325",
  month =        "????",
  year =         "2017",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2017.2672984",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Thu Jul 13 14:57:15 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  URL =          "http://ieeexplore.ieee.org/document/7862221/",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Huang:2017:BBC,
  author =       "Jianye Huang and Qiong Huang and Chunhua Pan",
  title =        "A Black-Box Construction of Strongly Unforgeable
                 Signature Scheme in the Leakage Setting",
  journal =      j-INT-J-FOUND-COMP-SCI,
  volume =       "28",
  number =       "6",
  pages =        "761--??",
  month =        sep,
  year =         "2017",
  CODEN =        "IFCSEN",
  DOI =          "https://doi.org/10.1142/S0129054117400172",
  ISSN =         "0129-0541",
  ISSN-L =       "0129-0541",
  bibdate =      "Fri Feb 9 11:49:58 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijfcs.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Foundations of Computer
                 Science (IJFCS)",
  journal-URL =  "http://www.worldscientific.com/loi/ijfcs",
}

@Article{Huang:2017:SSS,
  author =       "Kaibin Huang and Raylin Tso and Yu-Chi Chen",
  title =        "Somewhat semantic secure public key encryption with
                 filtered-equality-test in the standard model and its
                 extension to searchable encryption",
  journal =      j-J-COMP-SYS-SCI,
  volume =       "89",
  number =       "??",
  pages =        "400--409",
  month =        nov,
  year =         "2017",
  CODEN =        "JCSSBM",
  DOI =          "https://doi.org/10.1016/j.jcss.2017.06.001",
  ISSN =         "0022-0000 (print), 1090-2724 (electronic)",
  ISSN-L =       "0022-0000",
  bibdate =      "Tue Jan 29 15:27:37 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsyssci.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0022000017300831",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer and System Sciences",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00220000",
}

@Misc{Hulsing:2017:XEH,
  author =       "A. H{\"u}lsing and D. Butin and S. Gazdag and J.
                 Rijneveld and A. Mohaisen",
  title =        "{XMSS}: Extended Hash-Based Signatures",
  howpublished = "Web document",
  day =          "24",
  month =        jul,
  year =         "2017",
  bibdate =      "Thu Aug 31 16:12:38 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  URL =          "http://datatracker.ietf.org/doc/draft-irtf-cfrg-xmss-hash-based-signature",
  acknowledgement = ack-nhfb,
}

@Article{Hyla:2017:HLS,
  author =       "Tomasz Hyla and Jerzy Peja{\'s}",
  title =        "A {Hess}-Like Signature Scheme Based on Implicit and
                 Explicit Certificates",
  journal =      j-COMP-J,
  volume =       "60",
  number =       "4",
  pages =        "457--475",
  day =          "23",
  month =        mar,
  year =         "2017",
  CODEN =        "CMPJA6",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Thu Nov 16 10:43:41 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://academic.oup.com/comjnl/article/60/4/457/2608054",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{I:2017:ETB,
  author =       "Indu I. and Rubesh Anand P. M. and Vidhyacharan
                 Bhaskar",
  title =        "Encrypted token based authentication with adapted
                 {SAML} technology for cloud web services",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "99",
  number =       "??",
  pages =        "131--145",
  day =          "1",
  month =        dec,
  year =         "2017",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Fri Jan 12 10:10:23 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804517303156",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Irshad:2017:CPP,
  author =       "Azeem Irshad and Shehzad Ashraf Chaudhry",
  title =        "Comments on {``A privacy preserving three-factor
                 authentication protocol for e-health clouds''}",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "73",
  number =       "4",
  pages =        "1504--1508",
  month =        apr,
  year =         "2017",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-016-1837-1",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Sat Jun 24 10:31:33 MDT 2017",
  bibsource =    "http://link.springer.com/journal/11227/73/4;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  note =         "See \cite{Jiang:2016:PPT}.",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Article{Jalili:2017:EAS,
  author =       "Majid Jalili and Hamid Sarbazi-Azad",
  title =        "Endurance-Aware Security Enhancement in Non-Volatile
                 Memories Using Compression and Selective Encryption",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "66",
  number =       "7",
  pages =        "1132--1144",
  month =        jul,
  year =         "2017",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2016.2642180",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Thu Jun 8 10:22:00 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  URL =          "https://www.computer.org/csdl/trans/tc/2017/07/07792116-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Jan:2017:PPB,
  author =       "Mian Jan and Priyadarsi Nanda and Muhammad Usman and
                 Xiangjian He",
  title =        "{PAWN}: a payload-based mutual authentication scheme
                 for wireless sensor networks",
  journal =      j-CCPE,
  volume =       "29",
  number =       "17",
  pages =        "",
  day =          "10",
  month =        sep,
  year =         "2017",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.3986",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Mon Sep 4 17:02:00 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
}

@Article{Jevdjic:2017:ASC,
  author =       "Djordje Jevdjic and Karin Strauss and Luis Ceze and
                 Henrique S. Malvar",
  title =        "Approximate Storage of Compressed and Encrypted
                 Videos",
  journal =      j-OPER-SYS-REV,
  volume =       "51",
  number =       "2",
  pages =        "361--373",
  month =        jun,
  year =         "2017",
  CODEN =        "OSRED8",
  DOI =          "https://doi.org/10.1145/3093315.3037718",
  ISSN =         "0163-5980 (print), 1943-586X (electronic)",
  ISSN-L =       "0163-5980",
  bibdate =      "Mon Jul 24 18:36:23 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/datacompression.bib;
                 https://www.math.utah.edu/pub/tex/bib/opersysrev.bib",
  abstract =     "The popularization of video capture devices has
                 created strong storage demand for encoded videos.
                 Approximate storage can ease this demand by enabling
                 denser storage at the expense of occasional errors.
                 Unfortunately, even minor storage errors, such as bit
                 flips, can result in major visual damage in encoded
                 videos. Similarly, video encryption, widely employed
                 for privacy and digital rights management, may create
                 long dependencies between bits that show little or no
                 tolerance to storage errors. In this paper we propose
                 VideoApp, a novel and efficient methodology to compute
                 bit-level reliability requirements for encoded videos
                 by tracking visual and metadata dependencies within
                 encoded bitstreams. We further show how VideoApp can be
                 used to trade video quality for storage density in an
                 optimal way. We integrate our methodology into a
                 popular H.264 encoder to partition an encoded video
                 stream into multiple streams that can receive different
                 levels of error correction according to their
                 reliability needs. When applied to a dense and highly
                 error-prone multi-level cell storage substrate, our
                 variable error correction mechanism reduces the error
                 correction overhead by half under the most
                 error-intolerant encoder settings, achieving
                 quality/density points that neither compression nor
                 approximation can achieve alone. Finally, we define the
                 basic invariants needed to support encrypted
                 approximate video storage. We present an analysis of
                 block cipher modes of operation, showing that some are
                 fully compatible with approximation, enabling
                 approximate and secure video storage systems.",
  acknowledgement = ack-nhfb,
  fjournal =     "Operating Systems Review",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J597",
}

@Article{Jiang:2017:BMA,
  author =       "Shaoquan Jiang",
  title =        "Bounds for Message Authentication with Distortion",
  journal =      j-COMP-J,
  volume =       "60",
  number =       "4",
  pages =        "497--506",
  day =          "23",
  month =        mar,
  year =         "2017",
  CODEN =        "CMPJA6",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Thu Nov 16 10:43:41 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://academic.oup.com/comjnl/article/60/4/497/2608061",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Jiang:2017:SLD,
  author =       "Wei Jiang and Liang Wen and Ke Jiang and Xia Zhang and
                 Xiong Pan and Keran Zhou",
  title =        "System-Level Design to Detect Fault Injection Attacks
                 on Embedded Real-Time Applications",
  journal =      j-JETC,
  volume =       "13",
  number =       "2",
  pages =        "22:1--22:??",
  month =        mar,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2967611",
  ISSN =         "1550-4832",
  bibdate =      "Sat Apr 8 10:16:07 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jetc.bib",
  abstract =     "Fault injection attack has been a serious threat to
                 security-critical embedded systems for a long time, yet
                 existing research ignores addressing of the problem
                 from a system-level perspective. This article presents
                 an approach to the synthesis of secure real-time
                 applications mapped on distributed embedded systems,
                 which focuses on preventing fault injection attacks of
                 the security protection on processing units. We utilize
                 symmetric cryptographic service to protect
                 confidentiality and deploy fault detection within a
                 confidential algorithm to resist fault injection
                 attacks. Several fault detection schemes are
                 identified, and their fault coverage rates and time
                 overheads are derived and measured. Our synthesis
                 approach makes efforts to determine the best fault
                 detection schemes for the encryption/decryption of
                 messages such that the overall security strength of
                 detecting a fault injection attack is maximized and the
                 deadline constraint of the real-time applications is
                 guaranteed. Due to the complexity of the problem, we
                 propose an efficient algorithm based on the fruit fly
                 optimization algorithm, and we compare it to the
                 simulated annealing approach. Extensive experiments and
                 a real-life application evaluation demonstrate the
                 superiority of our approach.",
  acknowledgement = ack-nhfb,
  articleno =    "22",
  fjournal =     "ACM Journal on Emerging Technologies in Computing
                 Systems (JETC)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J967",
}

@Article{Judmayer:2017:BCI,
  author =       "Aljosha Judmayer and Nicholas Stifter and Katharina
                 Krombholz and Edgar Weippl and Elisa Bertino and Ravi
                 Sandhu",
  title =        "Blocks and Chains: Introduction to {Bitcoin},
                 Cryptocurrencies, and Their Consensus Mechanisms",
  journal =      "Synthesis Lectures on Information Security, Privacy,
                 and Trust",
  volume =       "9",
  number =       "1",
  pages =        "1--123",
  month =        jun,
  year =         "2017",
  DOI =          "https://doi.org/10.2200/S00773ED1V01Y201704SPT020",
  ISBN =         "1-62705-713-7",
  ISBN-13 =      "978-1-62705-713-4",
  ISSN =         "1945-9742 (print), 1945-9750 (electronic)",
  ISSN-L =       "1945-9742",
  bibdate =      "Thu Nov 30 15:24:52 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7987472",
  acknowledgement = ack-nhfb,
  keywords =     "Bitcoin; block; blockchain; chain; consensus ledger;
                 cryptographic currency; Nakamoto consensus;
                 Proof-of-Work",
}

@Article{Kandi:2017:ELC,
  author =       "Haribabu Kandi and Deepak Mishra and Subrahmanyam R.
                 K. Sai Gorthi",
  title =        "Exploring the learning capabilities of convolutional
                 neural networks for robust image watermarking",
  journal =      j-COMPUT-SECUR,
  volume =       "65",
  number =       "??",
  pages =        "247--268",
  month =        mar,
  year =         "2017",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:48 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404816301699",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kawachi:2017:GCR,
  author =       "Akinori Kawachi and Yoshio Okamoto and Keisuke Tanaka
                 and Kenji Yasunaga",
  title =        "General Constructions of Rational Secret Sharing with
                 Expected Constant-Round Reconstruction",
  journal =      j-COMP-J,
  volume =       "60",
  number =       "5",
  pages =        "711--728",
  day =          "1",
  month =        apr,
  year =         "2017",
  CODEN =        "CMPJA6",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Thu Nov 16 10:43:43 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://academic.oup.com/comjnl/article/60/5/711/2715224",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Khan:2017:TPK,
  author =       "Suleman Khan and Muhammad Shiraz and Laleh Boroumand
                 and Abdullah Gani and Muhammad Khurram Khan",
  title =        "Towards port-knocking authentication methods for
                 mobile cloud computing",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "97",
  number =       "??",
  pages =        "66--78",
  day =          "1",
  month =        nov,
  year =         "2017",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Sun Oct 1 12:23:21 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804517302813",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Khazaei:2017:COA,
  author =       "Shahram Khazaei and Siavash Ahmadi",
  title =        "Ciphertext-only attack on $ d \times d $ {Hill} in {$
                 O(d 13^d) $}",
  journal =      j-INFO-PROC-LETT,
  volume =       "118",
  number =       "??",
  pages =        "25--29",
  month =        feb,
  year =         "2017",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Tue Nov 22 15:19:12 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019016301338",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190/",
}

@Article{Kiayias:2017:EEV,
  author =       "Aggelos Kiayias and Thomas Zacharias and Bingsheng
                 Zhang",
  title =        "An Efficient {E2E} Verifiable {E}-voting System
                 without Setup Assumptions",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "3",
  pages =        "14--23",
  month =        may # "\slash " # jun,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2017.71",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 25 21:35:08 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/03/msp2017030014-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Kiljan:2017:SAC,
  author =       "Sven Kiljan and Koen Simoens and Danny {De Cock} and
                 Marko {Van Eekelen} and Harald Vranken",
  title =        "A Survey of Authentication and Communications Security
                 in Online Banking",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "4",
  pages =        "61:1--61:??",
  month =        feb,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3002170",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Feb 9 09:18:20 MST 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "A survey was conducted to provide a state of the art
                 of online banking authentication and communications
                 security implementations. Between global regions the
                 applied (single or multifactor) authentication schemes
                 differ greatly, as well as the security of SSL/TLS
                 implementations. Three phases for online banking
                 development are identified. It is predicted that mobile
                 banking will enter a third phase, characterized by the
                 use of standard web technologies to develop mobile
                 banking applications for different platforms. This has
                 the potential to make mobile banking a target for
                 attacks in a similar manner that home banking currently
                 is.",
  acknowledgement = ack-nhfb,
  articleno =    "61",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Kleinrouweler:2017:SAP,
  author =       "Jan Willem Kleinrouweler and Sergio Cabrero and Pablo
                 Cesar",
  title =        "An {SDN} Architecture for Privacy-Friendly
                 Network-Assisted {DASH}",
  journal =      j-TOMM,
  volume =       "13",
  number =       "3s",
  pages =        "44:1--44:??",
  month =        aug,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3092838",
  ISSN =         "1551-6857 (print), 1551-6865 (electronic)",
  ISSN-L =       "1551-6857",
  bibdate =      "Sat Dec 23 10:49:22 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tomccap.bib",
  abstract =     "Dynamic Adaptive Streaming over HTTP (DASH) is the
                 premier technology for Internet video streaming. DASH
                 efficiently uses existing HTTP-based delivery
                 infrastructures implementing adaptive streaming.
                 However, DASH traffic is bursty in nature. This causes
                 performance problems when DASH players share a network
                 connection or in networks with heavy background
                 traffic. The result is unstable and lower quality
                 video. In this article, we present the design and
                 implementation of a so-called DASH Assisting Network
                 Element (DANE). Our system provides target bitrate
                 signaling and dynamic traffic control. These two
                 mechanisms realize proper bandwidth sharing among
                 clients. Our system is privacy friendly and fully
                 supports encrypted video streams. Trying to improve the
                 streaming experience for users who share a network
                 connection, our system increases the video bitrate and
                 reduces the number of quality switches. We show this
                 through evaluations in our Wi-Fi testbed.",
  acknowledgement = ack-nhfb,
  articleno =    "44",
  fjournal =     "ACM Transactions on Multimedia Computing,
                 Communications, and Applications",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J961",
}

@Article{Knijnenburg:2017:PCE,
  author =       "Bart P. Knijnenburg",
  title =        "Privacy? {I} Can't Even! {Making} a Case for
                 User-Tailored Privacy",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "4",
  pages =        "62--67",
  month =        jul # "\slash " # aug,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2017.3151331",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Aug 29 06:15:10 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/04/msp2017040062-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Kolman:2017:SCG,
  author =       "Eyal Kolman and Benny Pinkas",
  title =        "Securely Computing a Ground Speed Model",
  journal =      j-TIST,
  volume =       "8",
  number =       "4",
  pages =        "54:1--54:??",
  month =        jul,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2998550",
  ISSN =         "2157-6904 (print), 2157-6912 (electronic)",
  ISSN-L =       "2157-6904",
  bibdate =      "Sat Dec 23 10:12:41 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tist.bib",
  abstract =     "Consider a server offering risk assessment services
                 and potential clients of these services. The risk
                 assessment model that is run by the server is based on
                 current and historical data of the clients. However,
                 the clients might prefer not sharing such sensitive
                 data with external parties such as the server, and the
                 server might consider the possession of this data as a
                 liability rather than an asset. Secure multi-party
                 computation (MPC) enables one, in principle, to compute
                 any function while hiding the inputs to the function,
                 and would thus enable the computation of the risk
                 assessment model while hiding the client's data from
                 the server. However, a direct application of a generic
                 MPC solution to this problem is rather inefficient due
                 to the large scale of the data and the complexity of
                 the function. We examine a specific case of risk
                 assessment-the ground speed model. In this model, the
                 geographical locations of successive
                 user-authentication attempts are compared, and a
                 warning flag is raised if the physical speed required
                 to move between these locations is greater than some
                 threshold, and some other conditions, such as
                 authentication from two related networks, do not hold.
                 We describe a very efficient secure computation
                 solution that is tailored for this problem. This
                 solution demonstrates that a risk model can be applied
                 over encrypted data with sufficient efficiency to fit
                 the requirements of commercial systems.",
  acknowledgement = ack-nhfb,
  articleno =    "54",
  fjournal =     "ACM Transactions on Intelligent Systems and Technology
                 (TIST)",
  journal-URL =  "http://portal.acm.org/citation.cfm?id=J1318",
}

@Article{Kornycky:2017:RFT,
  author =       "Joe Kornycky and Omar Abdul-Hameed and Ahmet Kondoz
                 and Brian C. Barber",
  title =        "Radio Frequency Traffic Classification Over {WLAN}",
  journal =      j-IEEE-TRANS-NETWORKING,
  volume =       "25",
  number =       "1",
  pages =        "56--68",
  month =        feb,
  year =         "2017",
  CODEN =        "IEANEP",
  DOI =          "https://doi.org/10.1109/TNET.2016.2562259",
  ISSN =         "1063-6692 (print), 1558-2566 (electronic)",
  ISSN-L =       "1063-6692",
  bibdate =      "Sat Mar 25 08:05:37 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
  abstract =     "Network traffic classification is the process of
                 analyzing traffic flows and associating them to
                 different categories of network applications. Network
                 traffic classification represents an essential task in
                 the whole chain of network security. Some of the most
                 important and widely spread applications of traffic
                 classification are the ability to classify encrypted
                 traffic, the identification of malicious traffic flows,
                 and the enforcement of security policies on the use of
                 different applications. Passively monitoring a network
                 utilizing low-cost and low-complexity wireless local
                 area network WLAN devices is desirable. Mobile devices
                 can be used or existing office desktops can be
                 temporarily utilized when their computational load is
                 low. This reduces the burden on existing network
                 hardware. The aim of this paper is to investigate
                 traffic classification techniques for wireless
                 communications. To aid with intrusion detection, the
                 key goal is to passively monitor and classify different
                 traffic types over WLAN to ensure that network security
                 policies are adhered to. The classification of
                 encrypted WLAN data poses some unique challenges not
                 normally encountered in wired traffic. WLAN traffic is
                 analyzed for features that are then used as an input to
                 six different machine learning ML algorithms for
                 traffic classification. One of these algorithms a
                 Gaussian mixture model incorporating a universal
                 background model has not been applied to wired or
                 wireless network classification before. The authors
                 also propose a ML algorithm that makes use of the
                 well-known vector quantization algorithm in conjunction
                 with a decision tree --- referred to as a TRee Adaptive
                 Parallel Vector Quantiser. This algorithm has a number
                 of advantages over the other ML algorithms tested and
                 is suited to wireless traffic classification. An
                 average F-score harmonic mean of precision and recall $
                 > 0.84 $ was achieved when training and testing on the
                 same day across six distinct traffic types.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE\slash ACM Transactions on Networking",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J771",
}

@Article{Kumar:2017:TAU,
  author =       "Vireshwar Kumar and Jung-Min (Jerry) Park and Kaigui
                 Bian",
  title =        "Transmitter authentication using hierarchical
                 modulation in dynamic spectrum sharing",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "91",
  number =       "??",
  pages =        "52--60",
  day =          "1",
  month =        aug,
  year =         "2017",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Sat Jul 29 15:40:55 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804517301935",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Kumari:2017:DPS,
  author =       "Saru Kumari and Xiong Li and Fan Wu and Ashok Kumar
                 Das and Kim-Kwang Raymond Choo and Jian Shen",
  title =        "Design of a provably secure biometrics-based
                 multi-cloud-server authentication scheme",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "68",
  number =       "??",
  pages =        "320--330",
  month =        mar,
  year =         "2017",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Sat Dec 10 08:32:13 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X16303776",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X/",
}

@Article{Kumari:2017:DSU,
  author =       "Saru Kumari and Ashok Kumar Das and Mohammad Wazid and
                 Xiong Li and Fan Wu and Kim-Kwang Raymond Choo and
                 Muhammad Khurram Khan",
  title =        "On the design of a secure user authentication and key
                 agreement scheme for wireless sensor networks",
  journal =      j-CCPE,
  volume =       "29",
  number =       "23",
  pages =        "??--??",
  day =          "10",
  month =        dec,
  year =         "2017",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.3930",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Sat Dec 30 09:11:59 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
}

@Article{Lai:2017:FPP,
  author =       "Jianchang Lai and Yi Mu and Fuchun Guo and Rongmao
                 Chen",
  title =        "Fully Privacy-Preserving {ID}-Based Broadcast
                 Encryption with Authorization",
  journal =      j-COMP-J,
  volume =       "60",
  number =       "12",
  pages =        "1809--1821",
  day =          "1",
  month =        dec,
  year =         "2017",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxx060",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Jan 8 08:15:52 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://academic.oup.com/comjnl/article/60/12/1809/3861972",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Book{Landau:2017:LCI,
  author =       "Susan Landau",
  title =        "Listening in: Cybersecurity in an insecure age",
  publisher =    pub-YALE,
  address =      pub-YALE:adr,
  pages =        "xiv + 221",
  year =         "2017",
  ISBN =         "0-300-22744-2 (hardcover)",
  ISBN-13 =      "978-0-300-22744-4 (hardcover)",
  LCCN =         "K3264.C65 L38 2017?",
  bibdate =      "Tue Jan 16 06:51:51 MST 2018",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  subject =      "Data encryption (Computer science); Law and
                 legislation; Computer networks; Security measures;
                 Government policy; Computer security; Government
                 policy; Computer security; Law and legislation",
  tableofcontents = "Racing into the digital revolution \\
                 We're all connected now \\
                 How do we protect ourselves? \\
                 Investigation in the age of encryption \\
                 There's no turning back",
}

@Article{Lauter:2017:POL,
  author =       "Kristin Lauter",
  title =        "Postquantum Opportunities: Lattices, Homomorphic
                 Encryption, and Supersingular Isogeny Graphs",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "4",
  pages =        "22--27",
  month =        jul # "\slash " # aug,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2017.3151338",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Aug 29 06:15:10 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/04/msp2017040022-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
}

@Article{Laxmi:2017:GGS,
  author =       "B. Prathusha Laxmi and A. Chilambuchelvan",
  title =        "{GSR}: {Geographic Secured Routing} using {SHA-3}
                 algorithm for node and message authentication in
                 wireless sensor networks",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "76",
  number =       "??",
  pages =        "98--105",
  month =        nov,
  year =         "2017",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Fri Jul 28 15:45:46 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X1730986X",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Lee:2017:FFE,
  author =       "Junghee Lee and Kalidas Ganesh and Hyuk-Jun Lee and
                 Youngjae Kim",
  title =        "{FESSD}: A Fast Encrypted {SSD} Employing On-Chip
                 Access-Control Memory",
  journal =      j-IEEE-COMPUT-ARCHIT-LETT,
  volume =       "16",
  number =       "2",
  pages =        "115--118",
  month =        jul # "\slash " # dec,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/LCA.2017.2667639",
  ISSN =         "1556-6056 (print), 1556-6064 (electronic)",
  ISSN-L =       "1556-6056",
  bibdate =      "Thu Jun 20 17:18:18 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeecomputarchitlett.bib",
  abstract =     "Cryptography is one of the most popular methods for
                 protecting data stored in storage devices such as
                 solid-state drives (SSDs). To maintain integrity of
                 data, one of the popular techniques is that all
                 incoming data are encrypted before they are stored,
                 however, in this technique, the encryption overhead is
                 non-negligible and it can increase I/O service time. In
                 order to mitigate the negative performance impact
                 caused by the data encryption, a write buffer can be
                 used to hide the long latency by encryption. Using the
                 write buffer, incoming unencrypted data can be
                 immediately returned as soon as they are written in the
                 buffer. They will get encrypted and synchronized with
                 flash memory. However, if the write buffer itself is
                 not encrypted, unencrypted secret data might leak
                 through this insecure write buffer. On the other hand,
                 if the entire write buffer is fully encrypted, it
                 incurs significant performance overhead. To address
                 this problem, we propose an on-chip access control
                 memory (ACM) and presents a fast encrypted SSD, called
                 FESSD that implements a secure write buffering
                 mechanism using the ACM. The ACM does not require a
                 memory-level full encryption mechanism, thus not only
                 solving the unencrypted data leaking problem, but also
                 offering relatively fast I/O service. Our simulation
                 results show that the I/O response time of FESSD can be
                 improved by up to 56 percent over a baseline where
                 encrypted data are stored in the normal write buffer.",
  acknowledgement = ack-nhfb,
  affiliation =  "Lee, J (Reprint Author), Univ Texas San Antonio, San
                 Antonio, TX 78249 USA. Lee, Junghee; Ganesh, Kalidas,
                 Univ Texas San Antonio, San Antonio, TX 78249 USA. Lee,
                 Hyuk-Jun; Kim, Youngjae, Sogang Univ, Seoul 121742,
                 South Korea.",
  author-email = "junghee.lee@my.utsa.edu dyk567@my.utsa.edu
                 hyukjunl@sogang.ac.kr youkim@sogang.ac.kr",
  da =           "2019-06-20",
  doc-delivery-number = "FR2AX",
  eissn =        "1556-6064",
  fjournal =     "IEEE Computer Architecture Letters",
  funding-acknowledgement = "National Research Foundation of Korea (NRF)
                 --- Korea Government (MISP) [2015R1C1A1A0152105]",
  funding-text = "This work was supported by the National Research
                 Foundation of Korea (NRF) grant funded by the Korea
                 Government (MISP) (No. 2015R1C1A1A0152105). This
                 research also used resources of The University of Texas
                 at San Antonio, San Antonio, TX. Youngjae Kim is the
                 corresponding author.",
  journal-iso =  "IEEE Comput. Archit. Lett.",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=10208",
  keywords =     "encryption; on-chip memory; security; Solid-state
                 drive (SSD)",
  keywords-plus = "SECURITY",
  number-of-cited-references = "11",
  research-areas = "Computer Science",
  times-cited =  "0",
  unique-id =    "Lee:2017:FFE",
  web-of-science-categories = "Computer Science, Hardware \&
                 Architecture",
}

@Article{Lee:2017:SUE,
  author =       "Kwangsu Lee and Seung Geol Choi and Dong Hoon Lee and
                 Jong Hwan Park and Moti Yung",
  title =        "Self-updatable encryption: Time constrained access
                 control with hidden attributes and better efficiency",
  journal =      j-THEOR-COMP-SCI,
  volume =       "667",
  number =       "??",
  pages =        "51--92",
  day =          "8",
  month =        mar,
  year =         "2017",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Wed Feb 15 08:03:13 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2015.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0304397516307551",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975/",
}

@Article{Lesi:2017:SAS,
  author =       "Vuk Lesi and Ilija Jovanov and Miroslav Pajic",
  title =        "Security-Aware Scheduling of Embedded Control Tasks",
  journal =      j-TECS,
  volume =       "16",
  number =       "5s",
  pages =        "188:1--188:??",
  month =        oct,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3126518",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Thu Oct 17 18:16:33 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tecs.bib",
  abstract =     "In this work, we focus on securing cyber-physical
                 systems (CPS) in the presence of network-based attacks,
                 such as Man-in-the-Middle (MitM) attacks, where a
                 stealthy attacker is able to compromise communication
                 between system sensors and controllers. Standard
                 methods for this type of attacks rely on the use of
                 cryptographic mechanisms, such as Message
                 Authentication Codes (MACs) to ensure data integrity.
                 However, this approach incurs significant computation
                 overhead, limiting its use in resource constrained
                 systems. Consequently, we consider the problem of
                 scheduling multiple control tasks on a shared processor
                 while providing a suitable level of security
                 guarantees. Specifically, by security guarantees we
                 refer to control performance, i.e., Quality-of-Control
                 (QoC), in the presence of attacks. We start by mapping
                 requirements for QoC under attack into constraints for
                 security-aware control tasks that, besides standard
                 control operations, intermittently perform data
                 authentication. This allows for the analysis of the
                 impact that security-related computation overhead has
                 on both schedulability of control tasks and QoC.
                 Building on this analysis, we introduce a mixed-integer
                 linear programming-based technique to obtain a
                 schedulable task set with predefined QoC requirements.
                 Also, to facilitate optimal resource allocation, we
                 provide a method to analyze interplay between available
                 computational resources and the overall QoC under
                 attack, and show how to obtain a schedulable task set
                 that maximizes the overall QoC guarantees. Finally, we
                 prove usability of our approach on a case study with
                 multiple automotive control components.",
  acknowledgement = ack-nhfb,
  articleno =    "188",
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J840",
}

@Article{Li:2017:AMA,
  author =       "Xiong Li and Maged Hamada Ibrahim and Saru Kumari and
                 Arun Kumar Sangaiah and Vidushi Gupta and Kim-Kwang
                 Raymond Choo",
  title =        "Anonymous mutual authentication and key agreement
                 scheme for wearable sensors in wireless body area
                 networks",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "129 (part 2)",
  number =       "??",
  pages =        "429--443",
  day =          "24",
  month =        dec,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Sat Dec 2 06:34:55 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1389128617301044",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286/",
}

@Article{Li:2017:CBS,
  author =       "Qi Li and Patrick P. C. Lee and Peng Zhang and Purui
                 Su and Liang He and Kui Ren and Qi Li and Patrick P. C.
                 Lee and Peng Zhang and Purui Su and Liang He and Kui
                 Ren",
  title =        "Capability-Based Security Enforcement in Named Data
                 Networking",
  journal =      j-IEEE-TRANS-NETWORKING,
  volume =       "25",
  number =       "5",
  pages =        "2719--2730",
  month =        oct,
  year =         "2017",
  CODEN =        "IEANEP",
  DOI =          "https://doi.org/10.1109/TNET.2017.2715822",
  ISSN =         "1063-6692 (print), 1558-2566 (electronic)",
  ISSN-L =       "1063-6692",
  bibdate =      "Fri Jan 12 17:57:12 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
  abstract =     "Named data networking NDN enhances traditional IP
                 networking by supporting in-network content caching for
                 better bandwidth usage and location-independent data
                 accesses for multi-path forwarding. However, NDN also
                 brings new security challenges. For example, an
                 adversary can arbitrarily inject packets to NDN to
                 poison content cache, or access content packets without
                 any restrictions. We propose capability-based security
                 enforcement architecture CSEA, a capability-based
                 security enforcement architecture that enables data
                 authenticity in NDN in a distributed manner. CSEA
                 leverages capabilities to specify the access rights of
                 forwarded packets. It allows NDN routers to verify the
                 authenticity of forwarded packets, and throttles
                 flooding-based DoS attacks from unsolicited packets. We
                 further develop a lightweight one-time signature scheme
                 for CSEA to ensure the timeliness of packets and
                 support efficient verification. We prototype CSEA on
                 the open-source CCNx platform, and evaluate CSEA via
                 testbed and Planetlab experiments. Our experimental
                 results show that CSEA only incurs around 4\% of
                 additional delays in retrieving data packets.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE\slash ACM Transactions on Networking",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J771",
}

@Article{Li:2017:CCD,
  author =       "Tong Li and Zheli Liu and Jin Li and Chunfu Jia and
                 Kuan-Ching Li",
  title =        "{CDPS}: A cryptographic data publishing system",
  journal =      j-J-COMP-SYS-SCI,
  volume =       "89",
  number =       "??",
  pages =        "80--91",
  month =        nov,
  year =         "2017",
  CODEN =        "JCSSBM",
  DOI =          "https://doi.org/10.1016/j.jcss.2016.12.004",
  ISSN =         "0022-0000 (print), 1090-2724 (electronic)",
  ISSN-L =       "0022-0000",
  bibdate =      "Tue Jan 29 15:27:37 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsyssci.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0022000016301313",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer and System Sciences",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00220000",
}

@Article{Li:2017:CCF,
  author =       "Jenny S. Li and Li-Chiou Chen and John V. Monaco and
                 Pranjal Singh and Charles C. Tappert",
  title =        "A comparison of classifiers and features for
                 authorship authentication of social networking
                 messages",
  journal =      j-CCPE,
  volume =       "29",
  number =       "14",
  pages =        "",
  day =          "25",
  month =        jul,
  year =         "2017",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.3918",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Mon Jul 24 08:22:38 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
}

@Article{Li:2017:CIS,
  author =       "Chengqing Li and Dongdong Lin and Jinhu Lu",
  title =        "Cryptanalyzing an Image-Scrambling Encryption
                 Algorithm of Pixel Bits",
  journal =      j-IEEE-MULTIMEDIA,
  volume =       "24",
  number =       "3",
  pages =        "64--71",
  month =        jul # "\slash " # sep,
  year =         "2017",
  CODEN =        "IEMUE4",
  DOI =          "https://doi.org/10.1109/MMUL.2017.3051512",
  ISSN =         "1070-986X (print), 1941-0166 (electronic)",
  ISSN-L =       "1070-986X",
  bibdate =      "Mon Jan 15 08:09:13 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeemultimedia.bib",
  URL =          "https://www.computer.org/csdl/mags/mu/2017/03/mmu2017030064-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://www.computer.org/multimedia/",
}

@Article{Li:2017:ESD,
  author =       "Fagen Li and Bo Liu and Jiaojiao Hong",
  title =        "An efficient signcryption for data access control in
                 cloud computing",
  journal =      j-COMPUTING,
  volume =       "99",
  number =       "5",
  pages =        "465--479",
  month =        may,
  year =         "2017",
  CODEN =        "CMPTA2",
  DOI =          "https://doi.org/10.1007/s00607-017-0548-7",
  ISSN =         "0010-485X (print), 1436-5057 (electronic)",
  ISSN-L =       "0010-485X",
  bibdate =      "Fri Feb 9 14:54:08 MST 2018",
  bibsource =    "http://link.springer.com/journal/607/99/5;
                 https://www.math.utah.edu/pub/tex/bib/computing.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computing",
  journal-URL =  "http://link.springer.com/journal/607",
}

@Article{Li:2017:MMA,
  author =       "Rongjia Li and Chenhui Jin",
  title =        "Meet-in-the-Middle Attack on $ 11$-Round {$3$D} Block
                 Cipher",
  journal =      j-INT-J-FOUND-COMP-SCI,
  volume =       "28",
  number =       "1",
  pages =        "",
  month =        jan,
  year =         "2017",
  CODEN =        "IFCSEN",
  DOI =          "https://doi.org/10.1142/S0129054117500022",
  ISSN =         "0129-0541",
  ISSN-L =       "0129-0541",
  bibdate =      "Tue Apr 4 14:39:43 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijfcs.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Foundations of Computer
                 Science (IJFCS)",
  journal-URL =  "http://www.worldscientific.com/loi/ijfcs",
}

@Article{Li:2017:PCL,
  author =       "Cong Li and Yuejian Fang and Xing Zhang and Cancan Jin
                 and Qingni Shen and Zhonghai Wu",
  title =        "A practical construction for large universe
                 hierarchical attribute-based encryption",
  journal =      j-CCPE,
  volume =       "29",
  number =       "17",
  pages =        "",
  day =          "10",
  month =        sep,
  year =         "2017",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.3957",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Mon Sep 4 17:02:00 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
}

@Article{Li:2017:RNF,
  author =       "Yang Li and Mengting Chen and Zhe Liu and Jian Wang",
  title =        "Reduction in the Number of Fault Injections for Blind
                 Fault Attack on {SPN} Block Ciphers",
  journal =      j-TECS,
  volume =       "16",
  number =       "2",
  pages =        "55:1--55:??",
  month =        apr,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3014583",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Mon Jul 24 09:51:12 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tecs.bib",
  abstract =     "In 2014, a new fault analysis called blind fault
                 attack (BFA) was proposed, in which attackers can only
                 obtain the number of different faulty outputs without
                 knowing the public data. The original BFA requires
                 480,000 fault injections to recover a 128-bit AES key.
                 This work attempts to reduce the number of fault
                 injections under the same attack assumptions. We
                 analyze BFA from an information theoretical perspective
                 and introduce a new probability-based distinguisher.
                 Three approaches are proposed for different attack
                 scenarios. The best one realized a 66.8\% reduction of
                 the number of fault injections on AES.",
  acknowledgement = ack-nhfb,
  articleno =    "55",
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J840",
}

@Article{Li:2017:SQS,
  author =       "Songbin Li and Yizhen Jia and C.-C. Jay Kuo",
  title =        "Steganalysis of {QIM} Steganography in Low-Bit-Rate
                 Speech Signals",
  journal =      j-IEEE-ACM-TASLP,
  volume =       "25",
  number =       "5",
  pages =        "1011--1022",
  month =        "????",
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/TASLP.2017.2676356",
  ISSN =         "2329-9290",
  ISSN-L =       "2329-9290",
  bibdate =      "Sat Jan 20 08:35:30 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeeacmtaslp.bib",
  URL =          "http://ieeexplore.ieee.org/document/7867798/",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6570655",
}

@Article{Lin:2017:ESF,
  author =       "Xi-Jun Lin and Lin Sun and Haipeng Qu and Xiaoshuai
                 Zhang",
  title =        "Editorial: On the Security of the First Leakage-Free
                 Certificateless Signcryption Scheme",
  journal =      j-COMP-J,
  volume =       "60",
  number =       "4",
  pages =        "491--496",
  day =          "23",
  month =        mar,
  year =         "2017",
  CODEN =        "CMPJA6",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Thu Nov 16 10:43:41 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://academic.oup.com/comjnl/article/60/4/491/2608059",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Liskiewicz:2017:SLS,
  author =       "Maciej Li{\'s}kiewicz and R{\"u}diger Reischuk and
                 Ulrich W{\"o}lfel",
  title =        "Security levels in steganography --- Insecurity does
                 not imply detectability",
  journal =      j-THEOR-COMP-SCI,
  volume =       "692",
  number =       "??",
  pages =        "25--45",
  day =          "5",
  month =        sep,
  year =         "2017",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Fri Aug 25 14:03:28 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2015.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0304397517305194",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{Liu:2017:ECC,
  author =       "Z. Liu and J. Gro{\ss}sch{\"a}dl and Z. Hu and K.
                 J{\"a}rvinen and H. Wang and I. Verbauwhede",
  title =        "Elliptic Curve Cryptography with Efficiently
                 Computable Endomorphisms and Its Hardware
                 Implementations for the {Internet of Things}",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "66",
  number =       "5",
  pages =        "773--785",
  month =        may,
  year =         "2017",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2016.2623609",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Thu Apr 6 07:46:06 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
  keywords =     "elliptic curve cryptography; Internet-of-Things;
                 multiple-precision arithmetic; signature verification;
                 VLSI designs",
}

@Article{Liu:2017:EEC,
  author =       "Zhe Liu and Jian Weng and Zhi Hu and Hwajeong Seo",
  title =        "Efficient Elliptic Curve Cryptography for Embedded
                 Devices",
  journal =      j-TECS,
  volume =       "16",
  number =       "2",
  pages =        "53:1--53:??",
  month =        apr,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2967103",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Mon Jul 24 09:51:12 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tecs.bib",
  abstract =     "Many resource-constrained embedded devices, such as
                 wireless sensor nodes, require public key encryption or
                 a digital signature, which has induced plenty of
                 research on efficient and secure implementation of
                 elliptic curve cryptography (ECC) on 8-bit processors.
                 In this work, we study the suitability of a special
                 class of finite fields, called optimal prime fields
                 (OPFs), for a ``lightweight'' ECC implementation with a
                 view toward high performance and security. First, we
                 introduce a highly optimized arithmetic library for
                 OPFs that includes two implementations for each finite
                 field arithmetic operation, namely a
                 performance-optimized version and a security-optimized
                 variant. The latter is resistant against simple power
                 analysis attacks in the sense that it always executes
                 the same sequence of instructions, independent of the
                 operands. Based on this OPF library, we then describe a
                 performance-optimized and a security-optimized
                 implementation of scalar multiplication on the elliptic
                 curve over OPFs at several security levels. The former
                 uses the Gallant-Lambert-Vanstone method on twisted
                 Edwards curves and reaches an execution time of 3.14M
                 cycles (over a 160-bit OPF) on an 8-bit ATmega128
                 processor, whereas the latter is based on a Montgomery
                 curve and executes in 5.53M cycles.",
  acknowledgement = ack-nhfb,
  articleno =    "53",
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J840",
}

@Article{Liu:2017:ESS,
  author =       "Chang Liu and Liehuang Zhu and Jinjun Chen",
  title =        "Efficient searchable symmetric encryption for storing
                 multiple source dynamic social data on cloud",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "86",
  number =       "??",
  pages =        "3--14",
  day =          "15",
  month =        may,
  year =         "2017",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Sat Jul 29 15:40:53 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S108480451630217X",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Liu:2017:GAU,
  author =       "Can Liu and Gradeigh D. Clark and Janne Lindqvist",
  title =        "Guessing Attacks on User-Generated Gesture Passwords",
  journal =      j-IMWUT,
  volume =       "1",
  number =       "1",
  pages =        "3:1--3:24",
  month =        mar,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3053331",
  ISSN =         "2474-9567",
  ISSN-L =       "2474-9567",
  bibdate =      "Fri Jun 16 10:24:00 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://dl.acm.org/citation.cfm?id=3053331",
  abstract =     "Touchscreens, the dominant input type for mobile
                 phones, require unique authentication solutions.
                 Gesture passwords have been proposed as an alternative
                 ubiquitous authentication technique. Prior security
                 analysis has relied on inconsistent measurements such
                 as mutual information or shoulder surfing attacks.We
                 present the first approach for measuring the security
                 of gestures with guessing attacks that model real-world
                 attacker behavior. Our major contributions are: (1) a
                 comprehensive analysis of the weak subspace for gesture
                 passwords, (2) a method for enumerating the size of the
                 full theoretical gesture password space, (3) a design
                 of a novel guessing attack against user-chosen gestures
                 using a dictionary, and (4) a brute-force attack used
                 for benchmarking the performance of the guessing
                 attack. Our dictionary attack, tested on newly
                 collected user data, achieves a cracking rate of
                 47.71\% after two weeks of computation using 109
                 guesses. This is a difference of 35.78 percentage
                 points compared to the 11.93\% cracking rate of the
                 brute-force attack. In conclusion, users are not taking
                 full advantage of the large theoretical password space
                 and instead choose their gesture passwords from weak
                 subspaces. We urge for further work on addressing this
                 challenge.",
  acknowledgement = ack-nhfb,
  articleno =    "3",
  fjournal =     "Proceedings of the ACM on Interactive, Mobile,
                 Wearable and Ubiquitous Technologies (IMWUT)",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J1566",
}

@Article{Liu:2017:HPI,
  author =       "Zhe Liu and Thomas P{\"o}ppelmann and Tobias Oder and
                 Hwajeong Seo and Sujoy Sinha Roy and Tim G{\"u}neysu
                 and Johann Gro{\ss}sch{\"a}dl and Howon Kim and Ingrid
                 Verbauwhede",
  title =        "High-Performance Ideal Lattice-Based Cryptography on
                 $8$-Bit {AVR} Microcontrollers",
  journal =      j-TECS,
  volume =       "16",
  number =       "4",
  pages =        "117:1--117:??",
  month =        aug,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3092951",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Mon Aug 14 18:53:33 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tecs.bib",
  abstract =     "Over recent years lattice-based cryptography has
                 received much attention due to versatile average-case
                 problems like Ring-LWE or Ring-SIS that appear to be
                 intractable by quantum computers. In this work, we
                 evaluate and compare implementations of Ring-LWE
                 encryption and the bimodal lattice signature scheme
                 (BLISS) on an 8-bit Atmel ATxmega128 microcontroller.
                 Our implementation of Ring-LWE encryption provides
                 comprehensive protection against timing side-channels
                 and takes 24.9ms for encryption and 6.7ms for
                 decryption. To compute a BLISS signature, our software
                 takes 317ms and 86ms for verification. These results
                 underline the feasibility of lattice-based cryptography
                 on constrained devices.",
  acknowledgement = ack-nhfb,
  articleno =    "117",
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J840",
}

@Article{Liu:2017:OOA,
  author =       "Zechao Liu and Zoe L. Jiang and Xuan Wang and Xinyi
                 Huang and S. M. Yiu and Kunihiko Sadakane",
  title =        "Offline\slash online attribute-based encryption with
                 verifiable outsourced decryption",
  journal =      j-CCPE,
  volume =       "29",
  number =       "7",
  pages =        "??--??",
  day =          "10",
  month =        apr,
  year =         "2017",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.3915",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Fri Mar 31 19:12:52 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
}

@Article{Liu:2017:SRG,
  author =       "Jing Liu and Yunyun Wu and Xuezheng Liu and Yunchun
                 Zhang and Gang Xue and Wei Zhou and Shaowen Yao",
  title =        "On the (In)Security of Recent Group Key Distribution
                 Protocols",
  journal =      j-COMP-J,
  volume =       "60",
  number =       "4",
  pages =        "507--526",
  day =          "23",
  month =        mar,
  year =         "2017",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxw061",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Thu Nov 16 10:43:41 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://academic.oup.com/comjnl/article/60/4/507/2608062",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Lopez-Alt:2017:MFH,
  author =       "Adriana L{\'o}pez-Alt and Eran Tromer and Vinod
                 Vaikuntanathan",
  title =        "Multikey Fully Homomorphic Encryption and
                 Applications",
  journal =      j-SIAM-J-COMPUT,
  volume =       "46",
  number =       "6",
  pages =        "1827--1892",
  month =        "????",
  year =         "2017",
  CODEN =        "SMJCAT",
  DOI =          "https://doi.org/10.1137/14100124X",
  ISSN =         "0097-5397 (print), 1095-7111 (electronic)",
  ISSN-L =       "0097-5397",
  bibdate =      "Wed Oct 9 17:50:42 MDT 2019",
  bibsource =    "http://epubs.siam.org/sam-bin/dbq/toclist/SICOMP/46/6;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/siamjcomput.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "SIAM Journal on Computing",
  journal-URL =  "http://epubs.siam.org/sicomp",
  onlinedate =   "January 2017",
}

@Article{Ma:2017:AEJ,
  author =       "Sha Ma",
  title =        "Authorized Equi-join for Multiple Data Contributors in
                 the {PKC}-Based Setting",
  journal =      j-COMP-J,
  volume =       "60",
  number =       "12",
  pages =        "1822--1838",
  day =          "1",
  month =        dec,
  year =         "2017",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxx061",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Jan 8 08:15:52 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://academic.oup.com/comjnl/article/60/12/1822/3861973",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Ma:2017:LBI,
  author =       "Chunguang Ma and Juyan Li and Weiping Ouyang",
  title =        "Lattice-Based Identity-Based Homomorphic Conditional
                 Proxy Re-Encryption for Secure Big Data Computing in
                 Cloud Environment",
  journal =      j-INT-J-FOUND-COMP-SCI,
  volume =       "28",
  number =       "6",
  pages =        "645--??",
  month =        sep,
  year =         "2017",
  CODEN =        "IFCSEN",
  DOI =          "https://doi.org/10.1142/S0129054117400111",
  ISSN =         "0129-0541",
  ISSN-L =       "0129-0541",
  bibdate =      "Fri Feb 9 11:49:58 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijfcs.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Foundations of Computer
                 Science (IJFCS)",
  journal-URL =  "http://www.worldscientific.com/loi/ijfcs",
}

@Article{Macedo:2017:SSP,
  author =       "Ricardo Macedo and Leonardo Melniski and Aldri Santos
                 and Yacine Ghamri-Doudane and Michele Nogueira",
  title =        "{SPARTA}: a survival performance degradation framework
                 for identity federations",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "121",
  number =       "??",
  pages =        "37--52",
  day =          "5",
  month =        jul,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Thu Jul 20 08:30:08 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1389128617301524",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286/",
}

@Article{Maitin-Shepard:2017:ECM,
  author =       "Jeremy Maitin-Shepard and Mehdi Tibouchi and Diego F.
                 Aranha",
  title =        "Elliptic Curve Multiset Hash",
  journal =      j-COMP-J,
  volume =       "60",
  number =       "4",
  pages =        "476--490",
  day =          "23",
  month =        mar,
  year =         "2017",
  CODEN =        "CMPJA6",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Thu Nov 16 10:43:41 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  URL =          "https://academic.oup.com/comjnl/article/60/4/476/2608055",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Maitra:2017:DFA,
  author =       "Subhamoy Maitra and Akhilesh Siddhanti and Santanu
                 Sarkar",
  title =        "A Differential Fault Attack on {Plantlet}",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "66",
  number =       "10",
  pages =        "1804--1808",
  month =        oct,
  year =         "2017",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2017.2700469",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Thu Sep 7 07:00:50 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  URL =          "http://ieeexplore.ieee.org/document/7917296/",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Maity:2017:ODC,
  author =       "Santi P. Maity and Hirak Kumar Maity",
  title =        "Optimality in Distortion Control in Reversible
                 Watermarking Using Genetic Algorithms",
  journal =      j-INT-J-IMAGE-GRAPHICS,
  volume =       "17",
  number =       "3",
  pages =        "1750013",
  month =        jul,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "0219-4678",
  ISSN-L =       "0219-4678",
  bibdate =      "Tue Oct 24 06:24:13 MDT 2017",
  bibsource =    "http://ejournals.wspc.com.sg/ijig/ijig.shtml;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijig.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Image and Graphics (IJIG)",
  journal-URL =  "http://www.worldscientific.com/worldscinet/ijig",
}

@Article{Mamais:2017:BVP,
  author =       "Stylianos S. Mamais and George Theodorakopoulos",
  title =        "Behavioural Verification: Preventing Report Fraud in
                 Decentralized Advert Distribution Systems",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "4",
  pages =        "88",
  day =          "20",
  month =        nov,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9040088",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:58 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/4/88",
  abstract =     "Service commissions, which are claimed by Ad-Networks
                 and Publishers, are susceptible to forgery as non-human
                 operators are able to artificially create fictitious
                 traffic on digital platforms for the purpose of
                 committing financial fraud. This places a significant
                 strain on Advertisers who have no effective means of
                 differentiating fabricated Ad-Reports from those which
                 correspond to real consumer activity. To address this
                 problem, we contribute an advert reporting system which
                 utilizes opportunistic networking and a
                 blockchain-inspired construction in order to identify
                 authentic Ad-Reports by determining whether they were
                 composed by honest or dishonest users. What constitutes
                 a user's honesty for our system is the manner in which
                 they access adverts on their mobile device. Dishonest
                 users submit multiple reports over a short period of
                 time while honest users behave as consumers who view
                 adverts at a balanced pace while engaging in typical
                 social activities such as purchasing goods online,
                 moving through space and interacting with other users.
                 We argue that it is hard for dishonest users to fake
                 honest behaviour and we exploit the behavioural
                 patterns of users in order to classify Ad-Reports as
                 real or fabricated. By determining the honesty of the
                 user who submitted a particular report, our system
                 offers a more secure reward-claiming model which
                 protects against fraud while still preserving the
                 user's anonymity.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Security and Privacy in Wireless and
                 Mobile Networks.",
}

@Article{Marko:2017:MDI,
  author =       "Frantisek Marko and Alexandr N. Zubkov",
  title =        "Minimal degrees of invariants of (super)groups --- a
                 connection to cryptology",
  journal =      j-LIN-MULT-ALGEBRA,
  volume =       "65",
  number =       "11",
  pages =        "2340--2355",
  year =         "2017",
  CODEN =        "LNMLAZ",
  DOI =          "https://doi.org/10.1080/03081087.2016.1273876",
  ISSN =         "0308-1087 (print), 1563-5139 (electronic)",
  ISSN-L =       "0308-1087",
  bibdate =      "Thu Nov 30 08:05:11 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/linmultalgebra.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Linear and Multilinear Algebra",
  journal-URL =  "http://www.tandfonline.com/loi/glma20",
  onlinedate =   "29 Dec 2016",
}

@Article{Martinovic:2017:AUP,
  author =       "Ivan Martinovic and Kasper Rasmussen and Marc
                 Roeschlin and Gene Tsudik",
  title =        "Authentication using pulse-response biometrics",
  journal =      j-CACM,
  volume =       "60",
  number =       "2",
  pages =        "108--115",
  month =        feb,
  year =         "2017",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/3023359",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Fri Feb 17 17:20:17 MST 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cacm2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://cacm.acm.org/magazines/2017/2/212440/fulltext",
  abstract =     "We propose a new biometric based on the human body's
                 response to an electric square pulse signal, called
                 pulse-response. We explore how this biometric can be
                 used to enhance security in the context of two example
                 applications: (1) an additional authentication
                 mechanism in PIN entry systems, and (2) a means of
                 continuous authentication on a secure terminal. The
                 pulse-response biometric is effective because each
                 human body exhibits a unique response to a signal pulse
                 applied at the palm of one hand, and measured at the
                 palm of the other. Using a prototype setup, we show
                 that users can be correctly identified, with high
                 probability, in a matter of seconds. This
                 identification mechanism integrates well with other
                 established methods and offers a reliable additional
                 layer of security, either on a continuous basis or at
                 login time. We build a proof-of-concept prototype and
                 perform experiments to assess the feasibility of
                 pulse-response as a practical biometric. The results
                 are very encouraging, achieving accuracies of 100\%
                 over a static data set, and 88\% over a data set with
                 samples taken over several weeks.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Masdari:2017:STA,
  author =       "Mohammad Masdari and Safiyyeh Ahmadzadeh",
  title =        "A survey and taxonomy of the authentication schemes in
                 {Telecare Medicine Information Systems}",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "87",
  number =       "??",
  pages =        "1--19",
  day =          "1",
  month =        jun,
  year =         "2017",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Sat Jul 29 15:40:53 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804517300978",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Mashhadi:2017:NMS,
  author =       "Samaneh Mashhadi",
  title =        "New multi-stage secret sharing in the standard model",
  journal =      j-INFO-PROC-LETT,
  volume =       "127",
  number =       "??",
  pages =        "43--48",
  month =        nov,
  year =         "2017",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Fri Aug 25 11:11:26 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019017301242",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Mastroeni:2017:APS,
  author =       "Isabella Mastroeni and Damiano Zanardini",
  title =        "Abstract Program Slicing: an Abstract
                 Interpretation-Based Approach to Program Slicing",
  journal =      j-TOCL,
  volume =       "18",
  number =       "1",
  pages =        "7:1--7:??",
  month =        apr,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3029052",
  ISSN =         "1529-3785 (print), 1557-945X (electronic)",
  ISSN-L =       "1529-3785",
  bibdate =      "Thu Apr 13 17:53:54 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tocl/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tocl.bib",
  abstract =     "In the present article, we formally define the notion
                 of abstract program slicing, a general form of program
                 slicing where properties of data are considered instead
                 of their exact value. This approach is applied to a
                 language with numeric and reference values and relies
                 on the notion of abstract dependencies between program
                 statements. The different forms of (backward) abstract
                 slicing are added to an existing formal framework where
                 traditional, nonabstract forms of slicing could be
                 compared. The extended framework allows us to
                 appreciate that abstract slicing is a generalization of
                 traditional slicing, since each form of traditional
                 slicing (dealing with syntactic dependencies) is
                 generalized by a semantic (nonabstract) form of
                 slicing, which is actually equivalent to an abstract
                 form where the identity abstraction is performed on
                 data. Sound algorithms for computing abstract
                 dependencies and a systematic characterization of
                 program slices are provided, which rely on the notion
                 of agreement between program states.",
  acknowledgement = ack-nhfb,
  articleno =    "7",
  fjournal =     "ACM Transactions on Computational Logic",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J773",
}

@Article{Matsumoto:2017:ACG,
  author =       "Stephanos Matsumoto and Raphael M. Reischuk and Pawel
                 Szalachowski and Tiffany Hyun-Jin Kim and Adrian
                 Perrig",
  title =        "Authentication Challenges in a Global Environment",
  journal =      j-TOPS,
  volume =       "20",
  number =       "1",
  pages =        "1:1--1:??",
  month =        feb,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3007208",
  ISSN =         "2471-2566 (print), 2471-2574 (electronic)",
  ISSN-L =       "2471-2566",
  bibdate =      "Mon Apr 3 09:09:40 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tops.bib",
  abstract =     "In this article, we address the problem of scaling
                 authentication for naming, routing, and end-entity (EE)
                 certification to a global environment in which
                 authentication policies and users' sets of trust roots
                 vary widely. The current mechanisms for authenticating
                 names (DNSSEC), routes (BGPSEC), and EE certificates
                 (TLS) do not support a coexistence of authentication
                 policies, affect the entire Internet when compromised,
                 cannot update trust root information efficiently, and
                 do not provide users with the ability to make flexible
                 trust decisions. We propose the Scalable Authentication
                 Infrastructure for Next-generation Trust (SAINT), which
                 partitions the Internet into groups with common, local
                 trust roots and isolates the effects of a compromised
                 trust root. SAINT requires groups with direct routing
                 connections to cross-sign each other for authentication
                 purposes, allowing diverse authentication policies
                 while keeping all entities' authentication information
                 globally discoverable. SAINT makes trust root
                 management a central part of the network architecture,
                 enabling trust root updates within seconds and allowing
                 users to make flexible trust decisions. SAINT operates
                 without a significant performance penalty and can be
                 deployed alongside existing infrastructures.",
  acknowledgement = ack-nhfb,
  articleno =    "1",
  fjournal =     "ACM Transactions on Privacy and Security (TOPS)",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J1547",
}

@Article{Mazumdar:2017:CRS,
  author =       "Bodhisatwa Mazumdar and Debdeep Mukhopadhyay",
  title =        "Construction of Rotation Symmetric {S}-Boxes with High
                 Nonlinearity and Improved {DPA} Resistivity",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "66",
  number =       "1",
  pages =        "59--72",
  month =        jan,
  year =         "2017",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2016.2569410",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Thu Dec 15 06:48:58 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Mazumder:2017:PSK,
  author =       "Rashed Mazumder and Atsuko Miyaji and Chunhua Su",
  title =        "Probably Secure Keyed-Function Based Authenticated
                 Encryption Schemes for Big Data",
  journal =      j-INT-J-FOUND-COMP-SCI,
  volume =       "28",
  number =       "6",
  pages =        "661--??",
  month =        sep,
  year =         "2017",
  CODEN =        "IFCSEN",
  DOI =          "https://doi.org/10.1142/S0129054117400123",
  ISSN =         "0129-0541",
  ISSN-L =       "0129-0541",
  bibdate =      "Fri Feb 9 11:49:58 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijfcs.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Foundations of Computer
                 Science (IJFCS)",
  journal-URL =  "http://www.worldscientific.com/loi/ijfcs",
}

@Article{Mazumder:2017:SAE,
  author =       "Rashed Mazumder and Atsuko Miyaji and Chunhua Su",
  title =        "A simple authentication encryption scheme",
  journal =      j-CCPE,
  volume =       "29",
  number =       "16",
  pages =        "",
  day =          "25",
  month =        aug,
  year =         "2017",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.4058",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Mon Jul 24 08:22:39 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
}

@Misc{McGrew:2017:IDH,
  author =       "Danile McGrew and M. Curcio and Scott Fluhrer",
  title =        "{Internet}-Draft: Hash-Based Signatures",
  howpublished = "Internet Engineering Task Force document.",
  year =         "2017",
  bibdate =      "Thu Aug 31 16:19:53 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  URL =          "http://datatracker.ietf.org/doc/draft-mcgrew-hash-sigs",
  acknowledgement = ack-nhfb,
}

@Article{Menesidou:2017:CKM,
  author =       "Sofia Anna Menesidou and Vasilios Katos and Georgios
                 Kambourakis",
  title =        "Cryptographic Key Management in Delay Tolerant
                 Networks: a Survey",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "3",
  pages =        "26",
  day =          "27",
  month =        jun,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9030026",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:57 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/3/26",
  abstract =     "Since their appearance at the dawn of the second
                 millennium, Delay or Disruption Tolerant Networks
                 (DTNs) have gradually evolved, spurring the development
                 of a variety of methods and protocols for making them
                 more secure and resilient. In this context, perhaps,
                 the most challenging problem to deal with is that of
                 cryptographic key management. To the best of our
                 knowledge, the work at hand is the first to survey the
                 relevant literature and classify the various so far
                 proposed key management approaches in such a restricted
                 and harsh environment. Towards this goal, we have
                 grouped the surveyed key management methods into three
                 major categories depending on whether the particular
                 method copes with (a) security initialization, (b) key
                 establishment, and (c) key revocation. We have
                 attempted to provide a concise but fairly complete
                 evaluation of the proposed up-to-date methods in a
                 generalized way with the aim of offering a central
                 reference point for future research.",
  acknowledgement = ack-nhfb,
}

@Article{Migliore:2017:HSA,
  author =       "Vincent Migliore and C{\'e}dric Seguin and Maria
                 M{\'e}ndez Real and Vianney Lapotre and Arnaud
                 Tisserand and Caroline Fontaine and Guy Gogniat and
                 Russell Tessier",
  title =        "A High-Speed Accelerator for Homomorphic Encryption
                 using the {Karatsuba} Algorithm",
  journal =      j-TECS,
  volume =       "16",
  number =       "5s",
  pages =        "138:1--138:??",
  month =        oct,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3126558",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Thu Oct 17 18:16:33 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tecs.bib",
  abstract =     "Somewhat Homomorphic Encryption (SHE) schemes can be
                 used to carry out operations on ciphered data. In a
                 cloud computing scenario, personal information can be
                 processed secretly, inferring a high level of
                 confidentiality. The principle limitation of SHE is the
                 size of ciphertext compared to the size of the message.
                 This issue can be addressed by using a batching
                 technique that ``packs'' several messages into one
                 ciphertext. However, this method leads to important
                 drawbacks in standard implementations. This paper
                 presents a fast hardware/software co-design
                 implementation of an encryption procedure using the
                 Karatsuba algorithm. Our hardware accelerator is 1.5
                 times faster than the state of the art for 1 encryption
                 and 4 times faster for 4 encryptions.",
  acknowledgement = ack-nhfb,
  articleno =    "138",
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J840",
}

@Article{Mosenia:2017:CCA,
  author =       "A. Mosenia and S. Sur-Kolay and A. Raghunathan and N.
                 K. Jha",
  title =        "{CABA}: Continuous Authentication Based on {BioAura}",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "66",
  number =       "5",
  pages =        "759--772",
  month =        may,
  year =         "2017",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2016.2622262",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Thu Apr 6 07:46:06 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
  keywords =     "Authentication; Authorization; behaviometrics;
                 Biomedical monitoring; biomedical signals; biometrics;
                 Biometrics (access control); biostreams; continuous
                 authentication; machine learning; Monitoring;
                 Scalability; security; wearable medical devices",
}

@Article{Mosenia:2017:PTS,
  author =       "Arsalan Mosenia and Xiaoliang Dai and Prateek Mittal
                 and Niraj Jha",
  title =        "{PinMe}: Tracking a Smartphone User around the World",
  journal =      "{IEEE} Transactions on Multi-Scale Computing Systems",
  volume =       "??",
  number =       "??",
  pages =        "1--17",
  month =        "????",
  year =         "2017",
  DOI =          "https://doi.org/10.1109/tmscs.2017.2751462",
  ISSN =         "2332-7766",
  ISSN-L =       "2332-7766",
  bibdate =      "Fri Dec 8 14:47:55 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  remark =       "Still in prepublication stage, not fully edited, and
                 not yet assigned to a journal issue. The article
                 describes non-GPS ways to track mobile phones.",
}

@Article{Mozaffari-Kermani:2017:FDA,
  author =       "Mehran Mozaffari-Kermani and Reza Azarderakhsh and
                 Anita Aghaie",
  title =        "Fault Detection Architectures for Post-Quantum
                 Cryptographic Stateless Hash-Based Secure Signatures
                 Benchmarked on {ASIC}",
  journal =      j-TECS,
  volume =       "16",
  number =       "2",
  pages =        "59:1--59:??",
  month =        apr,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2930664",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Mon Jul 24 09:51:12 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tecs.bib",
  abstract =     "Symmetric-key cryptography can resist the potential
                 post-quantum attacks expected with the not-so-faraway
                 advent of quantum computing power. Hash-based,
                 code-based, lattice-based, and multivariate-quadratic
                 equations are all other potential candidates, the merit
                 of which is that they are believed to resist both
                 classical and quantum computers, and applying ``Shor's
                 algorithm''-the quantum-computer discrete-logarithm
                 algorithm that breaks classical schemes-to them is
                 infeasible. In this article, we propose, assess, and
                 benchmark reliable constructions for stateless
                 hash-based signatures. Such architectures are believed
                 to be one of the prominent post-quantum schemes,
                 offering security proofs relative to plausible
                 properties of the hash function; however, it is well
                 known that their confidentiality does not guarantee
                 reliable architectures in the presence natural and
                 malicious faults. We propose and benchmark fault
                 diagnosis methods for this post-quantum cryptography
                 variant through case studies for hash functions and
                 present the simulations and implementations results
                 (through application-specific integrated circuit
                 evaluations) to show the applicability of the presented
                 schemes. The proposed approaches make such hash-based
                 constructions more reliable against natural faults and
                 help protecting them against malicious faults and can
                 be tailored based on the resources available and for
                 different reliability objectives.",
  acknowledgement = ack-nhfb,
  articleno =    "59",
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J840",
}

@Article{Mukherjee:2017:EPP,
  author =       "Srilekha Mukherjee and Goutam Sanyal",
  title =        "Enhanced Position Power First Mapping {(PPFM)} based
                 image steganography",
  journal =      j-INT-J-COMPUT-APPL,
  volume =       "39",
  number =       "2",
  pages =        "59--68",
  year =         "2017",
  CODEN =        "IJCAFW",
  DOI =          "https://doi.org/10.1080/1206212X.2016.1273624",
  ISSN =         "1206-212X (print), 1925-7074 (electronic)",
  ISSN-L =       "1206-212X",
  bibdate =      "Sat Apr 21 17:31:06 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijca.bib",
  URL =          "https://www.tandfonline.com/doi/full/10.1080/1206212X.2016.1273624",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Computer Applications",
  journal-URL =  "https://www.tandfonline.com/loi/tjca20",
  online-date =  "02 Jan 2017",
}

@Article{Mulholland:2017:DCD,
  author =       "John Mulholland and Michele Mosca and Johannes Braun",
  title =        "The Day the Cryptography Dies",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "4",
  pages =        "14--21",
  month =        jul # "\slash " # aug,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2017.3151325",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Aug 29 06:15:10 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/04/msp2017040014-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
}

@Article{Mundhenk:2017:SAN,
  author =       "Philipp Mundhenk and Andrew Paverd and Artur Mrowca
                 and Sebastian Steinhorst and Martin Lukasiewycz and
                 Suhaib A. Fahmy and Samarjit Chakraborty",
  title =        "Security in Automotive Networks: Lightweight
                 Authentication and Authorization",
  journal =      j-TODAES,
  volume =       "22",
  number =       "2",
  pages =        "25:1--25:??",
  month =        mar,
  year =         "2017",
  CODEN =        "ATASFO",
  DOI =          "https://doi.org/10.1145/2960407",
  ISSN =         "1084-4309 (print), 1557-7309 (electronic)",
  ISSN-L =       "1084-4309",
  bibdate =      "Fri Jul 21 10:49:30 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/todaes/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/todaes.bib",
  abstract =     "With the increasing amount of interconnections between
                 vehicles, the attack surface of internal vehicle
                 networks is rising steeply. Although these networks are
                 shielded against external attacks, they often do not
                 have any internal security to protect against malicious
                 components or adversaries who can breach the network
                 perimeter. To secure the in-vehicle network, all
                 communicating components must be authenticated, and
                 only authorized components should be allowed to send
                 and receive messages. This is achieved through the use
                 of an authentication framework. Cryptography is widely
                 used to authenticate communicating parties and provide
                 secure communication channels (e.g., Internet
                 communication). However, the real-time performance
                 requirements of in-vehicle networks restrict the types
                 of cryptographic algorithms and protocols that may be
                 used. In particular, asymmetric cryptography is
                 computationally infeasible during vehicle operation. In
                 this work, we address the challenges of designing
                 authentication protocols for automotive systems. We
                 present Lightweight Authentication for Secure
                 Automotive Networks (LASAN), a full lifecycle
                 authentication approach. We describe the core LASAN
                 protocols and show how they protect the internal
                 vehicle network while complying with the real-time
                 constraints and low computational resources of this
                 domain. By leveraging the fixed structure of automotive
                 networks, we minimize bandwidth and computation
                 requirements. Unlike previous work, we also explain how
                 this framework can be integrated into all aspects of
                 the automotive product lifecycle, including
                 manufacturing, vehicle maintenance, and software
                 updates. We evaluate LASAN in two different ways:
                 First, we analyze the security properties of the
                 protocols using established protocol verification
                 techniques based on formal methods. Second, we evaluate
                 the timing requirements of LASAN and compare these to
                 other frameworks using a new highly modular discrete
                 event simulator for in-vehicle networks, which we have
                 developed for this evaluation.",
  acknowledgement = ack-nhfb,
  articleno =    "25",
  fjournal =     "ACM Transactions on Design Automation of Electronic
                 Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J776",
}

@Book{Mundy:2017:CGU,
  author =       "Liza Mundy",
  title =        "Code girls: the untold story of the {American} women
                 code breakers of {World War II}",
  publisher =    "Hachette Books",
  address =      "New York, NY, USA",
  pages =        "xiv + 416",
  year =         "2017",
  ISBN =         "0-316-35253-5 (hardcover), 0-316-43989-4 (large
                 print), 1-4789-2270-2 (audio book), 1-4789-2271-0
                 (audio download), 0-316-35255-1 (e-book)",
  ISBN-13 =      "978-0-316-35253-6 (hardcover), 978-0-316-43989-3
                 (large print), 978-1-4789-2270-4 (audio book),
                 978-1-4789-2271-1 (audio download), 978-0-316-35255-0
                 (e-book)",
  LCCN =         "D810.C88 M86 2017",
  bibdate =      "Sat Dec 23 09:01:41 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/master.bib;
                 z3950.loc.gov:7090/Voyager",
  abstract =     "Recruited by the U.S. Army and Navy from small towns
                 and elite colleges, more than ten thousand women served
                 as codebreakers during World War II. While their
                 brothers and boyfriends took up arms, these women moved
                 to Washington and learned the meticulous work of
                 code-breaking. Their efforts shortened the war, saved
                 countless lives, and gave them access to careers
                 previously denied to them. A strict vow of secrecy
                 nearly erased their efforts from history; now, through
                 dazzling research and interviews with surviving code
                 girls, bestselling author Liza Mundy brings to life
                 this riveting and vital story of American courage,
                 service, and scientific accomplishment.",
  acknowledgement = ack-nhfb,
  author-dates = "1960--",
  subject =      "World War, 1939-1945; Cryptography; Participation,
                 Female; Cryptographers; United States; History; 20th
                 century",
  tableofcontents = "Introduction: ``Your country needs you, young
                 ladies'' \\
                 Part I. ``In the event of total war women will be
                 needed'' \\
                 Twenty-eight acres of girls \\
                 ``This is a man's size job, but I seem to be getting
                 away with it'' \\
                 The most difficult problem \\
                 ``So many girls in one place'' \\
                 Part II. ``Over all this vast expanse of waters Japan
                 was supreme'' \\
                 ``It was heart-rending'' \\
                 ``Q for communications'' \\
                 The forlorn shoe \\
                 ``Hell's half-acre'' \\
                 ``It was only human to complain'' \\
                 Pencil-pushing mamas sink the shipping of Japan \\
                 Part III. The tide turns \\
                 Sugar camp \\
                 ``All my love, Jim'' \\
                 ``Enemy landing at the mouth of the Seine'' \\
                 Teedy \\
                 The surrender message \\
                 Good-bye to Crow \\
                 Epilogue: The mitten",
}

@Article{Nacer:2017:DAM,
  author =       "Hassina Nacer and Nabil Djebari and Hachem Slimani and
                 Djamil Aissani",
  title =        "A distributed authentication model for composite {Web}
                 services",
  journal =      j-COMPUT-SECUR,
  volume =       "70",
  number =       "??",
  pages =        "144--178",
  month =        sep,
  year =         "2017",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:51 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404817301153",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nain:2017:SPE,
  author =       "Ajay Kumar Nain and Jagadish Bandaru and Mohammed
                 Abdullah Zubair and Rajalakshmi Pachamuthu",
  title =        "A Secure Phase-Encrypted {IEEE 802.15.4} Transceiver
                 Design",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "66",
  number =       "8",
  pages =        "1421--1427",
  month =        "????",
  year =         "2017",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2017.2672752",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Thu Jul 13 14:57:15 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  URL =          "http://ieeexplore.ieee.org/document/7862216/",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Namasudra:2017:NSA,
  author =       "Suyel Namasudra and Pinki Roy",
  title =        "A new secure authentication scheme for cloud computing
                 environment",
  journal =      j-CCPE,
  volume =       "29",
  number =       "20",
  pages =        "??--??",
  day =          "25",
  month =        oct,
  year =         "2017",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.3864",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Mon Oct 2 11:26:28 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
}

@Article{Nandakumar:2017:CAI,
  author =       "Rajalakshmi Nandakumar and Alex Takakuwa and Tadayoshi
                 Kohno and Shyamnath Gollakota",
  title =        "{CovertBand}: Activity Information Leakage using
                 Music",
  journal =      j-IMWUT,
  volume =       "1",
  number =       "3",
  pages =        "87:1--87:24",
  month =        "????",
  year =         "2017",
  CODEN =        "????",
  ISSN =         "????",
  bibdate =      "Fri Aug 25 15:07:55 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/imwut.bib",
  URL =          "http://musicattacks.cs.washington.edu/activity-information-leakage.pdf",
  abstract =     "This paper contributes a novel method for low-cost,
                 covert physical sensing and, by doing so, surfaces new
                 privacy threats. We demonstrate how a smartphone and
                 portable speaker playing music with embedded, inaudible
                 signals can track multiple individuals' locations and
                 activities both within a room and through barriers in
                 2D space. We achieve this by transforming a smartphone
                 into an active sonar system that emits a combination of
                 a sonar pulse and music and listens to the reflections
                 off of humans in the environment. Our implementation,
                 CovertBand, monitors minute changes to these
                 reflections to track multiple people concurrently and
                 to recognize different types of motion, leaking
                 information about where people are in addition to what
                 they may be doing. We evaluated CovertBand by running
                 experiments in five homes in the Seattle area, showing
                 that we can localize both single and multiple
                 individuals through barriers. These tests show
                 CovertBand can track walking subjects with a mean
                 tracking error of 18 cm and subjects moving at a fixed
                 position with an accuracy of 8 cm at up to 6 m in
                 line-of-sight and 3 m through barriers. We test a
                 variety of rhythmic mot ions such as pumping arms,
                 jumping, and supine pelvic tilts in through-wall
                 scenarios and show that they produce discernibly
                 different spectrograms from walking in the acoustic
                 reflections. In tests with 33 subjects, we also show
                 that even in ideal scenarios, listeners were unlikely
                 to detect a CovertBand attack",
  acknowledgement = ack-nhfb,
  articleno =    "87",
  fjournal =     "Proceedings of the ACM on Interactive, Mobile,
                 Wearable and Ubiquitous Technologies (IMWUT)",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J1566",
  keywords =     "active sonar; information leakage; motion tracking;
                 music processing",
}

@Article{Natgunanathan:2017:PBM,
  author =       "Iynkaran Natgunanathan and Yong Xiang and Guang Hua
                 and Gleb Beliakov and John Yearwood",
  title =        "Patchwork-Based Multilayer Audio Watermarking",
  journal =      j-IEEE-ACM-TASLP,
  volume =       "25",
  number =       "11",
  pages =        "2176--2187",
  month =        "????",
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/TASLP.2017.2749001",
  ISSN =         "2329-9290",
  ISSN-L =       "2329-9290",
  bibdate =      "Sat Jan 20 08:35:32 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeeacmtaslp.bib",
  URL =          "http://ieeexplore.ieee.org/document/8025572/",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6570655",
}

@Article{Ngo:2017:CSS,
  author =       "Xuan Thuy Ngo and Jean-Luc Danger and Sylvain Guilley
                 and Tarik Graba and Yves Mathieu and Zakaria Najm and
                 Shivam Bhasin",
  title =        "Cryptographically Secure Shield for Security {IPs}
                 Protection",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "66",
  number =       "2",
  pages =        "354--360",
  month =        "????",
  year =         "2017",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2016.2584041",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Thu Jan 19 06:52:50 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Nguyen:2017:DPA,
  author =       "Toan Van Nguyen and Napa Sae-Bae and Nasir Memon",
  title =        "{DRAW}-A-{PIN}: Authentication using finger-drawn
                 {PIN} on touch devices",
  journal =      j-COMPUT-SECUR,
  volume =       "66",
  number =       "??",
  pages =        "115--128",
  month =        may,
  year =         "2017",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:49 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404817300123",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Noorman:2017:SLC,
  author =       "Job Noorman and Jo {Van Bulck} and Jan Tobias
                 M{\"u}hlberg and Frank Piessens and Pieter Maene and
                 Bart Preneel and Ingrid Verbauwhede and Johannes
                 G{\"o}tzfried and Tilo M{\"u}ller and Felix Freiling",
  title =        "{Sancus 2.0}: a Low-Cost Security Architecture for
                 {IoT} Devices",
  journal =      j-TOPS,
  volume =       "20",
  number =       "3",
  pages =        "7:1--7:??",
  month =        aug,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3079763",
  ISSN =         "2471-2566 (print), 2471-2574 (electronic)",
  ISSN-L =       "2471-2566",
  bibdate =      "Sat Dec 23 09:59:06 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tops.bib",
  abstract =     "The Sancus security architecture for networked
                 embedded devices was proposed in 2013 at the USENIX
                 Security conference. It supports remote (even
                 third-party) software installation on devices while
                 maintaining strong security guarantees. More
                 specifically, Sancus can remotely attest to a software
                 provider that a specific software module is running
                 uncompromised and can provide a secure communication
                 channel between software modules and software
                 providers. Software modules can securely maintain local
                 state and can securely interact with other software
                 modules that they choose to trust. Over the past three
                 years, significant experience has been gained with
                 applications of Sancus, and several extensions of the
                 architecture have been investigated-both by the
                 original designers as well as by independent
                 researchers. Informed by these additional research
                 results, this journal version of the Sancus paper
                 describes an improved design and implementation,
                 supporting additional security guarantees (such as
                 confidential deployment) and a more efficient
                 cryptographic core. We describe the design of Sancus
                 2.0 (without relying on any prior knowledge of Sancus)
                 and develop and evaluate a prototype FPGA
                 implementation. The prototype extends an MSP430
                 processor with hardware support for the memory access
                 control and cryptographic functionality required to run
                 Sancus. We report on our experience using Sancus in a
                 variety of application scenarios and discuss some
                 important avenues of ongoing and future work.",
  acknowledgement = ack-nhfb,
  articleno =    "7",
  fjournal =     "ACM Transactions on Privacy and Security (TOPS)",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J1547",
}

@Article{Nordrum:2017:GBD,
  author =       "A. Nordrum",
  title =        "Govern by blockchain: {Dubai} wants one platform to
                 rule them all, while {Illinois} will try anything",
  journal =      j-IEEE-SPECTRUM,
  volume =       "54",
  number =       "10",
  pages =        "54--55",
  month =        oct,
  year =         "2017",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.2017.8048841",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 07:02:09 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Buildings; Contracts; cryptography; Economics;
                 financial industry; Government; government data
                 processing; public-sector blockchain experiments; Urban
                 areas",
}

@Article{Nunez:2017:PRE,
  author =       "David Nu{\~n}ez and Isaac Agudo and Javier Lopez",
  title =        "Proxy Re-Encryption: Analysis of constructions and its
                 application to secure access delegation",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "87",
  number =       "??",
  pages =        "193--209",
  day =          "1",
  month =        jun,
  year =         "2017",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Sat Jul 29 15:40:53 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804517301078",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Odelu:2017:PSA,
  author =       "Vanga Odelu and Ashok Kumar Das and Saru Kumari and
                 Xinyi Huang and Mohammad Wazid",
  title =        "Provably secure authenticated key agreement scheme for
                 distributed mobile cloud computing services",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "68",
  number =       "??",
  pages =        "74--88",
  month =        mar,
  year =         "2017",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Sat Dec 10 08:32:13 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X16303065",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X/",
}

@Article{Ozturk:2017:CAH,
  author =       "Erdin{\c{c}} {\"O}zt{\"u}rk and Yark{\i}n Dor{\"o}z
                 and Erkay Sava{\c{s}} and Berk Sunar",
  title =        "A Custom Accelerator for Homomorphic Encryption
                 Applications",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "66",
  number =       "1",
  pages =        "3--16",
  month =        jan,
  year =         "2017",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2016.2574340",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Thu Dec 15 06:48:58 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Padget:2017:FGA,
  author =       "Julian A. Padget and Wamberto W. Vasconcelos",
  title =        "Fine-Grained Access Control via Policy-Carrying Data",
  journal =      j-TOIT,
  volume =       "18",
  number =       "3",
  pages =        "31:1--31:??",
  month =        may,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3133324",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:09 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/toit.bib",
  abstract =     "We address the problem of associating access policies
                 with datasets and how to monitor compliance via
                 policy-carrying data. Our contributions are a formal
                 model in first-order logic inspired by normative
                 multi-agent systems to regulate data access, and a
                 computational model for the validation of specific use
                 cases and the verification of policies against
                 criteria. Existing work on access policy identifies
                 roles as a key enabler, with which we concur, but much
                 of the rest focusses on authentication and
                 authorization technology. Our proposal aims to address
                 the normative principles put forward in Berners-Lee's
                 bill of rights for the internet, through human-readable
                 but machine-processable access control policies.",
  acknowledgement = ack-nhfb,
  articleno =    "31",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Patranabis:2017:PSK,
  author =       "S. Patranabis and Y. Shrivastava and D. Mukhopadhyay",
  title =        "Provably Secure Key-Aggregate Cryptosystems with
                 Broadcast Aggregate Keys for Online Data Sharing on the
                 Cloud",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "66",
  number =       "5",
  pages =        "891--904",
  month =        may,
  year =         "2017",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2016.2629510",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Thu Apr 6 07:46:06 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
  keywords =     "Aggregates; broadcast encryption; CCA security; Cloud
                 computing; Data privacy; data security; data sharing;
                 Encryption; key-aggregate cryptosystem; provable
                 security; Scalability; scalability; semantic security",
}

@Article{Peck:2017:BWD,
  author =       "Morgan E. Peck",
  title =        "Blockchain world --- Do you need a blockchain? {This}
                 chart will tell you if the technology can solve your
                 problem",
  journal =      j-IEEE-SPECTRUM,
  volume =       "54",
  number =       "10",
  pages =        "38--60",
  month =        oct,
  year =         "2017",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.2017.8048838",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 07:02:09 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Bitcoin; blockchain technology; Companies;
                 Conferences; cryptography; data-management systems;
                 Databases; digital ecosystem; electronic health
                 records; health care; health care records management;
                 Juniper Research; online identities; Oracle Corp;
                 Packaging; Privacy; property titles; records
                 management; relational databases; Software; supply
                 chains",
}

@Book{Pellikaan:2017:CCC,
  author =       "Ruud Pellikaan and Xin-Wen Wu and Stanislav Bulygin
                 and Relinde Jurrius",
  title =        "Codes, Cryptology and Curves with Computer Algebra",
  publisher =    pub-CAMBRIDGE,
  address =      pub-CAMBRIDGE:adr,
  pages =        "xii + 597",
  year =         "2017",
  ISBN =         "0-521-52036-3 (paperback), 0-521-81711-0 (hardcover),
                 0-511-98217-8 (e-book)",
  ISBN-13 =      "978-0-521-52036-2 (paperback), 978-0-521-81711-0
                 (hardcover), 978-0-511-98217-0 (e-book)",
  LCCN =         "QA268 .P45 2017",
  bibdate =      "Tue Oct 22 09:50:04 MDT 2019",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "This well-balanced text touches on theoretical and
                 applied aspects of protecting digital data. The reader
                 is provided with the basic theory and is then shown
                 deeper fascinating detail, including the current state
                 of the art. Readers will soon become familiar with
                 methods of protecting digital data while it is
                 transmitted, as well as while the data is being stored.
                 Both basic and advanced error-correcting codes are
                 introduced together with numerous results on their
                 parameters and properties. The authors explain how to
                 apply these codes to symmetric and public key
                 cryptosystems and secret sharing. Interesting
                 approaches based on polynomial systems solving are
                 applied to cryptography and decoding codes. Computer
                 algebra systems are also used to provide an
                 understanding of how objects introduced in the book are
                 constructed, and how their properties can be examined.
                 This book is designed for Masters-level students
                 studying mathematics, computer science, electrical
                 engineering or physics.",
  acknowledgement = ack-nhfb,
  remark =       "Title from publisher's bibliographic system (viewed on
                 27 Oct 2017).",
  subject =      "Error-correcting codes (Information theory); Curves,
                 Algebraic; Coding theory; Coding theory; Curves,
                 Algebraic; Error-correcting codes (Information
                 theory)",
  tableofcontents = "Error-correcting codes / Ruud Pellikaan and Xin-Wen
                 Wu \\
                 Code constructions and bounds on codes / Ruud Pellikaan
                 and Xin-Wen Wu \\
                 Weight enumeration / Relinde Jurrius, Ruud Pellikaan
                 and Xin-Wen Wu \\
                 Cyclic codes / Ruud Pellikaan \\
                 Polynomial codes / Ruud Pellikaan \\
                 Algebraic decoding / Ruud Pellikaan and Xin-Wen Wu \\
                 Complexity and decoding / Stanislav Bulygin, Ruud
                 Pellikaan and Xin-Wen Wu \\
                 Codes and related structures / Relinde Jurrius and Ruud
                 Pellikaan \\
                 Cryptology / Stanislav Bulygin \\
                 Gr{\"o}bner bases for coding and cryptology / Stanislav
                 Bulygin \\
                 Codes on curves / Ruud Pellikaan \\
                 Coding and cryptology with computer algebra / Stanislav
                 Bulygin",
}

@Article{Pendleton:2017:SSS,
  author =       "Marcus Pendleton and Richard Garcia-Lebron and Jin-Hee
                 Cho and Shouhuai Xu",
  title =        "A Survey on Systems Security Metrics",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "4",
  pages =        "62:1--62:??",
  month =        feb,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3005714",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Feb 9 09:18:20 MST 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "Security metrics have received significant attention.
                 However, they have not been systematically explored
                 based on the understanding of attack-defense
                 interactions, which are affected by various factors,
                 including the degree of system vulnerabilities, the
                 power of system defense mechanisms, attack (or threat)
                 severity, and situations a system at risk faces. This
                 survey particularly focuses on how a system security
                 state can evolve as an outcome of cyber attack-defense
                 interactions. This survey concerns how to measure
                 system-level security by proposing a security metrics
                 framework based on the following four sub-metrics: (1)
                 metrics of system vulnerabilities, (2) metrics of
                 defense power, (3) metrics of attack or threat
                 severity, and (4) metrics of situations. To investigate
                 the relationships among these four sub-metrics, we
                 propose a hierarchical ontology with four
                 sub-ontologies corresponding to the four sub-metrics
                 and discuss how they are related to each other. Using
                 the four sub-metrics, we discuss the state-of-art
                 existing security metrics and their advantages and
                 disadvantages (or limitations) to obtain lessons and
                 insight in order to achieve an ideal goal in developing
                 security metrics. Finally, we discuss open research
                 questions in the security metrics research domain and
                 we suggest key factors to enhance security metrics from
                 a system security perspective.",
  acknowledgement = ack-nhfb,
  articleno =    "62",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Poh:2017:SDV,
  author =       "Geong Sen Poh and Vishnu Monn Baskaran and Ji-Jian
                 Chin and Moesfa Soeheila Mohamad and Kay Win Lee and
                 Dharmadharshni Maniam and Muhammad Reza Z'aba",
  title =        "Searchable Data Vault: Encrypted Queries in Secure
                 Distributed Cloud Storage",
  journal =      j-ALGORITHMS-BASEL,
  volume =       "10",
  number =       "2",
  month =        jun,
  year =         "2017",
  CODEN =        "ALGOCH",
  DOI =          "https://doi.org/10.3390/a10020052",
  ISSN =         "1999-4893 (electronic)",
  ISSN-L =       "1999-4893",
  bibdate =      "Fri May 3 13:50:13 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/algorithms.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.mdpi.com/1999-4893/10/2/52",
  acknowledgement = ack-nhfb,
  articleno =    "52",
  fjournal =     "Algorithms (Basel)",
  journal-URL =  "https://www.mdpi.com/journal/algorithms",
  ORCID-numbers = "Geong Sen Poh/0000-0002-2905-688X; Ji-Jian
                 Chin/0000-0001-9809-6976",
  pagecount =    "??",
  pubdates =     "Received: 28 February 2017 / Revised: 19 April 2017 /
                 Accepted: 3 May 2017 / Published: 9 May 2017",
}

@Article{Poh:2017:SSE,
  author =       "Geong Sen Poh and Ji-Jian Chin and Wei-Chuen Yau and
                 Kim-Kwang Raymond Choo and Moesfa Soeheila Mohamad",
  title =        "Searchable Symmetric Encryption: Designs and
                 Challenges",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "3",
  pages =        "40:1--40:??",
  month =        oct,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3064005",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:00 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "Searchable Symmetric Encryption (SSE) when deployed in
                 the cloud allows one to query encrypted data without
                 the risk of data leakage. Despite the widespread
                 interest, existing surveys do not examine in detail how
                 SSE's underlying structures are designed and how these
                 result in the many properties of a SSE scheme. This is
                 the gap we seek to address, as well as presenting
                 recent state-of-the-art advances on SSE. Specifically,
                 we present a general framework and believe the
                 discussions may lead to insights for potential new
                 designs. We draw a few observations. First, most
                 schemes use index table, where optimal index size and
                 sublinear search can be achieved using an inverted
                 index. Straightforward updating can only be achieved
                 using direct index, but search time would be linear. A
                 recent trend is the combinations of index table, and
                 tree, deployed for efficient updating and storage.
                 Secondly, mechanisms from related fields such as
                 Oblivious RAM (ORAM) have been integrated to reduce
                 leakages. However, using these mechanisms to minimise
                 leakages in schemes with richer functionalities (e.g.,
                 ranked, range) is relatively unexplored. Thirdly, a new
                 approach (e.g., multiple servers) is required to
                 mitigate new and emerging attacks on leakage. Lastly,
                 we observe that a proposed index may not be practically
                 efficient when implemented, where I/O access must be
                 taken into consideration.",
  acknowledgement = ack-nhfb,
  articleno =    "40",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Polyakov:2017:FPR,
  author =       "Yuriy Polyakov and Kurt Rohloff and Gyana Sahu and
                 Vinod Vaikuntanathan",
  title =        "Fast Proxy Re-Encryption for Publish\slash Subscribe
                 Systems",
  journal =      j-TOPS,
  volume =       "20",
  number =       "4",
  pages =        "14:1--14:??",
  month =        oct,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3128607",
  ISSN =         "2471-2566 (print), 2471-2574 (electronic)",
  ISSN-L =       "2471-2566",
  bibdate =      "Sat Dec 23 09:59:06 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tops.bib",
  abstract =     "We develop two IND-CPA-secure multihop unidirectional
                 Proxy Re-Encryption (PRE) schemes by applying the
                 Ring-LWE (RLWE) key switching approach from the
                 homomorphic encryption literature. Unidirectional PRE
                 is ideal for secure publish-subscribe operations where
                 a publisher encrypts information using a public key
                 without knowing upfront who the subscriber will be and
                 what private key will be used for decryption. The
                 proposed PRE schemes provide a multihop capability,
                 meaning that when PRE-encrypted information is
                 published onto a PRE-enabled server, the server can
                 either delegate access to specific clients or enable
                 other servers the right to delegate access. Our first
                 scheme (which we call NTRU-ABD-PRE) is based on a
                 variant of the NTRU-RLWE homomorphic encryption scheme.
                 Our second and main PRE scheme (which we call BV-PRE)
                 is built on top of the Brakerski-Vaikuntanathan (BV)
                 homomorphic encryption scheme and relies solely on the
                 RLWE assumption. We present an open-source C++
                 implementation of both schemes and discuss several
                 algorithmic and software optimizations. We examine
                 parameter selection tradeoffs in the context of
                 security, runtime\slash latency, throughput, ciphertext
                 expansion, memory usage, and multihop capabilities. Our
                 experimental analysis demonstrates that BV-PRE
                 outperforms NTRU-ABD-PRE in both single-hop and
                 multihop settings. The BV-PRE scheme has a lower time
                 and space complexity than existing IND-CPA-secure
                 lattice-based PRE schemes and requires small concrete
                 parameters, making the scheme computationally efficient
                 for use on low-resource embedded systems while still
                 providing 100 bits of security. We present practical
                 recommendations for applying the PRE schemes to several
                 use cases of ad hoc information sharing for
                 publish-subscribe operations.",
  acknowledgement = ack-nhfb,
  articleno =    "14",
  fjournal =     "ACM Transactions on Privacy and Security (TOPS)",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J1547",
}

@Article{Puthal:2017:DDK,
  author =       "Deepak Puthal and Surya Nepal and Rajiv Ranjan and
                 Jinjun Chen",
  title =        "{DLSeF}: a Dynamic Key-Length-Based Efficient
                 Real-Time Security Verification Model for Big Data
                 Stream",
  journal =      j-TECS,
  volume =       "16",
  number =       "2",
  pages =        "51:1--51:??",
  month =        apr,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2937755",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Mon Jul 24 09:51:12 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tecs.bib",
  abstract =     "Applications in risk-critical domains such as
                 emergency management and industrial control systems
                 need near-real-time stream data processing in
                 large-scale sensing networks. The key problem is how to
                 ensure online end-to-end security (e.g.,
                 confidentiality, integrity, and authenticity) of data
                 streams for such applications. We refer to this as an
                 online security verification problem. Existing data
                 security solutions cannot be applied in such
                 applications as they cannot deal with data streams with
                 high-volume and high-velocity data in real time. They
                 introduce a significant buffering delay during security
                 verification, resulting in a requirement for a large
                 buffer size for the stream processing server. To
                 address this problem, we propose a Dynamic
                 Key-Length-Based Security Framework (DLSeF) based on a
                 shared key derived from synchronized prime numbers; the
                 key is dynamically updated at short intervals to thwart
                 potential attacks to ensure end-to-end security.
                 Theoretical analyses and experimental results of the
                 DLSeF framework show that it can significantly improve
                 the efficiency of processing stream data by reducing
                 the security verification time and buffer usage without
                 compromising security.",
  acknowledgement = ack-nhfb,
  articleno =    "51",
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J840",
}

@Article{Qin:2017:DIR,
  author =       "Chuan Qin and Jingwei Li and Patrick P. C. Lee",
  title =        "The Design and Implementation of a Rekeying-Aware
                 Encrypted Deduplication Storage System",
  journal =      j-TOS,
  volume =       "13",
  number =       "1",
  pages =        "9:1--9:??",
  month =        mar,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3032966",
  ISSN =         "1553-3077 (print), 1553-3093 (electronic)",
  ISSN-L =       "1553-3077",
  bibdate =      "Sat Mar 25 07:00:07 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/tos/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tos.bib",
  abstract =     "Rekeying refers to an operation of replacing an
                 existing key with a new key for encryption. It renews
                 security protection to protect against key compromise
                 and enable dynamic access control in cryptographic
                 storage. However, it is non-trivial to realize
                 efficient rekeying in encrypted deduplication storage
                 systems, which use deterministic content-derived
                 encryption keys to allow deduplication on ciphertexts.
                 We design and implement a rekeying-aware encrypted
                 deduplication (REED) storage system. REED builds on a
                 deterministic version of all-or-nothing transform, such
                 that it enables secure and lightweight rekeying, while
                 preserving the deduplication capability. We propose two
                 REED encryption schemes that trade between performance
                 and security and extend REED for dynamic access
                 control. We implement a REED prototype with various
                 performance optimization techniques and demonstrate how
                 we can exploit similarity to mitigate key generation
                 overhead. Our trace-driven testbed evaluation shows
                 that our REED prototype maintains high performance and
                 storage efficiency.",
  acknowledgement = ack-nhfb,
  articleno =    "9",
  fjournal =     "ACM Transactions on Storage",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J960",
}

@Article{Qiu:2017:AAS,
  author =       "Yue Qiu and Maode Ma and Shuo Chen",
  title =        "An anonymous authentication scheme for multi-domain
                 machine-to-machine communication in cyber-physical
                 systems",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "129 (part 1)",
  number =       "??",
  pages =        "306--318",
  day =          "24",
  month =        dec,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Wed Nov 22 06:05:46 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S138912861730381X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286/",
}

@Article{Qiu:2017:PSB,
  author =       "Yue Qiu and Maode Ma and Xilei Wang",
  title =        "A proxy signature-based handover authentication scheme
                 for {LTE} wireless networks",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "83",
  number =       "??",
  pages =        "63--71",
  day =          "1",
  month =        apr,
  year =         "2017",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Fri Mar 31 07:48:45 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804517300449",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Radke:2017:SPP,
  author =       "Kenneth Radke and Colin Boyd",
  title =        "Security Proofs for Protocols Involving Humans",
  journal =      j-COMP-J,
  volume =       "60",
  number =       "4",
  pages =        "527--540",
  day =          "23",
  month =        mar,
  year =         "2017",
  CODEN =        "CMPJA6",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Thu Nov 16 10:43:41 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://academic.oup.com/comjnl/article/60/4/527/2354604",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Rao:2017:CFA,
  author =       "Y. Sreenivasa Rao and Ratna Dutta",
  title =        "Computational friendly attribute-based encryptions
                 with short ciphertext",
  journal =      j-THEOR-COMP-SCI,
  volume =       "668",
  number =       "??",
  pages =        "1--26",
  day =          "15",
  month =        mar,
  year =         "2017",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Wed Mar 8 12:16:00 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2015.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0304397516307587",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{Rao:2017:SEC,
  author =       "Y. Sreenivasa Rao",
  title =        "A secure and efficient Ciphertext-Policy
                 Attribute-Based Signcryption for Personal Health
                 Records sharing in cloud computing",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "67",
  number =       "??",
  pages =        "133--151",
  month =        feb,
  year =         "2017",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Tue Nov 22 14:20:56 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X16302746",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X/",
}

@Article{Rawat:2017:VIS,
  author =       "Hemendra Rawat and Patrick Schaumont",
  title =        "Vector Instruction Set Extensions for Efficient
                 Computation of {Keccak}",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "66",
  number =       "10",
  pages =        "1778--1789",
  month =        oct,
  year =         "2017",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2017.2700795",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Thu Sep 7 07:00:50 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  URL =          "http://ieeexplore.ieee.org/document/7918507/",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Razaque:2017:SDA,
  author =       "Abdul Razaque and Syed S. Rizvi",
  title =        "Secure data aggregation using access control and
                 authentication for wireless sensor networks",
  journal =      j-COMPUT-SECUR,
  volume =       "70",
  number =       "??",
  pages =        "532--545",
  month =        sep,
  year =         "2017",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:51 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404817301402",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Reaves:2017:MBM,
  author =       "Bradley Reaves and Jasmine Bowers and Nolen Scaife and
                 Adam Bates and Arnav Bhartiya and Patrick Traynor and
                 Kevin R. B. Butler",
  title =        "Mo(bile) Money, Mo(bile) Problems: Analysis of
                 Branchless Banking Applications",
  journal =      j-TOPS,
  volume =       "20",
  number =       "3",
  pages =        "11:1--11:??",
  month =        aug,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3092368",
  ISSN =         "2471-2566 (print), 2471-2574 (electronic)",
  ISSN-L =       "2471-2566",
  bibdate =      "Sat Dec 23 09:59:06 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tops.bib",
  abstract =     "Mobile money, also known as branchless banking,
                 leverages ubiquitous cellular networks to bring
                 much-needed financial services to the unbanked in the
                 developing world. These services are often deployed as
                 smartphone apps, and although marketed as secure, these
                 applications are often not regulated as strictly as
                 traditional banks, leaving doubt about the truth of
                 such claims. In this article, we evaluate these claims
                 and perform the first in-depth measurement analysis of
                 branchless banking applications. We first perform an
                 automated analysis of all 46 known Android mobile money
                 apps across the 246 known mobile money providers from
                 2015. We then perform a comprehensive manual teardown
                 of the registration, login, and transaction procedures
                 of a diverse 15\% of these apps. We uncover pervasive
                 vulnerabilities spanning botched certification
                 validation, do-it-yourself cryptography, and other
                 forms of information leakage that allow an attacker to
                 impersonate legitimate users, modify transactions, and
                 steal financial records. These findings show that the
                 majority of these apps fail to provide the protections
                 needed by financial services. In an expanded
                 re-evaluation one year later, we find that these
                 systems have only marginally improved their security.
                 Additionally, we document our experiences working in
                 this sector for future researchers and provide
                 recommendations to improve the security of this
                 critical ecosystem. Finally, through inspection of
                 providers' terms of service, we also discover that
                 liability for these problems unfairly rests on the
                 shoulders of the customer, threatening to erode trust
                 in branchless banking and hinder efforts for global
                 financial inclusion.",
  acknowledgement = ack-nhfb,
  articleno =    "11",
  fjournal =     "ACM Transactions on Privacy and Security (TOPS)",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J1547",
}

@Article{Reinicke:2017:RDS,
  author =       "Bryan Reinicke and Jeffrey Cummings and Howard
                 Kleinberg",
  title =        "The Right to Digital Self-Defense",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "4",
  pages =        "68--71",
  month =        jul # "\slash " # aug,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2017.3151324",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Aug 29 06:15:10 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/04/msp2017040068-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Rivest:2017:WEV,
  author =       "Ronald L. Rivest and Philip B. Stark",
  title =        "When Is an Election Verifiable?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "3",
  pages =        "48--50",
  month =        may # "\slash " # jun,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2017.78",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 25 21:35:08 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/03/msp2017030048-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Roy:2017:LOS,
  author =       "Dipanjan Roy and Anirban Sengupta",
  title =        "Low overhead symmetrical protection of reusable {IP}
                 core using robust fingerprinting and watermarking
                 during high level synthesis",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "71",
  number =       "??",
  pages =        "89--101",
  month =        jun,
  year =         "2017",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Thu Mar 9 14:20:18 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X16305556",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Sadhya:2017:PRE,
  author =       "Debanjan Sadhya and Sanjay Kumar Singh",
  title =        "Privacy risks ensuing from cross-matching among
                 databases: a case study for soft biometrics",
  journal =      j-INFO-PROC-LETT,
  volume =       "128",
  number =       "??",
  pages =        "38--45",
  month =        dec,
  year =         "2017",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Fri Aug 25 11:46:56 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019017301436",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Safkhani:2017:PSD,
  author =       "Masoumeh Safkhani and Nasour Bagheri",
  title =        "Passive secret disclosure attack on an
                 ultralightweight authentication protocol for {Internet
                 of Things}",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "73",
  number =       "8",
  pages =        "3579--3585",
  month =        aug,
  year =         "2017",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-017-1959-0",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Mon Oct 2 11:08:37 MDT 2017",
  bibsource =    "http://link.springer.com/journal/11227/73/8;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Article{Sendrier:2017:CBC,
  author =       "Nicolas Sendrier",
  title =        "Code-Based Cryptography: State of the Art and
                 Perspectives",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "4",
  pages =        "44--50",
  month =        jul # "\slash " # aug,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2017.3151345",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Aug 29 06:15:10 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/04/msp2017040044-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
}

@Article{Sengupta:2017:USB,
  author =       "Binanda Sengupta and Abhijit Das",
  title =        "Use of {SIMD}-based data parallelism to speed up
                 sieving in integer-factoring algorithms",
  journal =      j-APPL-MATH-COMP,
  volume =       "293",
  number =       "??",
  pages =        "204--217",
  day =          "15",
  month =        jan,
  year =         "2017",
  CODEN =        "AMHCBQ",
  DOI =          "https://doi.org/10.1016/j.amc.2016.08.019",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Fri Sep 30 06:36:11 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/applmathcomput2015.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0096300316305148",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003/",
  keywords =     "Integer factorization; Lattice sieve method;
                 Multiple-polynomial quadratic sieve method;
                 Number-field sieve method; Single instruction multiple
                 data",
}

@Book{Shemanske:2017:MCE,
  author =       "Thomas R. Shemanske",
  title =        "Modern Cryptography and Elliptic Curves: a Beginner's
                 Guide",
  volume =       "83",
  publisher =    pub-AMS,
  address =      pub-AMS:adr,
  pages =        "xii + 250",
  year =         "2017",
  ISBN =         "1-4704-3582-9, 1-4704-4123-3 (e-book)",
  ISBN-13 =      "978-1-4704-3582-0, 978-1-4704-4123-4 (e-book)",
  LCCN =         "QA567.2.E44 S534 2017",
  MRclass =      "11-01 68-01 11Axx 14G50 11T71 68P25 11Y05 94A60 11G05
                 81P68",
  bibdate =      "Tue Oct 22 09:55:53 MDT 2019",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  series =       "Student mathematical library",
  URL =          "http://public.ebookcentral.proquest.com/choice/publicfullrecord.aspx?p=4940250",
  abstract =     "This book offers the beginning undergraduate student
                 some of the vista of modern mathematics by developing
                 and presenting the tools needed to gain an
                 understanding of the arithmetic of elliptic curves over
                 finite fields and their applications to modern
                 cryptography. This gradual introduction also makes a
                 significant effort to teach students how to produce or
                 discover a proof by presenting mathematics as an
                 exploration, and at the same time, it provides the
                 necessary mathematical underpinnings to investigate the
                 practical and implementation side of elliptic curve
                 cryptography (ECC). Elements of.",
  acknowledgement = ack-nhfb,
  author-dates = "1952--",
  remark =       "Versement en lot.",
  subject =      "Cryptography; Textbooks; Curves, Elliptic; Geometry,
                 Algebraic; Cryptography.; Curves, Elliptic.; Geometry,
                 Algebraic.",
  tableofcontents = "Preface \\
                 Introduction \\
                 1. Three Motivating Problems \\
                 1.1. Fermat's Last Theorem \\
                 1.2. The Congruent Number Problem \\
                 1.3. Cryptography \\
                 2. Back to the Beginning \\
                 2.1. The Unit Circle: Real vs. Rational Points \\
                 2.2. Parametrizing the Rational Points on the Unit
                 Circle \\
                 2.3. Finding all Pythagorean Triples \\
                 2.4. Looking for Underlying Structure: Geometry vs.
                 Algebra \\
                 2.5. More about Points on Curves \\
                 2.6. Gathering Some Insight about Plane Curves \\
                 2.7. Additional Exercises \\
                 3. Some Elementary Number Theory \\
                 3.1. The Integers \\
                 3.2. Some Basic Properties of the Integers \\
                 3.3. Euclid's Algorithm \\
                 3.4. A First Pass at Modular Arithmetic \\
                 3.5. Elementary Cryptography: Caesar Cipher \\
                 3.6. Affine Ciphers and Linear Congruences \\
                 3.7. Systems of Congruences \\
                 4. A Second View of Modular Arithmetic: \Z\_{ } and \_{
                 } \\
                 4.1. Groups and Rings \\
                 4.2. Fractions and the Notion of an Equivalence
                 Relation \\
                 4.3. Modular Arithmetic \\
                 4.4. A Few More Comments on the Euler Totient Function
                 \\
                 4.5. An Application to Factoring \\
                 5. Public-Key Cryptography and RSA \\
                 5.1. A Brief Overview of Cryptographic Systems \\
                 5.2. RSA \\
                 5.3. Hash Functions \\
                 5.4. Breaking Cryptosystems and Practical RSA Security
                 Considerations \\
                 6. A Little More Algebra \\
                 6.1. Towards a Classification of Groups \\
                 6.2. Cayley Tables \\
                 6.3. A Couple of Non-abelian Groups \\
                 6.4. Cyclic Groups and Direct Products \\
                 6.5. Fundamental Theorem of Finite Abelian Groups \\
                 6.6. Primitive Roots \\
                 6.7. Diffie--Hellman Key Exchange \\
                 6.8. ElGamal Encryption \\
                 7. Curves in Affine and Projective Space \\
                 7.1. Affine and Projective Space \\
                 7.2. Curves in the Affine and Projective Plane \\
                 7.3. Rational Points on Curves \\
                 7.4. The Group Law for Points on an Elliptic Curve \\
                 7.5. A Formula for the Group Law on an Elliptic Curve
                 \\
                 7.6. The Number of Points on an Elliptic Curve \\
                 8. Applications of Elliptic Curves \\
                 8.1. Elliptic Curves and Factoring \\
                 8.2. Elliptic Curves and Cryptography \\
                 8.3. Remarks on a Post-Quantum Cryptographic World \\
                 Appendix A. Deeper Results and Concluding Thoughts \\
                 A.1. The Congruent Number Problem and Tunnell's
                 Solution \\
                 A.2. A Digression on Functions of a Complex Variable
                 \\
                 A.3. Return to the Birch and Swinnerton-Dyer Conjecture
                 \\
                 A.4. Elliptic Curves over $\C$ \\
                 Appendix B. Answers to Selected Exercises \\
                 B.1. Chapter 2 \\
                 B.2. Chapter 3 \\
                 B.3. Chapter 4 \\
                 B.4. Chapter 5 \\
                 B.5. Chapter 6 \\
                 B.6. Chapter 7 \\
                 Bibliography \\
                 Index \\
                 Back Cover",
}

@Article{Shen:2017:RDP,
  author =       "Wenting Shen and Guangyang Yang and Jia Yu and Hanlin
                 Zhang and Fanyu Kong and Rong Hao",
  title =        "Remote data possession checking with
                 privacy-preserving authenticators for cloud storage",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "76",
  number =       "??",
  pages =        "136--145",
  month =        nov,
  year =         "2017",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Fri Jul 28 15:45:46 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X16304939",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Sherman:2017:ICC,
  author =       "Alan Sherman and Melissa Dark and Agnes Chan and Rylan
                 Chong and Thomas Morris and Linda Oliva and John
                 Springer and Bhavani Thuraisingham and Christopher
                 Vatcher and Rakesh Verma and Susanne Wetzel",
  title =        "{INSuRE}: Collaborating Centers of Academic Excellence
                 Engage Students in Cybersecurity Research",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "4",
  pages =        "72--78",
  month =        jul # "\slash " # aug,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2017.3151327",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Aug 29 06:15:10 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/04/msp2017040072-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Shin:2017:CGI,
  author =       "Kyuyong Shin and Carlee Joe-Wong and Sangtae Ha and
                 Yung Yi and Injong Rhee and Douglas S. Reeves",
  title =        "{T-Chain}: a General Incentive Scheme for Cooperative
                 Computing",
  journal =      j-IEEE-TRANS-NETWORKING,
  volume =       "25",
  number =       "4",
  pages =        "2122--2137",
  month =        aug,
  year =         "2017",
  CODEN =        "IEANEP",
  DOI =          "https://doi.org/10.1109/TNET.2017.2685560",
  ISSN =         "1063-6692 (print), 1558-2566 (electronic)",
  ISSN-L =       "1063-6692",
  bibdate =      "Tue Oct 3 16:29:33 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
  abstract =     "In this paper, we propose a simple, distributed, but
                 highly efficient fairness-enforcing incentive mechanism
                 for cooperative computing. The proposed mechanism,
                 called triangle chaining T-Chain, enforces reciprocity
                 to avoid the exploitable aspects of the schemes that
                 allow free-riding. In T-Chain, symmetric key
                 cryptography provides the basis for a lightweight,
                 almost-fair exchange protocol, which is coupled with a
                 pay-it-forward mechanism. This combination increases
                 the opportunity for multi-lateral exchanges and further
                 maximizes the resource utilization of participants,
                 each of whom is assumed to operate solely for his or
                 her own benefit. T-Chain also provides barrier-free
                 entry to newcomers with flexible resource allocation,
                 allowing them to immediately benefit, and, therefore,
                 is suitable for dynamic environments with high churn
                 i.e., turnover. T-Chain is distributed and simple to
                 implement, as no trusted third party is required to
                 monitor or enforce the scheme, nor is there any
                 reliance on reputation information or tokens.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE\slash ACM Transactions on Networking",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J771",
}

@Article{Shin:2017:SSD,
  author =       "Youngjoo Shin and Dongyoung Koo and Junbeom Hur",
  title =        "A Survey of Secure Data Deduplication Schemes for
                 Cloud Storage Systems",
  journal =      j-COMP-SURV,
  volume =       "49",
  number =       "4",
  pages =        "74:1--74:??",
  month =        feb,
  year =         "2017",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3017428",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Thu Feb 9 09:18:20 MST 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/surveys/;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "Data deduplication has attracted many cloud service
                 providers (CSPs) as a way to reduce storage costs. Even
                 though the general deduplication approach has been
                 increasingly accepted, it comes with many security and
                 privacy problems due to the outsourced data delivery
                 models of cloud storage. To deal with specific security
                 and privacy issues, secure deduplication techniques
                 have been proposed for cloud data, leading to a diverse
                 range of solutions and trade-offs. Hence, in this
                 article, we discuss ongoing research on secure
                 deduplication for cloud data in consideration of the
                 attack scenarios exploited most widely in cloud
                 storage. On the basis of classification of
                 deduplication system, we explore security risks and
                 attack scenarios from both inside and outside
                 adversaries. We then describe state-of-the-art secure
                 deduplication techniques for each approach that deal
                 with different security issues under specific or
                 combined threat models, which include both
                 cryptographic and protocol solutions. We discuss and
                 compare each scheme in terms of security and efficiency
                 specific to different security goals. Finally, we
                 identify and discuss unresolved issues and further
                 research challenges for secure deduplication in cloud
                 storage.",
  acknowledgement = ack-nhfb,
  articleno =    "74",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Shivani:2017:RIE,
  author =       "J. L. Divya Shivani and Ranjan K. Senapati",
  title =        "Robust Image Embedded Watermarking Using {DCT} and
                 Listless {SPIHT}",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "3",
  pages =        "33",
  day =          "12",
  month =        jul,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9030033",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:57 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/3/33",
  abstract =     "This paper presents a DCT-based (DCT: discrete cosine
                 transform) listless set partitioning in hierarchical
                 trees (SPIHT) digital watermarking technique that is
                 robust against several common attacks such as cropping,
                 filtering, sharpening, noise, inversion, contrast
                 manipulation, and compression. The proposed technique
                 is made further robust by the incorporation of the
                 Chinese remainder theorem (CRT) encryption technique.
                 Our scheme is compared with the recently proposed
                 CRT-based DCT technique, CRT-based spatial domain
                 watermarking, and DCT-based inter block correlation
                 techniques. Extensive simulation experiments show
                 better robustness in common image manipulations and, at
                 the same time, the proposed technique successfully
                 makes the watermark perceptually invisible. A better
                 Tamper Assessment Function (TAF) value of 2-15\% and a
                 better Normalized Correlation (NC) is achieved compared
                 to some of the above techniques. In particular, the
                 proposed technique shows better robustness on
                 compression attacks at moderate to higher compression
                 ratios. It is possible to maintain the imperceptibility
                 and low TAF for various values by doubling the capacity
                 of the watermark.",
  acknowledgement = ack-nhfb,
}

@Article{Siadati:2017:MYS,
  author =       "Hossein Siadati and Toan Nguyen and Payas Gupta and
                 Markus Jakobsson and Nasir Memon",
  title =        "Mind your {SMSes}: Mitigating social engineering in
                 second factor authentication",
  journal =      j-COMPUT-SECUR,
  volume =       "65",
  number =       "??",
  pages =        "14--28",
  month =        mar,
  year =         "2017",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:48 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481630116X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Singh:2017:SCB,
  author =       "Priyanka Singh and Balasubramanian Raman and Nishant
                 Agarwal and Pradeep K. Atrey",
  title =        "Secure Cloud-Based Image Tampering Detection and
                 Localization Using {POB} Number System",
  journal =      j-TOMM,
  volume =       "13",
  number =       "3",
  pages =        "23:1--23:??",
  month =        aug,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3077140",
  ISSN =         "1551-6857 (print), 1551-6865 (electronic)",
  ISSN-L =       "1551-6857",
  bibdate =      "Sat Dec 23 10:49:22 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tomccap.bib",
  abstract =     "The benefits of high-end computation infrastructure
                 facilities provided by cloud-based multimedia systems
                 are attracting people all around the globe. However,
                 such cloud-based systems possess security issues as
                 third party servers become involved in them. Rendering
                 data in an unreadable form so that no information is
                 revealed to the cloud data centers will serve as the
                 best solution to these security issues. One such image
                 encryption scheme based on a Permutation Ordered Binary
                 Number System has been proposed in this work. It
                 distributes the image information in totally random
                 shares, which can be stored at the cloud data centers.
                 Further, the proposed scheme authenticates the shares
                 at the pixel level. If any tampering is done at the
                 cloud servers, the scheme can accurately identify the
                 altered pixels via authentication bits and localizes
                 the tampered area. The tampered portion is also
                 reflected back in the reconstructed image that is
                 obtained at the authentic user end. The experimental
                 results validate the efficacy of the proposed scheme
                 against various kinds of possible attacks, tested with
                 a variety of images. The tamper detection accuracy has
                 been computed on a pixel basis and found to be
                 satisfactorily high for most of the tampering
                 scenarios.",
  acknowledgement = ack-nhfb,
  articleno =    "23",
  fjournal =     "ACM Transactions on Multimedia Computing,
                 Communications, and Applications",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J961",
}

@Article{Skracic:2017:AAU,
  author =       "Kristian Skraci{\'c} and Predrag Pale and Zvonko
                 Kostanjcar",
  title =        "Authentication approach using one-time challenge
                 generation based on user behavior patterns captured in
                 transactional data sets",
  journal =      j-COMPUT-SECUR,
  volume =       "67",
  number =       "??",
  pages =        "107--121",
  month =        jun,
  year =         "2017",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:49 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481730055X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Son:2017:NOC,
  author =       "Junggab Son and Donghyun Kim and Md Zakirul Alam
                 Bhuiyan and Rasheed Hussain and Heekuck Oh",
  title =        "A new outsourcing conditional proxy re-encryption
                 suitable for mobile cloud environment",
  journal =      j-CCPE,
  volume =       "29",
  number =       "14",
  pages =        "",
  day =          "25",
  month =        jul,
  year =         "2017",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.3946",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Mon Jul 24 08:22:38 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
}

@Article{Song:2017:PPF,
  author =       "Wei Song and Bing Wang and Qian Wang and Zhiyong Peng
                 and Wenjing Lou and Yihui Cui",
  title =        "A privacy-preserved full-text retrieval algorithm over
                 encrypted data for cloud storage applications",
  journal =      j-J-PAR-DIST-COMP,
  volume =       "99",
  number =       "??",
  pages =        "14--27",
  month =        jan,
  year =         "2017",
  CODEN =        "JPDCER",
  ISSN =         "0743-7315 (print), 1096-0848 (electronic)",
  ISSN-L =       "0743-7315",
  bibdate =      "Thu Nov 17 09:55:21 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jpardistcomp.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0743731516300533",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Parallel and Distributed Computing",
  journal-URL =  "http://www.sciencedirect.com/science/journal/07437315/",
}

@Article{Song:2017:SAM,
  author =       "Jun Song and Fan Yang and Lizhe Wang",
  title =        "Secure authentication in motion: a novel online
                 payment framework for drive-thru {Internet}",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "76",
  number =       "??",
  pages =        "146--158",
  month =        nov,
  year =         "2017",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Fri Jul 28 15:45:46 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X16301960",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Song:2017:SSI,
  author =       "Jun Song and Fan Yang and Kim-Kwang Raymond Choo and
                 Zhijian Zhuang and Lizhe Wang",
  title =        "{SIPF}: a Secure Installment Payment Framework for
                 Drive-Thru {Internet}",
  journal =      j-TECS,
  volume =       "16",
  number =       "2",
  pages =        "52:1--52:??",
  month =        apr,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3014584",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Mon Jul 24 09:51:12 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tecs.bib",
  abstract =     "Ensuring the security and privacy of vehicular ad hoc
                 networks (VANETs) and related services such as secure
                 payment has been the focus of recent research efforts.
                 Existing secure payment solutions generally require
                 stable and reliable network connection. This is,
                 however, a challenge in a VANET setting. Drive-thru
                 Internet, a secure payment solution for VANETs,
                 involves a great number of fast-moving vehicles
                 competing for connections/communications
                 simultaneously. Thus, service providers may find it
                 challenging to provide real-time payment services or
                 may have to sacrifice the confidentiality and the
                 authenticity of payment vouchers for usability. In this
                 article, we propose a secure installment payment
                 framework for drive-thru Internet deployment in a VANET
                 setting. The framework also provides the capability to
                 embody properties such as confidentiality of payment
                 vouchers, offline signature verification, periodical
                 reconciliation, and installment payment. Performance
                 evaluation and security analysis demonstrate the
                 utility of the framework in a VANET setting.",
  acknowledgement = ack-nhfb,
  articleno =    "52",
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J840",
}

@Misc{Stevens:2017:AFS,
  author =       "Marc Stevens and Elie Bursztein and Pierre Karpman and
                 Ange Albertini and Yarik Markov and Alex Petit Bianco
                 and Clement Baisse",
  title =        "Announcing the first {SHA1} collision",
  howpublished = "Web report",
  day =          "23",
  month =        feb,
  year =         "2017",
  bibdate =      "Fri Feb 24 16:52:31 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  URL =          "https://security.googleblog.com/2017/02/announcing-first-sha1-collision.html",
  abstract =     "Today, more than 20 years after of SHA-1 was first
                 introduced, we are announcing the first practical
                 technique for generating a collision. This represents
                 the culmination of two years of research that sprung
                 from a collaboration between the CWI Institute in
                 Amsterdam and Google. We've summarized how we went
                 about generating a collision below. As a proof of the
                 attack, we are releasing two PDFs that have identical
                 SHA-1 hashes but different content.",
  acknowledgement = ack-nhfb,
}

@Article{Sun:2017:CPP,
  author =       "Jiameng Sun and Binrui Zhu and Jing Qin and Jiankun Hu
                 and Qianhong Wu",
  title =        "Confidentiality-Preserving Publicly Verifiable
                 Computation",
  journal =      j-INT-J-FOUND-COMP-SCI,
  volume =       "28",
  number =       "6",
  pages =        "799--??",
  month =        sep,
  year =         "2017",
  CODEN =        "IFCSEN",
  DOI =          "https://doi.org/10.1142/S0129054117400196",
  ISSN =         "0129-0541",
  ISSN-L =       "0129-0541",
  bibdate =      "Fri Feb 9 11:49:58 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijfcs.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Foundations of Computer
                 Science (IJFCS)",
  journal-URL =  "http://www.worldscientific.com/loi/ijfcs",
}

@Article{Sun:2017:PKE,
  author =       "Shi-Feng Sun and Dawu Gu and Udaya Parampalli and Yu
                 Yu and Baodong Qin",
  title =        "Public key encryption resilient to leakage and
                 tampering attacks",
  journal =      j-J-COMP-SYS-SCI,
  volume =       "89",
  number =       "??",
  pages =        "142--156",
  month =        nov,
  year =         "2017",
  CODEN =        "JCSSBM",
  DOI =          "https://doi.org/10.1016/j.jcss.2017.03.004",
  ISSN =         "0022-0000 (print), 1090-2724 (electronic)",
  ISSN-L =       "0022-0000",
  bibdate =      "Tue Jan 29 15:27:37 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsyssci.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0022000017300326",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer and System Sciences",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00220000",
}

@Article{Sutar:2017:DPI,
  author =       "Soubhagya Sutar and Arnab Raha and Devadatta Kulkarni
                 and Rajeev Shorey and Jeffrey Tew and Vijay
                 Raghunathan",
  title =        "{D-PUF}: An Intrinsically Reconfigurable {DRAM PUF}
                 for Device Authentication and Random Number
                 Generation",
  journal =      j-TECS,
  volume =       "17",
  number =       "1",
  pages =        "1--31",
  month =        dec,
  year =         "2017",
  DOI =          "https://doi.org/10.1145/3105915",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Fri Dec 8 17:33:32 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib;
                 https://www.math.utah.edu/pub/tex/bib/tecs.bib",
  abstract =     "Physically Unclonable Functions (PUFs) have proved to
                 be an effective and low-cost measure against
                 counterfeiting by providing device authentication and
                 secure key storage services. Memory-based PUF
                 implementations are an attractive option due to the
                 ubiquitous nature of memory in electronic devices and
                 the requirement of minimal (or no) additional
                 circuitry. Dynamic Random Access Memory-(DRAM) based
                 PUFs are particularly advantageous due to their large
                 address space and multiple controllable parameters
                 during response generation. However, prior works on
                 DRAM PUFs use a static response-generation mechanism
                 making them vulnerable to security attacks. Further,
                 they result in slow device authentication, are not
                 applicable to commercial off-the-shelf devices, or
                 require DRAM power cycling prior to authentication. In
                 this article, we propose D-PUF, an intrinsically
                 reconfigurable DRAM PUF based on the idea of DRAM
                 refresh pausing. A key feature of the proposed DRAM PUF
                 is reconfigurability, that is, by varying the DRAM
                 refresh-pause interval, the challenge-response behavior
                 of the PUF can be altered, making it robust to various
                 attacks. The article is broadly divided into two parts.
                 In the first part, we demonstrate the use of D-PUF in
                 performing device authentication through a secure,
                 low-overhead methodology. In the second part, we show
                 the generation of true random numbers using D-PUF. The
                 design is implemented and validated using an Altera
                 Stratix IV GX FPGA-based Terasic TR4-230 development
                 board and several off-the-shelf 1GB DDR3 DRAM modules.
                 Our experimental results demonstrate a 4.3$ \times
                 $--6.4$ \times $ reduction in authentication time
                 compared to prior work. Using controlled temperature
                 and accelerated aging tests, we also demonstrate the
                 robustness of our authentication mechanism to
                 temperature variations and aging effects. Finally, the
                 ability of the design to generate random numbers is
                 verified using the NIST Statistical Test Suite.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J840",
}

@Article{Tan:2017:JDC,
  author =       "Rui Tan and Sheng-Yuan Chiu and Hoang Hai Nguyen and
                 David K. Y. Yau and Deokwoo Jung",
  title =        "A Joint Data Compression and Encryption Approach for
                 Wireless Energy Auditing Networks",
  journal =      j-TOSN,
  volume =       "13",
  number =       "2",
  pages =        "9:1--9:??",
  month =        jun,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3027489",
  ISSN =         "1550-4859 (print), 1550-4867 (electronic)",
  ISSN-L =       "1550-4859",
  bibdate =      "Mon Jul 24 09:36:37 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/datacompression.bib;
                 https://www.math.utah.edu/pub/tex/bib/tosn.bib",
  abstract =     "Fine-grained real-time metering is a fundamental
                 service of wireless energy auditing networks, where
                 metering data is transmitted from embedded wireless
                 power meters to gateways for centralized processing,
                 storage, and forwarding. Due to limited meter
                 capability and wireless bandwidth, the increasing
                 sampling rates and network scales needed to support new
                 energy auditing applications pose significant
                 challenges to metering data fidelity and secrecy. This
                 article exploits the compression and encryption
                 properties of compressive sensing (CS) to design a
                 joint data compression and encryption (JICE) approach
                 that addresses these two challenges simultaneously.
                 Compared with a conventional signal processing pipeline
                 that compresses and encrypts data sequentially, JICE
                 reduces computation and space complexities due to its
                 simple design. It thus leaves more processor time and
                 available buffer space for handling lossy wireless
                 transmissions. Moreover, JICE features an adaptive
                 reconfiguration mechanism that selects the signal
                 representation basis of CS at runtime among several
                 candidate bases to achieve the best fidelity of the
                 recovered data at the gateways. This mechanism enables
                 JICE to adapt to changing power consumption patterns.
                 On a smart plug platform, we implemented JICE and
                 several baseline approaches including downsampling,
                 lossless compression, and the pipeline approach.
                 Extensive testbed experiments show that JICE achieves
                 higher data delivery ratios and lower recovery
                 distortions under a range of realistic settings. In
                 particular, at a meter sampling rate of 8 Hz, JICE
                 increases the number of meters supported by a gateway
                 by 50\%, compared with the commonly used pipeline
                 approach, while keeping a signal distortion rate lower
                 than 5\%.",
  acknowledgement = ack-nhfb,
  articleno =    "9",
  fjournal =     "ACM Transactions on Sensor Networks (TOSN)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J981",
}

@Article{Tankard:2017:BNK,
  author =       "Colin Tankard",
  title =        "{BYOE}: New kid on the block",
  journal =      j-NETWORK-SECURITY,
  volume =       "2017",
  number =       "11",
  pages =        "20--20",
  month =        nov,
  year =         "2017",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(17)30096-X",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 17:01:52 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S135348581730096X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
  keywords =     "bring your own encryption (BYOE)",
}

@Article{Tankard:2017:ECB,
  author =       "Colin Tankard",
  title =        "Encryption as the cornerstone of big data security",
  journal =      j-NETWORK-SECURITY,
  volume =       "2017",
  number =       "3",
  pages =        "5--7",
  month =        mar,
  year =         "2017",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(17)30025-9",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Mon Dec 4 17:01:43 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485817300259",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Taylor:2017:EBH,
  author =       "Michael Bedford Taylor",
  title =        "The Evolution of {Bitcoin} Hardware",
  journal =      j-COMPUTER,
  volume =       "50",
  number =       "9",
  pages =        "58--66",
  month =        sep,
  year =         "2017",
  CODEN =        "CPTRB4",
  DOI =          "https://doi.org/10.1109/MC.2017.3571056",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Thu Nov 30 15:24:52 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/computer2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.computer.org/csdl/mags/co/2017/09/mco2017090058-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
  keywords =     "application specific integrated circuits;
                 application-specific integrated circuit; ASIC; ASIC
                 clouds; ASICMiner; AvalonBitFury; Bitmain; blockchain;
                 Butterfly Labs; cloud; computer centres;
                 cryptocurrencies; cryptocurrency; cryptography; Data
                 mining; datacenter; datacenters; digital currency;
                 Exchange rates; Field programmable gate arrays;
                 financial technology; GPU; Graphics processing units;
                 graphics processing units; Hardware; hardware; hashing;
                 homebrew machines; planet-scale computing; {Bitcoin};
                 {Bitcoin} hardware",
}

@Article{Tewari:2017:CNU,
  author =       "Aakanksha Tewari and B. B. Gupta",
  title =        "Cryptanalysis of a novel ultra-lightweight mutual
                 authentication protocol for {IoT} devices using {RFID}
                 tags",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "73",
  number =       "3",
  pages =        "1085--1102",
  month =        mar,
  year =         "2017",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-016-1849-x",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Sat Jun 24 10:31:32 MDT 2017",
  bibsource =    "http://link.springer.com/journal/11227/73/3;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/datacompression.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Article{Tian:2017:ORA,
  author =       "Yangguang Tian and Guomin Yang and Yi Mu and Shiwei
                 Zhang and Kaitai Liang and Yong Yu",
  title =        "One-Round Attribute-Based Key Exchange in the
                 Multi-Party Setting",
  journal =      j-INT-J-FOUND-COMP-SCI,
  volume =       "28",
  number =       "6",
  pages =        "725--??",
  month =        sep,
  year =         "2017",
  CODEN =        "IFCSEN",
  DOI =          "https://doi.org/10.1142/S0129054117400159",
  ISSN =         "0129-0541",
  ISSN-L =       "0129-0541",
  bibdate =      "Fri Feb 9 11:49:58 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijfcs.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Foundations of Computer
                 Science (IJFCS)",
  journal-URL =  "http://www.worldscientific.com/loi/ijfcs",
}

@Article{Tian:2017:RSP,
  author =       "Z. Tian and T. Liu and Q. Zheng and E. Zhuang and M.
                 Fan and Z. Yang",
  title =        "Reviving Sequential Program Birthmarking for
                 Multithreaded Software Plagiarism Detection",
  journal =      j-IEEE-TRANS-SOFTW-ENG,
  volume =       "PP",
  number =       "99",
  pages =        "1--1",
  month =        "????",
  year =         "2017",
  CODEN =        "IESEDJ",
  DOI =          "https://doi.org/10.1109/TSE.2017.2688383",
  ISSN =         "0098-5589 (print), 1939-3520 (electronic)",
  ISSN-L =       "0098-5589",
  bibdate =      "Thu Feb 1 19:49:24 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranssoftweng2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/multithreading.bib",
  URL =          "http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=7888597",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Software Engineering",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=32",
}

@Article{Toreini:2017:TRP,
  author =       "Ehsan Toreini and Siamak F. Shahandashti and Feng
                 Hao",
  title =        "Texture to the Rescue: Practical Paper Fingerprinting
                 Based on Texture Patterns",
  journal =      j-TOPS,
  volume =       "20",
  number =       "3",
  pages =        "9:1--9:??",
  month =        aug,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3092816",
  ISSN =         "2471-2566 (print), 2471-2574 (electronic)",
  ISSN-L =       "2471-2566",
  bibdate =      "Sat Dec 23 09:59:06 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tops.bib",
  abstract =     "In this article, we propose a novel paper
                 fingerprinting technique based on analyzing the
                 translucent patterns revealed when a light source
                 shines through the paper. These patterns represent the
                 inherent texture of paper, formed by the random
                 interleaving of wooden particles during the
                 manufacturing process. We show that these patterns can
                 be easily captured by a commodity camera and condensed
                 into a compact 2,048-bit fingerprint code. Prominent
                 works in this area (Nature 2005, IEEE S8P 2009, CCS
                 2011) have all focused on fingerprinting paper based on
                 the paper ``surface.'' We are motivated by the
                 observation that capturing the surface alone misses
                 important distinctive features such as the noneven
                 thickness, random distribution of impurities, and
                 different materials in the paper with varying
                 opacities. Through experiments, we demonstrate that the
                 embedded paper texture provides a more reliable source
                 for fingerprinting than features on the surface. Based
                 on the collected datasets, we achieve 0\% false
                 rejection and 0\% false acceptance rates. We further
                 report that our extracted fingerprints contain 807
                 degrees of freedom (DoF), which is much higher than the
                 249 DoF with iris codes (that have the same size of
                 2,048 bits). The high amount of DoF for texture-based
                 fingerprints makes our method extremely scalable for
                 recognition among very large databases; it also allows
                 secure usage of the extracted fingerprint in
                 privacy-preserving authentication schemes based on
                 error correction techniques.",
  acknowledgement = ack-nhfb,
  articleno =    "9",
  fjournal =     "ACM Transactions on Privacy and Security (TOPS)",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J1547",
}

@Article{Treleaven:2017:BTF,
  author =       "Philip Treleaven and Richard Gendal Brown and Danny
                 Yang",
  title =        "Blockchain Technology in Finance",
  journal =      j-COMPUTER,
  volume =       "50",
  number =       "9",
  pages =        "14--17",
  month =        sep,
  year =         "2017",
  CODEN =        "CPTRB4",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Mon Oct 2 08:46:55 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/computer2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.computer.org/csdl/mags/co/2017/09/mco2017090014.html",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
}

@Article{Tuna:2017:SIS,
  author =       "Gurkan Tuna and Dimitrios G. Kogias and V. Cagri
                 Gungor and Cengiz Gezer and Erhan Taskin and Erman
                 Ayday",
  title =        "A survey on information security threats and solutions
                 for {Machine to Machine (M2M)} communications",
  journal =      j-J-PAR-DIST-COMP,
  volume =       "109",
  number =       "??",
  pages =        "142--154",
  month =        nov,
  year =         "2017",
  CODEN =        "JPDCER",
  ISSN =         "0743-7315 (print), 1096-0848 (electronic)",
  ISSN-L =       "0743-7315",
  bibdate =      "Sat Aug 19 13:10:32 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jpardistcomp.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0743731517301867",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Parallel and Distributed Computing",
  journal-URL =  "http://www.sciencedirect.com/science/journal/07437315",
}

@Article{vandeGraaf:2017:LTT,
  author =       "Jeroen van de Graaf",
  title =        "Long-Term Threats to Ballot Privacy",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "3",
  pages =        "40--47",
  month =        may # "\slash " # jun,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2017.77",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 25 21:35:08 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/03/msp2017030040-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{vanRijswijk-Deij:2017:PIE,
  author =       "Roland van Rijswijk-Deij and Kaspar Hageman and Anna
                 Sperotto and Aiko Pras",
  title =        "The Performance Impact of Elliptic Curve Cryptography
                 on {DNSSEC} Validation",
  journal =      j-IEEE-TRANS-NETWORKING,
  volume =       "25",
  number =       "2",
  pages =        "738--750",
  month =        apr,
  year =         "2017",
  CODEN =        "IEANEP",
  DOI =          "https://doi.org/10.1109/TNET.2016.2605767",
  ISSN =         "1063-6692 (print), 1558-2566 (electronic)",
  ISSN-L =       "1063-6692",
  bibdate =      "Mon Jun 5 18:46:21 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
  abstract =     "The domain name system DNS is a core Internet
                 infrastructure that translates names to
                 machine-readable information, such as IP addresses.
                 Security flaws in DNS led to a major overhaul, with the
                 introduction of the DNS security DNSSEC extensions.
                 DNSSEC adds integrity and authenticity to the DNS using
                 digital signatures. DNSSEC, however, has its own
                 concerns. It suffers from availability problems due to
                 packet fragmentation and is a potent source of
                 distributed denial-of-service attacks. In earlier work,
                 we argued that many issues with DNSSEC stem from the
                 choice of RSA as default signature algorithm. A switch
                 to alternatives based on elliptic curve cryptography
                 ECC can resolve these issues. Yet switching to ECC
                 introduces a new problem: ECC signature validation is
                 much slower than RSA validation. Thus, switching DNSSEC
                 to ECC imposes a significant additional burden on DNS
                 resolvers, pushing load toward the edges of the
                 network. Therefore, in this paper, we study the
                 question: will switching DNSSEC to ECC lead to problems
                 for DNS resolvers, or can they handle the extra load?
                 To answer this question, we developed a model that
                 accurately predicts how many signature validations DNS
                 resolvers have to perform. This allows us to calculate
                 the additional CPU load ECC imposes on a resolver.
                 Using real-world measurements from four DNS resolvers
                 and with two open-source DNS implementations, we
                 evaluate future scenarios where DNSSEC is universally
                 deployed. Our results conclusively show that switching
                 DNSSEC to ECC signature schemes does not impose an
                 insurmountable load on DNS resolvers, even in worst
                 case scenarios.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE\slash ACM Transactions on Networking",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J771",
}

@Article{Vasiliadis:2017:DIS,
  author =       "Giorgos Vasiliadis and Lazaros Koromilas and Michalis
                 Polychronakis and Sotiris Ioannidis",
  title =        "Design and Implementation of a Stateful Network Packet
                 Processing Framework for {GPUs}",
  journal =      j-IEEE-TRANS-NETWORKING,
  volume =       "25",
  number =       "1",
  pages =        "610--623",
  month =        feb,
  year =         "2017",
  CODEN =        "IEANEP",
  DOI =          "https://doi.org/10.1109/TNET.2016.2597163",
  ISSN =         "1063-6692 (print), 1558-2566 (electronic)",
  ISSN-L =       "1063-6692",
  bibdate =      "Sat Mar 25 08:05:37 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
  abstract =     "Graphics processing units GPUs are a powerful platform
                 for building the high-speed network traffic processing
                 applications using low-cost hardware. The existing
                 systems tap the massively parallel architecture of GPUs
                 to speed up certain computationally intensive tasks,
                 such as cryptographic operations and pattern matching.
                 However, they still suffer from significant overheads
                 due to critical-path operations that are still being
                 carried out on the CPU, and redundant inter-device data
                 transfers. In this paper, we present GASPP, a
                 programmable network traffic processing framework
                 tailored to modern graphics processors. GASPP
                 integrates optimized GPU-based implementations of a
                 broad range of operations commonly used in the network
                 traffic processing applications, including the first
                 purely GPU-based implementation of network flow
                 tracking and TCP stream reassembly. GASPP also employs
                 novel mechanisms for tackling the control flow
                 irregularities across SIMT threads, and for sharing the
                 memory context between the network interfaces and the
                 GPU. Our evaluation shows that GASPP can achieve
                 multigigabit traffic forwarding rates even for complex
                 and computationally intensive network operations, such
                 as stateful traffic classification, intrusion
                 detection, and packet encryption. Especially when
                 consolidating multiple network applications on the same
                 system, GASPP achieves up to $ 16.2 \times $ speedup
                 compared with different monolithic GPU-based
                 implementations of the same applications.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE\slash ACM Transactions on Networking",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J771",
}

@Article{Venkatakrishnan:2017:DRB,
  author =       "Shaileshh Bojja Venkatakrishnan and Giulia Fanti and
                 Pramod Viswanath",
  title =        "{Dandelion}: Redesigning the {Bitcoin} Network for
                 Anonymity",
  journal =      j-POMACS,
  volume =       "1",
  number =       "1",
  pages =        "22:1--22:??",
  month =        jun,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3084459",
  ISSN =         "2476-1249",
  ISSN-L =       "2476-1249",
  bibdate =      "Fri Jun 16 09:11:52 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/pomacs.bib",
  URL =          "http://dl.acm.org/citation.cfm?id=3084459",
  abstract =     "Bitcoin and other cryptocurrencies have surged in
                 popularity over the last decade. Although Bitcoin does
                 not claim to provide anonymity for its users, it enjoys
                 a public perception of being a privacy preserving
                 financial system. In reality, cryptocurrencies publish
                 users' entire transaction histories in plaintext,
                 albeit under a pseudonym; this is required for
                 transaction validation. Therefore, if a user's
                 pseudonym can be linked to their human identity, the
                 privacy fallout can be significant. Recently,
                 researchers have demonstrated deanonymization attacks
                 that exploit weaknesses in the Bitcoin network's
                 peer-to-peer (P2P) networking protocols. In particular,
                 the P2P network currently forwards content in a
                 structured way that allows observers to deanonymize
                 users. In this work, we redesign the P2P network from
                 first principles with the goal of providing strong,
                 provable anonymity guarantees. We propose a simple
                 networking policy called Dandelion which provides
                 quasi-optimal, network-wide anonymity, with minimal
                 cost to the network's utility. We also discuss
                 practical implementation challenges and propose
                 heuristic solutions.",
  acknowledgement = ack-nhfb,
  articleno =    "22",
  fjournal =     "Proceedings of the ACM on Measurement and Analysis of
                 Computing Systems (POMACS)",
  journal-URL =  "http://dl.acm.org/pub.cfm?id=J1567",
}

@Article{Venkatakrishnan:2017:DRBb,
  author =       "Shaileshh Bojja Venkatakrishnan and Giulia Fanti and
                 Pramod Viswanath",
  title =        "{Dandelion}: Redesigning the {Bitcoin} Network for
                 Anonymity",
  journal =      j-POMACS,
  volume =       "1",
  number =       "1",
  pages =        "22:1--22:34",
  month =        jun,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3084459",
  ISSN =         "2476-1249",
  ISSN-L =       "2476-1249",
  bibdate =      "Fri Jun 16 09:11:52 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/pomacs.bib",
  URL =          "http://dl.acm.org/citation.cfm?id=3084459",
  abstract =     "Bitcoin and other cryptocurrencies have surged in
                 popularity over the last decade. Although Bitcoin does
                 not claim to provide anonymity for its users, it enjoys
                 a public perception of being a privacy preserving
                 financial system. In reality, cryptocurrencies publish
                 users' entire transaction histories in plaintext,
                 albeit under a pseudonym; this is required for
                 transaction validation. Therefore, if a user's
                 pseudonym can be linked to their human identity, the
                 privacy fallout can be significant. Recently,
                 researchers have demonstrated deanonymization attacks
                 that exploit weaknesses in the Bitcoin network's
                 peer-to-peer (P2P) networking protocols. In particular,
                 the P2P network currently forwards content in a
                 structured way that allows observers to deanonymize
                 users. In this work, we redesign the P2P network from
                 first principles with the goal of providing strong,
                 provable anonymity guarantees. We propose a simple
                 networking policy called Dandelion which provides
                 quasi-optimal, network-wide anonymity, with minimal
                 cost to the network's utility. We also discuss
                 practical implementation challenges and propose
                 heuristic solutions.",
  acknowledgement = ack-nhfb,
  articleno =    "22",
  fjournal =     "Proceedings of the ACM on Measurement and Analysis of
                 Computing Systems (POMACS)",
  journal-URL =  "http://dl.acm.org/pub.cfm?id=J1567",
}

@Article{Vergnaud:2017:CAB,
  author =       "Damien Vergnaud",
  title =        "Comment on {`Attribute-Based Signatures for Supporting
                 Anonymous Certification' by N. Kaaniche and M. Laurent
                 (ESORICS 2016)}",
  journal =      j-COMP-J,
  volume =       "60",
  number =       "12",
  pages =        "1801--1808",
  day =          "1",
  month =        dec,
  year =         "2017",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxx058",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Jan 8 08:15:52 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://academic.oup.com/comjnl/article/60/12/1801/3861971",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Vollala:2017:EEM,
  author =       "Satyanarayana Vollala and Ramasubramanian N.",
  title =        "Energy efficient modular exponentiation for public-key
                 cryptography based on bit forwarding techniques",
  journal =      j-INFO-PROC-LETT,
  volume =       "119",
  number =       "??",
  pages =        "25--38",
  month =        mar,
  year =         "2017",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Mon Dec 19 07:37:49 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019016301715",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190/",
}

@Article{Wang:2017:ABS,
  author =       "Qi Wang and Xiangxue Li and Yu Yu",
  title =        "Anonymity for {Bitcoin} from Secure Escrow Address",
  journal =      j-IEEE-ACCESS,
  volume =       "??",
  number =       "??",
  pages =        "1--1",
  month =        "????",
  year =         "2017",
  DOI =          "https://doi.org/10.1109/ACCESS.2017.2787563",
  ISSN =         "2169-3536",
  ISSN-L =       "2169-3536",
  bibdate =      "Sun Jan 21 12:22:33 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Access",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6287639",
  keywords =     "Address Shuffling; Anonymity; Bitcoin; Distribute Key
                 Generation; Encryption; Indexes; Privacy; Protocols;
                 Public key",
}

@Article{Wang:2017:CAS,
  author =       "Changji Wang and Yuan Li and Jian Fang and Jianguo
                 Xie",
  title =        "Cloud-aided scalable revocable identity-based
                 encryption scheme with ciphertext update",
  journal =      j-CCPE,
  volume =       "29",
  number =       "20",
  pages =        "??--??",
  day =          "25",
  month =        oct,
  year =         "2017",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.4035",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Mon Oct 2 11:26:28 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
}

@Article{Wang:2017:CES,
  author =       "Xu An Wang and Jianfeng Ma and Fatos Xhafa and Mingwu
                 Zhang and Xiaoshuang Luo",
  title =        "Cost-effective secure E-health cloud system using
                 identity based cryptographic techniques",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "67",
  number =       "??",
  pages =        "242--254",
  month =        feb,
  year =         "2017",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Tue Nov 22 14:20:56 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X16302588",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X/",
}

@Article{Wang:2017:DRM,
  author =       "Yi Wang and Yajun Ha",
  title =        "A {DFA}-Resistant and Masked {PRESENT} with Area
                 Optimization for {RFID} Applications",
  journal =      j-TECS,
  volume =       "16",
  number =       "4",
  pages =        "102:1--102:??",
  month =        aug,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3035543",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Mon Aug 14 18:53:33 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tecs.bib",
  abstract =     "Radio-Frequency Identification (RFID) tag-based
                 applications are usually resource constrained and
                 security sensitive. However, only about 2,000 gate
                 equivalents in a tag can be budgeted for implementing
                 security components [27]. This requires not only
                 lightweight cryptographic algorithms such as PRESENT
                 (around 1,000 gate equivalents) but also lightweight
                 protections against modern Side Channel Attacks (SCAs).
                 With this budget, the first-order masking and fault
                 detection are two suitable countermeasures to be
                 developed for PRESENT. However, if both countermeasures
                 are applied without any optimization, it will
                 significantly exceed the given area budget. In this
                 work, we optimize area to include both countermeasures
                 to maximize the security for PRESENT within this RFID
                 area budget. The most area-consuming parts of the
                 proposed design are the masked S-boxes and the inverse
                 masked S-boxes. To optimize the area, we have deduced a
                 computational relationship between these two parts,
                 which enables us to reuse the hardware resource of the
                 masked S-boxes to implement the inverse masked S-boxes.
                 The proposed design takes up only 2,376 gates with UMC
                 65nm CMOS technology. Compared with the unoptimized
                 design, our implementation reduces the overall area by
                 28.45\%. We have tested the effectiveness of the
                 first-order Differential Power Analysis (DPA) and
                 Differential Fault Analysis (DFA) -resistant
                 countermeasures. Experimental results show that we have
                 enhanced the SCA resistance of our PRESENT
                 implementation.",
  acknowledgement = ack-nhfb,
  articleno =    "102",
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J840",
}

@Article{Wang:2017:DVP,
  author =       "Huaqun Wang and Debiao He and Yimu Ji",
  title =        "Designated-verifier proof of assets for {Bitcoin}
                 exchange using elliptic curve cryptography",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "??",
  number =       "??",
  pages =        "??--??",
  month =        "????",
  year =         "2017",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Fri Dec 1 11:14:22 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X1731350X",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Wang:2017:FWA,
  author =       "Ran Wang and Guangquan Xu and Bin Liu and Yan Cao and
                 Xiaohong Li",
  title =        "Flow Watermarking for Antinoise and Multistream
                 Tracing in Anonymous Networks",
  journal =      j-IEEE-MULTIMEDIA,
  volume =       "24",
  number =       "4",
  pages =        "38--47",
  month =        oct # "\slash " # dec,
  year =         "2017",
  CODEN =        "IEMUE4",
  DOI =          "https://doi.org/10.1109/MMUL.2017.4031314",
  ISSN =         "1070-986X (print), 1941-0166 (electronic)",
  ISSN-L =       "1070-986X",
  bibdate =      "Mon Jan 15 08:09:14 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeemultimedia.bib",
  URL =          "https://www.computer.org/csdl/mags/mu/2017/04/mmu2017040038-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://www.computer.org/multimedia/",
}

@Article{Wang:2017:PPD,
  author =       "Xiaofen Wang and Yi Mu and Rongmao Chen",
  title =        "Privacy-preserving data search and sharing protocol
                 for social networks through wireless applications",
  journal =      j-CCPE,
  volume =       "29",
  number =       "7",
  pages =        "??--??",
  day =          "10",
  month =        apr,
  year =         "2017",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.3870",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Fri Mar 31 19:12:52 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
}

@Article{Wang:2017:PPK,
  author =       "Yujue Wang and HweeHwa Pang",
  title =        "Probabilistic Public Key Encryption for Controlled
                 Equijoin in Relational Databases",
  journal =      j-COMP-J,
  volume =       "60",
  number =       "4",
  pages =        "600--612",
  day =          "23",
  month =        mar,
  year =         "2017",
  CODEN =        "CMPJA6",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Thu Nov 16 10:43:41 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://academic.oup.com/comjnl/article/60/4/600/2354608",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Wang:2017:RRA,
  author =       "YiPeng Wang and Xiaochun Yun and Yongzheng Zhang and
                 Liwei Chen and Tianning Zang",
  title =        "Rethinking robust and accurate application protocol
                 identification",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "129 (part 1)",
  number =       "??",
  pages =        "64--78",
  day =          "24",
  month =        dec,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Wed Nov 22 06:05:46 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1389128617303572",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286/",
}

@Article{Wang:2017:SRS,
  author =       "Wei Wang and Peng Xu and Laurence Tianruo Yang and
                 Willy Susilo and Jinjun Chen",
  title =        "Securely Reinforcing Synchronization for Embedded
                 Online Contests",
  journal =      j-TECS,
  volume =       "16",
  number =       "2",
  pages =        "58:1--58:??",
  month =        apr,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/2899000",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Mon Jul 24 09:51:12 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tecs.bib",
  abstract =     "When competing in eBay bidding, online games, or
                 e-exams in embedded computing environments, people
                 naturally face asynchronous starts from different
                 computing devices, which is treated as a security risk
                 of online contests. The security risks of online
                 contests also include eavesdropping during data
                 transmission without intended rights, and false starts
                 by malicious competitors, which also means asynchrony
                 in contests. Accordingly, online contests need security
                 guarantees, especially on synchronization. In this
                 article, for synchronic and secure starts in a contest,
                 we update security requirements of confidentiality,
                 anonymity, and synchrony, comparing the current work to
                 our previous work. Based on the updated requirements,
                 we propose a general framework for the Advanced Secure
                 Synchronized Reading (ASSR) system, which can hold
                 multiple contests simultaneously in the cloud. It is
                 important to note that the system can ignore the
                 impacts of heterogeneity among competitors. Considering
                 the heterogeneity both on transmission and computing,
                 we construct a novel Randomness-reused Identity Based
                 Key Encapsulation Mechanism (RIBKEM) to support
                 separable decapsulation, which can shorten both
                 decryption delay and transmission delay with the best
                 efforts. Finally, ASSR enhances synchronization
                 achievement for contest starts with heterogeneous
                 delays of competitors while satisfying other security
                 requirements. As a complement, the analysis on the
                 provable security of ASSR is given, as well as a
                 further analysis on the achievement of
                 synchronization.",
  acknowledgement = ack-nhfb,
  articleno =    "58",
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J840",
}

@Article{Wei:2017:CES,
  author =       "Jianghong Wei and Xinyi Huang and Wenfen Liu and
                 Xuexian Hu",
  title =        "Cost-Effective and Scalable Data Sharing in Cloud
                 Storage Using Hierarchical Attribute-Based Encryption
                 with Forward Security",
  journal =      j-INT-J-FOUND-COMP-SCI,
  volume =       "28",
  number =       "7",
  pages =        "843--??",
  month =        nov,
  year =         "2017",
  CODEN =        "IFCSEN",
  DOI =          "https://doi.org/10.1142/S0129054117500289",
  ISSN =         "0129-0541",
  ISSN-L =       "0129-0541",
  bibdate =      "Sat Feb 24 10:21:24 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijfcs.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Foundations of Computer
                 Science (IJFCS)",
  journal-URL =  "http://www.worldscientific.com/loi/ijfcs",
}

@Article{Weisse:2017:RLC,
  author =       "Ofir Weisse and Valeria Bertacco and Todd Austin",
  title =        "Regaining Lost Cycles with {HotCalls}: a Fast
                 Interface for {SGX} Secure Enclaves",
  journal =      j-COMP-ARCH-NEWS,
  volume =       "45",
  number =       "2",
  pages =        "81--93",
  month =        may,
  year =         "2017",
  CODEN =        "CANED2",
  DOI =          "https://doi.org/10.1145/3140659.3080208",
  ISSN =         "0163-5964 (print), 1943-5851 (electronic)",
  ISSN-L =       "0163-5964",
  bibdate =      "Fri Sep 15 11:09:14 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigarch.bib",
  abstract =     "Intel's SGX secure execution technology allows running
                 computations on secret data using untrusted servers.
                 While recent work showed how to port applications and
                 large-scale computations to run under SGX, the
                 performance implications of using the technology
                 remains an open question. We present the first
                 comprehensive quantitative study to evaluate the
                 performance of SGX. We show that straightforward use of
                 SGX library primitives for calling functions add
                 between 8,200 --- 17,000 cycles overhead, compared to
                 150 cycles of a typical system call. We quantify the
                 performance impact of these library calls and show that
                 in applications with high system calls frequency, such
                 as memcached, openVPN, and lighttpd, which all have
                 high bandwidth network requirements, the performance
                 degradation may be as high as 79\%. We investigate the
                 sources of this performance degradation by leveraging a
                 new set of microbenchmarks for SGX-specific operations
                 such as enclave entry-calls and out-calls, and
                 encrypted memory I/O accesses. We leverage the insights
                 we gain from these analyses to design a new SGX
                 interface framework HotCalls. HotCalls are based on a
                 synchronization spin-lock mechanism and provide a
                 13-27x speedup over the default interface. It can
                 easily be integrated into existing code, making it a
                 practical solution. Compared to a baseline SGX
                 implementation of memcached, openVPN, and lighttpd ---
                 we show that using the new interface boosts the
                 throughput by 2.6-3.7x, and reduces application latency
                 by 62-74\%.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGARCH Computer Architecture News",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J89",
}

@Article{Werner:2017:CIM,
  author =       "Jorge Werner and Carla Merkle Westphall and Carlos
                 Becker Westphall",
  title =        "Cloud identity management: a survey on privacy
                 strategies",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "122",
  number =       "??",
  pages =        "29--42",
  day =          "20",
  month =        jul,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Thu Jul 20 08:30:08 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1389128617301664",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286/",
}

@Misc{Winder:2017:ROS,
  author =       "Davey Winder",
  title =        "Researchers open sliding window to completely break
                 {\tt libgcrypt} {RSA-1024}",
  howpublished = "Web blog.",
  day =          "6",
  month =        jul,
  year =         "2017",
  bibdate =      "Tue Jul 11 16:58:04 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  note =         "See \cite{Bernstein:2017:SRD}.",
  URL =          "https://www.scmagazineuk.com/researchers-open-sliding-window-to-completely-break-libgcrypt-rsa-1024/article/673178/",
  abstract =     "The libgcrypt encryption library as used by the open
                 source Gnu Privacy Guard (GnuPG) has been cracked wide
                 open by researchers from the universities of Adelaide,
                 Eindhoven, Illinois, Maryland and Pennsylvania.",
  acknowledgement = ack-nhfb,
  remark =       "Security hole was fixed in libgcrypt-1.7.8, released
                 29 June 2017.",
}

@Article{Wu:2017:EAK,
  author =       "Fan Wu and Lili Xu and Saru Kumari and Xiong Li and
                 Jian Shen and Kim-Kwang Raymond Choo and Mohammad Wazid
                 and Ashok Kumar Das",
  title =        "An efficient authentication and key agreement scheme
                 for multi-gateway wireless sensor networks in {IoT}
                 deployment",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "89",
  number =       "??",
  pages =        "72--85",
  day =          "1",
  month =        jul,
  year =         "2017",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Sat Jul 29 15:40:54 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804516303150",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Wu:2017:HMA,
  author =       "Ying Wu and Jinyong Chang and Rui Xue and Rui Zhang",
  title =        "Homomorphic {MAC} from Algebraic One-Way Functions for
                 Network Coding with Small Key Size",
  journal =      j-COMP-J,
  volume =       "60",
  number =       "12",
  pages =        "1785--1800",
  day =          "1",
  month =        dec,
  year =         "2017",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxx055",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Jan 8 08:15:52 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://academic.oup.com/comjnl/article/60/12/1785/3885827",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Wu:2017:SPM,
  author =       "Wei-Chen Wu",
  title =        "A secret push messaging service in {VANET} clouds",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "73",
  number =       "7",
  pages =        "3085--3097",
  month =        jul,
  year =         "2017",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-016-1932-3",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Mon Oct 2 11:08:37 MDT 2017",
  bibsource =    "http://link.springer.com/journal/11227/73/7;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Article{Xiong:2017:CCC,
  author =       "Hu Xiong and Qiang Wang and Jianfei Sun",
  title =        "Comments on {``Circuit ciphertext-policy
                 attribute-based hybrid encryption with verifiable
                 delegation''}",
  journal =      j-INFO-PROC-LETT,
  volume =       "127",
  number =       "??",
  pages =        "67--70",
  month =        nov,
  year =         "2017",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Fri Aug 25 11:11:26 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranspardistsys.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib",
  note =         "See \cite{Xu:2016:CCP}.",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019017301308",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Xu:2017:EOS,
  author =       "Rui Xu and Kirill Morozov and Yanjiang Yang and
                 Jianying Zhou and Tsuyoshi Takagi",
  title =        "Efficient outsourcing of secure $k$-nearest neighbour
                 query over encrypted database",
  journal =      j-COMPUT-SECUR,
  volume =       "69",
  number =       "??",
  pages =        "65--83",
  month =        aug,
  year =         "2017",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:50 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404816301651",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Xu:2017:GKG,
  author =       "Weitao Xu and Chitra Javali and Girish Revadigar and
                 Chengwen Luo and Neil Bergmann and Wen Hu",
  title =        "{Gait-Key}: a Gait-Based Shared Secret Key Generation
                 Protocol for Wearable Devices",
  journal =      j-TOSN,
  volume =       "13",
  number =       "1",
  pages =        "6:1--6:??",
  month =        feb,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3023954",
  ISSN =         "1550-4859 (print), 1550-4867 (electronic)",
  ISSN-L =       "1550-4859",
  bibdate =      "Mon Jul 24 09:36:36 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tosn.bib",
  abstract =     "Recent years have witnessed a remarkable growth in the
                 number of smart wearable devices. For many of these
                 devices, an important security issue is to establish an
                 authenticated communication channel between legitimate
                 devices to protect the subsequent communications. Due
                 to the wireless nature of the communication and the
                 extreme resource constraints of sensor devices,
                 providing secure, efficient, and user-friendly device
                 pairing is a challenging task. Traditional solutions
                 for device pairing mostly depend on key
                 predistribution, which is unsuitable for wearable
                 devices in many ways. In this article, we design
                 Gait-Key, a shared secret key generation scheme that
                 allows two legitimate devices to establish a common
                 cryptographic key by exploiting users' walking
                 characteristics (gait). The intuition is that the
                 sensors on different locations on the same body
                 experience similar accelerometer signals when the user
                 is walking. However, one main challenge is that the
                 accelerometer also captures motion signals produced by
                 other body parts (e.g., swinging arms). We address this
                 issue by using the blind source separation technique to
                 extract the informative signal produced by the unique
                 gait patterns. Our experimental results show that
                 Gait-Key can generate a common 128-bit key for two
                 legitimate devices with 98.3\% probability. To
                 demonstrate the feasibility, the proposed key
                 generation scheme is implemented on modern smartphones.
                 The evaluation results show that the proposed scheme
                 can run in real time on modern mobile devices and
                 incurs low system overhead.",
  acknowledgement = ack-nhfb,
  articleno =    "6",
  fjournal =     "ACM Transactions on Sensor Networks (TOSN)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J981",
}

@Article{Xu:2017:SEP,
  author =       "Zhiyan Xu and Libing Wu and Muhammad Khurram Khan and
                 Kim-Kwang Raymond Choo and Debiao He",
  title =        "A secure and efficient public auditing scheme using
                 {RSA} algorithm for cloud storage",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "73",
  number =       "12",
  pages =        "5285--5309",
  month =        dec,
  year =         "2017",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-017-2085-8",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Sat Jan 6 08:59:18 MST 2018",
  bibsource =    "http://link.springer.com/journal/11227/73/12;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Article{Xue:2017:CNC,
  author =       "Kaiping Xue and Jianan Hong and Yingjie Xue and David
                 S. L. Wei and Nenghai Yu and Peilin Hong",
  title =        "{CABE}: A New Comparable Attribute-Based Encryption
                 Construction with $0$-Encoding and $1$-Encoding",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "66",
  number =       "9",
  pages =        "1491--1503",
  month =        sep,
  year =         "2017",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2017.2693265",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Thu Aug 17 10:06:38 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  URL =          "http://ieeexplore.ieee.org/document/7896558/",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Yakubu:2017:SSN,
  author =       "Abukari M. Yakubu and Namunu C. Maddage and Pradeep K.
                 Atrey",
  title =        "Securing Speech Noise Reduction in Outsourced
                 Environment",
  journal =      j-TOMM,
  volume =       "13",
  number =       "4",
  pages =        "51:1--51:??",
  month =        oct,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3105970",
  ISSN =         "1551-6857 (print), 1551-6865 (electronic)",
  ISSN-L =       "1551-6857",
  bibdate =      "Sat Dec 23 10:49:23 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tomccap.bib",
  abstract =     "Cloud data centers (CDCs) are becoming a
                 cost-effective method for processing and storage of
                 multimedia data including images, video, and audio.
                 Since CDCs are physically located in different
                 jurisdictions, and are managed by external parties,
                 data security is a growing concern. Data encryption at
                 CDCs is commonly practiced to improve data security.
                 However, to process the data at CDCs, data must often
                 be decrypted, which raises issues in security. Thus,
                 there is a growing demand for data processing
                 techniques in encrypted domain in such an outsourced
                 environment. In this article, we analyze encrypted
                 domain speech content processing techniques for noise
                 reduction. Noise contaminates speech during
                 transmission or during the acquisition process by
                 recording. As a result, the quality of the speech
                 content is degraded. We apply Shamir's secret sharing
                 as the cryptosystem to encrypt speech data before
                 uploading it to a CDC. We then propose finite impulse
                 response digital filters to reduce white and wind noise
                 in the speech in the encrypted domain. We prove that
                 our proposed schemes meet the security requirements of
                 efficiency, accuracy, and checkability for both
                 semi-honest and malicious adversarial models.
                 Experimental results show that our proposed filtering
                 techniques for speech noise reduction in the encrypted
                 domain produce similar results when compared to
                 plaintext domain processing.",
  acknowledgement = ack-nhfb,
  articleno =    "51",
  fjournal =     "ACM Transactions on Multimedia Computing,
                 Communications, and Applications",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J961",
}

@Article{Yamada:2017:EPA,
  author =       "Asahiko Yamada and Tatsuro Ikeda",
  title =        "Enhanced {PKI} authentication with trusted product at
                 claimant",
  journal =      j-COMPUT-SECUR,
  volume =       "67",
  number =       "??",
  pages =        "324--334",
  month =        jun,
  year =         "2017",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:49 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404817300044",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Yan:2017:PIS,
  author =       "Jianhua Yan and Licheng Wang and Jing Li and Muzi Li
                 and Yixan Yang and Wenbin Yao",
  title =        "Pre-image sample algorithm with irregular {Gaussian}
                 distribution and construction of identity-based
                 signature",
  journal =      j-CCPE,
  volume =       "29",
  number =       "20",
  pages =        "??--??",
  day =          "25",
  month =        oct,
  year =         "2017",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.3925",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Mon Oct 2 11:26:28 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
}

@Article{Yang:2017:CCS,
  author =       "Kun Yang and Domenic Forte and Mark M. Tehranipoor",
  title =        "{CDTA}: a Comprehensive Solution for Counterfeit
                 Detection, Traceability, and Authentication in the
                 {IoT} Supply Chain",
  journal =      j-TODAES,
  volume =       "22",
  number =       "3",
  pages =        "42:1--42:??",
  month =        may,
  year =         "2017",
  CODEN =        "ATASFO",
  DOI =          "https://doi.org/10.1145/3005346",
  ISSN =         "1084-4309 (print), 1557-7309 (electronic)",
  ISSN-L =       "1084-4309",
  bibdate =      "Fri Jul 21 10:49:30 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/todaes/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/todaes.bib",
  abstract =     "The Internet of Things (IoT) is transforming the way
                 we live and work by increasing the connectedness of
                 people and things on a scale that was once
                 unimaginable. However, the vulnerabilities in the IoT
                 supply chain have raised serious concerns about the
                 security and trustworthiness of IoT devices and
                 components within them. Testing for device provenance,
                 detection of counterfeit integrated circuits (ICs) and
                 systems, and traceability of IoT devices are
                 challenging issues to address. In this article, we
                 develop a novel radio-frequency identification
                 (RFID)-based system suitable for counterfeit detection,
                 traceability, and authentication in the IoT supply
                 chain called CDTA. CDTA is composed of different types
                 of on-chip sensors and in-system structures that
                 collect necessary information to detect multiple
                 counterfeit IC types (recycled, cloned, etc.), track
                 and trace IoT devices, and verify the overall system
                 authenticity. Central to CDTA is an RFID tag employed
                 as storage and a channel to read the information from
                 different types of chips on the printed circuit board
                 (PCB) in both power-on and power-off scenarios. CDTA
                 sensor data can also be sent to the remote server for
                 authentication via an encrypted Ethernet channel when
                 the IoT device is deployed in the field. A novel board
                 ID generator is implemented by combining outputs of
                 physical unclonable functions (PUFs) embedded in the
                 RFID tag and different chips on the PCB. A light-weight
                 RFID protocol is proposed to enable mutual
                 authentication between RFID readers and tags. We also
                 implement a secure interchip communication on the PCB.
                 Simulations and experimental results using Spartan 3E
                 FPGAs demonstrate the effectiveness of this system. The
                 efficiency of the radio-frequency (RF) communication
                 has also been verified via a PCB prototype with a
                 printed slot antenna.",
  acknowledgement = ack-nhfb,
  articleno =    "42",
  fjournal =     "ACM Transactions on Design Automation of Electronic
                 Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J776",
}

@Article{Yang:2017:SAS,
  author =       "Ying Yang and Ruggero Pintus and Holly Rushmeier and
                 Ioannis Ivrissimtzis",
  title =        "A {$3$D} Steganalytic Algorithm and
                 Steganalysis-Resistant Watermarking",
  journal =      j-IEEE-TRANS-VIS-COMPUT-GRAPH,
  volume =       "23",
  number =       "2",
  pages =        "1002--1013",
  month =        feb,
  year =         "2017",
  CODEN =        "ITVGEA",
  ISSN =         "1077-2626 (print), 1941-0506 (electronic), 2160-9306",
  ISSN-L =       "1077-2626",
  bibdate =      "Wed Jan 4 16:45:57 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetransviscomputgraph.bib/",
  URL =          "https://www.computer.org/csdl/trans/tg/2017/02/07399411-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2945",
}

@Article{Yang:2017:SKS,
  author =       "Yang Yang and Xianghan Zheng and Victor Chang and
                 Chunming Tang",
  title =        "Semantic keyword searchable proxy re-encryption for
                 postquantum secure cloud storage",
  journal =      j-CCPE,
  volume =       "29",
  number =       "19",
  pages =        "??--??",
  day =          "10",
  month =        oct,
  year =         "2017",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.4211",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Mon Oct 2 11:26:27 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
}

@InProceedings{Ye:2017:VCS,
  author =       "Katherine Q. Ye and Matthew Green and Naphat
                 Sanguansin and Lennart Beringer and Adam Petcher and
                 Andrew W. Appel",
  editor =       "{ACM}",
  booktitle =    "{Proceedings of CCS 17, October 30--November 3, 2017,
                 Dallas, TX, USA}",
  title =        "Verified Correctness and Security of {mbedTLS
                 HMAC-DRBG}",
  publisher =    pub-ACM,
  address =      pub-ACM:adr,
  pages =        "1--14",
  year =         "2017",
  DOI =          "https://doi.org/10.1145/3133956.3133974",
  ISBN =         "1-4503-4946-3",
  ISBN-13 =      "978-1-4503-4946-8",
  LCCN =         "????",
  bibdate =      "Fri Sep 15 09:34:01 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://www.cs.princeton.edu/~appel/papers/verified-hmac-drbg.pdf",
  abstract =     "We have formalized the functional specification of
                 HMAC-DRBG (NIST 800-90A), and we have proved its
                 cryptographic security --- that its output is
                 pseudorandom --- using a hybrid game-based proof. We
                 have also proved that the mbedTLS implementation (C
                 program) correctly implements this functional
                 specification. That proof composes with an existing C
                 compiler correctness proof to guarantee, end-to-end,
                 that the machine language program gives strong
                 pseudorandomness. All proofs (hybrid games, C program
                 verification, compiler, and their composition) are
                 machine-checked in the Coq proof assistant. Our proofs
                 are modular: the hybrid game proof holds on any
                 implementation of HMAC-DRBG that satisfies our
                 functional specification. Therefore, our functional
                 specification can serve as a high-assurance
                 reference.",
  acknowledgement = ack-nhfb,
  remark =       "Check final published page numbers??",
}

@Article{Yeh:2017:SIB,
  author =       "Lo-Yao Yeh and Woei-Jiunn Tsaur and Hsin-Han Huang",
  title =        "Secure {IoT}-Based, Incentive-Aware Emergency
                 Personnel Dispatching Scheme with Weighted Fine-Grained
                 Access Control",
  journal =      j-TIST,
  volume =       "9",
  number =       "1",
  pages =        "10:1--10:??",
  month =        oct,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3063716",
  ISSN =         "2157-6904 (print), 2157-6912 (electronic)",
  ISSN-L =       "2157-6904",
  bibdate =      "Sat Dec 23 10:12:42 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tist.bib",
  abstract =     "Emergency response times following a traffic accident
                 are extremely crucial in reducing the number of
                 traffic-related deaths. Existing emergency vehicle
                 dispatching systems rely heavily on manual assignments.
                 Although some technology-assisted emergency systems
                 engage in emergency message dissemination and path
                 planning, efficient emergency response is one of the
                 main factors that can decrease traffic-related deaths.
                 Obviously, effective emergency response often plays a
                 far more important role in a successful rescue. In this
                 article, we propose a secure IoT-based and
                 incentive-aware emergency personnel dispatching scheme
                 (EPDS) with weighted fine-grained access control. Our
                 EPDS can recruit available medical personnel
                 on-the-fly, such as physicians driving in the vicinity
                 of the accident scene. An appropriate incentive, such
                 as paid leave, can be offered to encourage medical
                 personnel to join rescue missions. Furthermore,
                 IoT-based devices are installed in vehicles or wearable
                 on drivers to gather biometric signals from the driver,
                 which can be used to decide precisely which divisions
                 or physicians are needed to administer the appropriate
                 remedy. Additionally, our scheme can cryptographically
                 authorize the assigned rescue vehicle to control
                 traffic to increase rescue efficacy. Our scheme also
                 takes advantage of adjacent roadside units to organize
                 the appropriate rescue personnel without requiring
                 long-distance communication with a trusted traffic
                 authority. Proof of security is provided and extensive
                 analyses, including qualitative and quantitative
                 analyses and simulations, show that the proposed scheme
                 can significantly improve rescue response time and
                 effectiveness. To the best of our knowledge, this is
                 the first work to make use of medical personnel that
                 are close by in emergency rescue missions.",
  acknowledgement = ack-nhfb,
  articleno =    "10",
  fjournal =     "ACM Transactions on Intelligent Systems and Technology
                 (TIST)",
  journal-URL =  "http://portal.acm.org/citation.cfm?id=J1318",
}

@Article{Yi:2017:ICM,
  author =       "Haibo Yi and Weijian Li",
  title =        "On the Importance of Checking Multivariate Public Key
                 Cryptography for Side-Channel Attacks: The Case of
                 {enTTS} Scheme",
  journal =      j-COMP-J,
  volume =       "60",
  number =       "8",
  pages =        "1197--1209",
  day =          "1",
  month =        aug,
  year =         "2017",
  CODEN =        "CMPJA6",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Thu Nov 16 10:43:47 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://academic.oup.com/comjnl/article/60/8/1197/2996413",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Yi:2017:ZCL,
  author =       "Wentan Yi and Shaozhen Chen and Yuchen Li",
  title =        "Zero-correlation Linear Cryptanalysis of {SAFER} Block
                 Cipher Family Using the Undisturbed Bits",
  journal =      j-COMP-J,
  volume =       "60",
  number =       "4",
  pages =        "613--624",
  day =          "23",
  month =        mar,
  year =         "2017",
  CODEN =        "CMPJA6",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Thu Nov 16 10:43:41 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://academic.oup.com/comjnl/article/60/4/613/2354610",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Yildiz:2017:BLF,
  author =       "Muhammet Yildiz and Berrin Yaniko{\u{g}}lu and Alisher
                 Kholmatov and Alper Kanak and Umut Uluda{\u{g}} and
                 Hakan Erdo{\u{g}}an",
  title =        "Biometric Layering with Fingerprints: Template
                 Security and Privacy Through Multi-Biometric Template
                 Fusion",
  journal =      j-COMP-J,
  volume =       "60",
  number =       "4",
  pages =        "573--587",
  day =          "23",
  month =        mar,
  year =         "2017",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxw081",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Thu Nov 16 10:43:41 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://academic.oup.com/comjnl/article/60/4/573/2354606",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Yin:2017:QPE,
  author =       "Hui Yin and Zheng Qin and Lu Ou and Keqin Li",
  title =        "A query privacy-enhanced and secure search scheme over
                 encrypted data in cloud computing",
  journal =      j-J-COMP-SYS-SCI,
  volume =       "90",
  number =       "??",
  pages =        "14--27",
  month =        dec,
  year =         "2017",
  CODEN =        "JCSSBM",
  DOI =          "https://doi.org/10.1016/j.jcss.2016.12.003",
  ISSN =         "0022-0000 (print), 1090-2724 (electronic)",
  ISSN-L =       "0022-0000",
  bibdate =      "Tue Jan 29 15:27:38 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsyssci.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0022000016301301",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computer and System Sciences",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00220000",
}

@Misc{Yoo:2017:PQD,
  author =       "Y. Yoo and others",
  title =        "A Post-Quantum Digital Signature Scheme Based on
                 Supersingular Isogenies",
  howpublished = "Cryptology ePrint Archive report",
  year =         "2017",
  bibdate =      "Thu Aug 31 16:02:50 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://eprint.iacr.org/2017/186",
  abstract =     "We present the first general-purpose digital signature
                 scheme based on supersingular elliptic curve isogenies
                 secure against quantum adversaries in the quantum
                 random oracle model with small key sizes. This scheme
                 is an application of Unruh's construction of
                 non-interactive zero-knowledge proofs to an interactive
                 zero-knowledge proof proposed by De Feo, Jao, and
                 Pl{\^u}t. We implement our proposed scheme on an x86-64
                 PC platform as well as an ARM-powered device. We
                 exploit the state-of-the-art techniques to speed up the
                 computations for general C and assembly. Finally, we
                 provide timing results for real world applications.",
  acknowledgement = ack-nhfb,
}

@Article{Young:2017:PSC,
  author =       "Adam L. Young and Moti Yung",
  title =        "Privacy and security: Cryptovirology: the birth,
                 neglect, and explosion of ransomware",
  journal =      j-CACM,
  volume =       "60",
  number =       "7",
  pages =        "24--26",
  month =        jul,
  year =         "2017",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/3097347",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Jun 27 17:12:39 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cacm2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://cacm.acm.org/magazines/2017/7/218875/fulltext",
  abstract =     "Recent attacks exploiting a known vulnerability
                 continue a downward spiral of ransomware-related
                 incidents.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Yu:2017:ACA,
  author =       "Gang Yu and Xiaoxiao Ma and Zhenfu Cao and Guang Zeng
                 and Wenbao Han",
  title =        "Accountable {CP-ABE} with Public Verifiability: How to
                 Effectively Protect the Outsourced Data in Cloud",
  journal =      j-INT-J-FOUND-COMP-SCI,
  volume =       "28",
  number =       "6",
  pages =        "705--??",
  month =        sep,
  year =         "2017",
  CODEN =        "IFCSEN",
  DOI =          "https://doi.org/10.1142/S0129054117400147",
  ISSN =         "0129-0541",
  ISSN-L =       "0129-0541",
  bibdate =      "Fri Feb 9 11:49:58 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijfcs.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Foundations of Computer
                 Science (IJFCS)",
  journal-URL =  "http://www.worldscientific.com/loi/ijfcs",
}

@Article{Yu:2017:PDA,
  author =       "Meng-Day (Mandel) Yu and Srinivas Devadas",
  title =        "Pervasive, dynamic authentication of physical items",
  journal =      j-CACM,
  volume =       "60",
  number =       "4",
  pages =        "32--39",
  month =        apr,
  year =         "2017",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/3024922",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Tue Mar 28 10:12:40 MDT 2017",
  bibsource =    "http://www.acm.org/pubs/contents/journals/cacm/;
                 https://www.math.utah.edu/pub/tex/bib/cacm2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://cacm.acm.org/magazines/2017/4/215034/fulltext",
  abstract =     "The use of silicon PUF circuits.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Yu:2017:PFS,
  author =       "Huifang Yu and Bo Yang",
  title =        "Pairing-Free and Secure Certificateless Signcryption
                 Scheme",
  journal =      j-COMP-J,
  volume =       "60",
  number =       "8",
  pages =        "1187--1196",
  day =          "1",
  month =        aug,
  year =         "2017",
  CODEN =        "CMPJA6",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Thu Nov 16 10:43:47 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://academic.oup.com/comjnl/article/60/8/1187/2979229",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Yuce:2017:AFI,
  author =       "Bilgiday Yuce and Nahid Farhady Ghalaty and Chinmay
                 Deshpande and Harika Santapuri and Conor Patrick and
                 Leyla Nazhandali and Patrick Schaumont",
  title =        "Analyzing the Fault Injection Sensitivity of Secure
                 Embedded Software",
  journal =      j-TECS,
  volume =       "16",
  number =       "4",
  pages =        "95:1--95:??",
  month =        aug,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3063311",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Mon Aug 14 18:53:33 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tecs.bib",
  abstract =     "Fault attacks on cryptographic software use faulty
                 ciphertext to reverse engineer the secret encryption
                 key. Although modern fault analysis algorithms are
                 quite efficient, their practical implementation is
                 complicated because of the uncertainty that comes with
                 the fault injection process. First, the intended fault
                 effect may not match the actual fault obtained after
                 fault injection. Second, the logic target of the fault
                 attack, the cryptographic software, is above the
                 abstraction level of physical faults. The resulting
                 uncertainty with respect to the fault effects in the
                 software may degrade the efficiency of the fault
                 attack, resulting in many more trial fault injections
                 than the amount predicted by the theoretical fault
                 attack. In this contribution, we highlight the
                 important role played by the processor
                 microarchitecture in the development of a fault attack.
                 We introduce the microprocessor fault sensitivity model
                 to systematically capture the fault response of a
                 microprocessor pipeline. We also propose
                 Microarchitecture-Aware Fault Injection Attack (MAFIA).
                 MAFIA uses the fault sensitivity model to guide the
                 fault injection and to predict the fault response. We
                 describe two applications for MAFIA. First, we
                 demonstrate a biased fault attack on an unprotected
                 Advanced Encryption Standard (AES) software program
                 executing on a seven-stage pipelined Reduced
                 Instruction Set Computer (RISC) processor. The use of
                 the microprocessor fault sensitivity model to guide the
                 attack leads to an order of magnitude fewer fault
                 injections compared to a traditional, blind fault
                 injection method. Second, MAFIA can be used to break
                 known software countermeasures against fault injection.
                 We demonstrate this by systematically breaking a
                 collection of state-of-the-art software fault
                 countermeasures. These two examples lead to the key
                 conclusion of this work, namely that software fault
                 attacks become much more harmful and effective when an
                 appropriate microprocessor fault sensitivity model is
                 used. This, in turn, highlights the need for better
                 fault countermeasures for software.",
  acknowledgement = ack-nhfb,
  articleno =    "95",
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J840",
}

@Article{Zaeem:2017:MAI,
  author =       "Razieh Nokhbeh Zaeem and Monisha Manoharan and
                 Yongpeng Yang and K. Suzanne Barber",
  title =        "Modeling and analysis of identity threat behaviors
                 through text mining of identity theft stories",
  journal =      j-COMPUT-SECUR,
  volume =       "65",
  number =       "??",
  pages =        "50--63",
  month =        mar,
  year =         "2017",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:48 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404816301559",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zaidan:2017:NDW,
  author =       "B. B. Zaidan and A. A. Zaidan and H. Abdul. Karim and
                 N. N. Ahmad",
  title =        "A new digital watermarking evaluation and benchmarking
                 methodology using an external group of evaluators and
                 multi-criteria analysis based on `large-scale data'",
  journal =      j-SPE,
  volume =       "47",
  number =       "10",
  pages =        "1365--1392",
  month =        oct,
  year =         "2017",
  CODEN =        "SPEXBL",
  DOI =          "https://doi.org/10.1002/spe.2465",
  ISSN =         "0038-0644 (print), 1097-024X (electronic)",
  ISSN-L =       "0038-0644",
  bibdate =      "Sat Dec 23 09:28:58 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/spe.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Software --- Practice and Experience",
  journal-URL =  "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1097-024X",
}

@Article{Zhai:2017:EEI,
  author =       "Xiaojun Zhai and Amine Ait Si Ali and Abbes Amira and
                 Faycal Bensaali",
  title =        "{ECG} encryption and identification based security
                 solution on the {Zynq SoC} for connected health
                 systems",
  journal =      j-J-PAR-DIST-COMP,
  volume =       "106",
  number =       "??",
  pages =        "143--152",
  month =        aug,
  year =         "2017",
  CODEN =        "JPDCER",
  ISSN =         "0743-7315 (print), 1096-0848 (electronic)",
  ISSN-L =       "0743-7315",
  bibdate =      "Sat Aug 19 13:10:31 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jpardistcomp.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0743731516301927",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Parallel and Distributed Computing",
  journal-URL =  "http://www.sciencedirect.com/science/journal/07437315",
}

@Article{Zhan:2017:NKG,
  author =       "Furui Zhan and Nianmin Yao and Zhenguo Gao and Guozhen
                 Tan",
  title =        "A novel key generation method for wireless sensor
                 networks based on system of equations",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "82",
  number =       "??",
  pages =        "114--127",
  day =          "15",
  month =        mar,
  year =         "2017",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Fri Mar 31 07:48:45 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804517300395",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Zhang:2017:FBI,
  author =       "Yunpeng Zhang and Chengyou Wang and Xiaoli Wang and
                 Min Wang",
  title =        "Feature-Based Image Watermarking Algorithm Using {SVD}
                 and {APBT} for Copyright Protection",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "2",
  pages =        "13",
  day =          "19",
  month =        apr,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9020013",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:57 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/2/13",
  abstract =     "Watermarking techniques can be applied in digital
                 images to maintain the authenticity and integrity for
                 copyright protection. In this paper, scale-invariant
                 feature transform (SIFT) is combined with local digital
                 watermarking and a digital watermarking algorithm based
                 on SIFT, singular value decomposition (SVD), and all
                 phase biorthogonal transform (APBT) is proposed. It
                 describes the generation process of the SIFT algorithm
                 in detail and obtains a series of scale-invariant
                 feature points. A large amount of candidate feature
                 points are selected to obtain the neighborhood which
                 can be used to embed the watermark. For these selected
                 feature points, block-based APBT is carried out on
                 their neighborhoods. Moreover, a coefficients matrix of
                 certain APBT coefficients is generated for SVD to embed
                 the encrypted watermark. Experimental results
                 demonstrate that the proposed watermarking algorithm
                 has stronger robustness than some previous schemes. In
                 addition, APBT-based digital watermarking algorithm has
                 good imperceptibility and is more robust to different
                 combinations of attacks, which can be applied for the
                 purpose of copyright protection.",
  acknowledgement = ack-nhfb,
  remark =       "Collection Information Systems Security.",
}

@Article{Zhang:2017:FGA,
  author =       "Rui Zhang and Hui Ma and Yao Lu",
  title =        "Fine-grained access control system based on fully
                 outsourced attribute-based encryption",
  journal =      j-J-SYST-SOFTW,
  volume =       "125",
  number =       "??",
  pages =        "344--353",
  month =        mar,
  year =         "2017",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Sat Feb 4 12:20:39 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib",
  URL =          "//www.sciencedirect.com/science/article/pii/S0164121216302606",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212/",
}

@Article{Zhang:2017:FWI,
  author =       "Heng Zhang and Chengyou Wang and Xiao Zhou",
  title =        "Fragile Watermarking for Image Authentication Using
                 the Characteristic of {SVD}",
  journal =      j-ALGORITHMS-BASEL,
  volume =       "10",
  number =       "1",
  month =        mar,
  year =         "2017",
  CODEN =        "ALGOCH",
  DOI =          "https://doi.org/10.3390/a10010027",
  ISSN =         "1999-4893 (electronic)",
  ISSN-L =       "1999-4893",
  bibdate =      "Fri May 3 13:50:13 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/algorithms.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.mdpi.com/1999-4893/10/1/27",
  acknowledgement = ack-nhfb,
  articleno =    "27",
  fjournal =     "Algorithms (Basel)",
  journal-URL =  "https://www.mdpi.com/journal/algorithms",
  ORCID-numbers = "Heng Zhang/0000-0003-1864-5432; Chengyou
                 Wang/0000-0002-0901-2492; Xiao
                 Zhou/0000-0002-1331-7379",
  pagecount =    "??",
  pubdates =     "Received: 21 December 2016 / Accepted: 15 February
                 2017 / Published: 17 February 2017",
}

@Article{Zhang:2017:GFD,
  author =       "Jian Zhang and Yang Yang and Yanjiao Chen and Jing
                 Chen and Qian Zhang",
  title =        "A general framework to design secure cloud storage
                 protocol using homomorphic encryption scheme",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "129 (part 1)",
  number =       "??",
  pages =        "37--50",
  day =          "24",
  month =        dec,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Wed Nov 22 06:05:46 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1389128617303328",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286/",
}

@Article{Zhang:2017:NLR,
  author =       "Leyou Zhang and Jingxia Zhang and Yi Mu",
  title =        "Novel Leakage-Resilient Attribute-Based Encryption
                 from Hash Proof System",
  journal =      j-COMP-J,
  volume =       "60",
  number =       "4",
  pages =        "541--554",
  day =          "23",
  month =        mar,
  year =         "2017",
  CODEN =        "CMPJA6",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Thu Nov 16 10:43:41 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  URL =          "https://academic.oup.com/comjnl/article/60/4/541/2608069",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Zhang:2017:PPN,
  author =       "Yuankai Zhang and Adam O'Neill and Micah Sherr and
                 Wenchao Zhou",
  title =        "Privacy-preserving network provenance",
  journal =      j-PROC-VLDB-ENDOWMENT,
  volume =       "10",
  number =       "11",
  pages =        "1550--1561",
  month =        aug,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "2150-8097",
  bibdate =      "Tue Sep 5 16:07:00 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/vldbe.bib",
  abstract =     "Network accountability, forensic analysis, and failure
                 diagnosis are becoming increasingly important for
                 network management and security. Network provenance
                 significantly aids network administrators in these
                 tasks by explaining system behavior and revealing the
                 dependencies between system states. Although
                 resourceful, network provenance can sometimes be too
                 rich, revealing potentially sensitive information that
                 was involved in system execution. In this paper, we
                 propose a cryptographic approach to preserve the
                 confidentiality of provenance (sub)graphs while
                 allowing users to query and access the parts of the
                 graph for which they are authorized. Our proposed
                 solution is a novel application of searchable symmetric
                 encryption (SSE) and more generally structured
                 encryption (SE). Our SE-enabled provenance system
                 allows a node to enforce access control policies over
                 its provenance data even after the data has been
                 shipped to remote nodes (e.g., for optimization
                 purposes). We present a prototype of our design and
                 demonstrate its practicality, scalability, and
                 efficiency for both provenance maintenance and
                 querying.",
  acknowledgement = ack-nhfb,
  fjournal =     "Proceedings of the VLDB Endowment",
  journal-URL =  "http://portal.acm.org/citation.cfm?id=J1174",
}

@Article{Zhang:2017:RIW,
  author =       "Heng Zhang and Chengyou Wang and Xiao Zhou",
  title =        "A Robust Image Watermarking Scheme Based on {SVD} in
                 the Spatial Domain",
  journal =      j-FUTURE-INTERNET,
  volume =       "9",
  number =       "3",
  pages =        "45",
  day =          "07",
  month =        aug,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi9030045",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:57 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/9/3/45",
  abstract =     "With the development of image processing technology,
                 the copyright protection of digital images has become
                 an urgent problem to be solved. As an effective method,
                 the robust digital watermarking technique emerges at a
                 historic moment. Currently, most robust watermarking
                 schemes are performed in the transform domains, such as
                 the discrete cosine transform (DCT) and singular value
                 decomposition (SVD). Compared with spatial domain
                 watermarking schemes, these methods have achieved good
                 performance, such as better robustness and higher
                 security. However, the computational complexity
                 increases with the use of forward and reverse
                 transforms. In this paper, we analyze the SVD-based
                 watermarking scheme and its impact on the spatial
                 domain. Based on this analysis and the mathematical
                 characteristics of SVD, we present a robust image
                 watermarking scheme where a binary watermark is
                 embedded into the largest singular value of each image
                 block in the spatial domain. Several experiments are
                 conducted to verify the performance of the proposed
                 watermarking scheme. The experimental results show that
                 compared with the existing SVD domain watermarking
                 schemes, our proposed method has maintained good
                 robustness against various attacks. Moreover, it avoids
                 the false positive problem existing in traditional
                 SVD-based watermarking schemes and has lower
                 computational complexity.",
  acknowledgement = ack-nhfb,
}

@Article{Zhao:2017:RAS,
  author =       "Caidan Zhao and Minmin Huang and Lianfen Huang and
                 Xiaojiang Du and Mohsen Guizani",
  title =        "A robust authentication scheme based on physical-layer
                 phase noise fingerprint for emerging wireless
                 networks",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "128",
  number =       "??",
  pages =        "164--171",
  day =          "9",
  month =        dec,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Mon Oct 30 06:00:14 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1389128617302347",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286/",
}

@Article{Zhou:2017:CLR,
  author =       "Yanwei Zhou and Bo Yang",
  title =        "Continuous Leakage-Resilient Public-Key Encryption
                 Scheme with {CCA} Security",
  journal =      j-COMP-J,
  volume =       "60",
  number =       "8",
  pages =        "1161--1172",
  day =          "1",
  month =        aug,
  year =         "2017",
  CODEN =        "CMPJA6",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Thu Nov 16 10:43:47 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://academic.oup.com/comjnl/article/60/8/1161/2882687",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Zhou:2017:ENQ,
  author =       "Lu Zhou and Youwen Zhu and Aniello Castiglione",
  title =        "Efficient $k$-{NN} query over encrypted data in cloud
                 with limited key-disclosure and offline data owner",
  journal =      j-COMPUT-SECUR,
  volume =       "69",
  number =       "??",
  pages =        "84--96",
  month =        aug,
  year =         "2017",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:50 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404816301663",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zhou:2017:IBB,
  author =       "Fucai Zhou and Su Peng and Jian Xu and Zifeng Xu",
  title =        "Identity-Based Batch Provable Data Possession with
                 Detailed Analyses",
  journal =      j-INT-J-FOUND-COMP-SCI,
  volume =       "28",
  number =       "6",
  pages =        "743--??",
  month =        sep,
  year =         "2017",
  CODEN =        "IFCSEN",
  DOI =          "https://doi.org/10.1142/S0129054117400160",
  ISSN =         "0129-0541",
  ISSN-L =       "0129-0541",
  bibdate =      "Fri Feb 9 11:49:58 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijfcs.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Foundations of Computer
                 Science (IJFCS)",
  journal-URL =  "http://www.worldscientific.com/loi/ijfcs",
}

@Article{Zhou:2017:LRC,
  author =       "Yanwei Zhou and Bo Yang",
  title =        "Leakage-resilient {CCA2}-secure certificateless
                 public-key encryption scheme without bilinear pairing",
  journal =      j-INFO-PROC-LETT,
  volume =       "130",
  number =       "??",
  pages =        "16--24",
  month =        feb,
  year =         "2017",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Mon Oct 30 08:51:08 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019017301680",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Zhu:2017:PSN,
  author =       "Youwen Zhu and Xingxin Li and Jian Wang and Yining Liu
                 and Zhiguo Qu",
  title =        "Practical Secure Na{\"\i}ve {Bayesian} Classification
                 Over Encrypted Big Data in Cloud",
  journal =      j-INT-J-FOUND-COMP-SCI,
  volume =       "28",
  number =       "6",
  pages =        "683--??",
  month =        sep,
  year =         "2017",
  CODEN =        "IFCSEN",
  DOI =          "https://doi.org/10.1142/S0129054117400135",
  ISSN =         "0129-0541",
  ISSN-L =       "0129-0541",
  bibdate =      "Fri Feb 9 11:49:58 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijfcs.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Foundations of Computer
                 Science (IJFCS)",
  journal-URL =  "http://www.worldscientific.com/loi/ijfcs",
}

@Article{Zufiria:2017:GLM,
  author =       "Pedro J. Zufiria and Jos{\'e} A. {\'A}lvarez-Cubero",
  title =        "Generalized Lexicographic {MultiObjective}
                 Combinatorial Optimization. {Application} to
                 Cryptography",
  journal =      j-SIAM-J-OPT,
  volume =       "27",
  number =       "4",
  pages =        "2182--2201",
  month =        "????",
  year =         "2017",
  CODEN =        "SJOPE8",
  DOI =          "https://doi.org/10.1137/16M1107826",
  ISSN =         "1052-6234 (print), 1095-7189 (electronic)",
  ISSN-L =       "1052-6234",
  bibdate =      "Fri Jan 12 07:04:38 MST 2018",
  bibsource =    "http://epubs.siam.org/sam-bin/dbq/toc/SIOPT/27/4;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/siamjopt.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "SIAM Journal on Optimization",
  journal-URL =  "http://epubs.siam.org/siopt",
  onlinedate =   "January 2017",
}

@Article{Abarzua:2018:ASC,
  author =       "Rodrigo Abarz{\'u}a and Santi Mart{\'\i}nez and
                 Valeria Mendoza and Javier Valera",
  title =        "Avoiding Side-Channel Attacks by Computing Isogenous
                 and Isomorphic Elliptic Curves",
  journal =      j-MATH-COMPUT-SCI,
  volume =       "12",
  number =       "3",
  pages =        "295--307",
  month =        sep,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s11786-018-0346-4",
  ISSN =         "1661-8270 (print), 1661-8289 (electronic)",
  ISSN-L =       "1661-8270",
  bibdate =      "Mon Mar 4 06:59:44 MST 2019",
  bibsource =    "http://link.springer.com/journal/11786/12/3;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/math-comput-sci.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Mathematics in Computer Science",
  journal-URL =  "http://link.springer.com/journal/11786",
}

@Article{Abbasinezhad-Mood:2018:DHI,
  author =       "Dariush Abbasinezhad-Mood and Morteza Nikooghadam",
  title =        "Design and hardware implementation of a
                 security-enhanced elliptic curve cryptography based
                 lightweight authentication scheme for smart grid
                 communications",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "84",
  number =       "??",
  pages =        "47--57",
  month =        jul,
  year =         "2018",
  CODEN =        "FGSEVI",
  DOI =          "https://doi.org/10.1016/j.future.2018.02.034",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Mon Apr 16 14:45:08 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167739X17315376",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Abdou:2018:SLV,
  author =       "Abdelrahman Abdou and P. C. {Van Oorschot}",
  title =        "Server Location Verification {(SLV)} and Server
                 Location Pinning: Augmenting {TLS} Authentication",
  journal =      j-TOPS,
  volume =       "21",
  number =       "1",
  pages =        "1:1--1:??",
  month =        jan,
  year =         "2018",
  DOI =          "https://doi.org/10.1145/3139294",
  ISSN =         "2471-2566 (print), 2471-2574 (electronic)",
  bibdate =      "Sat Sep 21 08:26:23 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tops.bib",
  URL =          "https://dl.acm.org/citation.cfm?id=3139294",
  abstract =     "We introduce the first known mechanism providing
                 realtime server location verification. Its uses include
                 enhancing server authentication by enabling browsers to
                 automatically interpret server location information. We
                 describe the design of this new measurement-based
                 technique, Server Location Verification (SLV), and
                 evaluate it using PlanetLab. We explain how SLV is
                 compatible with the increasing trends of geographically
                 distributed content dissemination over the Internet,
                 without causing any new interoperability conflicts.
                 Additionally, we introduce the notion of (verifiable)
                 server location pinning (conceptually similar to
                 certificate pinning) to support SLV, and evaluate their
                 combined impact using a server-authentication
                 evaluation framework. The results affirm the addition
                 of new security benefits to the existing TLS-based
                 authentication mechanisms. We implement SLV through a
                 location verification service, the simplest version of
                 which requires no server-side changes. We also
                 implement a simple browser extension that interacts
                 seamlessly with the verification infrastructure to
                 obtain realtime server location-verification results.",
  acknowledgement = ack-nhfb,
  articleno =    "1",
  fjournal =     "ACM Transactions on Privacy and Security (TOPS)",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J1547",
}

@Article{Abellan:2018:FCQ,
  author =       "C. Abellan and V. Pruneri",
  title =        "The future of cybersecurity is quantum",
  journal =      j-IEEE-SPECTRUM,
  volume =       "55",
  number =       "7",
  pages =        "30--35",
  month =        jul,
  year =         "2018",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.2018.8389185",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 07:02:09 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "1870 book Telegraphic Code; California; cryptography;
                 Distributed feedback devices; Encryption; fraud; French
                 Atlantic Telegraph Co; Generators; military
                 investigator; Photonics; Public key; quantum
                 cryptography; quantum cybersecurity; Quantum mechanics;
                 Sacramento; security of data; telegram transmission;
                 telegraphy; U.S. Civil War; unbreakable encryption
                 method; wire --- a problem",
}

@Article{Acar:2018:SHE,
  author =       "Abbas Acar and Hidayet Aksu and A. Selcuk Uluagac and
                 Mauro Conti",
  title =        "A Survey on Homomorphic Encryption Schemes: Theory and
                 Implementation",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "4",
  pages =        "79:1--79:??",
  month =        sep,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3214303",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "Legacy encryption systems depend on sharing a key
                 (public or private) among the peers involved in
                 exchanging an encrypted message. However, this approach
                 poses privacy concerns. The users or service providers
                 with the key have exclusive rights on the data.
                 Especially with popular cloud services, control over
                 the privacy of the sensitive data is lost. Even when
                 the keys are not shared, the encrypted material is
                 shared with a third party that does not necessarily
                 need to access the content. Moreover, untrusted
                 servers, providers, and cloud operators can keep
                 identifying elements of users long after users end the
                 relationship with the services. Indeed, Homomorphic
                 Encryption (HE), a special kind of encryption scheme,
                 can address these concerns as it allows any third party
                 to operate on the encrypted data without decrypting it
                 in advance. Although this extremely useful feature of
                 the HE scheme has been known for over 30 years, the
                 first plausible and achievable Fully Homomorphic
                 Encryption (FHE) scheme, which allows any computable
                 function to perform on the encrypted data, was
                 introduced by Craig Gentry in 2009. Even though this
                 was a major achievement, different implementations so
                 far demonstrated that FHE still needs to be improved
                 significantly to be practical on every platform.
                 Therefore, this survey focuses on HE and FHE schemes.
                 First, we present the basics of HE and the details of
                 the well-known Partially Homomorphic Encryption (PHE)
                 and Somewhat Homomorphic Encryption (SWHE), which are
                 important pillars for achieving FHE. Then, the main FHE
                 families, which have become the base for the other
                 follow-up FHE schemes, are presented. Furthermore, the
                 implementations and recent improvements in Gentry-type
                 FHE schemes are also surveyed. Finally, further
                 research directions are discussed. This survey is
                 intended to give a clear knowledge and foundation to
                 researchers and practitioners interested in knowing,
                 applying, and extending the state-of-the-art HE, PHE,
                 SWHE, and FHE systems.",
  acknowledgement = ack-nhfb,
  articleno =    "79",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Aghili:2018:ISA,
  author =       "Seyed Farhad Aghili and Maede Ashouri-Talouki and
                 Hamid Mala",
  title =        "{DoS}, impersonation and de-synchronization attacks
                 against an ultra-lightweight {RFID} mutual
                 authentication protocol for {IoT}",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "74",
  number =       "1",
  pages =        "509--525",
  month =        jan,
  year =         "2018",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-017-2139-y",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Sat Jan 6 08:59:19 MST 2018",
  bibsource =    "http://link.springer.com/journal/11227/74/1;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Article{Agrawal:2018:RLR,
  author =       "Megha Agrawal and Tarun Kumar Bansal and Donghoon
                 Chang and Amit Kumar Chauhan and Seokhie Hong and
                 Jinkeon Kang and Somitra Kumar Sanadhya",
  title =        "{RCB}: leakage-resilient authenticated encryption via
                 re-keying",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "74",
  number =       "9",
  pages =        "4173--4198",
  month =        sep,
  year =         "2018",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-016-1824-6",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Thu Oct 10 15:31:14 MDT 2019",
  bibsource =    "http://link.springer.com/journal/11227/74/9;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Article{Ahmadzadeh:2018:HPE,
  author =       "Armin Ahmadzadeh and Omid Hajihassani and Saeid
                 Gorgin",
  title =        "A high-performance and energy-efficient exhaustive key
                 search approach via {GPU} on {DES}-like cryptosystems",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "74",
  number =       "1",
  pages =        "160--182",
  month =        jan,
  year =         "2018",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-017-2120-9",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Sat Jan 6 08:59:19 MST 2018",
  bibsource =    "http://link.springer.com/journal/11227/74/1;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Article{Akhtar:2018:BSI,
  author =       "Z. Akhtar and A. Hadid and M. S. Nixon and M.
                 Tistarelli and J. Dugelay and S. Marcel",
  title =        "Biometrics: In Search of Identity and Security
                 ({Q\&A})",
  journal =      j-IEEE-MULTIMEDIA,
  volume =       "25",
  number =       "3",
  pages =        "22--35",
  month =        jul # "\slash " # sep,
  year =         "2018",
  CODEN =        "IEMUE4",
  DOI =          "https://doi.org/10.1109/MMUL.2018.2873494",
  ISSN =         "1070-986x (print), 1941-0166 (electronic)",
  ISSN-L =       "1070-986X",
  bibdate =      "Fri Aug 2 10:38:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeemultimedia.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE MultiMedia",
  journal-URL =  "http://www.computer.org/multimedia/",
  keywords =     "authorisation; biometrics; Biometrics; biometrics
                 (access control); Databases; DNA; Face; Face
                 Recognition; Feature extraction; Fingerprint
                 recognition; Fingerprint Recognition; Forensics;
                 identity theft; Iris Recognition; Iris recognition;
                 Privacy; Security; security threats",
}

@Article{Al-Azzam:2018:SRC,
  author =       "Saad Al-Azzam and Ahmad Sharieh and Azzam Sleit and
                 Nedaa Al-Azzam",
  title =        "Securing robot communication using packet encryption
                 distribution",
  journal =      j-NETWORK-SECURITY,
  volume =       "2018",
  number =       "2",
  pages =        "8--14",
  month =        feb,
  year =         "2018",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Thu Sep 12 12:57:47 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485818300151",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Al-Qurishi:2018:EKA,
  author =       "Muhammad Al-Qurishi and Sk Md Mizanur Rahman and M.
                 Shamim Hossain and Ahmad Almogren and Majed Alrubaian
                 and Atif Alamri and Mabrook Al-Rakhami and B. B.
                 Gupta",
  title =        "An efficient key agreement protocol for
                 {Sybil}-precaution in online social networks",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "84",
  number =       "??",
  pages =        "139--148",
  month =        jul,
  year =         "2018",
  CODEN =        "FGSEVI",
  DOI =          "https://doi.org/10.1016/j.future.2017.07.055",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Mon Apr 16 14:45:08 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167739X17306623",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Alam:2018:AFC,
  author =       "Badiul Alam and Zhe Jin and Wun-She Yap and Bok-Min
                 Goi",
  title =        "An alignment-free cancelable fingerprint template for
                 bio-cryptosystems",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "115",
  number =       "??",
  pages =        "20--32",
  day =          "1",
  month =        aug,
  year =         "2018",
  CODEN =        "JNCAF3",
  DOI =          "https://doi.org/10.1016/j.jnca.2018.04.013",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Sun May 27 08:10:17 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804518301450",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Alharbi:2018:CME,
  author =       "Rawan Alharbi and Tammy Stump and Nilofar Vafaie and
                 Angela Pfammatter and Bonnie Spring and Nabil
                 Alshurafa",
  title =        "{I} Can't Be Myself: Effects of Wearable Cameras on
                 the Capture of Authentic Behavior in the Wild",
  journal =      j-IMWUT,
  volume =       "2",
  number =       "3",
  pages =        "1--40",
  month =        sep,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3264900",
  ISSN =         "2474-9567 (electronic)",
  bibdate =      "Thu Jan 23 12:37:04 MST 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/imwut.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3264900",
  abstract =     "Wearable sensors can provide reliable, automated
                 measures of health behaviors in free-living
                 populations. However, validation of these measures is
                 impossible without observable confirmation of
                 behaviors. Participants have expressed discomfort
                 during the \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "90",
  fjournal =     "Proceedings of the ACM on Interactive, Mobile,
                 Wearable and Ubiquitous Technologies (IMWUT)",
  journal-URL =  "https://dl.acm.org/loi/imwut",
}

@Article{Ali:2018:CBR,
  author =       "Zulfiqar Ali and Muhammad Imran and Mansour Alsulaiman
                 and Muhammad Shoaib and Sana Ullah",
  title =        "Chaos-based robust method of zero-watermarking for
                 medical signals",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "88",
  number =       "??",
  pages =        "400--412",
  month =        nov,
  year =         "2018",
  CODEN =        "FGSEVI",
  DOI =          "https://doi.org/10.1016/j.future.2018.05.058",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Tue Sep 18 14:07:58 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X18304709",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Ali:2018:ECM,
  author =       "Zulfiqar Ali and M. Shamim Hossain and Ghulam Muhammad
                 and Ihsan Ullah and Hamid Abachi and Atif Alamri",
  title =        "Edge-centric multimodal authentication system using
                 encrypted biometric templates",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "85",
  number =       "??",
  pages =        "76--87",
  month =        aug,
  year =         "2018",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Thu Apr 19 14:05:57 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167739X17328741",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Ali:2018:SUA,
  author =       "Rifaqat Ali and Arup Kumar Pal and Saru Kumari and
                 Marimuthu Karuppiah and Mauro Conti",
  title =        "A secure user authentication and key-agreement scheme
                 using wireless sensor networks for agriculture
                 monitoring",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "84",
  number =       "??",
  pages =        "200--215",
  month =        jul,
  year =         "2018",
  CODEN =        "FGSEVI",
  DOI =          "https://doi.org/10.1016/j.future.2017.06.018",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Mon Apr 16 14:45:08 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167739X17303862",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Ali:2018:ZWA,
  author =       "Zulfiqar Ali and Muhammad Imran and Mansour Alsulaiman
                 and Tanveer Zia and Muhammad Shoaib",
  title =        "A zero-watermarking algorithm for privacy protection
                 in biomedical signals",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "82",
  number =       "??",
  pages =        "290--303",
  month =        may,
  year =         "2018",
  CODEN =        "FGSEVI",
  DOI =          "https://doi.org/10.1016/j.future.2017.12.007",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Sun Feb 18 14:42:10 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167739X17322975",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Alpar:2018:BTA,
  author =       "Orcan Alpar",
  title =        "Biometric touchstroke authentication by fuzzy
                 proximity of touch locations",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "86",
  number =       "??",
  pages =        "71--80",
  month =        sep,
  year =         "2018",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Wed Jun 20 10:38:06 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167739X17326055",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Altawy:2018:SLT,
  author =       "Riham Altawy and Raghvendra Rohit and Morgan He and
                 Kalikinkar Mandal and Gangqiang Yang and Guang Gong",
  title =        "{SLISCP-light}: Towards Hardware Optimized
                 Sponge-specific Cryptographic Permutations",
  journal =      j-TECS,
  volume =       "17",
  number =       "4",
  pages =        "81:1--81:??",
  month =        aug,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3233245",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Thu Oct 17 18:16:41 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/tecs.bib",
  abstract =     "The emerging areas in which highly resource
                 constrained devices are interacting wirelessly to
                 accomplish tasks have led manufacturers to embed
                 communication systems in them. Tiny low-end devices
                 such as sensor networks nodes and Radio Frequency
                 Identification (RFID) tags are of particular importance
                 due to their vulnerability to security attacks, which
                 makes protecting their communication privacy and
                 authenticity an essential matter. In this work, we
                 present a lightweight do-it-all cryptographic design
                 that offers the basic underlying functionalities to
                 secure embedded communication systems in tiny devices.
                 Specifically, we revisit the design approach of the
                 sLiSCP family of lightweight cryptographic
                 permutations, which was proposed in SAC 2017. sLiSCP is
                 designed to be used in a unified duplex sponge
                 construction to provide minimal overhead for multiple
                 cryptographic functionalities within one hardware
                 design. The design of sLiSCP follows a 4-subblock
                 Type-2 Generalized Feistel-like Structure (GFS) with
                 unkeyed round-reduced Simeck as the round function,
                 which are extremely efficient building blocks in terms
                 of their hardware area requirements. In SLISCP-light,
                 we tweak the GFS design and turn it into an elegant
                 Partial Substitution-Permutation Network construction,
                 which further reduces the hardware areas of the SLISCP
                 permutations by around 16\% of their original values.
                 The new design also enhances the bit diffusion and
                 algebraic properties of the permutations and enables us
                 to reduce the number of steps, thus achieving a better
                 throughput in both the hashing and authentication
                 modes. We perform a thorough security analysis of the
                 new design with respect to its diffusion, differential
                 and linear, and algebraic properties. For
                 SLISCP-light-192, we report parallel implementation
                 hardware areas of 1,820 (respectively, 1,892)GE in CMOS
                 65 nm (respectively, 130 nm) ASIC. The areas for
                 SLISCP-light-256 are 2,397 and 2,500GE in CMOS 65 nm
                 and 130 nm ASIC, respectively. Overall, the unified
                 duplex sponge mode of SLISCP-light-192, which provides
                 (authenticated) encryption and hashing functionalities,
                 satisfies the area (1,958GE), power (3.97 $ \mu $W),
                 and throughput (44.4kbps) requirements of passive RFID
                 tags.",
  acknowledgement = ack-nhfb,
  articleno =    "81",
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J840",
}

@Article{AlTawy:2018:TCM,
  author =       "Riham AlTawy and Raghvendra Rohit and Morgan He and
                 Kalikinkar Mandal and Gangqiang Yang and Guang Gong",
  title =        "Towards a Cryptographic Minimal Design: The {sLiSCP}
                 Family of Permutations",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "67",
  number =       "9",
  pages =        "1341--1358",
  month =        "????",
  year =         "2018",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2018.2811467",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Thu Aug 9 10:45:38 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  URL =          "https://ieeexplore.ieee.org/document/8305605/",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Amin:2018:UAP,
  author =       "Ruhul Amin and S. K. Hafizul Islam and Neeraj Kumar
                 and Kim-Kwang Raymond Choo",
  title =        "An untraceable and anonymous password authentication
                 protocol for heterogeneous wireless sensor networks",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "104",
  number =       "??",
  pages =        "133--144",
  day =          "15",
  month =        feb,
  year =         "2018",
  CODEN =        "JNCAF3",
  DOI =          "https://doi.org/10.1016/j.jnca.2017.12.012",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Sat Mar 3 15:22:10 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804517304058",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Aminifar:2018:OME,
  author =       "Amir Aminifar and Petru Eles and Zebo Peng",
  title =        "Optimization of Message Encryption for Real-Time
                 Applications in Embedded Systems",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "67",
  number =       "5",
  pages =        "748--754",
  month =        may,
  year =         "2018",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2017.2778728",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Thu Apr 12 07:11:24 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  URL =          "https://ieeexplore.ieee.org/document/8125122/",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Anandakumar:2018:RHA,
  author =       "N. Nalla Anandakumar and M. Prem Laxman Das and
                 Somitra K. Sanadhya and Mohammad S. Hashmi",
  title =        "Reconfigurable Hardware Architecture for Authenticated
                 Key Agreement Protocol Over Binary {Edwards} Curve",
  journal =      j-TRETS,
  volume =       "11",
  number =       "2",
  pages =        "12:1--12:??",
  month =        nov,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3231743",
  ISSN =         "1936-7406 (print), 1936-7414 (electronic)",
  ISSN-L =       "1936-7406",
  bibdate =      "Sat Oct 19 17:43:00 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/trets.bib",
  abstract =     "In this article, we present a high-performance
                 hardware architecture for Elliptic curve based
                 (authenticated) key agreement protocol ``Elliptic Curve
                 Menezes, Qu and Vanstone'' (ECMQV) over Binary Edwards
                 Curve (BEC). We begin by analyzing inversion module on
                 a 251-bit binary field. Subsequently, we present Field
                 Programmable Gate Array (FPGA) implementations of the
                 unified formula for computing elliptic curve point
                 addition on BEC in affine and projective coordinates
                 and investigate the relative performance of these two
                 coordinates. Then, we implement the w -coordinate based
                 differential addition formulae suitable for usage in
                 Montgomery ladder. Next, we present a novel hardware
                 architecture of BEC point multiplication using mixed w
                 -coordinates of the Montgomery laddering algorithm and
                 analyze it in terms of resistance to Simple Power
                 Analysis (SPA) attack. In order to improve the
                 performance, the architecture utilizes registers
                 efficiently and uses efficient scheduling mechanisms
                 for the BEC arithmetic implementations. Our
                 implementation results show that the proposed
                 architecture is resistant against SPA attack and yields
                 a better performance when compared to the existing
                 state-of-the-art BEC designs for computing point
                 multiplication (PM). Finally, we present an FPGA design
                 of ECMQV key agreement protocol using BEC defined over
                 GF(2$^{251}$ ). The execution of ECMQV protocol takes
                 66.47 $ \mu $ s using 32,479 slices on Virtex-4 FPGA
                 and 52.34 $ \mu $ s using 15,988 slices on Virtex-5
                 FPGA. To the best of our knowledge, this is the first
                 FPGA design of the ECMQV protocol using BEC.",
  acknowledgement = ack-nhfb,
  articleno =    "12",
  fjournal =     "ACM Transactions on Reconfigurable Technology and
                 Systems (TRETS)",
  journal-URL =  "http://portal.acm.org/toc.cfm?id=J1151",
}

@Article{Anastasiadis:2018:BTA,
  author =       "M. Anastasiadis and N. Chatzis and K. A. Draziotis",
  title =        "Birthday type attacks to the {Naccache--Stern}
                 knapsack cryptosystem",
  journal =      j-INFO-PROC-LETT,
  volume =       "138",
  number =       "??",
  pages =        "35--38",
  month =        oct,
  year =         "2018",
  CODEN =        "IFPLAT",
  DOI =          "https://doi.org/10.1016/j.ipl.2018.06.002",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Fri Sep 14 08:04:51 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019018301273",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Araldo:2018:CEC,
  author =       "Andrea Araldo and Gyorgy Dan and Dario Rossi",
  title =        "Caching Encrypted Content Via Stochastic Cache
                 Partitioning",
  journal =      j-IEEE-TRANS-NETWORKING,
  volume =       "26",
  number =       "1",
  pages =        "548--561",
  month =        feb,
  year =         "2018",
  CODEN =        "IEANEP",
  DOI =          "https://doi.org/10.1109/TNET.2018.2793892",
  ISSN =         "1063-6692 (print), 1558-2566 (electronic)",
  ISSN-L =       "1063-6692",
  bibdate =      "Thu Apr 19 11:27:04 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
  abstract =     "In-network caching is an appealing solution to cope
                 with the increasing bandwidth demand of video, audio,
                 and data transfer over the Internet. Nonetheless, in
                 order to protect consumer privacy and their own
                 business, content providers CPs increasingly deliver
                 encrypted content, thereby preventing Internet service
                 providers ISPs from employing traditional caching
                 strategies, which require the knowledge of the objects
                 being transmitted. To overcome this emerging tussle
                 between security and efficiency, in this paper we
                 propose an architecture in which the ISP partitions the
                 cache space into slices, assigns each slice to a
                 different CP, and lets the CPs remotely manage their
                 slices. This architecture enables transparent caching
                 of encrypted content and can be deployed in the very
                 edge of the ISP's network i.e., base stations and
                 femtocells, while allowing CPs to maintain exclusive
                 control over their content. We propose an algorithm,
                 called SDCP, for partitioning the cache storage into
                 slices so as to maximize the bandwidth savings provided
                 by the cache. A distinctive feature of our algorithm is
                 that ISPs only need to measure the aggregated miss
                 rates of each CP, but they need not know the individual
                 objects that are requested. We prove that the SDCP
                 algorithm converges to a partitioning that is close to
                 the optimal, and we bound its optimality gap. We use
                 simulations to evaluate SDCP's convergence rate under
                 stationary and nonstationary content popularity.
                 Finally, we show that SDCP significantly outperforms
                 traditional reactive caching techniques, considering
                 both CPs with perfect and with imperfect knowledge of
                 their content popularity.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE\slash ACM Transactions on Networking",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J771",
}

@Article{Archer:2018:KDR,
  author =       "David W. Archer and Dan Bogdanov and Yehuda Lindell
                 and Liina Kamm and Kurt Nielsen and Jakob Illeborg
                 Pagter and Nigel P. Smart and Rebecca N. Wright",
  title =        "From Keys to Databases --- Real-World Applications of
                 Secure Multi-Party Computation",
  journal =      j-COMP-J,
  volume =       "61",
  number =       "12",
  pages =        "1749--1771",
  day =          "1",
  month =        dec,
  year =         "2018",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxy090",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Nov 27 19:24:38 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://academic.oup.com/comjnl/article/61/12/1749/5095655",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Au:2018:PPP,
  author =       "Man Ho Au and Kaitai Liang and Joseph K. Liu and
                 Rongxing Lu and Jianting Ning",
  title =        "Privacy-preserving personal data operation on mobile
                 cloud: Chances and challenges over advanced persistent
                 threat",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "79 (part 1)",
  number =       "??",
  pages =        "337--349",
  year =         "2018",
  CODEN =        "FGSEVI",
  DOI =          "https://doi.org/10.1016/j.future.2017.06.021",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Fri Nov 24 15:16:17 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167739X17312864",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
  keywords =     "Applied cryptography; Mobile could; Privacy;
                 Security",
}

@Article{Badawi:2018:ASS,
  author =       "Ahmad {Al Badawi} and Bharadwaj Veeravalli and Khin Mi
                 Mi Aung and Brahim Hamadicharef",
  title =        "Accelerating subset sum and lattice based public-key
                 cryptosystems with multi-core {CPUs} and {GPUs}",
  journal =      j-J-PAR-DIST-COMP,
  volume =       "119",
  number =       "??",
  pages =        "179--190",
  month =        sep,
  year =         "2018",
  CODEN =        "JPDCER",
  DOI =          "https://doi.org/10.1016/j.jpdc.2018.04.014",
  ISSN =         "0743-7315 (print), 1096-0848 (electronic)",
  ISSN-L =       "0743-7315",
  bibdate =      "Thu May 31 06:49:57 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jpardistcomp.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0743731518302831",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Parallel and Distributed Computing",
  journal-URL =  "http://www.sciencedirect.com/science/journal/07437315",
}

@Article{Balagani:2018:IAC,
  author =       "Kiran S. Balagani and Paolo Gasti and Aaron Elliott
                 and Azriel Richardson and Mike O'Neal",
  title =        "The impact of application context on privacy and
                 performance of keystroke authentication systems",
  journal =      j-J-COMP-SECUR,
  volume =       "26",
  number =       "4",
  pages =        "543--556",
  month =        "????",
  year =         "2018",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-171017",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 23 05:47:17 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Barbareschi:2018:PBH,
  author =       "Mario Barbareschi and Alessandra {De Benedictis} and
                 Nicola Mazzocca",
  title =        "A {PUF}-based hardware mutual authentication
                 protocol",
  journal =      j-J-PAR-DIST-COMP,
  volume =       "119",
  number =       "??",
  pages =        "107--120",
  month =        sep,
  year =         "2018",
  CODEN =        "JPDCER",
  DOI =          "https://doi.org/10.1016/j.jpdc.2018.04.007",
  ISSN =         "0743-7315 (print), 1096-0848 (electronic)",
  ISSN-L =       "0743-7315",
  bibdate =      "Thu May 31 06:49:57 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jpardistcomp.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0743731518302582",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Parallel and Distributed Computing",
  journal-URL =  "http://www.sciencedirect.com/science/journal/07437315",
}

@Article{Barcellos:2018:RSP,
  author =       "M. Barcellos and D. F. Aranha",
  title =        "Research in Security and Privacy in {Brazil}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "6",
  pages =        "14--21",
  month =        nov # "\slash " # dec,
  year =         "2018",
  DOI =          "https://doi.org/10.1109/MSEC.2018.2874855",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
  keywords =     "Brazil; Communication networks; Cryptography; data
                 privacy; geographical distribution; Internet of Things;
                 Privacy; privacy; research areas.; security; Security
                 of data",
}

@Article{Baruah:2018:TFA,
  author =       "Barnana Baruah and Subhasish Dhal",
  title =        "A two-factor authentication scheme against {FDM}
                 attack in {IFTTT} based Smart Home System",
  journal =      j-COMPUT-SECUR,
  volume =       "77",
  number =       "??",
  pages =        "21--35",
  month =        aug,
  year =         "2018",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:55 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404818302402",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Misc{Bellovin:2018:UAE,
  author =       "Steven M. Bellovin",
  title =        "{Usenet}, Authentication, and Engineering (or: Early
                 Design Decisions for {Usenet})",
  howpublished = "Web article.",
  day =          "23",
  month =        feb,
  year =         "2018",
  bibdate =      "Thu Mar 01 07:29:49 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/unix.bib",
  URL =          "https://www.cs.columbia.edu/~smb/blog/2018-02/2018-02-23.html",
  acknowledgement = ack-nhfb,
}

@Article{Beltran:2018:IAA,
  author =       "Marta Beltr{\'a}n",
  title =        "Identifying, authenticating and authorizing smart
                 objects and end users to cloud services in {Internet of
                 Things}",
  journal =      j-COMPUT-SECUR,
  volume =       "77",
  number =       "??",
  pages =        "595--611",
  month =        aug,
  year =         "2018",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:55 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404818301366",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Berman:2018:CFC,
  author =       "Itay Berman and Iftach Haitner and Aris Tentes",
  title =        "Coin Flipping of Any Constant Bias Implies One-Way
                 Functions",
  journal =      j-J-ACM,
  volume =       "65",
  number =       "3",
  pages =        "14:1--14:??",
  month =        mar,
  year =         "2018",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/2979676",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  bibdate =      "Wed Jul 25 16:08:11 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We show that the existence of a coin-flipping protocol
                 safe against any nontrivial constant bias (e.g., .499)
                 implies the existence of one-way functions. This
                 improves upon a result of Haitner and Omri (FOCS'11),
                 who proved this implication for protocols with bias $
                 \sqrt 2 - 1 / 2 - o (1) \approx .207 $. Unlike the
                 result of Haitner and Omri, our result also holds for
                 weak coin-flipping protocols.",
  acknowledgement = ack-nhfb,
  articleno =    "14",
  fjournal =     "Journal of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J401",
}

@Article{Berretti:2018:IAS,
  author =       "Stefano Berretti",
  title =        "Improved Audio Steganalytic Feature and Its
                 Applications in Audio Forensics",
  journal =      j-TOMM,
  volume =       "14",
  number =       "2",
  pages =        "43:1--43:??",
  month =        may,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3190575",
  ISSN =         "1551-6857 (print), 1551-6865 (electronic)",
  ISSN-L =       "1551-6857",
  bibdate =      "Tue May 29 08:39:06 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tomccap.bib",
  abstract =     "Digital multimedia steganalysis has attracted wide
                 attention over the past decade. Currently, there are
                 many algorithms for detecting image steganography.
                 However, little research has been devoted to audio
                 steganalysis. Since the statistical properties of image
                 and audio files are quite different, features that are
                 effective in image steganalysis may not be effective
                 for audio. In this article, we design an improved audio
                 steganalytic feature set derived from both the time and
                 Mel-frequency domains for detecting some typical
                 steganography in the time domain, including LSB
                 matching, Hide4PGP, and Steghide. The experiment
                 results, evaluated on different audio sources,
                 including various music and speech clips of different
                 complexity, have shown that the proposed features
                 significantly outperform the existing ones. Moreover,
                 we use the proposed features to detect and further
                 identify some typical audio operations that would
                 probably be used in audio tampering. The extensive
                 experiment results have shown that the proposed
                 features also outperform the related forensic methods,
                 especially when the length of the audio clip is small,
                 such as audio clips with 800 samples. This is very
                 important in real forensic situations.",
  acknowledgement = ack-nhfb,
  articleno =    "43",
  fjournal =     "ACM Transactions on Multimedia Computing,
                 Communications, and Applications",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J961",
}

@Article{Bhattacharya:2018:UPC,
  author =       "Sarani Bhattacharya and Debdeep Mukhopadhyay",
  title =        "Utilizing Performance Counters for Compromising Public
                 Key Ciphers",
  journal =      j-TOPS,
  volume =       "21",
  number =       "1",
  pages =        "5:1--5:??",
  month =        jan,
  year =         "2018",
  DOI =          "https://doi.org/10.1145/3156015",
  ISSN =         "2471-2566 (print), 2471-2574 (electronic)",
  bibdate =      "Sat Sep 21 08:26:23 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tops.bib",
  URL =          "https://dl.acm.org/citation.cfm?id=3156015",
  abstract =     "Hardware performance counters (HPCs) are useful
                 artifacts for evaluating the performance of software
                 implementations. Recently, HPCs have been made more
                 convenient to use without requiring explicit kernel
                 patches or superuser privileges. However, in this
                 article, we highlight that the information revealed by
                 HPCs can be also exploited to attack standard
                 implementations of public key algorithms. In
                 particular, we analyze the vulnerability due to the
                 event branch miss leaked via the HPCs during execution
                 of the target ciphers. We present an iterative attack
                 that targets the key bits of 1,024-bit RSA and 256-bit
                 ECC, whereas in the offline phase, the system's
                 underlying branch predictor is approximated by a
                 theoretical predictor in the literature. Subsimulations
                 are performed corresponding to each bit guess to
                 classify the message space into distinct partitions
                 based on the event branch misprediction and the target
                 key bit value. In the online phase, branch
                 mispredictions obtained from the hardware performance
                 monitors on the target system reveal the secret key
                 bits. We also theoretically prove that the probability
                 of success of the attack is equivalent to the accurate
                 modeling of the theoretical predictor to the underlying
                 system predictor. In addition, we propose an improved
                 version of the attack that requires fewer branch
                 misprediction traces from the HPCs to recover the
                 secret. Experimentations using both attack strategies
                 have been provided on Intel Core 2 Duo, Core i3, and
                 Core i5 platforms for 1,024-bit implementation of RSA
                 and 256-bit scalar multiplication over the secp 256 r 1
                 curve followed by results on the effect of change of
                 parameters on the success rate. The attack can
                 successfully reveal the exponent bits and thus seeks
                 attention to model secure branch predictors such that
                 it inherently prevents information leakage.",
  acknowledgement = ack-nhfb,
  articleno =    "5",
  fjournal =     "ACM Transactions on Privacy and Security (TOPS)",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J1547",
}

@Article{Bibak:2018:AUH,
  author =       "Khodakhast Bibak and Bruce M. Kapron and Venkatesh
                 Srinivasan and L{\'a}szl{\'o} T{\'o}th",
  title =        "On an Almost-Universal Hash Function Family with
                 Applications to Authentication and Secrecy Codes",
  journal =      j-INT-J-FOUND-COMP-SCI,
  volume =       "29",
  number =       "3",
  pages =        "357--??",
  month =        apr,
  year =         "2018",
  CODEN =        "IFCSEN",
  DOI =          "https://doi.org/10.1142/S0129054118500089",
  ISSN =         "0129-0541",
  ISSN-L =       "0129-0541",
  bibdate =      "Thu May 10 06:25:10 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijfcs.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Foundations of Computer
                 Science (IJFCS)",
  journal-URL =  "http://www.worldscientific.com/loi/ijfcs",
}

@Article{Bitansky:2018:IOF,
  author =       "Nir Bitansky and Vinod Vaikuntanathan",
  title =        "Indistinguishability Obfuscation from Functional
                 Encryption",
  journal =      j-J-ACM,
  volume =       "65",
  number =       "6",
  pages =        "39:1--39:??",
  month =        nov,
  year =         "2018",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/3234511",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 29 14:39:21 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3234511",
  abstract =     "Indistinguishability obfuscation (IO) is a tremendous
                 notion, powerful enough to give rise to almost any
                 known cryptographic object. Prior candidate IO
                 constructions were based on specific assumptions on
                 algebraic objects called multi-linear graded encodings.
                 We present a generic construction of
                 indistinguishability obfuscation from public-key
                 functional encryption with succinct encryption circuits
                 and subexponential security. This shows the equivalence
                 of indistinguishability obfuscation and public-key
                 functional encryption, a primitive that has previously
                 seemed to be much weaker, lacking the power and the
                 staggering range of applications of
                 indistinguishability obfuscation. Our main construction
                 can be based on functional encryption schemes that
                 support a single functional key, and where the
                 encryption circuit grows sub-linearly in the
                 circuit-size of the function. We further show that
                 sublinear succinctness in circuit-size for single-key
                 schemes can be traded with sublinear succinctness in
                 the number of keys (also known as the collusion-size )
                 for multi-key schemes. We also show that, under the
                 Learning with Errors assumption, our techniques imply
                 that any indistinguishability obfuscator can be
                 converted into one where the size of obfuscated
                 circuits is twice that of the original circuit plus an
                 additive overhead that is polynomial in its depth,
                 input length, and the security parameter.",
  acknowledgement = ack-nhfb,
  articleno =    "39",
  fjournal =     "Journal of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J401",
}

@Article{Bocu:2018:HEB,
  author =       "R. Bocu and C. Costache",
  title =        "A homomorphic encryption-based system for securely
                 managing personal health metrics data",
  journal =      j-IBM-JRD,
  volume =       "62",
  number =       "1",
  pages =        "1:1--1:10",
  month =        "????",
  year =         "2018",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  ISSN-L =       "0018-8646",
  bibdate =      "Thu Feb 1 06:34:25 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ibmjrd.bib",
  URL =          "http://ieeexplore.ieee.org/document/8269765/",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5288520",
}

@Article{Bogdanov:2018:IEA,
  author =       "Dan Bogdanov and Liina Kamm and Sven Laur and Ville
                 Sokk",
  title =        "Implementation and Evaluation of an Algorithm for
                 Cryptographically Private Principal Component Analysis
                 on Genomic Data",
  journal =      j-TCBB,
  volume =       "15",
  number =       "5",
  pages =        "1427--1432",
  month =        sep,
  year =         "2018",
  CODEN =        "ITCBCY",
  DOI =          "https://doi.org/10.1109/TCBB.2018.2858818",
  ISSN =         "1545-5963 (print), 1557-9964 (electronic)",
  ISSN-L =       "1545-5963",
  bibdate =      "Thu Nov 8 06:18:46 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcbb.bib",
  abstract =     "We improve the quality of cryptographically
                 privacy-preserving genome-wide association studies by
                 correctly handling population stratification-the
                 inherent genetic difference of patient groups, e.g.,
                 people with different ancestries. Our approach is to
                 use principal component analysis to reduce the
                 dimensionality of the problem so that we get less
                 spurious correlations between traits of interest and
                 certain positions in the genome. While this approach is
                 commonplace in practical genomic analysis, it has not
                 been used within a privacy-preserving setting. In this
                 paper, we use cryptographically secure multi-party
                 computation to tackle principal component analysis, and
                 present an implementation and experimental results
                 showing the performance of the approach.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE/ACM Transactions on Computational Biology and
                 Bioinformatics",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J954",
}

@Article{Bottarelli:2018:PCW,
  author =       "Mirko Bottarelli and Gregory Epiphaniou and Dhouha
                 Kbaier {Ben Ismail} and Petros Karadimas and Haider
                 Al-Khateeb",
  title =        "Physical characteristics of wireless communication
                 channels for secret key establishment: a survey of the
                 research",
  journal =      j-COMPUT-SECUR,
  volume =       "78",
  number =       "??",
  pages =        "454--476",
  month =        sep,
  year =         "2018",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:57 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404818300841",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Braeken:2018:AAA,
  author =       "A. Braeken and Abdellah Touhafi",
  title =        "{AAA} --- autonomous anonymous user authentication and
                 its application in {V2G}",
  journal =      j-CCPE,
  volume =       "30",
  number =       "12",
  pages =        "",
  day =          "25",
  month =        jun,
  year =         "2018",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.4303",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Sat Aug 4 10:03:15 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://onlinelibrary.wiley.com/doi/abs/10.1002/cpe.4303",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
}

@Article{Brewster:2018:RCF,
  author =       "R. Brewster",
  title =        "Re-creating the first flip-flop --- A fundamental
                 component of computers turns 100 [Resources Hands On]",
  journal =      j-IEEE-SPECTRUM,
  volume =       "55",
  number =       "6",
  pages =        "13--14",
  month =        jun,
  year =         "2018",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.2018.8362215",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 07:02:09 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "amplifying vacuum tube; cryptography; digital
                 circuits; electronic toggle switch; ENIAC; flip-flop;
                 flip-flops; history; initial electrical control signal;
                 John Bardeen; time 100.0 year; transistors; vacuum
                 tubes; William Eccles; William Shockley",
}

@Article{Buchmann:2018:PCP,
  author =       "J. Buchmann and K. Lauter and M. Mosca",
  title =        "Postquantum Cryptography, Part 2",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "5",
  pages =        "12--13",
  month =        sep # "\slash " # oct,
  year =         "2018",
  DOI =          "https://doi.org/10.1109/MSP.2018.3761714",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
  keywords =     "Computer networks; Computer security; Cryptography;
                 cryptography; postquantum cryptography; security; Shor;
                 Special issues and sections",
}

@Article{Budroni:2018:HGB,
  author =       "Alessandro Budroni and Federico Pintore",
  title =        "Hashing to {G2} on {BLS} pairing-friendly curves",
  journal =      j-ACM-COMM-COMP-ALGEBRA,
  volume =       "52",
  number =       "3",
  pages =        "63--66",
  month =        sep,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3313880.3313884",
  ISSN =         "1932-2232 (print), 1932-2240 (electronic)",
  ISSN-L =       "1932-2232",
  bibdate =      "Sat Feb 23 06:21:15 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigsam.bib",
  abstract =     "When a pairing e: $ G_1 $ x $ G_2 $ -{$>$} $ G_T $, on
                 an elliptic curve E defined over F$_q$, is exploited in
                 a cryptographic protocol, there is often the need to
                 hash binary strings into $ G_1$ and $ G_2$.
                 Traditionally, if $E$ admits a twist $ \tilde {E}$ of
                 order $d$, then $ G_1$ = E (F$_q$ ) \cap E [ r ], where
                 r is a prime integer, and $ G_2$ = $ \tilde {E}$ (F
                 $_q^{k / d}$ ) \cap $ \tilde {E}$ [ r ], where k is the
                 embedding degree of E w.r.t. r. The standard approach
                 for hashing a binary string into $ G_1$ and $ G_2$ is
                 to map it to general points P \in E ( F$_q$ ) and P'
                 \in $ \tilde {E}$ (F $_q^{k / d}$ ), and then multiply
                 them by the cofactors c = \#E (F $_q$ )/ r and c ' =
                 \#$ \tilde {E}$ (F $_q^{k / d}$ )/ r respectively.
                 Usually, the multiplication by c' is computationally
                 expensive. In order to speed up such a computation, two
                 different methods (by Scott et al. and by Fuentes et
                 al. ) have been proposed. In this poster we consider
                 these two methods for BLS pairing-friendly curves
                 having k \in {12, 24, 30, 42,48}, providing efficiency
                 comparisons. When k = 42,48, the Fuentes et al. method
                 requires an expensive one-off pre-computation which was
                 infeasible for the computational power at our disposal.
                 In these cases, we theoretically obtain hashing maps
                 that follow Fuentes et al. idea.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Communications in Computer Algebra",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1000",
}

@Article{Bultan:2018:SCA,
  author =       "Tevfik Bultan",
  title =        "Side-Channel Analysis via Symbolic Execution and Model
                 Counting",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "4",
  pages =        "55--55",
  month =        oct,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3282517.3302416",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Sat Oct 19 18:11:10 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "An important problem in computer security is the
                 detection of side-channel vulnerabilities. Information
                 gained by observing nonfunctional properties of program
                 executions (i.e., sidechannels such as execution time
                 or memory usage) can enable attackers to infer secrets
                 that the program accesses (such as a password). In this
                 talk, I will discuss how symbolic execution, combined
                 with a model counting constraint solver, can be used
                 for quantifying side-channel leakage in Java programs.
                 I will also discuss automata-based model counting
                 techniques. We have implemented these techniques by
                 integrating our model counting constraint solver,
                 called Automata-Based model Counter (ABC), with the
                 symbolic execution tool Symbolic Path Finder (SPF).",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Canard:2018:CPK,
  author =       "S{\'e}bastien Canard and Viet Cuong Trinh",
  title =        "Certificateless Public Key Cryptography in the
                 Standard Model",
  journal =      j-FUND-INFO,
  volume =       "161",
  number =       "3",
  pages =        "219--248",
  month =        "????",
  year =         "2018",
  CODEN =        "FUMAAJ",
  DOI =          "https://doi.org/10.3233/FI-2018-1701",
  ISSN =         "0169-2968 (print), 1875-8681 (electronic)",
  ISSN-L =       "0169-2968",
  bibdate =      "Fri Sep 21 07:16:52 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/fundinfo2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Fundamenta Informaticae",
  journal-URL =  "http://content.iospress.com/journals/fundamenta-informaticae",
}

@Article{Canard:2018:NTC,
  author =       "S. Canard and D. H. Phan and D. Pointcheval and V. C.
                 Trinh",
  title =        "A new technique for compacting ciphertext in
                 multi-channel broadcast encryption and attribute-based
                 encryption",
  journal =      j-THEOR-COMP-SCI,
  volume =       "723",
  number =       "??",
  pages =        "51--72",
  day =          "2",
  month =        may,
  year =         "2018",
  CODEN =        "TCSCDI",
  DOI =          "https://doi.org/10.1016/j.tcs.2018.02.036",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Fri Mar 30 09:27:56 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2015.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0304397518301427",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{Cao:2018:CUP,
  author =       "Kaidi Cao and Jing Liao and Lu Yuan",
  title =        "{CariGANs}: unpaired photo-to-caricature translation",
  journal =      j-TOG,
  volume =       "37",
  number =       "6",
  pages =        "244:1--244:??",
  month =        nov,
  year =         "2018",
  CODEN =        "ATGRDF",
  DOI =          "https://doi.org/10.1145/3272127.3275046",
  ISSN =         "0730-0301 (print), 1557-7368 (electronic)",
  ISSN-L =       "0730-0301",
  bibdate =      "Tue Oct 22 12:28:14 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tog.bib",
  abstract =     "Facial caricature is an art form of drawing faces in
                 an exaggerated way to convey humor or sarcasm. In this
                 paper, we propose the first Generative Adversarial
                 Network (GAN) for unpaired photo-to-caricature
                 translation, which we call ``CariGANs''. It explicitly
                 models geometric exaggeration and appearance
                 stylization using two components: CariGeoGAN, which
                 only models the geometry-to-geometry transformation
                 from face photos to caricatures, and CariStyGAN, which
                 transfers the style appearance from caricatures to face
                 photos without any geometry deformation. In this way, a
                 difficult cross-domain translation problem is decoupled
                 into two easier tasks. The perceptual study shows that
                 caricatures generated by our CariGANs are closer to the
                 hand-drawn ones, and at the same time better persevere
                 the identity, compared to state-of-the-art methods.
                 Moreover, our CariGANs allow users to control the shape
                 exaggeration degree and change the color/texture style
                 by tuning the parameters or giving an example
                 caricature.",
  acknowledgement = ack-nhfb,
  articleno =    "244",
  fjournal =     "ACM Transactions on Graphics",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J778",
}

@Article{Cao:2018:EEG,
  author =       "Jin Cao and Maode Ma and Hui Li and Yulong Fu and
                 Xuefeng Liu",
  title =        "{EGHR}: Efficient group-based handover authentication
                 protocols for {mMTC} in {5G} wireless networks",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "102",
  number =       "??",
  pages =        "1--16",
  day =          "15",
  month =        jan,
  year =         "2018",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Fri Jan 12 10:10:20 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804517303776",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Cerf:2018:CSA,
  author =       "Vinton G. Cerf",
  title =        "{Cerf}'s up: Self-authenticating identifiers",
  journal =      j-CACM,
  volume =       "61",
  number =       "12",
  pages =        "5--5",
  month =        dec,
  year =         "2018",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/3289429",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Nov 26 10:11:32 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://cacm.acm.org/magazines/2018/12/232883/fulltext",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Chang:2018:DMU,
  author =       "Doohwang Chang and Ganapati Bhat and Umit Ogras and
                 Bertan Bakkaloglu and Sule Ozev",
  title =        "Detection Mechanisms for Unauthorized Wireless
                 Transmissions",
  journal =      j-TODAES,
  volume =       "23",
  number =       "6",
  pages =        "70:1--70:??",
  month =        dec,
  year =         "2018",
  CODEN =        "ATASFO",
  DOI =          "https://doi.org/10.1145/3241046",
  ISSN =         "1084-4309 (print), 1557-7309 (electronic)",
  ISSN-L =       "1084-4309",
  bibdate =      "Fri Mar 22 16:58:40 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/todaes.bib",
  abstract =     "With increasing diversity of supply chains from design
                 to delivery, there is an increasing risk that
                 unauthorized changes can be made within an IC. One of
                 the motivations for this type of change is to learn
                 important information (such as encryption keys,
                 spreading codes) from the hardware, and transmit this
                 information to a malicious party. To evade detection,
                 such unauthorized communication can be hidden within
                 legitimate bursts of transmit signal. In this article,
                 we present several signal processing techniques to
                 detect unauthorized transmissions which can be hidden
                 within the legitimate signal. We employ a scheme where
                 the legitimate transmission is configured to emit a
                 single sinusoidal waveform. We use time and spectral
                 domain analysis techniques to explore the transmit
                 spectrum. Since every transmission, no matter how low
                 the signal power is, must have a spectral signature, we
                 identify unauthorized transmission by eliminating the
                 desired signal from the spectrum after capture.
                 Experiment results show that when spread spectrum
                 techniques are used, the presence of an unauthorized
                 signal can be determined without the need for decoding
                 the malicious signal. The proposed detection techniques
                 need to be used as enhancements to the regular testing
                 and verification procedures if hardware security is a
                 concern.",
  acknowledgement = ack-nhfb,
  articleno =    "70",
  fjournal =     "ACM Transactions on Design Automation of Electronic
                 Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J776",
}

@Article{Chattaraj:2018:NTS,
  author =       "Durbadal Chattaraj and Monalisa Sarma and Ashok Kumar
                 Das",
  title =        "A new two-server authentication and key agreement
                 protocol for accessing secure cloud services",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "131",
  number =       "??",
  pages =        "144--164",
  day =          "11",
  month =        feb,
  year =         "2018",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Sat Feb 3 10:51:33 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S1389128617304255",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286/",
}

@Article{Chaudhry:2018:IRB,
  author =       "Shehzad Ashraf Chaudhry and Husnain Naqvi and Mohammad
                 Sabzinejad Farash and Taeshik Shon and Muhammad Sher",
  title =        "An improved and robust biometrics-based three factor
                 authentication scheme for multiserver environments",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "74",
  number =       "8",
  pages =        "3504--3520",
  month =        aug,
  year =         "2018",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-015-1601-y",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Thu Oct 10 15:31:14 MDT 2019",
  bibsource =    "http://link.springer.com/journal/11227/74/8;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Article{Chauhan:2018:BBA,
  author =       "Jagmohan Chauhan and Suranga Seneviratne and Yining Hu
                 and Archan Misra and Aruna Seneviratne and Youngki
                 Lee",
  title =        "Breathing-Based Authentication on Resource-Constrained
                 {IoT} Devices using Recurrent Neural Networks",
  journal =      j-COMPUTER,
  volume =       "51",
  number =       "5",
  pages =        "60--67",
  month =        may,
  year =         "2018",
  CODEN =        "CPTRB4",
  DOI =          "https://doi.org/10.1109/MC.2018.2381119",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Thu May 31 05:53:38 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computer2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.computer.org/csdl/mags/co/2018/05/mco2018050060-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
}

@Article{Chauhan:2018:PCD,
  author =       "Jagmohan Chauhan and Jathushan Rajasegaran and Suranga
                 Seneviratne and Archan Misra and Aruna Seneviratne and
                 Youngki Lee",
  title =        "Performance Characterization of Deep Learning Models
                 for Breathing-based Authentication on
                 Resource-Constrained Devices",
  journal =      j-IMWUT,
  volume =       "2",
  number =       "4",
  pages =        "1--24",
  month =        dec,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3287036",
  ISSN =         "2474-9567 (electronic)",
  bibdate =      "Thu Jan 23 12:37:06 MST 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/imwut.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3287036",
  abstract =     "Providing secure access to smart devices such as
                 smartphones, wearables and various other IoT devices is
                 becoming increasingly important, especially as these
                 devices store a range of sensitive personal
                 information. Breathing acoustics-based \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "158",
  fjournal =     "Proceedings of the ACM on Interactive, Mobile,
                 Wearable and Ubiquitous Technologies (IMWUT)",
  journal-URL =  "https://dl.acm.org/loi/imwut",
}

@Article{Checkoway:2018:WDL,
  author =       "Stephen Checkoway and Jacob Maskiewicz and Christina
                 Garman and Joshua Fried and Shaanan Cohney and Matthew
                 Green and Nadia Heninger and Ralf-Philipp Weinmann and
                 Eric Rescorla and Hovav Shacham",
  title =        "Where did {I} leave my keys?: lessons from the
                 {Juniper Dual EC} incident",
  journal =      j-CACM,
  volume =       "61",
  number =       "11",
  pages =        "148--155",
  month =        nov,
  year =         "2018",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/3266291",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Mon Oct 29 12:40:16 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "https://cacm.acm.org/magazines/2018/11/232227/fulltext",
  abstract =     "In December 2015, Juniper Networks announced multiple
                 security vulnerabilities stemming from unauthorized
                 code in ScreenOS, the operating system for their
                 NetScreen Virtual Private Network (VPN) routers. The
                 more sophisticated of these vulnerabilities was a
                 passive VPN decryption capability, enabled by a change
                 to one of the parameters used by the Dual Elliptic
                 Curve (EC) pseudorandom number generator. In this
                 paper, we described the results of a full independent
                 analysis of the ScreenOS randomness and VPN key
                 establishment protocol subsystems, which we carried out
                 in response to this incident. While Dual EC is known to
                 be insecure against an attacker who can choose the
                 elliptic curve parameters, Juniper had claimed in 2013
                 that ScreenOS included countermeasures against this
                 type of attack. We find that, contrary to Juniper's
                 public statements, the ScreenOS VPN implementation has
                 been vulnerable to passive exploitation by an attacker
                 who selects the Dual EC curve point since 2008. This
                 vulnerability arises due to flaws in Juniper's
                 countermeasures as well as a cluster of changes that
                 were all introduced concurrently with the inclusion of
                 Dual EC in a single 2008 release. We demonstrate the
                 vulnerability on a real NetScreen device by modifying
                 the firmware to install our own parameters, and we show
                 that it is possible to passively decrypt an individual
                 VPN session in isolation without observing any other
                 network traffic. This incident is an important example
                 of how guidelines for random number generation,
                 engineering, and validation can fail in practice.
                 Additionally, it casts further doubt on the
                 practicality of designing a safe ``exceptional access''
                 or ``key escrow'' scheme of the type contemplated by
                 law enforcement agencies in the United States and
                 elsewhere.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Chen:2018:ERS,
  author =       "Siyuan Chen and Peng Zeng and Kim-Kwang Raymond Choo
                 and Xiaolei Dong",
  title =        "Efficient Ring Signature and Group Signature Schemes
                 Based on $q$-ary Identification Protocols",
  journal =      j-COMP-J,
  volume =       "61",
  number =       "4",
  pages =        "545--560",
  day =          "1",
  month =        apr,
  year =         "2018",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxx112",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Fri Aug 3 11:54:19 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://academic.oup.com/comjnl/article/61/4/545/4656252",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Chen:2018:ESA,
  author =       "Yung-Chih Chen",
  title =        "Enhancements to {SAT} Attack: Speedup and Breaking
                 Cyclic Logic Encryption",
  journal =      j-TODAES,
  volume =       "23",
  number =       "4",
  pages =        "52:1--52:??",
  month =        jul,
  year =         "2018",
  CODEN =        "ATASFO",
  DOI =          "https://doi.org/10.1145/3190853",
  ISSN =         "1084-4309 (print), 1557-7309 (electronic)",
  ISSN-L =       "1084-4309",
  bibdate =      "Fri Mar 22 16:58:39 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/todaes.bib",
  abstract =     "Logic encryption is an IC protection technique for
                 preventing an IC design from overproduction and
                 unauthorized use. It hides a design's functionality by
                 inserting key gates and key inputs, such that a secret
                 key is required to activate the design and make it
                 function correctly. The security of a logic encryption
                 algorithm is evaluated according to the difficulty of
                 cracking the secret key. The state-of-the-art attack
                 method identifies a secret key with a series of
                 SAT-solving calls to prune all the incorrect keys.
                 Although it can break most of the existing logic
                 encryption algorithms within a few hours, we observe
                 that there exist two enhancements for increasing its
                 efficiency. First, we introduce a preprocess to
                 identify and eliminate redundant key inputs and
                 simplify SAT problems. Second, we present a key
                 checking process for increasing the pruned incorrect
                 keys in each SAT-solving iteration. We conducted the
                 experiments on a set of benchmark circuits encrypted by
                 six different logic encryption algorithms. The
                 simulation results show that the enhanced method can
                 successfully unlock 10 benchmark circuits which
                 originally could not be cracked within 1 hour. For all
                 the benchmark circuits, the average speedup is
                 approximately 2.2x in terms of simulation time.
                 Furthermore, a recent logic encryption method locks a
                 design by creating cyclic paths, which can invalidate
                 the SAT-based attack method. We analyze the impact of
                 cyclic paths and propose an enhancement to break the
                 cyclic logic encryption method.",
  acknowledgement = ack-nhfb,
  articleno =    "52",
  fjournal =     "ACM Transactions on Design Automation of Electronic
                 Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J776",
}

@Article{Chen:2018:RLF,
  author =       "Yu Chen and Baodong Qin and Haiyang Xue",
  title =        "Regular lossy functions and their applications in
                 leakage-resilient cryptography",
  journal =      j-THEOR-COMP-SCI,
  volume =       "739",
  number =       "??",
  pages =        "13--38",
  day =          "29",
  month =        aug,
  year =         "2018",
  CODEN =        "TCSCDI",
  DOI =          "https://doi.org/10.1016/j.tcs.2018.04.043",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Fri Jun 8 16:52:50 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2015.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0304397518302937",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{Chen:2018:SIA,
  author =       "Jiageng Chen and Chunhua Su and Kuo-Hui Yeh and Moti
                 Yung",
  title =        "Special Issue on Advanced Persistent Threat",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "79 (part 1)",
  number =       "??",
  pages =        "243--246",
  year =         "2018",
  CODEN =        "FGSEVI",
  DOI =          "https://doi.org/10.1016/j.future.2017.11.005",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Fri Nov 24 15:16:17 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167739X17324913",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
  keywords =     "APT; Behavior based detection; Data driven security;
                 Encrypted traffic; Zero-day vulnerability",
}

@Article{Chung:2018:ERN,
  author =       "Heewon Chung and Myungsun Kim",
  title =        "Encoding of Rational Numbers and Their Homomorphic
                 Computations for {FHE}-Based Applications",
  journal =      j-INT-J-FOUND-COMP-SCI,
  volume =       "29",
  number =       "6",
  pages =        "??--??",
  month =        sep,
  year =         "2018",
  DOI =          "https://doi.org/10.1142/S0129054118500193",
  ISSN =         "0129-0541",
  ISSN-L =       "0129-0541",
  bibdate =      "Mon Nov 12 14:26:47 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijfcs.bib",
  URL =          "https://www.worldscientific.com/doi/10.1142/S0129054118500193",
  abstract =     "This work addresses a basic problem of security
                 systems that operate on very sensitive information.
                 Specifically, we are interested in the problem of
                 privately handling numeric data represented by rational
                 numbers (e.g., medical records). Fully homomorphic
                 encryption (FHE) is one of the natural and powerful
                 tools for ensuring privacy of sensitive data, while
                 allowing complicated computations on the data. However,
                 because the native plaintext domain of known FHE
                 schemes is restricted to a set of quite small integers,
                 it is not easy to obtain efficient algorithms for
                 encrypted rational numbers in terms of space and
                 computation costs. For example, the na{\"\i}ve decimal
                 representation considerably restricts the choice of
                 parameters in employing an FHE scheme, particularly the
                 plaintext size. Our basic strategy is to alleviate this
                 inefficiency by using a different representation of
                 rational numbers instead of na{\"\i}ve expressions. In
                 this work we express rational numbers as continued
                 fractions. Because continued fractions enable us to
                 represent rational numbers as a sequence of integers,
                 we can use a plaintext space with a small size while
                 preserving the same quality of precision. However, this
                 encoding technique requires performing very complex
                 arithmetic operations, such as division and modular
                 reduction. Theoretically, FHE allows the evaluation of
                 any function, including modular reduction at encrypted
                 data, but it requires a Boolean circuit of very high
                 degree to be constructed. Hence, the primary
                 contribution of this work is developing an approach to
                 solve this efficiency problem using homomorphic
                 operations with small degrees.",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Foundations of Computer
                 Science (IJFCS)",
  journal-URL =  "http://www.worldscientific.com/loi/ijfcs",
}

@Article{Claxson:2018:SVE,
  author =       "Nick Claxson",
  title =        "Securing {VoIP}: encrypting today's digital telephony
                 systems",
  journal =      j-NETWORK-SECURITY,
  volume =       "2018",
  number =       "11",
  pages =        "11--13",
  month =        nov,
  year =         "2018",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Thu Sep 12 12:58:02 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485818301120",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Cohen:2018:WCC,
  author =       "Aloni Cohen and Justin Holmgren and Ryo Nishimaki and
                 Vinod Vaikuntanathan and Daniel Wichs",
  title =        "Watermarking Cryptographic Capabilities",
  journal =      j-SIAM-J-COMPUT,
  volume =       "47",
  number =       "6",
  pages =        "2157--2202",
  month =        "????",
  year =         "2018",
  CODEN =        "SMJCAT",
  DOI =          "https://doi.org/10.1137/18M1164834",
  ISSN =         "0097-5397 (print), 1095-7111 (electronic)",
  ISSN-L =       "0097-5397",
  bibdate =      "Wed Oct 9 17:50:55 MDT 2019",
  bibsource =    "http://epubs.siam.org/sam-bin/dbq/toclist/SICOMP/47/6;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/siamjcomput.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "SIAM Journal on Computing",
  journal-URL =  "http://epubs.siam.org/sicomp",
  onlinedate =   "January 2018",
}

@Article{Connolly:2018:FE,
  author =       "Aisling Connolly",
  title =        "Freedom of Encryption",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "1",
  pages =        "102--103",
  month =        jan # "\slash " # feb,
  year =         "2018",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 16 07:55:13 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/01/msp2018010102.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/security",
}

@Article{Cui:2018:ABC,
  author =       "Hui Cui and Robert H. Deng and Yingjiu Li",
  title =        "Attribute-based cloud storage with secure provenance
                 over encrypted data",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "79 (part 2)",
  number =       "??",
  pages =        "461--472",
  year =         "2018",
  CODEN =        "FGSEVI",
  DOI =          "https://doi.org/10.1016/j.future.2017.10.010",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Fri Nov 24 15:16:17 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167739X17322835",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
  keywords =     "Access control; Anonymity; Cloud storage;
                 Confidentiality; Revocation; Scalability; Secure
                 provenance; Traceability",
}

@Article{Dai:2018:OPC,
  author =       "Wei Dai and William Whyte and Zhenfei Zhang",
  title =        "Optimizing Polynomial Convolution for {NTRUEncrypt}",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "67",
  number =       "11",
  pages =        "1572--1583",
  month =        "????",
  year =         "2018",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2018.2809723",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Thu Oct 11 14:31:34 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  URL =          "https://ieeexplore.ieee.org/document/8303667/",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Daneshgar:2018:SSS,
  author =       "Amir Daneshgar and Fahimeh Mohebbipoor",
  title =        "A Secure Self-Synchronized Stream Cipher",
  journal =      j-COMP-J,
  volume =       "61",
  number =       "8",
  pages =        "1180--1201",
  day =          "1",
  month =        aug,
  year =         "2018",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxy053",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Fri Aug 3 11:54:57 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://academic.oup.com/comjnl/article/61/8/1180/5005423",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Darivandpour:2018:ESP,
  author =       "Javad Darivandpour and Mikhail J. Atallah",
  title =        "Efficient and secure pattern matching with wildcards
                 using lightweight cryptography",
  journal =      j-COMPUT-SECUR,
  volume =       "77",
  number =       "??",
  pages =        "666--674",
  month =        aug,
  year =         "2018",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:55 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481830021X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Delledonne:2018:CDA,
  author =       "Lorenzo Delledonne and Vittorio Zaccaria and Ruggero
                 Susella and Guido Bertoni and Filippo Melzani",
  title =        "{CASCA}: a Design Automation Approach for Designing
                 Hardware Countermeasures Against Side-Channel Attacks",
  journal =      j-TODAES,
  volume =       "23",
  number =       "6",
  pages =        "69:1--69:??",
  month =        dec,
  year =         "2018",
  CODEN =        "ATASFO",
  DOI =          "https://doi.org/10.1145/3241047",
  ISSN =         "1084-4309 (print), 1557-7309 (electronic)",
  ISSN-L =       "1084-4309",
  bibdate =      "Fri Mar 22 16:58:40 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/todaes.bib",
  abstract =     "Implementing a cryptographic circuit poses challenges
                 not always acknowledged in the backing mathematical
                 theory. One of them is the vulnerability against
                 side-channel attacks. A side-channel attack is a
                 procedure that uses information leaked by the circuit
                 through, for example, its own power consumption or
                 electromagnetic emissions, to derive sensitive data
                 (e.g, the secret key used for encryption). Nowadays, we
                 design circuitry to keep this sensitive information
                 from leaking (i.e., a countermeasure ), but the path
                 from specification down to implementation is far from
                 being fully automatic. As we know, manual refinement
                 steps can be error prone and the sheer potential of
                 these errors can be devastating in a scenario such as
                 the one we are dealing with. In this article, we
                 investigate whether a single embedded domain specific
                 language (EDSL) can, at the same time, help us in
                 specifying and enforcing the functionality of the
                 circuit as well as its protection against side-channel
                 attacks. The EDSL is a fundamental block of an original
                 design flow (named Countermeasure Against Side-Channel
                 Attacks, i.e., CASCA) whose aim is to complement an
                 existing industrial scenario and to provide the
                 necessary guarantee that a secure primitive is not
                 vulnerable up to a first-order attack. As a practical
                 case study, we will show how we applied the proposed
                 tools to ensure both functional and extra-functional
                 correctness of a composite-field Advanced Encryption
                 Standard (AES) S-Box. To ensure the reproducibility of
                 this research, this article is accompanied by an open
                 source release of the EDSL$^1$ that contains the
                 presented S-Box implementation and an additional
                 3-Shares threshold implementation of the Keccak $ \chi
                 $ function [7].",
  acknowledgement = ack-nhfb,
  articleno =    "69",
  fjournal =     "ACM Transactions on Design Automation of Electronic
                 Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J776",
}

@Article{Deng:2018:SFE,
  author =       "Lih-Yuan Deng and Jyh-Jen Horng Shiau and Henry
                 Horng-Shing Lu and Dale Bowman",
  title =        "{Secure and Fast Encryption (SAFE)} with Classical
                 Random Number Generators",
  journal =      j-TOMS,
  volume =       "44",
  number =       "4",
  pages =        "45:1--45:17",
  month =        aug,
  year =         "2018",
  CODEN =        "ACMSCU",
  DOI =          "https://doi.org/10.1145/3212673",
  ISSN =         "0098-3500 (print), 1557-7295 (electronic)",
  ISSN-L =       "0098-3500",
  bibdate =      "Fri Oct 5 11:23:13 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib;
                 https://www.math.utah.edu/pub/tex/bib/toms.bib",
  URL =          "https://dl.acm.org/citation.cfm?id=3212673",
  abstract =     "Pseudo-random number generators (PRNGs) play an
                 important role in both areas of computer simulation and
                 computer security. Currently, there appears to be a
                 huge divide between the types of PRNGs used in these
                 two areas. For PRNGs in computer security applications,
                 the security concern is extremely important. For PRNGs
                 in computer simulation applications, the properties of
                 high-dimensional equi-distribution, efficiency, long
                 period-length, and portability are important. In recent
                 years, there have been many PRNGs proposed in the area
                 of computer simulation satisfying these nice
                 properties. However, most of them are linear
                 generators, thus sharing the same weakness in
                 predictability. The major aim of this article is to
                 propose a general class of secure generators, called
                 SAFE (secure and fast encryption) generators, by
                 properly ``mixing'' two baseline generators with the
                 aforementioned properties to obtain a secure generator
                 that would inherit these nice properties. Specifically,
                 we propose applying a general mutual-shuffling method
                 to certain linear generators, such as the currently
                 most popular MT19937 generator and large-order multiple
                 recursive generators, as well as outputting certain
                 nonlinear transformations of the generated variates to
                 construct secure PRNGS.",
  acknowledgement = ack-nhfb,
  articleno =    "45",
  fjournal =     "ACM Transactions on Mathematical Software (TOMS)",
  journal-URL =  "http://dl.acm.org/pub.cfm?id=J782",
}

@Article{Dickens:2018:SCI,
  author =       "Bernard {Dickens III} and Haryadi S. Gunawi and Ariel
                 J. Feldman and Henry Hoffmann",
  title =        "{StrongBox}: Confidentiality, Integrity, and
                 Performance using Stream Ciphers for Full Drive
                 Encryption",
  journal =      j-SIGPLAN,
  volume =       "53",
  number =       "2",
  pages =        "708--721",
  month =        feb,
  year =         "2018",
  CODEN =        "SINODQ",
  DOI =          "https://doi.org/10.1145/3296957.3173183",
  ISSN =         "0362-1340 (print), 1523-2867 (print), 1558-1160
                 (electronic)",
  ISSN-L =       "0362-1340",
  bibdate =      "Wed Oct 16 14:12:56 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigplan2010.bib",
  abstract =     "Full-drive encryption (FDE) is especially important
                 for mobile devices because they contain large
                 quantities of sensitive data yet are easily lost or
                 stolen. Unfortunately, the standard approach to FDE-the
                 AES block cipher in XTS mode-is 3--5$ \times $ slower
                 than unencrypted storage. Authenticated encryption
                 based on stream ciphers is already used as a faster
                 alternative to AES in other contexts, such as HTTPS,
                 but the conventional wisdom is that stream ciphers are
                 unsuitable for FDE. Used naively in drive encryption,
                 stream ciphers are vulnerable to attacks, and
                 mitigating these attacks with on-drive metadata is
                 generally believed to ruin performance. In this paper,
                 we argue that recent developments in mobile hardware
                 invalidate this assumption, making it possible to use
                 fast stream ciphers for FDE. Modern mobile devices
                 employ solid-state storage with Flash Translation
                 Layers (FTL), which operate similarly to Log-structured
                 File Systems (LFS). They also include trusted hardware
                 such as Trusted Execution Environments (TEEs) and
                 secure storage areas. Leveraging these two trends, we
                 propose StrongBox, a stream cipher-based FDE layer that
                 is a drop-in replacement for dm-crypt, the standard
                 Linux FDE module based on AES-XTS. StrongBox introduces
                 a system design and on-drive data structures that
                 exploit LFS's lack of overwrites to avoid costly
                 rekeying and a counter stored in trusted hardware to
                 protect against attacks. We implement StrongBox on an
                 ARM big.LITTLE mobile processor and test its
                 performance under multiple popular production LFSes. We
                 find that StrongBox improves read performance by as
                 much as 2.36$ \times $ (1.72$ \times $ on average)
                 while offering stronger integrity guarantees.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGPLAN Notices",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J706",
  remark =       "ASPLOS '18 proceedings.",
}

@Article{Ding:2018:NPH,
  author =       "Kaimeng Ding and Shiping Chen and Fan Meng",
  title =        "A Novel Perceptual Hash Algorithm for Multispectral
                 Image Authentication",
  journal =      j-ALGORITHMS-BASEL,
  volume =       "11",
  number =       "1",
  month =        jan,
  year =         "2018",
  CODEN =        "ALGOCH",
  DOI =          "https://doi.org/10.3390/a11010006",
  ISSN =         "1999-4893 (electronic)",
  ISSN-L =       "1999-4893",
  bibdate =      "Fri May 3 13:50:14 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/algorithms.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  URL =          "https://www.mdpi.com/1999-4893/11/1/6",
  acknowledgement = ack-nhfb,
  articleno =    "6",
  fjournal =     "Algorithms (Basel)",
  journal-URL =  "https://www.mdpi.com/journal/algorithms",
  ORCID-numbers = "Kaimeng Ding/0000-0002-1339-813X; Shiping
                 Chen/0000-0002-4603-0024; Fan
                 Meng/0000-0002-3419-7652",
  pagecount =    "??",
  pubdates =     "Received: 21 December 2017 / Revised: 7 January 2018 /
                 Accepted: 8 January 2018 / Published: 14 January 2018",
}

@Article{Djaziri-Larbi:2018:WDA,
  author =       "Sonia Djaziri-Larbi and Ga{\"e}l Mah{\'e} and Imen
                 Mezghani and Monia Turki and M{\'e}riem Ja{\"\i}dane",
  title =        "Watermark-Driven Acoustic Echo Cancellation",
  journal =      j-IEEE-ACM-TASLP,
  volume =       "26",
  number =       "2",
  pages =        "367--378",
  month =        "????",
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/TASLP.2017.2778150",
  ISSN =         "2329-9290",
  ISSN-L =       "2329-9290",
  bibdate =      "Sat Jan 20 08:35:33 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeeacmtaslp.bib",
  URL =          "http://ieeexplore.ieee.org/document/8122007/",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6570655",
}

@Article{Dong:2018:SSM,
  author =       "Yao Dong and Ana Milanova and Julian Dolby",
  title =        "{SecureMR}: secure mapreduce using homomorphic
                 encryption and program partitioning",
  journal =      j-SIGPLAN,
  volume =       "53",
  number =       "1",
  pages =        "389--390",
  month =        jan,
  year =         "2018",
  CODEN =        "SINODQ",
  DOI =          "https://doi.org/10.1145/3200691.3178520",
  ISSN =         "0362-1340 (print), 1523-2867 (print), 1558-1160
                 (electronic)",
  ISSN-L =       "0362-1340",
  bibdate =      "Wed Oct 16 14:12:56 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigplan2010.bib",
  abstract =     "In cloud computing customers upload data and
                 computation to cloud providers. As they cede their data
                 to the cloud provider, they may cede data
                 confidentiality. We develop SecureMR, a system that
                 analyzes and transforms MapReduce programs to operate
                 over encrypted data. SecureMR makes use of partially
                 homomorphic encryption and a trusted client. We
                 evaluate SecureMR on a set of MapReduce benchmarks.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGPLAN Notices",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J706",
  remark =       "PPoPP '18 proceedings.",
}

@Article{Dou:2018:OHR,
  author =       "Yi Dou and Henry C B Chan and Man Ho Au",
  title =        "Order-Hiding Range Query over Encrypted Data without
                 Search Pattern Leakage",
  journal =      j-COMP-J,
  volume =       "61",
  number =       "12",
  pages =        "1806--1824",
  day =          "1",
  month =        dec,
  year =         "2018",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxy075",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Nov 27 19:24:38 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://academic.oup.com/comjnl/article/61/12/1806/5065094",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@InProceedings{Drucker:2018:FMB,
  author =       "Nir Drucker and Shay Gueron and Vlad Krasnov",
  title =        "Fast multiplication of binary polynomials with the
                 forthcoming vectorized {VPCLMULQDQ} instruction",
  crossref =     "Tenca:2018:PIS",
  pages =        "115--119",
  year =         "2018",
  DOI =          "https://doi.org/10.1109/ARITH.2018.8464777",
  bibdate =      "Fri Jan 31 08:05:31 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/fparith.bib",
  abstract =     "Polynomial multiplication over binary fields $ \mathbb
                 {F}_{2^n} $ is a common primitive, used for example by
                 current cryptosystems such as AES-GCM (with $ n =
                 128$). It also turns out to be a primitive for other
                 cryptosystems, that are being designed for the Post
                 Quantum era, with values n 128. Examples from the
                 recent submissions to the NIST Post-Quantum
                 Cryptography project, are BIKE, LEDAKem, and GeMSS,
                 where the performance of the polynomial
                 multiplications, is significant. Therefore, efficient
                 polynomial multiplication over $ \mathbb {F}_{2^n}$,
                 with large $n$, is a significant emerging optimization
                 target. Anticipating future applications, Intel has
                 recently announced that its future architecture
                 (codename Ice Lake) will introduce a new vectorized way
                 to use the current VPCLMULQDQ instruction. In this
                 paper, we demonstrate how to use this instruction for
                 accelerating polynomial multiplication. Our analysis
                 shows a prediction for at least $ 2 \times $ speedup
                 for multiplications with polynomials of degree 512 or
                 more.",
  acknowledgement = ack-nhfb,
  keywords =     "Acceleration; AES-GCM; ARITH-25; BIKE; binary
                 field-mathbbF2n; Computer architecture; Cryptography;
                 cryptosystems; fast binary polynomial multiplication;
                 fast multiplication; GeMSS; ice lake; LEDAKem; NIST;
                 NIST Post-Quantum Cryptography project; optimisation;
                 Optimization; optimization target; polynomials; post
                 quantum cryptography; quantum cryptography; Registers;
                 vectorized VPCLMULQDQ instruction; Web services",
}

@Article{Dwivedi:2018:DLR,
  author =       "Ashutosh Dhar Dwivedi and Pawel Morawiecki and Rajani
                 Singh and Shalini Dhar",
  title =        "Differential-linear and related key cryptanalysis of
                 round-reduced scream",
  journal =      j-INFO-PROC-LETT,
  volume =       "136",
  number =       "??",
  pages =        "5--8",
  month =        aug,
  year =         "2018",
  CODEN =        "IFPLAT",
  DOI =          "https://doi.org/10.1016/j.ipl.2018.03.010",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Fri May 18 16:36:27 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019018300656",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Dziembowski:2018:NMC,
  author =       "Stefan Dziembowski and Krzysztof Pietrzak and Daniel
                 Wichs",
  title =        "Non-Malleable Codes",
  journal =      j-J-ACM,
  volume =       "65",
  number =       "4",
  pages =        "20:1--20:??",
  month =        aug,
  year =         "2018",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/3178432",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Thu Nov 29 14:39:20 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We introduce the notion of ``non-malleable codes''
                 which relaxes the notion of error correction and error
                 detection. Informally, a code is non-malleable if the
                 message contained in a modified codeword is either the
                 original message, or a completely unrelated value. In
                 contrast to error correction and error detection,
                 non-malleability can be achieved for very rich classes
                 of modifications. We construct an efficient code that
                 is non-malleable with respect to modifications that
                 affect each bit of the codeword arbitrarily (i.e.,
                 leave it untouched, flip it, or set it to either 0 or
                 1), but independently of the value of the other bits of
                 the codeword. Using the probabilistic method, we also
                 show a very strong and general statement: there exists
                 a non-malleable code for every ``small enough'' family
                 F of functions via which codewords can be modified.
                 Although this probabilistic method argument does not
                 directly yield efficient constructions, it gives us
                 efficient non-malleable codes in the random-oracle
                 model for very general classes of tampering
                 functions-e.g., functions where every bit in the
                 tampered codeword can depend arbitrarily on any 99\% of
                 the bits in the original codeword. As an application of
                 non-malleable codes, we show that they provide an
                 elegant algorithmic solution to the task of protecting
                 functionalities implemented in hardware (e.g.,
                 signature cards) against ``tampering attacks.'' In such
                 attacks, the secret state of a physical system is
                 tampered, in the hopes that future interaction with the
                 modified system will reveal some secret information.
                 This problem was previously studied in the work of
                 Gennaro et al. in 2004 under the name ``algorithmic
                 tamper proof security'' (ATP). We show that
                 non-malleable codes can be used to achieve important
                 improvements over the prior work. In particular, we
                 show that any functionality can be made secure against
                 a large class of tampering attacks, simply by encoding
                 the secret state with a non-malleable code while it is
                 stored in memory.",
  acknowledgement = ack-nhfb,
  articleno =    "20",
  fjournal =     "Journal of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J401",
  remark =       "Distributed Computing, Cryptography, Distributed
                 Computing, Cryptography, Coding Theory, Automata
                 Theory, Complexity Theory, Programming Languages,
                 Algorithms, Invited Paper Foreword and Databases.",
}

@Article{Ehatisham-ul-Haq:2018:CAS,
  author =       "Muhammad Ehatisham-ul-Haq and Muhammad Awais Azam and
                 Usman Naeem and Yasar Amin and Jonathan Loo",
  title =        "Continuous authentication of smartphone users based on
                 activity pattern recognition using passive mobile
                 sensing",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "109",
  number =       "??",
  pages =        "24--35",
  day =          "1",
  month =        may,
  year =         "2018",
  CODEN =        "JNCAF3",
  DOI =          "https://doi.org/10.1016/j.jnca.2018.02.020",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Sun May 27 08:10:14 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804518300717",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@InProceedings{Emmart:2018:FME,
  author =       "Niall Emmart and Fangyu Zhengt and Charles Weems",
  title =        "Faster Modular Exponentiation Using Double Precision
                 Floating Point Arithmetic on the {GPU}",
  crossref =     "Tenca:2018:PIS",
  pages =        "130--137",
  year =         "2018",
  DOI =          "https://doi.org/10.1109/ARITH.2018.8464792",
  bibdate =      "Fri Jan 31 08:05:31 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/fparith.bib",
  abstract =     "This paper presents a new approach to integer multiple
                 precision (MP) modular exponentiation, using
                 double-precision floating point (DPF) operations, that
                 is suitable for GPU implementation. We show speedups
                 ranging from 20\% to 34\% over the best prior GPU times
                 for sizes corresponding to common RSA cryptographic
                 operations (2048 to 4096 bits). Three techniques are
                 described. First, by adding $ 2^{104} $ to the high
                 half of the product, and $ 2^{52} $ to the low half, we
                 set the implicit leading 1 in the DPF mantissa so that
                 the full 52 explicit bits are available for each half
                 of the 104-bit products of samples. Second, the DPF
                 values are cast bitwise to 64-bit integers for adding
                 the column sums to get the MP result. Normally the cast
                 would require masking off the exponents, but because
                 they are constant, we can include them in the column
                 sums and correct just once for their total. Third, by
                 initializing the column sums with the appropriate
                 negative value to compensate for the exponent sums, no
                 corrective subtraction is needed. Our implementation on
                 an NVIDIA GTX Titan Black GPU achieves between 132.5K
                 and 161.9K modular exponentiations per second of size
                 1024 bits, with latencies ranging from 21.7 ms to 17.8
                 ms, making it practical for online RSA applications.
                 Proportional results are shown for 1536 and 2048 bits.
                 The implementation is so efficient that its maximum
                 sustained performance is actually bounded by the
                 thermal limit of the GPU.",
  acknowledgement = ack-nhfb,
  keywords =     "appropriate negative value; ARITH-25; column sums;
                 common RSA cryptographic operations; Computer
                 architecture; cryptography; Cryptography; double
                 precision floating point arithmetic; DPF mantissa;
                 exponent sum compensation; faster modular
                 exponentiation; floating point arithmetic;
                 Floating-point arithmetic; Graphics processing units;
                 graphics processing units; Hardware; integer multiple
                 precision modular exponentiation; multiple precision
                 modular exponentiation; NVIDIA GTX Titan Black GPU;
                 online RSA applications; parallel architectures; time
                 17.8 ms to 21.7 ms; word length 1024.0 bit; word length
                 104 bit; word length 1536.0 bit; word length 2048 bit
                 to 4096 bit; word length 64 bit",
}

@Article{Espitau:2018:LAF,
  author =       "Thomas Espitau and Pierre-Alain Fouque and Beno{\^\i}t
                 G{\'e}rard and Mehdi Tibouchi",
  title =        "Loop-Abort Faults on Lattice-Based Signature Schemes
                 and Key Exchange Protocols",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "67",
  number =       "11",
  pages =        "1535--1549",
  month =        nov,
  year =         "2018",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2018.2833119",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Fri Mar 15 08:10:14 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  URL =          "https://ieeexplore.ieee.org/document/8354897/",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Fahd:2018:CPA,
  author =       "Shah Fahd and Mehreen Afzal and Haider Abbas and
                 Waseem Iqbal and Salman Waheed",
  title =        "Correlation power analysis of modes of encryption in
                 {AES} and its countermeasures",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "83",
  number =       "??",
  pages =        "496--509",
  month =        jun,
  year =         "2018",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Thu Mar 15 17:42:39 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167739X17311822",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Fan:2018:MBP,
  author =       "Jingyuan Fan and Chaowen Guan and Kui Ren and Chunming
                 Qiao",
  title =        "Middlebox-Based Packet-Level Redundancy Elimination
                 Over Encrypted Network Traffic",
  journal =      j-IEEE-TRANS-NETWORKING,
  volume =       "26",
  number =       "4",
  pages =        "1742--1753",
  month =        aug,
  year =         "2018",
  CODEN =        "IEANEP",
  DOI =          "https://doi.org/10.1109/TNET.2018.2846791",
  ISSN =         "1063-6692 (print), 1558-2566 (electronic)",
  ISSN-L =       "1063-6692",
  bibdate =      "Thu Oct 18 05:31:02 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
  abstract =     "To eliminate redundant transfers over WAN links and
                 improve network efficiency, middleboxes have been
                 deployed at ingress/egress. These middleboxes can
                 operate on individual packets and are application layer
                 protocol transparent. They can identify and remove
                 duplicated byte strings on the fly. However, with the
                 increasing use of HTTPS, current redundancy elimination
                 RE solution can no longer work without violating
                 end-to-end privacy. In this paper, we present RE over
                 encrypted traffic REET, the first middlebox-based
                 system that supports both intra-user and inter-user
                 packet-level RE directly over encrypted traffic. REET
                 realizes this by using a novel protocol with limited
                 overhead and protects end users from honest-but-curious
                 middleboxes. We implement REET and show its performance
                 for both end users and middleboxes using several
                 hundred gigabytes of network traffic traces collected
                 from a large U.S. university.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE\slash ACM Transactions on Networking",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J771",
}

@Article{Fanti:2018:DLC,
  author =       "Giulia Fanti and Shaileshh Bojja Venkatakrishnan and
                 Surya Bakshi and Bradley Denby and Shruti Bhargava and
                 Andrew Miller and Pramod Viswanath",
  title =        "{Dandelion++}: Lightweight Cryptocurrency Networking
                 with Formal Anonymity Guarantees",
  journal =      j-SIGMETRICS,
  volume =       "46",
  number =       "1",
  pages =        "5--7",
  month =        jun,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3292040.3219620",
  ISSN =         "0163-5999 (print), 1557-9484 (electronic)",
  ISSN-L =       "0163-5999",
  bibdate =      "Fri Jan 18 06:03:57 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigmetrics.bib",
  abstract =     "Recent work has demonstrated significant anonymity
                 vulnerabilities in Bitcoin's networking stack. In
                 particular, the current mechanism for broadcasting
                 Bitcoin transactions allows third-party observers to
                 link transactions to the IP addresses that originated
                 them. This lays the groundwork for low-cost,
                 large-scale deanonymization attacks. In this work, we
                 present Dandelion++, a first-principles defense against
                 large-scale deanonymization attacks with near-optimal
                 information-theoretic guarantees. Dandelion++ builds
                 upon a recent proposal called Dandelion that exhibited
                 similar goals. However, in this paper, we highlight
                 some simplifying assumptions made in Dandelion, and
                 show how they can lead to serious deanonymization
                 attacks when violated. In contrast, Dandelion++ defends
                 against stronger adversaries that are allowed to
                 disobey protocol. Dandleion++ is lightweight, scalable,
                 and completely interoperable with the existing Bitcoin
                 network.We evaluate it through experiments on Bitcoin's
                 mainnet (i.e., the live Bitcoin network) to demonstrate
                 its interoperability and low broadcast latency
                 overhead.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGMETRICS Performance Evaluation Review",
  journal-URL =  "http://portal.acm.org/toc.cfm?id=J618",
}

@Article{Farwa:2018:FAI,
  author =       "Shabieh Farwa and Nazeer Muhammad and Nargis Bibi and
                 Sajjad A. Haider and Syed R. Naqvi and Sheraz Anjum",
  title =        "{Fresnelet} approach for image encryption in the
                 algebraic frame",
  journal =      j-APPL-MATH-COMP,
  volume =       "334",
  number =       "??",
  pages =        "343--355",
  day =          "1",
  month =        oct,
  year =         "2018",
  CODEN =        "AMHCBQ",
  DOI =          "https://doi.org/10.1016/j.amc.2018.03.105",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jun 2 17:40:19 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/applmathcomput2015.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  note =         "See retraction notice \cite{Farwa:2019:RNF}.",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0096300318302868",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Faz-Hernandez:2018:FSI,
  author =       "Armando Faz-Hern{\'a}ndez and Julio L{\'o}pez and
                 Eduardo Ochoa-Jim{\'e}nez and Francisco
                 Rodr{\'\i}guez-Henr{\'\i}quez",
  title =        "A Faster Software Implementation of the Supersingular
                 Isogeny {Diffie--Hellman} Key Exchange Protocol",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "67",
  number =       "11",
  pages =        "1622--1636",
  month =        nov,
  year =         "2018",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2017.2771535",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Fri Mar 15 08:10:14 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  URL =          "https://ieeexplore.ieee.org/document/8100879/",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Feng:2018:ABB,
  author =       "Qi Feng and Debiao He and Sherali Zeadally and Huaqun
                 Wang",
  title =        "Anonymous biometrics-based authentication scheme with
                 key distribution for mobile multi-server environment",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "84",
  number =       "??",
  pages =        "239--251",
  month =        jul,
  year =         "2018",
  CODEN =        "FGSEVI",
  DOI =          "https://doi.org/10.1016/j.future.2017.07.040",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Mon Apr 16 14:45:08 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167739X17309020",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Feng:2018:ALA,
  author =       "Wei Feng and Yu Qin and Shijun Zhao and Dengguo Feng",
  title =        "{AAoT}: Lightweight attestation and authentication of
                 low-resource things in {IoT} and {CPS}",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "134",
  number =       "??",
  pages =        "167--182",
  day =          "7",
  month =        apr,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1016/j.comnet.2018.01.039",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Sat Mar 17 13:11:52 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1389128618300471",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286/",
}

@Article{Ferrag:2018:SCN,
  author =       "Mohamed Amine Ferrag and Leandros Maglaras and
                 Antonios Argyriou and Dimitrios Kosmanos and Helge
                 Janicke",
  title =        "Security for {4G} and {5G} cellular networks: a survey
                 of existing authentication and privacy-preserving
                 schemes",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "101",
  number =       "??",
  pages =        "55--82",
  day =          "1",
  month =        jan,
  year =         "2018",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Fri Jan 12 10:10:20 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804517303521",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Fidler:2018:CCN,
  author =       "Bradley Fidler",
  title =        "Cryptography, Capitalism, and National Security",
  journal =      j-IEEE-ANN-HIST-COMPUT,
  volume =       "40",
  number =       "4",
  pages =        "80--84",
  month =        oct # "\slash " # dec,
  year =         "2018",
  CODEN =        "IAHCEX",
  DOI =          "https://doi.org/10.1109/MAHC.2018.2876099",
  ISSN =         "1058-6180 (print), 1934-1547 (electronic)",
  ISSN-L =       "1058-6180",
  bibdate =      "Thu Jan 24 10:01:33 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeeannhistcomput.bib",
  URL =          "https://ieeexplore.ieee.org/document/8620680/",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Annals of the History of Computing",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=85",
}

@Article{Fu:2018:LUA,
  author =       "Xingbing Fu and Xuyun Nie and Ting Wu and Fagen Li",
  title =        "Large universe attribute based access control with
                 efficient decryption in cloud storage system",
  journal =      j-J-SYST-SOFTW,
  volume =       "135",
  number =       "??",
  pages =        "157--164",
  month =        jan,
  year =         "2018",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Mon Nov 13 10:11:01 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0164121217302510",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Fugkeaw:2018:SSA,
  author =       "Somchart Fugkeaw and Hiroyuki Sato",
  title =        "Scalable and secure access control policy update for
                 outsourced big data",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "79 (part 1)",
  number =       "??",
  pages =        "364--373",
  year =         "2018",
  CODEN =        "FGSEVI",
  DOI =          "https://doi.org/10.1016/j.future.2017.06.014",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Fri Nov 24 15:16:17 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167739X17312426",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
  keywords =     "Cloud computing; CP-ABE; Data access control; Policy
                 update; Proxy re-encryption",
}

@Article{Gao:2018:PRR,
  author =       "Xinwei Gao and Jintai Ding and Lin Li and Jiqiang
                 Liu",
  title =        "Practical Randomized {RLWE}-Based Key Exchange Against
                 Signal Leakage Attack",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "67",
  number =       "11",
  pages =        "1584--1593",
  month =        nov,
  year =         "2018",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2018.2808527",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Fri Mar 15 08:10:14 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  URL =          "https://ieeexplore.ieee.org/document/8300634/",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Geetha:2018:OVC,
  author =       "P. Geetha and V. S. Jayanthi and A. N. Jayanthi",
  title =        "Optimal visual cryptographic scheme with multiple
                 share creation for multimedia applications",
  journal =      j-COMPUT-SECUR,
  volume =       "78",
  number =       "??",
  pages =        "301--320",
  month =        sep,
  year =         "2018",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:57 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404818308241",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gerault:2018:RAR,
  author =       "David G{\'e}rault and Pascal Lafourcade and Marine
                 Minier and Christine Solnon",
  title =        "Revisiting {AES} related-key differential attacks with
                 constraint programming",
  journal =      j-INFO-PROC-LETT,
  volume =       "139",
  number =       "??",
  pages =        "18--23",
  month =        nov,
  year =         "2018",
  CODEN =        "IFPLAT",
  DOI =          "https://doi.org/10.1016/j.ipl.2018.07.001",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Fri Sep 14 08:04:51 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S002001901830139X",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Gonzalez-Serrano:2018:SML,
  author =       "Francisco-Javier Gonz{\'a}lez-Serrano and Adri{\'a}n
                 Amor-Mart{\'\i}n and Jorge Casamay{\'o}n-Ant{\'o}n",
  title =        "Supervised machine learning using encrypted training
                 data",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "4",
  pages =        "365--377",
  month =        aug,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0381-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Jul 25 08:53:56 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0381-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Gope:2018:LPP,
  author =       "Prosanta Gope and Ruhul Amin and S. K. Hafizul Islam
                 and Neeraj Kumar and Vinod Kumar Bhalla",
  title =        "Lightweight and privacy-preserving {RFID}
                 authentication scheme for distributed {IoT}
                 infrastructure with secure localization services for
                 smart city environment",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "83",
  number =       "??",
  pages =        "629--637",
  month =        jun,
  year =         "2018",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Thu Mar 15 17:42:39 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167739X17313043",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Gunleifsen:2018:TCP,
  author =       "H{\aa}kon Gunleifsen and Vasileios Gkioulos and Thomas
                 Kemmerich",
  title =        "A Tiered Control Plane Model for Service Function
                 Chaining Isolation",
  journal =      j-FUTURE-INTERNET,
  volume =       "10",
  number =       "6",
  pages =        "46",
  day =          "04",
  month =        jun,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi10060046",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:51:00 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/future-internet.bib;
                 https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  URL =          "https://www.mdpi.com/1999-5903/10/6/46",
  abstract =     "This article presents an architecture for encryption
                 automation in interconnected Network Function
                 Virtualization (NFV) domains. Current NFV
                 implementations are designed for deployment within
                 trusted domains, where overlay networks with static
                 trusted links are utilized for enabling network
                 security. Nevertheless, within a Service Function Chain
                 (SFC), Virtual Network Function (VNF) flows cannot be
                 isolated and end-to-end encrypted because each VNF
                 requires direct access to the overall SFC data-flow.
                 This restricts both end-users and Service Providers
                 from enabling end-to-end security, and in extended VNF
                 isolation within the SFC data traffic. Encrypting data
                 flows on a per-flow basis results in an extensive
                 amount of secure tunnels, which cannot scale
                 efficiently in manual configurations. Additionally,
                 creating secure data plane tunnels between NFV
                 providers requires secure exchange of key parameters,
                 and the establishment of an east--west control plane
                 protocol. In this article, we present an architecture
                 focusing on these two problems, investigating how
                 overlay networks can be created, isolated, and secured
                 dynamically. Accordingly, we propose an architecture
                 for automated establishment of encrypted tunnels in
                 NFV, which introduces a novel, tiered east--west
                 communication channel between network controllers in a
                 multi-domain environment.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Software Defined Networking (SDN) and
                 Network Function Virtualization (NFV).",
}

@Article{Guo:2018:AFH,
  author =       "Qingwen Guo and Qiong Huang and Guomin Yang",
  title =        "Authorized Function Homomorphic Signature",
  journal =      j-COMP-J,
  volume =       "61",
  number =       "12",
  pages =        "1897--1908",
  day =          "1",
  month =        dec,
  year =         "2018",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxy114",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Nov 27 19:24:38 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://academic.oup.com/comjnl/article/61/12/1897/5158246",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Guo:2018:KAA,
  author =       "Cheng Guo and Ningqi Luo and Md Zakirul Alam Bhuiyan
                 and Yingmo Jie and Yuanfang Chen and Bin Feng and
                 Muhammad Alam",
  title =        "Key-aggregate authentication cryptosystem for data
                 sharing in dynamic cloud storage",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "84",
  number =       "??",
  pages =        "190--199",
  month =        jul,
  year =         "2018",
  CODEN =        "FGSEVI",
  DOI =          "https://doi.org/10.1016/j.future.2017.07.038",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Mon Apr 16 14:45:08 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167739X17307926",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Guo:2018:PSC,
  author =       "Yuyan Guo and Jiguo Li and Yang Lu and Yichen Zhang
                 and Futai Zhang",
  title =        "Provably secure certificate-based encryption with
                 leakage resilience",
  journal =      j-THEOR-COMP-SCI,
  volume =       "711",
  number =       "??",
  pages =        "1--10",
  day =          "8",
  month =        feb,
  year =         "2018",
  CODEN =        "TCSCDI",
  DOI =          "https://doi.org/10.1016/j.tcs.2017.10.020",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Thu Feb 8 13:49:55 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2015.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S030439751730748X",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{Guo:2018:SMK,
  author =       "Ziqing Guo and Hua Zhang and Caijun Sun and Qiaoyan
                 Wen and Wenmin Li",
  title =        "Secure multi-keyword ranked search over encrypted
                 cloud data for multiple data owners",
  journal =      j-J-SYST-SOFTW,
  volume =       "137",
  number =       "??",
  pages =        "380--395",
  month =        mar,
  year =         "2018",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Mon Feb 5 17:47:04 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0164121217303011",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Guo:2018:WBS,
  author =       "Jinyi Guo and Wei Ren and Yi Ren and Tianqing Zhu",
  title =        "A Watermark-Based In-Situ Access Control Model for
                 Image Big Data",
  journal =      j-FUTURE-INTERNET,
  volume =       "10",
  number =       "8",
  pages =        "69",
  day =          "29",
  month =        jul,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi10080069",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:51:01 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/10/8/69",
  abstract =     "When large images are used for big data analysis, they
                 impose new challenges in protecting image privacy. For
                 example, a geographic image may consist of several
                 sensitive areas or layers. When it is uploaded into
                 servers, the image will be accessed by diverse
                 subjects. Traditional access control methods regulate
                 access privileges to a single image, and their access
                 control strategies are stored in servers, which imposes
                 two shortcomings: (1) fine-grained access control is
                 not guaranteed for areas/layers in a single image that
                 need to maintain secret for different roles; and (2)
                 access control policies that are stored in servers
                 suffers from multiple attacks (e.g., transferring
                 attacks). In this paper, we propose a novel
                 watermark-based access control model in which access
                 control policies are associated with objects being
                 accessed (called an in-situ model). The proposed model
                 integrates access control policies as watermarks within
                 images, without relying on the availability of servers
                 or connecting networks. The access control for images
                 is still maintained even though images are
                 redistributed again to further subjects. Therefore,
                 access control policies can be delivered together with
                 the big data of images. Moreover, we propose a
                 hierarchical key-role-area model for fine-grained
                 encryption, especially for large size images such as
                 geographic maps. The extensive analysis justifies the
                 security and performance of the proposed model.",
  acknowledgement = ack-nhfb,
  remark =       "Section Big Data and Augmented Intelligence.",
}

@Article{Gupta:2018:SCA,
  author =       "Haritabh Gupta and Shamik Sural and Vijayalakshmi
                 Atluri and Jaideep Vaidya",
  title =        "A side-channel attack on smartphones: Deciphering key
                 taps using built-in microphones",
  journal =      j-J-COMP-SECUR,
  volume =       "26",
  number =       "2",
  pages =        "255--281",
  month =        "????",
  year =         "2018",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-17975",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 23 05:47:15 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Haigh:2018:CP,
  author =       "Thomas Haigh and Mark Priestley",
  title =        "{Colossus} and Programmability",
  journal =      j-IEEE-ANN-HIST-COMPUT,
  volume =       "40",
  number =       "4",
  pages =        "5--27",
  month =        oct # "\slash " # dec,
  year =         "2018",
  CODEN =        "IAHCEX",
  DOI =          "https://doi.org/10.1109/MAHC.2018.2877912",
  ISSN =         "1058-6180 (print), 1934-1547 (electronic)",
  ISSN-L =       "1058-6180",
  bibdate =      "Thu Jan 24 10:01:33 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeeannhistcomput.bib",
  URL =          "https://ieeexplore.ieee.org/document/8509146/",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Annals of the History of Computing",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=85",
}

@Article{Ham:2018:IYP,
  author =       "HyoungMin Ham and JongHyup Lee and JooSeok Song",
  title =        "Improved yoking proof protocols for preserving
                 anonymity",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "4",
  pages =        "379--393",
  month =        aug,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0383-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Jul 25 08:53:56 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0383-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Hamad:2018:DWU,
  author =       "Safwat Hamad and Ahmed Elhadad and Amal Khalifa",
  title =        "{DNA} Watermarking Using Codon Postfix Technique",
  journal =      j-TCBB,
  volume =       "15",
  number =       "5",
  pages =        "1605--1610",
  month =        sep,
  year =         "2018",
  CODEN =        "ITCBCY",
  DOI =          "https://doi.org/10.1109/TCBB.2017.2754496",
  ISSN =         "1545-5963 (print), 1557-9964 (electronic)",
  ISSN-L =       "1545-5963",
  bibdate =      "Thu Nov 8 06:18:46 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcbb.bib",
  abstract =     "DNA watermarking is a data hiding technique that aims
                 to protect the copyright of DNA sequences and ensures
                 the security of private genetic information. In this
                 paper, we proposed a novel DNA watermarking technique
                 that can be used to embed binary bits into real DNA
                 sequences. The proposed technique mutates the codon
                 postfix according to the embedded bit. Our method was
                 tested for a sample set of DNA sequences and the
                 extracted bits showed robustness against mutation.
                 Furthermore, the proposed DNA watermarking method
                 proved to be secured, undetectable, resistance, and
                 preservative to biological functions.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE/ACM Transactions on Computational Biology and
                 Bioinformatics",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J954",
}

@Article{Hameed:2018:TFV,
  author =       "Khizar Hameed and Abid Khan and Mansoor Ahmed and
                 Alavalapati Goutham Reddy and M. Mazhar Rathore",
  title =        "Towards a formally verified zero watermarking scheme
                 for data integrity in the {Internet of Things}
                 based-wireless sensor networks",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "82",
  number =       "??",
  pages =        "274--289",
  month =        may,
  year =         "2018",
  CODEN =        "FGSEVI",
  DOI =          "https://doi.org/10.1016/j.future.2017.12.009",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Sun Feb 18 14:42:10 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167739X17322756",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Hammi:2018:BTD,
  author =       "Mohamed Tahar Hammi and Badis Hammi and Patrick Bellot
                 and Ahmed Serhrouchni",
  title =        "Bubbles of Trust: a decentralized blockchain-based
                 authentication system for {IoT}",
  journal =      j-COMPUT-SECUR,
  volume =       "78",
  number =       "??",
  pages =        "126--142",
  month =        sep,
  year =         "2018",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:57 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404818300890",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Han:2018:BEI,
  author =       "Jinsong Han and Chen Qian and Yuqin Yang and Ge Wang
                 and Han Ding and Xin Li and Kui Ren",
  title =        "{Butterfly}: Environment-Independent Physical-Layer
                 Authentication for Passive {RFID}",
  journal =      j-IMWUT,
  volume =       "2",
  number =       "4",
  pages =        "1--21",
  month =        dec,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3287044",
  ISSN =         "2474-9567 (electronic)",
  bibdate =      "Thu Jan 23 12:37:06 MST 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/imwut.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3287044",
  abstract =     "RFID tag authentication is challenging because most
                 commodity tags cannot run cryptographic algorithms.
                 Prior research demonstrates that physical layer
                 information based authentication is a promising
                 solution, which uses special features from the
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "166",
  fjournal =     "Proceedings of the ACM on Interactive, Mobile,
                 Wearable and Ubiquitous Technologies (IMWUT)",
  journal-URL =  "https://dl.acm.org/loi/imwut",
}

@Article{Han:2018:ERA,
  author =       "Qi Han and Yinghui Zhang and Hui Li",
  title =        "Efficient and robust attribute-based encryption
                 supporting access policy hiding in {Internet of
                 Things}",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "83",
  number =       "??",
  pages =        "269--277",
  month =        jun,
  year =         "2018",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Thu Mar 15 17:42:39 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167739X1731868X",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Han:2018:TSE,
  author =       "Shuai Han and Shengli Liu and Lin Lyu and Dawu Gu",
  title =        "Tightly Secure Encryption Schemes against Related-Key
                 Attacks",
  journal =      j-COMP-J,
  volume =       "61",
  number =       "12",
  pages =        "1825--1844",
  day =          "1",
  month =        dec,
  year =         "2018",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxy074",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Nov 27 19:24:38 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://academic.oup.com/comjnl/article/61/12/1825/5067538",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{He:2018:LAB,
  author =       "Qian He and Ning Zhang and Yongzhuang Wei and Yan
                 Zhang",
  title =        "Lightweight attribute based encryption scheme for
                 mobile cloud assisted cyber-physical systems",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "140",
  number =       "??",
  pages =        "163--173",
  day =          "20",
  month =        jul,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1016/j.comnet.2018.01.038",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Thu May 31 13:40:46 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1389128618300458",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286/",
}

@Article{He:2018:MBF,
  author =       "Jingsha He and Jianan Wu and Nafei Zhu and Muhammad
                 Salman Pathan",
  title =        "{MinHash}-Based Fuzzy Keyword Search of Encrypted Data
                 across Multiple Cloud Servers",
  journal =      j-FUTURE-INTERNET,
  volume =       "10",
  number =       "5",
  pages =        "38",
  day =          "01",
  month =        may,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi10050038",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:51:00 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/future-internet.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  URL =          "https://www.mdpi.com/1999-5903/10/5/38",
  abstract =     "To enhance the efficiency of data searching, most data
                 owners store their data files in different cloud
                 servers in the form of cipher-text. Thus, efficient
                 search using fuzzy keywords becomes a critical issue in
                 such a cloud computing environment. This paper proposes
                 a method that aims at improving the efficiency of
                 cipher-text retrieval and lowering storage overhead for
                 fuzzy keyword search. In contrast to traditional
                 approaches, the proposed method can reduce the
                 complexity of Min-Hash-based fuzzy keyword search by
                 using Min-Hash fingerprints to avoid the need to
                 construct the fuzzy keyword set. The method will
                 utilize Jaccard similarity to rank the results of
                 retrieval, thus reducing the amount of calculation for
                 similarity and saving a lot of time and space overhead.
                 The method will also take consideration of multiple
                 user queries through re-encryption technology and
                 update user permissions dynamically. Security analysis
                 demonstrates that the method can provide better privacy
                 preservation and experimental results show that
                 efficiency of cipher-text using the proposed method can
                 improve the retrieval time and lower storage overhead
                 as well.",
  acknowledgement = ack-nhfb,
}

@Article{Howe:2018:PDG,
  author =       "James Howe and Ayesha Khalid and Ciara Rafferty and
                 Francesco Regazzoni and M{\'a}ire O'Neill",
  title =        "On Practical Discrete {Gaussian} Samplers for
                 Lattice-Based Cryptography",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "67",
  number =       "3",
  pages =        "322--334",
  month =        "????",
  year =         "2018",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2016.2642962",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Thu Feb 15 05:53:34 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  URL =          "http://ieeexplore.ieee.org/document/7792671/",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Hu:2018:SVA,
  author =       "C. Hu and W. Li and X. Cheng and J. Yu and S. Wang and
                 R. Bie",
  title =        "A Secure and Verifiable Access Control Scheme for Big
                 Data Storage in Clouds",
  journal =      j-IEEE-TRANS-BIG-DATA,
  volume =       "4",
  number =       "3",
  pages =        "341--355",
  month =        sep,
  year =         "2018",
  DOI =          "https://doi.org/10.1109/TBDATA.2016.2621106",
  ISSN =         "2332-7790",
  bibdate =      "Fri Aug 2 11:24:47 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetransbigdata.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Big Data",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6687317",
  keywords =     "Access control; access control; access legitimacy;
                 access policy update; authorisation; Big data; Big
                 Data; Big data storage; ciphertext; cloud computing;
                 Cloud computing; cloud computing; cloud server;
                 Cryptography; cryptography; data owner; eligible users;
                 outsourcing; Outsourcing; secret sharing; secure access
                 control scheme; security strengths; Servers; storage
                 management; the NTRU cryptosystem; verifiable access
                 control scheme",
}

@Article{Huang:2018:BLD,
  author =       "Chenyu Huang and Huangxun Chen and Lin Yang and Qian
                 Zhang",
  title =        "{BreathLive}: Liveness Detection for Heart Sound
                 Authentication with Deep Breathing",
  journal =      j-IMWUT,
  volume =       "2",
  number =       "1",
  pages =        "1--25",
  month =        mar,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3191744",
  ISSN =         "2474-9567 (electronic)",
  bibdate =      "Thu Jan 23 12:36:59 MST 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/imwut.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3191744",
  abstract =     "Nowadays, considerable number of devices have been
                 proposed to monitor cardiovascular health. To protect
                 medical data on these devices from unauthorized access,
                 researchers have proposed ECG-based and heart
                 sound-based authentication methods. However, \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "12",
  fjournal =     "Proceedings of the ACM on Interactive, Mobile,
                 Wearable and Ubiquitous Technologies (IMWUT)",
  journal-URL =  "https://dl.acm.org/loi/imwut",
}

@Article{Huang:2018:CT,
  author =       "Qinlong Huang and Yixian Yang and Mansuo Shen",
  title =        "Corrigendum to {``Secure and efficient data
                 collaboration with hierarchical attribute-based
                 encryption in cloud computing'' [Future Gener. Comput.
                 Syst. {\bf 72} (2017) 239--249]}",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "86",
  number =       "??",
  pages =        "1534--1534",
  month =        sep,
  year =         "2018",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Wed Jun 20 10:46:17 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  note =         "See \cite{Huang:2017:SED}.",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167739X18312238",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Huang:2018:LRD,
  author =       "Jianye Huang and Qiong Huang and Willy Susilo",
  title =        "Leakage-Resilient Dual-Form Signatures",
  journal =      j-COMP-J,
  volume =       "61",
  number =       "8",
  pages =        "1216--1227",
  day =          "1",
  month =        aug,
  year =         "2018",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxy059",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Fri Aug 3 11:54:57 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://academic.oup.com/comjnl/article/61/8/1216/5035762",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Huang:2018:PIB,
  author =       "Qinlong Huang and Yixian Yang and Jingyi Fu",
  title =        "{PRECISE}: Identity-based private data sharing with
                 conditional proxy re-encryption in online social
                 networks",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "86",
  number =       "??",
  pages =        "1523--1533",
  month =        sep,
  year =         "2018",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Wed Jun 20 10:46:17 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167739X17310257",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Hubballi:2018:NTC,
  author =       "Neminath Hubballi and Mayank Swarnkar",
  title =        "{BitCoding}: Network Traffic Classification Through
                 Encoded Bit Level Signatures",
  journal =      j-IEEE-TRANS-NETWORKING,
  volume =       "26",
  number =       "5",
  pages =        "2334--2346",
  month =        oct,
  year =         "2018",
  CODEN =        "IEANEP",
  DOI =          "https://doi.org/10.1109/TNET.2018.2868816",
  ISSN =         "1063-6692 (print), 1558-2566 (electronic)",
  ISSN-L =       "1063-6692",
  bibdate =      "Thu Nov 8 06:12:22 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
  abstract =     "With many network protocols using obfuscation
                 techniques to hide their identity, robust methods of
                 traffic classification are required. In traditional
                 deep-packet-inspection DPI methods, application
                 specific signatures are generated with byte-level data
                 from payload. Increasingly new data formats are being
                 used to encode the application protocols with bit-level
                 information which render the byte-level signatures
                 ineffective. In this paper, we describe BitCoding a
                 bit-level DPI-based signature generation technique.
                 BitCoding uses only a small number of initial bits from
                 a flow and identify invariant bits as signature.
                 Subsequently, these bit signatures are encoded and
                 transformed into a newly defined state transition
                 machine transition constrained counting automata. While
                 short signatures are efficient for processing, this
                 will increase the chances of collision and cross
                 signature matching with increase in number of
                 signatures applications. We describe a method for
                 signature similarity detection using a variant of
                 Hamming distance and propose to increase the length of
                 signatures for a subset of protocols to avoid overlaps.
                 We perform extensive experiments with three different
                 data sets consisting of 537,380 flows with a packet
                 count of 3,445,969 and show that, BitCoding has very
                 good detection performance across different types of
                 protocols text, binary, and proprietary making it
                 protocol-type agnostic. Further, to understand the
                 portability of signatures generated we perform cross
                 evaluation, i.e., signatures generated from one site
                 are used for testing with data from other sites to
                 conclude that it will lead to a small compromise in
                 detection performance.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE\slash ACM Transactions on Networking",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J771",
}

@Article{Hunger:2018:DDC,
  author =       "Casen Hunger and Lluis Vilanova and Charalampos
                 Papamanthou and Yoav Etsion and Mohit Tiwari",
  title =        "{DATS} --- Data Containers for {Web} Applications",
  journal =      j-SIGPLAN,
  volume =       "53",
  number =       "2",
  pages =        "722--736",
  month =        feb,
  year =         "2018",
  CODEN =        "SINODQ",
  DOI =          "https://doi.org/10.1145/3296957.3173213",
  ISSN =         "0362-1340 (print), 1523-2867 (print), 1558-1160
                 (electronic)",
  ISSN-L =       "0362-1340",
  bibdate =      "Wed Oct 16 14:12:56 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigplan2010.bib",
  abstract =     "Data containers enable users to control access to
                 their data while untrusted applications compute on it.
                 However, they require replicating an application inside
                 each container --- compromising functionality,
                 programmability, and performance. We propose DATS --- a
                 system to run web applications that retains application
                 usability and efficiency through a mix of hardware
                 capability enhanced containers and the introduction of
                 two new primitives modeled after the popular
                 model-view-controller (MVC) pattern. (1) DATS
                 introduces a templating language to create views that
                 compose data across data containers. (2) DATS uses
                 authenticated storage and confinement to enable an
                 untrusted storage service, such as memcached and
                 deduplication, to operate on plain-text data across
                 containers. These two primitives act as robust
                 declassifiers that allow DATS to enforce
                 non-interference across containers, taking large
                 applications out of the trusted computing base (TCB).
                 We showcase eight different web applications including
                 Gitlab and a Slack-like chat, significantly improve the
                 worst-case overheads due to application replication,
                 and demonstrate usable performance for common-case
                 usage.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGPLAN Notices",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J706",
  remark =       "ASPLOS '18 proceedings.",
}

@Article{Hunt:2018:RDS,
  author =       "Tyler Hunt and Zhiting Zhu and Yuanzhong Xu and Simon
                 Peter and Emmett Witchel",
  title =        "{Ryoan}: a Distributed Sandbox for Untrusted
                 Computation on Secret Data",
  journal =      j-TOCS,
  volume =       "35",
  number =       "4",
  pages =        "13:1--13:??",
  month =        dec,
  year =         "2018",
  CODEN =        "ACSYEC",
  DOI =          "https://doi.org/10.1145/3231594",
  ISSN =         "0734-2071 (print), 1557-7333 (electronic)",
  ISSN-L =       "0734-2071",
  bibdate =      "Sat Sep 21 11:44:29 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tocs.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3231594",
  abstract =     "Users of modern data-processing services such as tax
                 preparation or genomic screening are forced to trust
                 them with data that the users wish to keep secret.
                 Ryoan$^1$ protects secret data while it is processed by
                 services that the data owner does not trust.
                 Accomplishing this goal in a distributed setting is
                 difficult, because the user has no control over the
                 service providers or the computational platform.
                 Confining code to prevent it from leaking secrets is
                 notoriously difficult, but Ryoan benefits from new
                 hardware and a request-oriented data model. Ryoan
                 provides a distributed sandbox, leveraging hardware
                 enclaves (e.g., Intel's software guard extensions (SGX)
                 [40]) to protect sandbox instances from potentially
                 malicious computing platforms. The protected sandbox
                 instances confine untrusted data-processing modules to
                 prevent leakage of the user's input data. Ryoan is
                 designed for a request-oriented data model, where
                 confined modules only process input once and do not
                 persist state about the input. We present the design
                 and prototype implementation of Ryoan and evaluate it
                 on a series of challenging problems including email
                 filtering, health analysis, image processing and
                 machine translation.",
  acknowledgement = ack-nhfb,
  articleno =    "13",
  fjournal =     "ACM Transactions on Computer Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J774",
}

@Article{Hussain:2018:PPP,
  author =       "Siam Umar Hussain and Farinaz Koushanfar",
  title =        "{P3}: Privacy Preserving Positioning for Smart
                 Automotive Systems",
  journal =      j-TODAES,
  volume =       "23",
  number =       "6",
  pages =        "79:1--79:??",
  month =        dec,
  year =         "2018",
  CODEN =        "ATASFO",
  DOI =          "https://doi.org/10.1145/3236625",
  ISSN =         "1084-4309 (print), 1557-7309 (electronic)",
  ISSN-L =       "1084-4309",
  bibdate =      "Fri Mar 22 16:58:40 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/todaes.bib",
  abstract =     "This article presents the first privacy-preserving
                 localization method based on provably secure primitives
                 for smart automotive systems. Using this method, a car
                 that is lost due to unavailability of GPS can compute
                 its location with assistance from three nearby cars,
                 while the locations of all the participating cars
                 including the lost car remain private. Technological
                 enhancement of modern vehicles, especially in
                 navigation and communication, necessitates parallel
                 enhancement in security and privacy. Previous
                 approaches to maintaining user location privacy
                 suffered from one or more of the following drawbacks:
                 trade-off between accuracy and privacy, one-sided
                 privacy, and the need of a trusted third party that
                 presents a single point to attack. The localization
                 method presented here is one of the very first
                 location-based services that eliminates all these
                 drawbacks. Two protocols for computing the location is
                 presented here based on two Secure Function Evaluation
                 (SFE) techniques that allow multiple parties to jointly
                 evaluate a function on inputs that are encrypted to
                 maintain privacy. The first one is based on the
                 two-party protocol named Yao's Garbled Circuit (GC).
                 The second one is based on the Beaver-Micali-Rogaway
                 (BMR) protocol that allows inputs from more than two
                 parties. The two secure localization protocols exhibit
                 trade-offs between performance and resilience against
                 collusion. Along with devising the protocols, we design
                 and optimize netlists for the functions required for
                 location computation by leveraging conventional logic
                 synthesis tools with custom libraries optimized for
                 SFE. Proof-of-concept implementation of the protocol
                 shows that the complete operation can be performed
                 within only 355ms. The fast computing time enables
                 localization of even moving cars.",
  acknowledgement = ack-nhfb,
  articleno =    "79",
  fjournal =     "ACM Transactions on Design Automation of Electronic
                 Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J776",
}

@Article{Hussain:2018:SSH,
  author =       "Siam Umar Hussain and M. Sadegh Riazi and Farinaz
                 Koushanfar",
  title =        "{SHAIP}: {Secure Hamming Distance for Authentication
                 of Intrinsic PUFs}",
  journal =      j-TODAES,
  volume =       "23",
  number =       "6",
  pages =        "75:1--75:??",
  month =        dec,
  year =         "2018",
  CODEN =        "ATASFO",
  DOI =          "https://doi.org/10.1145/3274669",
  ISSN =         "1084-4309 (print), 1557-7309 (electronic)",
  ISSN-L =       "1084-4309",
  bibdate =      "Fri Mar 22 16:58:40 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/todaes.bib",
  abstract =     "In this article, we present SHAIP, a secure Hamming
                 distance-based mutual authentication protocol. It
                 allows an unlimited number of authentications by
                 employing an intrinsic Physical Unclonable Function
                 (PUF). PUFs are being increasingly employed for remote
                 authentication of devices. Most of these devices have
                 limited resources. Therefore, the intrinsic PUFs are
                 most suitable for this task as they can be built with
                 little or no modification to the underlying hardware
                 platform. One major drawback of the current
                 authentication schemes is that they expose the PUF
                 response. This makes the intrinsic PUFs, which have a
                 limited number of challenge-response pairs, unusable
                 after a certain number of authentication sessions.
                 Moreover, these schemes are one way in the sense that
                 they only allow one party, the prover, to authenticate
                 herself to the verifier. We propose a symmetric mutual
                 authentication scheme based on secure
                 (privacy-preserving) computation of the Hamming
                 distance between the PUF response from the remote
                 device and reference response stored at the verifier
                 end. This allows both parties to authenticate each
                 other without revealing their respective sets of
                 inputs. We show that our scheme is effective with all
                 state-of-the-art intrinsic PUFs. The proposed scheme is
                 lightweight and does not require any modification to
                 the underlying hardware.",
  acknowledgement = ack-nhfb,
  articleno =    "75",
  fjournal =     "ACM Transactions on Design Automation of Electronic
                 Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J776",
}

@Article{Islam:2018:REP,
  author =       "SK Hafizul Islam and Mohammad S. Obaidat and Pandi
                 Vijayakumar and Enas Abdulhay and Fagen Li and M.
                 Krishna Chaitanya Reddy",
  title =        "A robust and efficient password-based conditional
                 privacy preserving authentication and group-key
                 agreement protocol for {VANETs}",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "84",
  number =       "??",
  pages =        "216--227",
  month =        jul,
  year =         "2018",
  CODEN =        "FGSEVI",
  DOI =          "https://doi.org/10.1016/j.future.2017.07.002",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Mon Apr 16 14:45:08 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167739X17308439",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Jaeger:2018:FAP,
  author =       "David Jaeger and Hendrik Graupner and Chris Pelchen
                 and Feng Cheng and Christoph Meinel",
  title =        "Fast Automated Processing and Evaluation of Identity
                 Leaks",
  journal =      j-INT-J-PARALLEL-PROG,
  volume =       "46",
  number =       "2",
  pages =        "441--470",
  month =        apr,
  year =         "2018",
  CODEN =        "IJPPE5",
  DOI =          "https://doi.org/10.1007/s10766-016-0478-6",
  ISSN =         "0885-7458 (print), 1573-7640 (electronic)",
  ISSN-L =       "0885-7458",
  bibdate =      "Fri Oct 11 08:37:50 MDT 2019",
  bibsource =    "http://link.springer.com/journal/10766/46/2;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjparallelprogram.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Parallel Programming",
  journal-URL =  "http://link.springer.com/journal/10766",
}

@Article{Jain:2018:MDN,
  author =       "Ajay Jain and Sachin Soni",
  title =        "Multi-Directional navigation method for optimized
                 consumption of user generated content through semantic
                 mapping of features derived from the user generated
                 content",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "4",
  pages =        "52--52",
  month =        oct,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3282517.3282535",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Sat Oct 19 18:11:10 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Gone are the days when a buyer used to depend solely
                 on the product marketing team to know what's good about
                 a product or product features. With the advent of
                 social media, product purchase has become democratic
                 with product buyers, product users are vocal about
                 reporting back their experience about the product.
                 According to Forrester, ``buyers will spend more time
                 on web pages that have social content than those that
                 don't'' and ``user-generated content has significant
                 influence on a buyer's purchase decision.'' The
                 research doesn't lie --- User Generated Content (termed
                 as UGC) is more effective at driving purchase intent
                 and brand loyalty than any other media. To create
                 engaging, authentic customer experiences, companies
                 should weave UGC throughout their owned websites,
                 showcasing the voices that consumers trust the most:
                 their own.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Jaiyeola:2018:IPN,
  author =       "Temitope Gbolahan Jaiyeola and Florentin Smarandache",
  title =        "Inverse Properties in Neutrosophic Triplet Loop and
                 Their Application to Cryptography",
  journal =      j-ALGORITHMS-BASEL,
  volume =       "11",
  number =       "3",
  month =        mar,
  year =         "2018",
  CODEN =        "ALGOCH",
  DOI =          "https://doi.org/10.3390/a11030032",
  ISSN =         "1999-4893 (electronic)",
  ISSN-L =       "1999-4893",
  bibdate =      "Fri May 3 13:50:14 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/algorithms.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.mdpi.com/1999-4893/11/3/32",
  acknowledgement = ack-nhfb,
  articleno =    "32",
  fjournal =     "Algorithms (Basel)",
  journal-URL =  "https://www.mdpi.com/journal/algorithms",
  ORCID-numbers = "Temitope Gbolahan Jaiyeola/0000-0002-8695-5478;
                 Florentin Smarandache/0000-0002-5560-5926",
  pagecount =    "??",
  pubdates =     "Received: 7 February 2018 / Revised: 11 March 2018 /
                 Accepted: 12 March 2018 / Published: 16 March 2018",
}

@Article{Jamil:2018:SPU,
  author =       "Fuzel Jamil and Abid Khan and Adeel Anjum and Mansoor
                 Ahmed and Farhana Jabeen and Nadeem Javaid",
  title =        "Secure provenance using an authenticated data
                 structure approach",
  journal =      j-COMPUT-SECUR,
  volume =       "73",
  number =       "??",
  pages =        "34--56",
  month =        mar,
  year =         "2018",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2017.10.005",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:53 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404817302122",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ji:2018:DIR,
  author =       "Wusheng Ji and Li Li and Weiwei Zhou",
  title =        "Design and Implementation of a {RFID} Reader\slash
                 Router in {RFID-WSN} Hybrid System",
  journal =      j-FUTURE-INTERNET,
  volume =       "10",
  number =       "11",
  pages =        "106",
  day =          "03",
  month =        nov,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi10110106",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:51:03 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/10/11/106",
  abstract =     "In order to put Radio Frequency Identification (RFID)
                 and Wireless Sensor Network (WSN) in a hybrid system,
                 this paper presents the design and implementation of a
                 RFID reader/router that can obtain information of both
                 RFID tags and WSN sensor nodes and transmit the
                 information through the WSN to the PC server. The RFID
                 reader and WSN router are combined with both hardware
                 and software. In hardware structure, CC2530 is used as
                 micro controller and RF module for ZigBee wireless
                 communication, and MF RC522 is used as reader RF chip.
                 The software deals with both identity and sensing
                 information and controls the routing. Experiment
                 results show that the RFID reader/router achieves long
                 distance identification, flexibility, scalability, and
                 low cost. It also provides reliable and secured data
                 transmission and broadens the communication range and
                 application scope of RFID readers.",
  acknowledgement = ack-nhfb,
}

@Article{Jia:2018:ERH,
  author =       "Hongyong Jia and Yue Chen and Julong Lan and Kaixiang
                 Huang and Jun Wang",
  title =        "Efficient revocable hierarchical identity-based
                 encryption using cryptographic accumulators",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "4",
  pages =        "477--490",
  month =        aug,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0387-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Jul 25 08:53:56 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0387-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Jiang:2018:AHP,
  author =       "Rong Jiang and Rongxing Lu and Kim-Kwang Raymond
                 Choo",
  title =        "Achieving high performance and privacy-preserving
                 query over encrypted multidimensional big metering
                 data",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "78 (part 1)",
  number =       "??",
  pages =        "392--401",
  month =        jan,
  year =         "2018",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Sat Sep 23 09:35:45 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X16301157",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Jiang:2018:CPA,
  author =       "Yinhao Jiang and Willy Susilo and Yi Mu and Fuchun
                 Guo",
  title =        "Ciphertext-policy attribute-based encryption against
                 key-delegation abuse in fog computing",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "78 (part 2)",
  number =       "??",
  pages =        "720--729",
  month =        jan,
  year =         "2018",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Mon Sep 25 09:24:12 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X17301322",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Jiang:2018:FCP,
  author =       "Yinhao Jiang and Willy Susilo and Yi Mu and Fuchun
                 Guo",
  title =        "Flexible ciphertext-policy attribute-based encryption
                 supporting {AND}-gate and threshold with short
                 ciphertexts",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "4",
  pages =        "463--475",
  month =        aug,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0376-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Jul 25 08:53:56 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0376-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Jordan:2018:EPE,
  author =       "M. Jordan and N. Sardino and M. McGrath and C. Zoellin
                 and T. E. Morris and C. Carranza Lewis and G. Vance and
                 B. Naylor and J. Pickel and M. S. Almeida and D.
                 Wierbowski and C. Meyer and R. Buendgen and M. Zagorski
                 and H. Schoone and K. Voss",
  title =        "Enabling pervasive encryption through {IBM Z} stack
                 innovations",
  journal =      j-IBM-JRD,
  volume =       "62",
  number =       "2--3",
  pages =        "2:1--2:11",
  month =        "????",
  year =         "2018",
  CODEN =        "IBMJAE",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  ISSN-L =       "0018-8646",
  bibdate =      "Thu May 10 14:55:17 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ibmjrd.bib",
  URL =          "https://ieeexplore.ieee.org/document/8270590/",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5288520",
}

@Article{Jordan:2018:QCS,
  author =       "S. P. Jordan and Y. Liu",
  title =        "Quantum Cryptanalysis: {Shor}, {Grover}, and Beyond",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "5",
  pages =        "14--21",
  month =        sep # "\slash " # oct,
  year =         "2018",
  DOI =          "https://doi.org/10.1109/MSP.2018.3761719",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
  keywords =     "algorithms; Computers; cryptanalysis; Elliptic curve
                 cryptography; Elliptic curves; Logic gates; postquantum
                 cryptography; Postquantum Cryptography Part 2; quantum
                 algorithms; quantum attack; Quantum computing; quantum
                 computing; quantum cryptanalysis; quantum cryptography;
                 security",
}

@Article{K:2018:AAF,
  author =       "Keerthi K. and Chester Rebeiro and Aritra Hazra",
  title =        "An Algorithmic Approach to Formally Verify an {ECC}
                 Library",
  journal =      j-TODAES,
  volume =       "23",
  number =       "5",
  pages =        "63:1--63:??",
  month =        oct,
  year =         "2018",
  CODEN =        "ATASFO",
  DOI =          "https://doi.org/10.1145/3224205",
  ISSN =         "1084-4309 (print), 1557-7309 (electronic)",
  ISSN-L =       "1084-4309",
  bibdate =      "Fri Mar 22 16:58:40 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/todaes.bib",
  abstract =     "The weakest link in cryptosystems is quite often due
                 to the implementation rather than the mathematical
                 underpinnings. A vast majority of attacks in the recent
                 past have targeted programming flaws and bugs to break
                 security systems. Due to the complexity, empirically
                 verifying such systems is practically impossible, while
                 manual verification as well as testing do not provide
                 adequate guarantees. In this article, we leverage model
                 checking techniques to prove the functional correctness
                 of an elliptic curve cryptography (ECC) library with
                 respect to its formal specification. We demonstrate how
                 the huge state space of the C library can be aptly
                 verified using a hierarchical assume-guarantee
                 verification strategy. To test the scalability of this
                 approach, we verify the correctness of five
                 NIST-specified elliptic curve implementations. We also
                 verify the newer curve25519 elliptic curve, which is
                 finding multiple applications, due to its higher
                 security and simpler implementation. The 192-bit NIST
                 elliptic curve took 1 day to verify. This was the
                 smallest curve we verified. The largest curve with a
                 521-bit prime field took 26 days to verify. Curve25519
                 took 1.5 days to verify.",
  acknowledgement = ack-nhfb,
  articleno =    "63",
  fjournal =     "ACM Transactions on Design Automation of Electronic
                 Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J776",
}

@Article{Kalayappan:2018:PAH,
  author =       "Rajshekar Kalayappan and Smruti R. Sarangi",
  title =        "Providing Accountability in Heterogeneous
                 Systems-on-Chip",
  journal =      j-TECS,
  volume =       "17",
  number =       "5",
  pages =        "83:1--83:??",
  month =        nov,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3241048",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Thu Oct 17 18:16:41 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tecs.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3241048",
  abstract =     "When modern systems-on-chip (SoCs), containing designs
                 from different organizations, miscompute or
                 underperform in the field, discerning the responsible
                 component is a non-trivial task. A perfectly
                 accountable system is one in which the on-chip
                 component at fault is always unambiguously detected.
                 The achievement of accountability can be greatly aided
                 by the collection of runtime information that captures
                 the events in the system that led to the error. Such
                 information collection must be fair and impartial to
                 all parties. In this article, we prove that logging
                 messages communicated between components from different
                 organizations is sufficient to provide accountability,
                 provided the logs are authentic. We then construct a
                 solution based on this premise, with an on-chip trusted
                 auditing system to authenticate the logs. We present a
                 thorough design of the auditing system, and demonstrate
                 that its performance overhead is a mere 0.49\%, and its
                 area overhead is a mere 0.194\% (in a heterogeneous 48
                 core, 400 mm$^2$ chip). We also demonstrate the
                 viability of this solution using three representative
                 bugs found in popular commercial SoCs.",
  acknowledgement = ack-nhfb,
  articleno =    "83",
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J840",
}

@Article{Karthiga:2018:PSA,
  author =       "I Karthiga and Sharmila Sankar",
  title =        "Providing Secret Authentication in Clustered Security
                 Architecture for Cloud-Based {WBAN}",
  journal =      j-COMP-J,
  volume =       "61",
  number =       "2",
  pages =        "223--232",
  day =          "1",
  month =        feb,
  year =         "2018",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxx051",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Fri Aug 3 11:54:04 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://academic.oup.com/comjnl/article/61/2/223/3861967",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Kavun:2018:SAE,
  author =       "Elif Bilge Kavun and Hristina Mihajloska and Tolga
                 Yal{\c{c}}in",
  title =        "A Survey on Authenticated Encryption--{ASIC}
                 Designer's Perspective",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "6",
  pages =        "88:1--88:??",
  month =        jan,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3131276",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:01 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "Authenticated encryption (AE) has been a vital
                 operation in cryptography due to its ability to provide
                 confidentiality, integrity, and authenticity at the
                 same time. Its use has soared in parallel with
                 widespread use of the internet and has led to several
                 new schemes. There have been studies investigating
                 software performance of various schemes. However, the
                 same is yet to be done for hardware. We present a
                 comprehensive survey of hardware (specifically ASIC)
                 performance of the most commonly used AE schemes in the
                 literature. These schemes include encrypt-then-MAC
                 combination, block-cipher-based AE modes, and the
                 recently introduced permutation-based AE scheme. For
                 completeness, we implemented each scheme with various
                 standardized block ciphers and/or hash algorithms, and
                 their lightweight versions. Our evaluation targets
                 minimizing the time-area product while maximizing the
                 throughput on an ASIC platform. We used 45nm NANGATE
                 Open Cell Library for syntheses. We present area,
                 speed, time-area product, throughput, and power figures
                 for both standard and lightweight versions of each
                 scheme. We also provide an unbiased discussion on the
                 impact of the structure and complexity of each scheme
                 on hardware implementation. Our results reveal
                 13\%--30\% performance boost in permutation-based AE
                 compared to conventional schemes, and they can be used
                 as a benchmark in the ongoing AE competition CAESAR.",
  acknowledgement = ack-nhfb,
  articleno =    "88",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Khamis:2018:CCT,
  author =       "Mohamed Khamis and Ludwig Trotter and Ville
                 M{\"a}kel{\"a} and Emanuel von Zezschwitz and Jens Le
                 and Andreas Bulling and Florian Alt",
  title =        "{CueAuth}: Comparing Touch, Mid-Air Gestures, and Gaze
                 for Cue-based Authentication on Situated Displays",
  journal =      j-IMWUT,
  volume =       "2",
  number =       "4",
  pages =        "1--22",
  month =        dec,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3287052",
  ISSN =         "2474-9567 (electronic)",
  bibdate =      "Thu Jan 23 12:37:06 MST 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/imwut.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3287052",
  abstract =     "Secure authentication on situated displays (e.g., to
                 access sensitive information or to make purchases) is
                 becoming increasingly important. A promising approach
                 to resist shoulder surfing attacks is to employ cues
                 that users respond to while \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "174",
  fjournal =     "Proceedings of the ACM on Interactive, Mobile,
                 Wearable and Ubiquitous Technologies (IMWUT)",
  journal-URL =  "https://dl.acm.org/loi/imwut",
}

@Article{Khan:2018:APS,
  author =       "Imran Khan and Shehzad Ashraf Chaudhry and Muhammad
                 Sher and Javed I. Khan and Muhammad Khurram Khan",
  title =        "An anonymous and provably secure biometric-based
                 authentication scheme using chaotic maps for accessing
                 medical drop box data",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "74",
  number =       "8",
  pages =        "3685--3703",
  month =        aug,
  year =         "2018",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-016-1886-5",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Thu Oct 10 15:31:14 MDT 2019",
  bibsource =    "http://link.springer.com/journal/11227/74/8;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Article{Khleborodov:2018:FEC,
  author =       "Denis Khleborodov",
  title =        "Fast elliptic curve point multiplication based on
                 window {Non-Adjacent Form} method",
  journal =      j-APPL-MATH-COMP,
  volume =       "334",
  number =       "??",
  pages =        "41--59",
  day =          "1",
  month =        oct,
  year =         "2018",
  CODEN =        "AMHCBQ",
  DOI =          "https://doi.org/10.1016/j.amc.2018.03.112",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Sat Jun 2 17:40:19 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/applmathcomput2015.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0096300318302935",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Kieffer:2018:IBC,
  author =       "Jean Kieffer and Luca {De Feo}",
  title =        "Isogeny-based cryptography in {Julia\slash Nemo}: a
                 case study",
  journal =      j-ACM-COMM-COMP-ALGEBRA,
  volume =       "52",
  number =       "4",
  pages =        "130--132",
  month =        dec,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3338637.3338643",
  ISSN =         "1932-2232 (print), 1932-2240 (electronic)",
  ISSN-L =       "1932-2232",
  bibdate =      "Wed Oct 23 07:34:18 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/julia.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigsam.bib",
  abstract =     "The Couveignes--Rostovtsev--Stolbunov key-exchange
                 protocol based on isogenies of elliptic curves is of
                 interest because it may resist quantum attacks, but its
                 efficient implementation remains a challenge. We
                 briefly present the computations involved, and
                 efficient algorithms to achieve the critical steps,
                 with timing results for our implementations in Sage and
                 Julia\slash Nemo.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Communications in Computer Algebra",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1000",
}

@Article{Kiljan:2018:ETA,
  author =       "Sven Kiljan and Harald Vranken and Marko van Eekelen",
  title =        "Evaluation of transaction authentication methods for
                 online banking",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "80",
  number =       "??",
  pages =        "430--447",
  month =        mar,
  year =         "2018",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Sat Dec 2 16:58:42 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X16301352",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Kim:2018:ARD,
  author =       "Sung Ryoung Kim and Jeong Nyeo Kim and Sung Tae Kim
                 and Sunwoo Shin and Jeong Hyun Yi",
  title =        "Anti-reversible dynamic tamper detection scheme using
                 distributed image steganography for {IoT}
                 applications",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "74",
  number =       "9",
  pages =        "4261--4280",
  month =        sep,
  year =         "2018",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-016-1848-y",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Thu Oct 10 15:31:14 MDT 2019",
  bibsource =    "http://link.springer.com/journal/11227/74/9;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Article{Kim:2018:EPP,
  author =       "Jinsu Kim and Dongyoung Koo and Yuna Kim and Hyunsoo
                 Yoon and Junbum Shin and Sungwook Kim",
  title =        "Efficient Privacy-Preserving Matrix Factorization for
                 Recommendation via Fully Homomorphic Encryption",
  journal =      j-TOPS,
  volume =       "21",
  number =       "4",
  pages =        "17:1--17:??",
  month =        oct,
  year =         "2018",
  DOI =          "https://doi.org/10.1145/3212509",
  ISSN =         "2471-2566 (print), 2471-2574 (electronic)",
  bibdate =      "Sat Sep 21 08:26:24 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tops.bib",
  URL =          "https://dl.acm.org/citation.cfm?id=3212509",
  abstract =     "There are recommendation systems everywhere in our
                 daily life. The collection of personal data of users by
                 a recommender in the system may cause serious privacy
                 issues. In this article, we propose the first
                 privacy-preserving matrix factorization for
                 recommendation using fully homomorphic encryption. Our
                 protocol performs matrix factorization over encrypted
                 users' rating data and returns encrypted outputs so
                 that the recommendation system learns nothing on rating
                 values and resulting user/item profiles. Furthermore,
                 the protocol provides a privacy-preserving method to
                 optimize the tuning parameters that can be a business
                 benefit for the recommendation service providers. To
                 overcome the performance degradation caused by the use
                 of fully homomorphic encryption, we introduce a novel
                 data structure to perform computations over encrypted
                 vectors, which are essential for matrix factorization,
                 through secure two-party computation in part. Our
                 experiments demonstrate the efficiency of our
                 protocol.",
  acknowledgement = ack-nhfb,
  articleno =    "17",
  fjournal =     "ACM Transactions on Privacy and Security (TOPS)",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J1547",
}

@Article{Kline:2018:CAR,
  author =       "Donald {Kline, Jr.} and Rami Melhem and Alex K.
                 Jones",
  title =        "Counter Advance for Reliable Encryption in Phase
                 Change Memory",
  journal =      j-IEEE-COMPUT-ARCHIT-LETT,
  volume =       "17",
  number =       "2",
  pages =        "209--212",
  month =        jul # "\slash " # dec,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/LCA.2018.2861012",
  ISSN =         "1556-6056 (print), 1556-6064 (electronic)",
  ISSN-L =       "1556-6056",
  bibdate =      "Thu Jun 20 17:18:18 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeecomputarchitlett.bib",
  abstract =     "The use of hardware encryption and new memory
                 technologies such as phase change memory (PCM) are
                 gaining popularity in a variety of server applications
                 such as cloud systems. While PCM provides energy and
                 density advantages over conventional DRAM memory, it
                 faces endurance challenges. Such challenges are
                 exacerbated when employing memory encryption as the
                 stored data is essentially randomized. losing data
                 locality and reducing or eliminating the effectiveness
                 of energy and endurance aware encoding techniques. This
                 results in increasing dynamic energy consumption and
                 accelerated wear out. In this paper we propose counter
                 advance, a technique to leverage the process of
                 encryption to improve reliability and lifetime while
                 maintaining low-energy and low-latency operation.
                 Counter advance is compatible with standard
                 error-correction codes (ECC) and error correction
                 pointers (ECP), the standard for mitigating endurance
                 faults in PCM. Counter advance achieves the same fault
                 tolerance using three ECP pointers for a 10(-4) cell
                 failure rate compared to the leading approach to
                 consider energy savings and reliability for encrypted
                 PCM (SECRET) using five ECP pointers. At a failure rate
                 of 10(-2), counter advance can achieve an uncorrectable
                 bit error rate (UBER) of 10(-1), compared to < 10(-4)
                 for SECRET using six ECP pointers. This leads to a
                 lifetime improvement of 3.8x while maintaining
                 comparable energy consumption and access latency.",
  acknowledgement = ack-nhfb,
  affiliation =  "Kline, D (Reprint Author), Univ Pittsburgh, Dept Elect
                 \& Comp Engn, Pittsburgh, PA 15260 USA. Kline, Donald,
                 Jr.; Jones, Alex K., Univ Pittsburgh, Dept Elect \&
                 Comp Engn, Pittsburgh, PA 15260 USA. Melhem, Rami, Univ
                 Pittsburgh, Dept Comp Sci, Pittsburgh, PA 15260 USA.",
  author-email = "dek61@pitt.edu melhem@cs.pitt.edu akjones@pitt.edu",
  da =           "2019-06-20",
  doc-delivery-number = "HA2CO",
  eissn =        "1556-6064",
  fjournal =     "IEEE Computer Architecture Letters",
  funding-acknowledgement = "NSF [1747452]; IUCRC Program of the
                 National Science Foundation [CNS-1738783]; SHREC",
  funding-text = "This work was supported by NSF Graduate Research
                 Fellowship award number 1747452, and SHREC industry and
                 agency members and by the IUCRC Program of the National
                 Science Foundation (Grant No. CNS-1738783).",
  journal-iso =  "IEEE Comput. Archit. Lett.",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=10208",
  keywords =     "Emerging memories; error correction; reliability;
                 stuck-at faults",
  number-of-cited-references = "16",
  oa =           "Bronze",
  ORCID-numbers = "Kline, Jr, Donald/0000-0002-4414-1513",
  research-areas = "Computer Science",
  times-cited =  "0",
  unique-id =    "Kline:2018:CAR",
  web-of-science-categories = "Computer Science, Hardware \&
                 Architecture",
}

@Article{Kobusinska:2018:BDF,
  author =       "Anna Kobusi{\'n}ska and Kamil Pawluczuk and Jerzy
                 Brzezi{\'n}ski",
  title =        "Big Data fingerprinting information analytics for
                 sustainability",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "86",
  number =       "??",
  pages =        "1321--1337",
  month =        sep,
  year =         "2018",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Wed Jun 20 10:46:17 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167739X17329965",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Komargodski:2018:LRO,
  author =       "Ilan Komargodski",
  title =        "Leakage resilient one-way functions: the
                 auxiliary-input setting",
  journal =      j-THEOR-COMP-SCI,
  volume =       "746",
  number =       "??",
  pages =        "6--18",
  day =          "25",
  month =        oct,
  year =         "2018",
  CODEN =        "TCSCDI",
  DOI =          "https://doi.org/10.1016/j.tcs.2018.06.014",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Fri Sep 21 11:15:31 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2015.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0304397518304304",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{Koo:2018:PPD,
  author =       "Dongyoung Koo and Junbeom Hur",
  title =        "Privacy-preserving deduplication of encrypted data
                 with dynamic ownership management in fog computing",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "78 (part 2)",
  number =       "??",
  pages =        "739--752",
  month =        jan,
  year =         "2018",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Mon Sep 25 09:24:12 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X17301309",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Koya:2018:AHM,
  author =       "Aneesh M. Koya and Deepthi P. P.",
  title =        "Anonymous hybrid mutual authentication and key
                 agreement scheme for wireless body area network",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "140",
  number =       "??",
  pages =        "138--151",
  day =          "20",
  month =        jul,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1016/j.comnet.2018.05.006",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Thu May 31 13:40:46 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1389128618302044",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286/",
}

@Article{Koziel:2018:HPS,
  author =       "Brian Koziel and Reza Azarderakhsh and Mehran
                 Mozaffari Kermani",
  title =        "A High-Performance and Scalable Hardware Architecture
                 for Isogeny-Based Cryptography",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "67",
  number =       "11",
  pages =        "1594--1609",
  month =        "????",
  year =         "2018",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2018.2815605",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Thu Oct 11 14:31:34 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  URL =          "https://ieeexplore.ieee.org/document/8315051/",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Kreutz:2018:KPS,
  author =       "D. Kreutz and J. Yu and P. Esteves-Ver{\'\i}ssimo and
                 C. Magalh{\~a}es and F. M. V. Ramos",
  title =        "The {KISS} Principle in Software-Defined Networking: A
                 Framework for Secure Communications",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "5",
  pages =        "60--70",
  month =        sep # "\slash " # oct,
  year =         "2018",
  DOI =          "https://doi.org/10.1109/MSP.2018.3761717",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
  keywords =     "Authentication; Complexity theory; computer network
                 security; Control systems; cryptographic primitives;
                 Cryptography; integrated device verification value
                 iDVV; KISS principle; perfect forward secrecy;
                 performance; Performance evaluation; Protocols; SDN;
                 secure channel support; secure communications; secure
                 mechanisms; secure SDN control plane communications
                 architecture; security; software defined networking;
                 software-defined networking; support infrastructure;
                 system architecture; telecommunication traffic;
                 traditional solutions",
}

@Article{Kshetri:2018:BEV,
  author =       "N. Kshetri and J. Voas",
  title =        "Blockchain-Enabled E-Voting",
  journal =      j-IEEE-SOFTWARE,
  volume =       "35",
  number =       "4",
  pages =        "95--99",
  month =        jul # "\slash " # aug,
  year =         "2018",
  CODEN =        "IESOEG",
  DOI =          "https://doi.org/10.1109/MS.2018.2801546",
  ISSN =         "0740-7459 (print), 1937-4194 (electronic)",
  ISSN-L =       "0740-7459",
  bibdate =      "Fri Aug 2 09:25:48 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesoft.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Software",
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/software",
  keywords =     "ballot anonymously; BEV; Blockchain;
                 blockchain-enabled e-voting; blockchains; cryptography;
                 Cryptography; data privacy; e-voting; elections;
                 Electronic voting; electronic voting; eligible voters;
                 encrypted key; fraud; government data processing;
                 Invited Content; online voting; paper ballots; software
                 development; software engineering; tamper-proof
                 personal ID; Urban areas; voter access; voter fraud;
                 voter fraud reduction",
}

@Article{Kumari:2018:SAS,
  author =       "Saru Kumari and Marimuthu Karuppiah and Ashok Kumar
                 Das and Xiong Li and Fan Wu and Neeraj Kumar",
  title =        "A secure authentication scheme based on elliptic curve
                 cryptography for {IoT} and cloud servers",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "74",
  number =       "12",
  pages =        "6428--6453",
  month =        dec,
  year =         "2018",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-017-2048-0",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Thu Oct 10 15:31:10 MDT 2019",
  bibsource =    "http://link.springer.com/journal/11227/74/12;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Article{Kuo:2018:DRA,
  author =       "Tsung-Min Kuo and Sung-Ming Yen and Meng-Che Han",
  title =        "Dynamic reversed accumulator",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "2",
  pages =        "183--191",
  month =        apr,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0360-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Mar 3 09:41:24 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0360-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
  keywords =     "Dynamic accumulator; Revocation; Zero-knowledge
                 proof",
}

@Article{Kurkcu:2018:CBE,
  author =       "{\"O}m{\"u}r K{\i}van{\c{c}} K{\"u}rk{\c{c}}{\"u} and
                 Ersin Aslan",
  title =        "A Comparison Between Edge Neighbor Rupture Degree and
                 Edge Scattering Number in Graphs",
  journal =      j-INT-J-FOUND-COMP-SCI,
  volume =       "29",
  number =       "7",
  pages =        "??--??",
  month =        nov,
  year =         "2018",
  DOI =          "https://doi.org/10.1142/S0129054118500247",
  ISSN =         "0129-0541",
  ISSN-L =       "0129-0541",
  bibdate =      "Mon Nov 12 14:26:50 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijfcs.bib",
  URL =          "https://www.worldscientific.com/doi/10.1142/S0129054118500247",
  abstract =     "The vulnerability measure of a graph or a network
                 depends on robustness of the remained graph, after
                 being exposed to any intervention or attack. In this
                 paper, we consider two edge vulnerability parameters
                 that are the edge neighbor rupture degree and the edge
                 scattering number. The values of these parameters of
                 some specific graphs and their graph operations are
                 calculated. Thus, we analyze and compare which
                 parameter is distinctive for the different type of
                 graphs by using tables.",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Foundations of Computer
                 Science (IJFCS)",
  journal-URL =  "http://www.worldscientific.com/loi/ijfcs",
}

@Article{Kwon:2018:CEI,
  author =       "Jihoon Kwon and Seog Chung Seo and Seokhie Hong",
  title =        "Correction to: {An efficient implementation of
                 pairing-based cryptography on MSP430 processor}",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "74",
  number =       "5",
  pages =        "2254--2254",
  month =        may,
  year =         "2018",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-018-2320-y",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Thu Oct 10 15:31:11 MDT 2019",
  bibsource =    "http://link.springer.com/journal/11227/74/5;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  note =         "See \cite{Kwon:2018:EIP}.",
  URL =          "http://link.springer.com/content/pdf/10.1007/s11227-018-2320-y.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Article{Kwon:2018:EIP,
  author =       "Jihoon Kwon and Seog Chung Seo and Seokhie Hong",
  title =        "An efficient implementation of pairing-based
                 cryptography on {MSP430} processor",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "74",
  number =       "3",
  pages =        "1394--1417",
  month =        mar,
  year =         "2018",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-017-2097-4",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Fri Mar 2 12:22:02 MST 2018",
  bibsource =    "http://link.springer.com/journal/11227/74/3;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Article{Lai:2018:EQK,
  author =       "Hong Lai and Mingxing Luo and Josef Pieprzyk and
                 Zhiguo Qu and Mehmet A. Orgun",
  title =        "Efficient quantum key distribution using
                 {Fibonacci}-number coding with a biased basis choice",
  journal =      j-INFO-PROC-LETT,
  volume =       "134",
  number =       "??",
  pages =        "24--30",
  month =        jun,
  year =         "2018",
  CODEN =        "IFPLAT",
  DOI =          "https://doi.org/10.1016/j.ipl.2018.01.011",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Sat Mar 10 13:57:33 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/fibquart.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019018300267",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Lai:2018:IBB,
  author =       "Jianchang Lai and Yi Mu and Fuchun Guo and Peng Jiang
                 and Sha Ma",
  title =        "Identity-Based Broadcast Encryption for Inner
                 Products",
  journal =      j-COMP-J,
  volume =       "61",
  number =       "8",
  pages =        "1240--1251",
  day =          "1",
  month =        aug,
  year =         "2018",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxy062",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Fri Aug 3 11:54:57 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://academic.oup.com/comjnl/article/61/8/1240/5035766",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Lai:2018:NSH,
  author =       "Qiqi Lai and Bo Yang and Yong Yu and Yuan Chen and
                 Jian Bai",
  title =        "Novel Smooth Hash Proof Systems Based on Lattices",
  journal =      j-COMP-J,
  volume =       "61",
  number =       "4",
  pages =        "561--574",
  day =          "1",
  month =        apr,
  year =         "2018",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxx111",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Fri Aug 3 11:54:19 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  URL =          "http://academic.oup.com/comjnl/article/61/4/561/4725104",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Lee:2018:NIC,
  author =       "Eunsung Lee and Sang Woo Kim",
  title =        "Non-interactive Conditional Proxy Re-Signature in the
                 Standard Model",
  journal =      j-COMP-J,
  volume =       "61",
  number =       "12",
  pages =        "1772--1782",
  day =          "1",
  month =        dec,
  year =         "2018",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/computer_journal/bxy036",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Nov 27 19:24:38 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://academic.oup.com/comjnl/article/61/12/1772/4965847",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Leung:2018:TTA,
  author =       "Ho-Man Colman Leung and Chi-Wing Fu and Pheng-Ann
                 Heng",
  title =        "{TwistIn}: Tangible Authentication of Smart Devices
                 via Motion Co-analysis with a Smartwatch",
  journal =      j-IMWUT,
  volume =       "2",
  number =       "2",
  pages =        "1--24",
  month =        jul,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3214275",
  ISSN =         "2474-9567 (electronic)",
  bibdate =      "Thu Jan 23 12:37:01 MST 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/imwut.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3214275",
  abstract =     "Smart devices contain sensitive information that has
                 to be guarded against unauthorized access through
                 authentication. Existing authentication methods become
                 obsolete as they are designed either for logging-in one
                 device at a time or are ineffective in \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "72",
  fjournal =     "Proceedings of the ACM on Interactive, Mobile,
                 Wearable and Ubiquitous Technologies (IMWUT)",
  journal-URL =  "https://dl.acm.org/loi/imwut",
}

@Article{Li:2018:CIC,
  author =       "M. Li and H. Fan and Y. Xiang and Y. Li and Y. Zhang",
  title =        "Cryptanalysis and Improvement of a Chaotic Image
                 Encryption by First-Order Time-Delay System",
  journal =      j-IEEE-MULTIMEDIA,
  volume =       "25",
  number =       "3",
  pages =        "92--101",
  month =        jul # "\slash " # sep,
  year =         "2018",
  CODEN =        "IEMUE4",
  DOI =          "https://doi.org/10.1109/MMUL.2018.112142439",
  ISSN =         "1070-986x (print), 1941-0166 (electronic)",
  ISSN-L =       "1070-986X",
  bibdate =      "Fri Aug 2 10:38:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeemultimedia.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE MultiMedia",
  journal-URL =  "http://www.computer.org/multimedia/",
  keywords =     "chaos; Correlation; cryptanalysis; cryptography;
                 delays; Encryption; first-order time-delay system;
                 hyperchaotic based image encryption scheme; IEEE
                 Multimedia; image coding; image encryption; Multimedia
                 communication; Object recognition; plaintext attack;
                 two-round crossover diffusion; vector partition;
                 vectors",
}

@Article{Li:2018:CIE,
  author =       "C. Li and D. Lin and J. L{\"u} and F. Hao",
  title =        "Cryptanalyzing an Image Encryption Algorithm Based on
                 Autoblocking and Electrocardiography",
  journal =      j-IEEE-MULTIMEDIA,
  volume =       "25",
  number =       "4",
  pages =        "46--56",
  month =        oct # "\slash " # dec,
  year =         "2018",
  CODEN =        "IEMUE4",
  DOI =          "https://doi.org/10.1109/MMUL.2018.2873472",
  ISSN =         "1070-986x (print), 1941-0166 (electronic)",
  ISSN-L =       "1070-986X",
  bibdate =      "Fri Aug 2 10:38:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeemultimedia.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE MultiMedia",
  journal-URL =  "http://www.computer.org/multimedia/",
  keywords =     "*; autoblocking method; Chaotic communication; chaotic
                 image encryption algorithm; chaotic system; cipher
                 images; cryptography; electrocardiography;
                 Electrocardiography; electrocardiography signals;
                 Encryption; Feature extraction; image processing;
                 Logistics; mask image; plain image",
}

@Article{Li:2018:MMA,
  author =       "Rongjia Li and Chenhui Jin",
  title =        "Meet-in-the-Middle Attacks on Reduced-Round
                 {QARMA-64\slash 128}",
  journal =      j-COMP-J,
  volume =       "61",
  number =       "8",
  pages =        "1158--1165",
  day =          "1",
  month =        aug,
  year =         "2018",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxy045",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Fri Aug 3 11:54:57 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://academic.oup.com/comjnl/article/61/8/1158/4993053",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Li:2018:OPP,
  author =       "Tong Li and Zhengan Huang and Ping Li and Zheli Liu
                 and Chunfu Jia",
  title =        "Outsourced privacy-preserving classification service
                 over encrypted data",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "106",
  number =       "??",
  pages =        "100--110",
  day =          "15",
  month =        mar,
  year =         "2018",
  CODEN =        "JNCAF3",
  DOI =          "https://doi.org/10.1016/j.jnca.2017.12.021",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Sat Mar 3 15:22:11 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804517304356",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Li:2018:RBB,
  author =       "Xiong Li and Jianwei Niu and Saru Kumari and Fan Wu
                 and Kim-Kwang Raymond Choo",
  title =        "A robust biometrics based three-factor authentication
                 scheme for {Global Mobility Networks} in smart city",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "83",
  number =       "??",
  pages =        "607--618",
  month =        jun,
  year =         "2018",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Thu Mar 15 17:42:39 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167739X1730585X",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Li:2018:SCM,
  author =       "Xiong Li and Fan Wu and Muhammad Khurram Khan and Lili
                 Xu and Jian Shen and Minho Jo",
  title =        "A secure chaotic map-based remote authentication
                 scheme for telecare medicine information systems",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "84",
  number =       "??",
  pages =        "149--159",
  month =        jul,
  year =         "2018",
  CODEN =        "FGSEVI",
  DOI =          "https://doi.org/10.1016/j.future.2017.08.029",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Mon Apr 16 14:45:08 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167739X1730688X",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Li:2018:TFA,
  author =       "Xiong Li and Jianwei Niu and Saru Kumari and Fan Wu
                 and Arun Kumar Sangaiah and Kim-Kwang Raymond Choo",
  title =        "A three-factor anonymous authentication scheme for
                 wireless sensor networks in {Internet of Things}
                 environments",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "103",
  number =       "??",
  pages =        "194--204",
  day =          "1",
  month =        feb,
  year =         "2018",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Fri Jan 12 10:10:21 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804517302254",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Li:2018:WMH,
  author =       "L. Li and H. Li and W. Yuan and J. Lu and X. Feng and
                 C. Chang",
  title =        "A Watermarking Mechanism With High Capacity for
                 Three-Dimensional Mesh Objects Using Integer Planning",
  journal =      j-IEEE-MULTIMEDIA,
  volume =       "25",
  number =       "3",
  pages =        "49--64",
  month =        jul # "\slash " # sep,
  year =         "2018",
  CODEN =        "IEMUE4",
  DOI =          "https://doi.org/10.1109/MMUL.2018.112142343",
  ISSN =         "1070-986x (print), 1941-0166 (electronic)",
  ISSN-L =       "1070-986X",
  bibdate =      "Fri Aug 2 10:38:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeemultimedia.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE MultiMedia",
  journal-URL =  "http://www.computer.org/multimedia/",
  keywords =     "carrier image; computer systems organization; digital
                 watermarking; Discrete Fourier transforms; flexible
                 selection process; global optimization; high capacity;
                 high-capacity information; IEEE Multimedia; image
                 watermarking; integer planning; mathematics of
                 computing; Multimedia communication; numerical
                 analysis; optimization; Robustness; signal processing
                 systems; Solid modeling; sparsity analysis process;
                 special-purpose and application-based systems;
                 Three-dimensional displays; three-dimensional mesh
                 objects; Watermarking; watermarking mechanism",
}

@Article{Lin:2018:BBB,
  author =       "Chao Lin and Debiao He and Xinyi Huang and Kim-Kwang
                 Raymond Choo and Athanasios V. Vasilakos",
  title =        "{BSeIn}: a blockchain-based secure mutual
                 authentication with fine-grained access control system
                 for industry 4.0",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "116",
  number =       "??",
  pages =        "42--52",
  day =          "15",
  month =        aug,
  year =         "2018",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Mon Oct 14 14:16:25 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804518301619",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Lin:2018:CPF,
  author =       "Xi-Jun Lin and Lin Sun and Haipeng Qu and Dongxiao
                 Liu",
  title =        "Cryptanalysis of A Pairing-Free Certificateless
                 Signcryption Scheme",
  journal =      j-COMP-J,
  volume =       "61",
  number =       "4",
  pages =        "539--544",
  day =          "1",
  month =        apr,
  year =         "2018",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxx104",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Fri Aug 3 11:54:19 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://academic.oup.com/comjnl/article/61/4/539/4608880",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Lin:2018:SEI,
  author =       "Tingting Lin and Hailun Yan and Xuejia Lai and Yixin
                 Zhong and Yin Jia",
  title =        "Security Evaluation and Improvement of a White-Box
                 {SMS4} Implementation Based on Affine Equivalence
                 Algorithm",
  journal =      j-COMP-J,
  volume =       "61",
  number =       "12",
  pages =        "1783--1790",
  day =          "1",
  month =        dec,
  year =         "2018",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxy068",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Nov 27 19:24:38 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://academic.oup.com/comjnl/article/61/12/1783/5055352",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Lin:2018:SSS,
  author =       "Xi-Jun Lin and Lin Sun and Haipeng Qu and Dongxiao
                 Liu",
  title =        "On the Security of Secure Server-Designation Public
                 Key Encryption with Keyword Search",
  journal =      j-COMP-J,
  volume =       "61",
  number =       "12",
  pages =        "1791--1793",
  day =          "1",
  month =        dec,
  year =         "2018",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxy073",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Nov 27 19:24:38 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://academic.oup.com/comjnl/article/61/12/1791/5055854",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Liu:2018:GEI,
  author =       "Zhe Liu and Patrick Longa and {\c{C}}etin Kaya
                 Ko{\c{c}}",
  title =        "{Guest Editors}' Introduction to the Special Issue on
                 Cryptographic Engineering in a Post-Quantum World:
                 State of the Art Advances",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "67",
  number =       "11",
  pages =        "1532--1534",
  month =        "????",
  year =         "2018",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2018.2869611",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Thu Oct 11 14:31:34 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  URL =          "https://ieeexplore.ieee.org/document/8485531/",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Liu:2018:HMS,
  author =       "Jianqiang Liu and Shuai Huo and Yi Wang",
  title =        "A Hierarchical Mapping System for Flat Identifier to
                 Locator Resolution Based on Active Degree",
  journal =      j-FUTURE-INTERNET,
  volume =       "10",
  number =       "8",
  pages =        "75",
  day =          "08",
  month =        aug,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi10080075",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:51:01 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/10/8/75",
  abstract =     "Overloading of IP address semantics appeals for a new
                 network architecture based on Identifier (ID)/Locator
                 separation. The challenge of Identifier (ID)/Locator
                 separation is how to solve the scalability and
                 efficiency challenges of identity-to-location
                 resolution. By analyzing the requirements of the
                 Identifier (ID)/Locator separation protocol, this paper
                 proposes a hierarchical mapping architecture on
                 active-degree (HMAA). This HMAA was divided into three
                 levels: active local level, neutral transfer level, and
                 inert global level. Each mapping item is dynamically
                 allocated to different levels to ensure minimizing
                 delay according to its activity characteristics. The
                 top layer CHORD is constructed by the Markov Decision
                 Process, which can keep consistency between the
                 physical topology and the logical topology. The
                 simulation results on delay time show that HMAA can
                 satisfy the scalability and efficiency requirements of
                 an Identifier (ID)/Locator separation network.",
  acknowledgement = ack-nhfb,
}

@Article{Liu:2018:IMM,
  author =       "Ya Liu and Anren Yang and Bo Dai and Wei Li and
                 Zhiqiang Liu and Dawu Gu and Zhiqiang Zeng",
  title =        "Improved Meet-in-the Middle Attacks on Reduced-Round
                 {TWINE-128}",
  journal =      j-COMP-J,
  volume =       "61",
  number =       "8",
  pages =        "1252--1258",
  day =          "1",
  month =        aug,
  year =         "2018",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxy061",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Fri Aug 3 11:54:57 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://academic.oup.com/comjnl/article/61/8/1252/5040794",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Liu:2018:PAB,
  author =       "Zechao Liu and Zoe L. Jiang and Xuan Wang and S. M.
                 Yiu",
  title =        "Practical attribute-based encryption: Outsourcing
                 decryption, attribute revocation and policy updating",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "108",
  number =       "??",
  pages =        "112--123",
  day =          "15",
  month =        apr,
  year =         "2018",
  CODEN =        "JNCAF3",
  DOI =          "https://doi.org/10.1016/j.jnca.2018.01.016",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Sun May 27 08:10:14 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804518300304",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Liu:2018:SKR,
  author =       "Jinhui Liu and Yong Yu and Bo Yang and Jianwei Jia and
                 Shijia Wang and Houzhen Wang",
  title =        "Structural Key Recovery of Simple Matrix Encryption
                 Scheme Family",
  journal =      j-COMP-J,
  volume =       "61",
  number =       "12",
  pages =        "1880--1896",
  day =          "1",
  month =        dec,
  year =         "2018",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxy093",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Nov 27 19:24:38 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://academic.oup.com/comjnl/article/61/12/1880/5110544",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Liu:2018:VRU,
  author =       "Rui Liu and Cory Cornelius and Reza Rawassizadeh and
                 Ronald Peterson and David Kotz",
  title =        "Vocal Resonance: Using Internal Body Voice for
                 Wearable Authentication",
  journal =      j-IMWUT,
  volume =       "2",
  number =       "1",
  pages =        "1--23",
  month =        mar,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3191751",
  ISSN =         "2474-9567 (electronic)",
  bibdate =      "Thu Jan 23 12:36:59 MST 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/imwut.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3191751",
  abstract =     "We observe the advent of body-area networks of
                 pervasive wearable devices, whether for health
                 monitoring, personal assistance, entertainment, or home
                 automation. For many devices, it is critical to
                 identify the wearer, allowing sensor data to be
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "19",
  fjournal =     "Proceedings of the ACM on Interactive, Mobile,
                 Wearable and Ubiquitous Technologies (IMWUT)",
  journal-URL =  "https://dl.acm.org/loi/imwut",
}

@Article{Liu:2018:VSE,
  author =       "Zheli Liu and Tong Li and Ping Li and Chunfu Jia and
                 Jin Li",
  title =        "Verifiable searchable encryption with aggregate keys
                 for data sharing system",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "78 (part 2)",
  number =       "??",
  pages =        "778--788",
  month =        jan,
  year =         "2018",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Mon Sep 25 09:24:12 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X17302340",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Loreti:2018:PAB,
  author =       "Pierpaolo Loreti and Lorenzo Bracciale and Alberto
                 Caponi",
  title =        "Push Attack: Binding Virtual and Real Identities Using
                 Mobile Push Notifications",
  journal =      j-FUTURE-INTERNET,
  volume =       "10",
  number =       "2",
  pages =        "13",
  day =          "31",
  month =        jan,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi10020013",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:59 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/10/2/13",
  abstract =     "Popular mobile apps use push notifications extensively
                 to offer an ``always connected'' experience to their
                 users. Social networking apps use them as a real-time
                 channel to notify users about new private messages or
                 new social interactions (e.g., friendship request,
                 tagging, etc.). Despite the cryptography used to
                 protect these communication channels, the strict
                 temporal binding between the actions that trigger the
                 notifications and the reception of the notification
                 messages in the mobile device may represent a privacy
                 issue. In this work, we present the push notification
                 attack designed to bind the physical owners of mobile
                 devices with their virtual identities, even if
                 pseudonyms are used. In an online attack, an active
                 attacker triggers a push notification and captures the
                 notification packets that transit in the network. In an
                 offline attack, a passive attacker correlates the
                 social network activity of a user with the received
                 push notification. The push notification attack
                 bypasses the standard ways of protecting user privacy
                 based on the network layer by operating at the
                 application level. It requires no additional software
                 on the victim's mobile device.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Security and Privacy in Wireless and
                 Mobile Networks.",
}

@Article{Lyu:2018:PKE,
  author =       "Lin Lyu and Shengli Liu and Shuai Han",
  title =        "Public-Key Encryption with Tight Simulation-Based
                 Selective-Opening Security",
  journal =      j-COMP-J,
  volume =       "61",
  number =       "2",
  pages =        "288--318",
  day =          "1",
  month =        feb,
  year =         "2018",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxx080",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Fri Aug 3 11:54:04 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://academic.oup.com/comjnl/article/61/2/288/4259796",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Mahmood:2018:ECC,
  author =       "Khalid Mahmood and Shehzad Ashraf Chaudhry and Husnain
                 Naqvi and Saru Kumari and Xiong Li and Arun Kumar
                 Sangaiah",
  title =        "An elliptic curve cryptography based lightweight
                 authentication scheme for smart grid communication",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "81",
  number =       "??",
  pages =        "557--565",
  month =        apr,
  year =         "2018",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Tue Dec 26 08:55:44 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X17309263",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Maitra:2018:TAA,
  author =       "Subhamoy Maitra and Nishant Sinha and Akhilesh
                 Siddhanti and Ravi Anand and Sugata Gangopadhyay",
  title =        "A {TMDTO} Attack Against {Lizard}",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "67",
  number =       "5",
  pages =        "733--739",
  month =        may,
  year =         "2018",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2017.2773062",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Thu Apr 12 07:11:24 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  URL =          "https://ieeexplore.ieee.org/document/8107499/",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Malina:2018:SET,
  author =       "Lukas Malina and Petr Dzurenda and Jan Hajny and
                 Zdenek Martinasek",
  title =        "Secure and efficient two-factor zero-knowledge
                 authentication solution for access control systems",
  journal =      j-COMPUT-SECUR,
  volume =       "77",
  number =       "??",
  pages =        "500--513",
  month =        aug,
  year =         "2018",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:55 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404818304942",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Martins:2018:SFH,
  author =       "Paulo Martins and Leonel Sousa and Artur Mariano",
  title =        "A Survey on Fully Homomorphic Encryption: an
                 Engineering Perspective",
  journal =      j-COMP-SURV,
  volume =       "50",
  number =       "6",
  pages =        "83:1--83:??",
  month =        jan,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3124441",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Jan 20 09:25:01 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "It is unlikely that a hacker is able to compromise
                 sensitive data that is stored in an encrypted form.
                 However, when data is to be processed, it has to be
                 decrypted, becoming vulnerable to attacks. Homomorphic
                 encryption fixes this vulnerability by allowing one to
                 compute directly on encrypted data. In this survey,
                 both previous and current Somewhat Homomorphic
                 Encryption (SHE) schemes are reviewed, and the more
                 powerful and recent Fully Homomorphic Encryption (FHE)
                 schemes are comprehensively studied. The concepts that
                 support these schemes are presented, and their
                 performance and security are analyzed from an
                 engineering standpoint.",
  acknowledgement = ack-nhfb,
  articleno =    "83",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Mashimo:2018:VMS,
  author =       "Susumu Mashimo and Ryota Shioya and Koji Inoue",
  title =        "{VMOR}: Microarchitectural Support for Operand Access
                 in an Interpreter",
  journal =      j-IEEE-COMPUT-ARCHIT-LETT,
  volume =       "17",
  number =       "2",
  pages =        "217--220",
  month =        jul # "\slash " # dec,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/LCA.2018.2866243",
  ISSN =         "1556-6056 (print), 1556-6064 (electronic)",
  ISSN-L =       "1556-6056",
  bibdate =      "Tue Jun 25 07:41:05 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeecomputarchitlett.bib;
                 https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  abstract =     "Dynamic scripting languages become very popular for
                 high productivity. However, many of these languages
                 have significant runtime overheads because they employ
                 interpreter-based virtual machines. One of the major
                 overheads for the interpreter is derived from operand
                 accesses, which significantly increase memory accesses.
                 We propose VMOR, microarchitectural support for the
                 operand accesses in the interpreter. VMOR remaps
                 operand values into floating-point physical registers,
                 which are rarely used in the interpreter, and thus.
                 VMOR effectively reduces the memory accesses.",
  acknowledgement = ack-nhfb,
  affiliation =  "Mashimo, S (Reprint Author), Kyushu Univ, Fukuoka,
                 Fukuoka 8190395, Japan. Mashimo, Susumu; Inoue, Koji,
                 Kyushu Univ, Fukuoka, Fukuoka 8190395, Japan. Shioya,
                 Ryota, Nagoya Univ, Nagoya, Aichi 4648601, Japan.",
  author-email = "susumu.mashimo@cpc.ait.kyushu-u.ac.jp
                 shioya@nuee.nagoya-u.ac.jp inoue@ait.kyushu-u.ac.jp",
  da =           "2019-06-20",
  doc-delivery-number = "HA2CO",
  eissn =        "1556-6064",
  fjournal =     "IEEE Computer Architecture Letters",
  funding-acknowledgement = "JSPS KAKENHI [JP17J10388]",
  funding-text = "This work was supported by JSPS KAKENHI Grant Number
                 JP17J10388.",
  journal-iso =  "IEEE Comput. Archit. Lett.",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=10208",
  keywords =     "authoring languages; Cryptography; Dynamic scripting
                 language; dynamic scripting languages; floating-point
                 physical registers; Hardware; high productivity;
                 interpreter; interpreter-based virtual machines; memory
                 accesses; microarchitectural support;
                 Microarchitecture; operand access; operand values;
                 Pipelines; Productivity; program interpreters;
                 Proposals; Registers; virtual machines; VMOR",
  number-of-cited-references = "10",
  research-areas = "Computer Science",
  times-cited =  "0",
  unique-id =    "Mashimo:2018:VMS",
  web-of-science-categories = "Computer Science, Hardware \&
                 Architecture",
}

@Article{Matias:2018:NNZ,
  author =       "P. Matias and P. Barbosa and T. N. C. Cardoso and D.
                 M. Campos and D. F. Aranha",
  title =        "{NIZKCTF}: A Noninteractive Zero-Knowledge
                 Capture-the-Flag Platform",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "6",
  pages =        "42--51",
  month =        nov # "\slash " # dec,
  year =         "2018",
  DOI =          "https://doi.org/10.1109/MSEC.2018.2875324",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
  keywords =     "Brazilian cybersecurity community; Computer security;
                 cryptography; Cryptography; educational tools; NIZKCTF;
                 noninteractive zero-knowledge capture-the-flag
                 platform; open-audit CTF platform; Privacy;
                 professional tools; security issues; Servers; Software
                 development; zero-knowledge proofs",
}

@Article{Memon:2018:TFS,
  author =       "Shiraz Memon and Jensen Jens and Elbers Willem and
                 Helmut Neukirchen and Matthias Book and Morris Riedel",
  title =        "Towards Federated Service Discovery and Identity
                 Management in Collaborative Data and Compute Cloud
                 Infrastructures",
  journal =      j-J-GRID-COMP,
  volume =       "16",
  number =       "4",
  pages =        "663--681",
  month =        dec,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10723-018-9445-3",
  ISSN =         "1570-7873 (print), 1572-9184 (electronic)",
  ISSN-L =       "1570-7873",
  bibdate =      "Fri Oct 11 06:43:45 MDT 2019",
  bibsource =    "http://link.springer.com/journal/10723/16/4;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jgridcomp.bib",
  URL =          "https://link.springer.com/article/10.1007/s10723-018-9445-3",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Grid Computing",
  journal-URL =  "http://link.springer.com/journal/10723",
}

@Article{Meng:2018:TTB,
  author =       "Weizhi Meng and Yu Wang and Duncan S. Wong and Sheng
                 Wen and Yang Xiang",
  title =        "{TouchWB}: Touch behavioral user authentication based
                 on web browsing on smartphones",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "117",
  number =       "??",
  pages =        "1--9",
  day =          "1",
  month =        sep,
  year =         "2018",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Mon Oct 14 14:16:26 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804518301723",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Migliore:2018:HSC,
  author =       "Vincent Migliore and Maria M{\'e}ndez Real and Vianney
                 Lapotre and Arnaud Tisserand and Caroline Fontaine and
                 Guy Gogniat",
  title =        "Hardware\slash Software Co-Design of an Accelerator
                 for {FV} Homomorphic Encryption Scheme Using
                 {Karatsuba} Algorithm",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "67",
  number =       "3",
  pages =        "335--347",
  month =        mar,
  year =         "2018",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2016.2645204",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Thu Feb 15 05:53:34 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  URL =          "http://ieeexplore.ieee.org/document/7797469/",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Migliore:2018:PPF,
  author =       "Vincent Migliore and Guillaume Bonnoron and Caroline
                 Fontaine",
  title =        "Practical Parameters for Somewhat Homomorphic
                 Encryption Schemes on Binary Circuits",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "67",
  number =       "11",
  pages =        "1550--1560",
  month =        "????",
  year =         "2018",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2018.2808962",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Thu Oct 11 14:31:34 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  URL =          "https://ieeexplore.ieee.org/document/8302942/",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Min:2018:AAB,
  author =       "Donghyun Min and Donggyu Park and Jinwoo Ahn and Ryan
                 Walker and Junghee Lee and Sungyong Park and Youngjae
                 Kim",
  title =        "{Amoeba}: An Autonomous Backup and Recovery {SSD} for
                 Ransomware Attack Defense",
  journal =      j-IEEE-COMPUT-ARCHIT-LETT,
  volume =       "17",
  number =       "2",
  pages =        "243--246",
  month =        jul # "\slash " # dec,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/LCA.2018.2883431",
  ISSN =         "1556-6056 (print), 1556-6064 (electronic)",
  ISSN-L =       "1556-6056",
  bibdate =      "Tue Jun 25 07:41:05 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeecomputarchitlett.bib",
  abstract =     "Ransomware is one of growing concerns in enterprise
                 and government organizations, because it may cause
                 financial damages or loss of important data. Although
                 there are techniques to detect and prevent ransomware,
                 an evolved ransomware may evade them because they are
                 based on monitoring known behaviors. Ransomware can be
                 mitigated if backup copies of data are retained in a
                 safe place. However, existing backup solutions may be
                 under ransomware's control and an intelligent
                 ransomware may destroy backup copies too. They also
                 incur overhead to storage space, performance and
                 network traffic (in case of remote backup). In this
                 paper, we propose an SSD system that supports automated
                 backup, called Amoeba. In particular, Amoeba is armed
                 with a hardware accelerator that can detect the
                 infection of pages by ransomware attacks at high speed
                 and a fine-grained backup control mechanism to minimize
                 space overhead for original data backup. For
                 evaluation, we extended the Microsoft SSD simulator to
                 implement Amoeba and evaluated it using the realistic
                 block-level traces, which are collected while running
                 the actual ransomware. According to our experiments,
                 Amoeba has negligible overhead and outperforms in
                 performance and space efficiency over the
                 state-of-the-art SSD, FlashGuard, which supports data
                 backup within the device.",
  acknowledgement = ack-nhfb,
  affiliation =  "Kim, Y (Reprint Author), Sogang Univ, Seoul 04107,
                 South Korea. Min, Donghyun; Park, Donggyu; Ahn, Jinwoo;
                 Park, Sungyong; Kim, Youngjae, Sogang Univ, Seoul
                 04107, South Korea. Walker, Ryan; Lee, Junghee, Univ
                 Texas San Antonio, San Antonio, TX 78249 USA.",
  author-email = "mdh38112@sogang.ac.kr dgpark@sogang.ac.kr
                 jinu37@sogang.ac.kr ryan.walker@utsa.edu
                 junghee.lee@utsa.edu parksy@sogang.ac.kr
                 youkim@sogang.ac.kr",
  da =           "2019-06-20",
  doc-delivery-number = "HE6YC",
  eissn =        "1556-6064",
  fjournal =     "IEEE Computer Architecture Letters",
  funding-acknowledgement = "National Research Foundation of Korea (NRF)
                 --- Korea Government (MSIT) [NRF-2018R1A1A1A05079398]",
  funding-text = "This work was supported by the National Research
                 Foundation of Korea (NRF) grant funded by the Korea
                 Government (MSIT) (No. NRF-2018R1A1A1A05079398).",
  journal-iso =  "IEEE Comput. Archit. Lett.",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=10208",
  keywords =     "Aerospace electronics; Amoeba; autonomous backup SSD;
                 autonomous recovery SSD; back-up procedures;
                 cryptography; Cryptography; data backup; Entropy;
                 FlashGuard; intelligent ransomware; invasive software;
                 Microsoft SSD simulator; Performance evaluation;
                 Ransomware; ransomware attack; ransomware attack
                 defense; Solid-state drive (SSD); SSD system; storage
                 management; storage security",
  number-of-cited-references = "12",
  ORCID-numbers = "Park, Sungyong/0000-0002-0309-1820 Min,
                 Donghyun/0000-0002-6043-9264",
  research-areas = "Computer Science",
  times-cited =  "0",
  unique-id =    "Min:2018:AAB",
  web-of-science-categories = "Computer Science, Hardware \&
                 Architecture",
  xxpages =      "245--248",
}

@Article{Miret:2018:PBC,
  author =       "Josep M. Miret and Daniel Sadornil and Juan G. Tena",
  title =        "Pairing-Based Cryptography on Elliptic Curves",
  journal =      j-MATH-COMPUT-SCI,
  volume =       "12",
  number =       "3",
  pages =        "309--318",
  month =        sep,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s11786-018-0347-3",
  ISSN =         "1661-8270 (print), 1661-8289 (electronic)",
  ISSN-L =       "1661-8270",
  bibdate =      "Mon Mar 4 06:59:44 MST 2019",
  bibsource =    "http://link.springer.com/journal/11786/12/3;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/math-comput-sci.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Mathematics in Computer Science",
  journal-URL =  "http://link.springer.com/journal/11786",
}

@Article{Mo:2018:RUA,
  author =       "Jiaqing Mo and Zhongwang Hu and Yuhua Lin",
  title =        "Remote user authentication and key agreement for
                 mobile client-server environments on elliptic curve
                 cryptography",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "74",
  number =       "11",
  pages =        "5927--5943",
  month =        nov,
  year =         "2018",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-018-2507-2",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Thu Oct 10 15:31:09 MDT 2019",
  bibsource =    "http://link.springer.com/journal/11227/74/11;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Article{Moataz:2018:SSE,
  author =       "Tarik Moataz and Indrajit Ray and Indrakshi Ray and
                 Abdullatif Shikfa and Fr{\'e}d{\'e}ric Cuppens and Nora
                 Cuppens",
  title =        "Substring search over encrypted data",
  journal =      j-J-COMP-SECUR,
  volume =       "26",
  number =       "1",
  pages =        "1--30",
  month =        "????",
  year =         "2018",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-14652",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 23 05:47:14 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Modersheim:2018:ABP,
  author =       "Sebastian M{\"o}dersheim and Luca Vigan{\`o}",
  title =        "Alpha--Beta Privacy",
  journal =      j-TOPS,
  volume =       "22",
  number =       "1",
  pages =        "7:1--7:??",
  month =        jan,
  year =         "2018",
  DOI =          "https://doi.org/10.1145/3289255",
  ISSN =         "2471-2566 (print), 2471-2574 (electronic)",
  bibdate =      "Sat Sep 21 08:26:24 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tops.bib",
  URL =          "https://dl.acm.org/citation.cfm?id=3289255",
  abstract =     "The formal specification of privacy goals in symbolic
                 protocol models has proved to be not quite trivial so
                 far. The most widely used approach in formal methods is
                 based on the static equivalence of frames in the
                 applied pi-calculus, basically asking whether or not
                 the intruder is able to distinguish two given worlds.
                 But then a subtle question emerges: How can we be sure
                 that we have specified all pairs of worlds to properly
                 reflect our intuitive privacy goal? To address this
                 problem, we introduce in this article a novel and
                 declarative way to specify privacy goals, called (
                 \alpha , \beta )-privacy. This new approach is based on
                 specifying two formulae \alpha and \beta in first-order
                 logic with Herbrand universes, where \alpha reflects
                 the intentionally released information and \beta
                 includes the actual cryptographic (``technical'')
                 messages the intruder can see. Then ( \alpha , \beta
                 )-privacy means that the intruder cannot derive any
                 ``nontechnical'' statement from \beta that he cannot
                 derive from \alpha already. We describe by a variety of
                 examples how this notion can be used in practice. Even
                 though ( \alpha , \beta )-privacy does not directly
                 contain a notion of distinguishing between worlds,
                 there is a close relationship to static equivalence of
                 frames that we investigate formally. This allows us to
                 justify (and criticize) the specifications that are
                 currently used in verification tools and obtain a
                 decision procedure for a large fragment of ( \alpha ,
                 \beta )-privacy.",
  acknowledgement = ack-nhfb,
  articleno =    "7",
  fjournal =     "ACM Transactions on Privacy and Security (TOPS)",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J1547",
}

@Misc{Mofrad:2018:CSI,
  author =       "Saeid Mofrad and Fengwei Zhang and Shiyong Lu and
                 Weidong (Larry) Shi",
  title =        "A Comparison Study of {Intel SGX} and {AMD} Memory
                 Encryption Technology",
  howpublished = "Web lecture slides.",
  day =          "30",
  month =        may,
  year =         "2018",
  bibdate =      "Mon Oct 07 11:03:16 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://caslab.csl.yale.edu/workshops/hasp2018/HASP18_a9-mofrad_slides.pdf",
  acknowledgement = ack-nhfb,
  remark =       "Floating-point performance charts show up to 19.3
                 times slowdown of Intel SGX compared to AMD SEV when
                 memory encryption is enabled.",
}

@Article{Mohd:2018:HDM,
  author =       "Bassam Jamil Mohd and Thaier Hayajneh and Khalil M.
                 Ahmad Yousef and Zaid Abu Khalaf and Md Zakirul Alam
                 Bhuiyan",
  title =        "Hardware design and modeling of lightweight block
                 ciphers for secure communications",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "83",
  number =       "??",
  pages =        "510--521",
  month =        jun,
  year =         "2018",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Thu Mar 15 17:42:39 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167739X17304661",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Morales-Sandoval:2018:PBC,
  author =       "Miguel Morales-Sandoval and Jose Luis Gonzalez-Compean
                 and Arturo Diaz-Perez and Victor J. Sosa-Sosa",
  title =        "A pairing-based cryptographic approach for data
                 security in the cloud",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "4",
  pages =        "441--461",
  month =        aug,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0375-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Jul 25 08:53:56 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0375-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Mosca:2018:CEQ,
  author =       "M. Mosca",
  title =        "Cybersecurity in an Era with Quantum Computers: Will
                 We Be Ready?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "5",
  pages =        "38--41",
  month =        sep # "\slash " # oct,
  year =         "2018",
  DOI =          "https://doi.org/10.1109/MSP.2018.3761723",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
  keywords =     "Cryptography; cryptography; cybersecurity; Fault
                 tolerance; Fault tolerant systems; information assets;
                 migration time; organizations; quantum attacks; quantum
                 computers; quantum computing; Quantum computing; risk
                 management; security; security of data; security shelf
                 life; specific risks",
}

@Article{Mouris:2018:TSB,
  author =       "Dimitris Mouris and Nektarios Georgios Tsoutsos and
                 Michail Maniatakos",
  title =        "TERMinator Suite: Benchmarking Privacy-Preserving
                 Architectures",
  journal =      j-IEEE-COMPUT-ARCHIT-LETT,
  volume =       "17",
  number =       "2",
  pages =        "122--125",
  month =        jul # "\slash " # dec,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/LCA.2018.2812814",
  ISSN =         "1556-6056 (print), 1556-6064 (electronic)",
  ISSN-L =       "1556-6056",
  bibdate =      "Thu Jun 20 17:18:18 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeecomputarchitlett.bib",
  abstract =     "Security and privacy are fundamental objectives
                 characterizing contemporary cloud computing. Despite
                 the wide adoption of encryption for protecting data in
                 transit and at rest, data in use remains unencrypted
                 inside cloud processors and memories, as computation is
                 not applicable on encrypted values. This limitation
                 introduces security risks, as unencrypted values can be
                 leaked through side-channels or hardware Trojans. To
                 address this problem, encrypted architectures have
                 recently been proposed, which leverage homomorphic
                 encryption to natively process encrypted data using
                 datapaths of thousands of bits. In this case,
                 additional security protections are traded for higher
                 performance penalties, which drives the need for more
                 efficient architectures. In this work, we develop
                 benchmarks specifically tailored to homomorphic
                 computers, to enable comparisons across different
                 architectures. Our benchmark suite, dubbed TERMinator,
                 is unique as it avoids ``termination {problems''} that
                 prohibit making control-flow decisions and evaluating
                 early termination conditions based on encrypted data,
                 as these can leak information. Contrary to generic
                 suites that ignore the fundamental challenges of
                 encrypted computation, our algorithms are tailored to
                 the security primitives of the target encrypted
                 architecture, such as the existence of branching
                 oracles. In our experiments, we compiled our benchmarks
                 for the Cryptoleq architecture and evaluated their
                 performance for a range of security parameters.",
  acknowledgement = ack-nhfb,
  affiliation =  "Tsoutsos, NG (Reprint Author), NYU, New York, NY 10003
                 USA. Mouris, Dimitris, Univ Athens, GR-10679 Athens,
                 Greece. Tsoutsos, Nektarios Georgios; Maniatakos,
                 Michail, NYU, New York, NY 10003 USA.",
  author-email = "jimouris@di.uoa.gr nektarios.tsoutsos@nyu.edu
                 michail.maniatakos@nyu.edu",
  da =           "2019-06-20",
  doc-delivery-number = "GP4TI",
  eissn =        "1556-6064",
  fjournal =     "IEEE Computer Architecture Letters",
  funding-acknowledgement = "NYU Abu Dhabi Global Ph.D. Student
                 Fellowship program",
  funding-text = "This work was partially sponsored by the NYU Abu Dhabi
                 Global Ph.D. Student Fellowship program. D. Mouris
                 thanks Orestis Polychroniou for the fruitful
                 discussions.",
  journal-iso =  "IEEE Comput. Archit. Lett.",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=10208",
  keywords =     "Benchmarks; data privacy; encrypted computation;
                 homomorphic encryption; leakage prevention; performance
                 evaluation; termination problem",
  number-of-cited-references = "14",
  ORCID-numbers = "Maniatakos, Michail/0000-0001-6899-0651",
  research-areas = "Computer Science",
  times-cited =  "0",
  unique-id =    "Mouris:2018:TSB",
  web-of-science-categories = "Computer Science, Hardware \&
                 Architecture",
}

@Article{Mozaffari-Kermani:2018:ERE,
  author =       "Mehran Mozaffari-Kermani and Reza Azarderakhsh and
                 Ausmita Sarker and Amir Jalali",
  title =        "Efficient and Reliable Error Detection Architectures
                 of Hash-Counter-Hash Tweakable Enciphering Schemes",
  journal =      j-TECS,
  volume =       "17",
  number =       "2",
  pages =        "54:1--54:??",
  month =        apr,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3159173",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Thu Oct 17 18:16:34 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/tecs.bib",
  abstract =     "Through pseudorandom permutation, tweakable
                 enciphering schemes (TES) constitute block cipher modes
                 of operation which perform length-preserving
                 computations. The state-of-the-art research has focused
                 on different aspects of TES, including implementations
                 on hardware [field-programmable gate array (FPGA)/
                 application-specific integrated circuit (ASIC)] and
                 software (hard/soft-core microcontrollers) platforms,
                 algorithmic security, and applicability to sensitive,
                 security-constrained usage models. In this article, we
                 propose efficient approaches for protecting such
                 schemes against natural and malicious faults.
                 Specifically, noting that intelligent attackers do not
                 merely get confined to injecting multiple faults, one
                 major benchmark for the proposed schemes is evaluation
                 toward biased and burst fault models. We evaluate a
                 variant of TES, i.e., the Hash-Counter-Hash scheme,
                 which involves polynomial hashing as other variants are
                 either similar or do not constitute finite field
                 multiplication which, by far, is the most involved
                 operation in TES. In addition, we benchmark the
                 overhead and performance degradation on the ASIC
                 platform. The results of our error injection
                 simulations and ASIC implementations show the
                 suitability of the proposed approaches for a wide range
                 of applications including deeply embedded systems.",
  acknowledgement = ack-nhfb,
  articleno =    "54",
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J840",
}

@Article{Muhammad:2018:ISU,
  author =       "Khan Muhammad and Muhammad Sajjad and Irfan Mehmood
                 and Seungmin Rho and Sung Wook Baik",
  title =        "Image steganography using uncorrelated color space and
                 its application for security of visual contents in
                 online social networks",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "86",
  number =       "??",
  pages =        "951--960",
  month =        sep,
  year =         "2018",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Wed Jun 20 10:38:06 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167739X16306768",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Nagano:2018:PRT,
  author =       "Koki Nagano and Jaewoo Seo and Jun Xing and Lingyu Wei
                 and Zimo Li and Shunsuke Saito and Aviral Agarwal and
                 Jens Fursund and Hao Li",
  title =        "{paGAN}: real-time avatars using dynamic textures",
  journal =      j-TOG,
  volume =       "37",
  number =       "6",
  pages =        "258:1--258:??",
  month =        nov,
  year =         "2018",
  CODEN =        "ATGRDF",
  DOI =          "https://doi.org/10.1145/3272127.3275075",
  ISSN =         "0730-0301 (print), 1557-7368 (electronic)",
  ISSN-L =       "0730-0301",
  bibdate =      "Tue Oct 22 12:28:14 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tog.bib",
  abstract =     "With the rising interest in personalized VR and gaming
                 experiences comes the need to create high quality 3D
                 avatars that are both low-cost and variegated. Due to
                 this, building dynamic avatars from a single
                 unconstrained input image is becoming a popular
                 application. While previous techniques that attempt
                 this require multiple input images or rely on
                 transferring dynamic facial appearance from a source
                 actor, we are able to do so using only one 2D input
                 image without any form of transfer from a source image.
                 We achieve this using a new conditional Generative
                 Adversarial Network design that allows fine-scale
                 manipulation of any facial input image into a new
                 expression while preserving its identity. Our photoreal
                 avatar GAN (paGAN) can also synthesize the unseen mouth
                 interior and control the eye-gaze direction of the
                 output, as well as produce the final image from a novel
                 viewpoint. The method is even capable of generating
                 fully-controllable temporally stable video sequences,
                 despite not using temporal information during training.
                 After training, we can use our network to produce
                 dynamic image-based avatars that are controllable on
                 mobile devices in real time. To do this, we compute a
                 fixed set of output images that correspond to key
                 blendshapes, from which we extract textures in UV
                 space. Using a subject's expression blendshapes at
                 run-time, we can linearly blend these key textures
                 together to achieve the desired appearance.
                 Furthermore, we can use the mouth interior and eye
                 textures produced by our network to synthesize
                 on-the-fly avatar animations for those regions. Our
                 work produces state-of-the-art quality image and video
                 synthesis, and is the first to our knowledge that is
                 able to generate a dynamically textured avatar with a
                 mouth interior, all from a single image.",
  acknowledgement = ack-nhfb,
  articleno =    "258",
  fjournal =     "ACM Transactions on Graphics",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J778",
}

@Article{Neustaedter:2018:BTW,
  author =       "Carman Neustaedter and Samarth Singhal and Rui Pan and
                 Yasamin Heshmat and Azadeh Forghani and John Tang",
  title =        "From Being There to Watching: Shared and Dedicated
                 Telepresence Robot Usage at Academic Conferences",
  journal =      j-TOCHI,
  volume =       "25",
  number =       "6",
  pages =        "33:1--33:??",
  month =        dec,
  year =         "2018",
  CODEN =        "ATCIF4",
  DOI =          "https://doi.org/10.1145/3243213",
  ISSN =         "1073-0516 (print), 1557-7325 (electronic)",
  ISSN-L =       "1073-0516",
  bibdate =      "Tue Oct 22 08:21:00 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tochi.bib",
  abstract =     "Telepresence attendance at academic conferences is now
                 a reality and allows people who cannot attend in person
                 with the opportunity to still be ``present.'' This is
                 valuable for people who face accessibility challenges,
                 cost or travel restrictions, or limited time for
                 travel. We have deployed and studied the use of
                 telepresence robots at three ACM conferences,
                 Ubicomp/ISWC 2014, CSCW 2016, and CHI 2016, ranging
                 from remote users having dedicated telepresence robots
                 to users sharing telepresence robots both synchronously
                 and asynchronously. In this article, we report on the
                 telepresence offerings along with the user behaviors,
                 experiences, and the social norms found for remote
                 conference attendance. Our results across the studies
                 focus around three main themes: shared vs. dedicated
                 robot usage, identity presentation and the value and
                 challenges associated with it; and local in-person
                 support through proxies and instant messaging
                 backchannels. These themes point to three different
                 areas of design exploration for telepresence robots,
                 pointing out the limitations of existing design
                 solutions with respect to each theme, areas for future
                 telepresence design work, and the value in considering
                 varied telepresence robot solutions, including both
                 dedicated and shared telepresence robots.",
  acknowledgement = ack-nhfb,
  articleno =    "33",
  fjournal =     "ACM Transactions on Computer-Human Interaction",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J756",
}

@Article{Nguyen:2018:TBU,
  author =       "Toan Nguyen and Nasir Memon",
  title =        "Tap-based user authentication for smartwatches",
  journal =      j-COMPUT-SECUR,
  volume =       "78",
  number =       "??",
  pages =        "174--186",
  month =        sep,
  year =         "2018",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:57 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404818303778",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ogiela:2018:EBI,
  author =       "Marek R. Ogiela and Hoon Ko",
  title =        "Editorial: Bio-inspired and cognitive approaches in
                 cryptography and security applications",
  journal =      j-CCPE,
  volume =       "30",
  number =       "2",
  pages =        "??--??",
  day =          "25",
  month =        jan,
  year =         "2018",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.4385",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Sat Dec 30 09:12:00 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
}

@Article{Ogiela:2018:LTC,
  author =       "Urszula Ogiela and Lidia Ogiela",
  title =        "Linguistic techniques for cryptographic data sharing
                 algorithms",
  journal =      j-CCPE,
  volume =       "30",
  number =       "3",
  pages =        "",
  day =          "10",
  month =        feb,
  year =         "2018",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.4275",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Sat Aug 4 10:03:11 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://onlinelibrary.wiley.com/doi/abs/10.1002/cpe.4275",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
}

@Article{Ogiela:2018:VCA,
  author =       "Urszula Ogiela and Makoto Takizawa and Lidia Ogiela",
  title =        "Visual {CAPTCHA} application in linguistic
                 cryptography",
  journal =      j-CCPE,
  volume =       "30",
  number =       "2",
  pages =        "??--??",
  day =          "25",
  month =        jan,
  year =         "2018",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.4362",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Sat Dec 30 09:12:00 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
}

@Article{P:2018:ABE,
  author =       "Praveen Kumar P and Syam Kumar P and Alphonse P. J.
                 A.",
  title =        "Attribute based encryption in cloud computing: A
                 survey, gap analysis, and future directions",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "108",
  number =       "??",
  pages =        "37--52",
  day =          "15",
  month =        apr,
  year =         "2018",
  CODEN =        "JNCAF3",
  DOI =          "https://doi.org/10.1016/j.jnca.2018.02.009",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Sun May 27 08:10:14 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804518300547",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Pagnin:2018:HDB,
  author =       "Elena Pagnin and Anjia Yang and Qiao Hu and Gerhard
                 Hancke and Aikaterini Mitrokotsa",
  title =        "{HB$^+$DB}: Distance bounding meets human based
                 authentication",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "80",
  number =       "??",
  pages =        "627--639",
  month =        mar,
  year =         "2018",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Sat Dec 2 16:58:42 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X16301492",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Paletov:2018:ICA,
  author =       "Rumen Paletov and Petar Tsankov and Veselin Raychev
                 and Martin Vechev",
  title =        "Inferring crypto {API} rules from code changes",
  journal =      j-SIGPLAN,
  volume =       "53",
  number =       "4",
  pages =        "450--464",
  month =        apr,
  year =         "2018",
  CODEN =        "SINODQ",
  DOI =          "https://doi.org/10.1145/3296979.3192403",
  ISSN =         "0362-1340 (print), 1523-2867 (print), 1558-1160
                 (electronic)",
  ISSN-L =       "0362-1340",
  bibdate =      "Wed Oct 16 14:12:57 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigplan2010.bib",
  abstract =     "Creating and maintaining an up-to-date set of security
                 rules that match misuses of crypto APIs is challenging,
                 as crypto APIs constantly evolve over time with new
                 cryptographic primitives and settings, making existing
                 ones obsolete. To address this challenge, we present a
                 new approach to extract security fixes from thousands
                 of code changes. Our approach consists of: (i)
                 identifying code changes, which often capture security
                 fixes, (ii) an abstraction that filters irrelevant code
                 changes (such as refactorings), and (iii) a clustering
                 analysis that reveals commonalities between semantic
                 code changes and helps in eliciting security rules. We
                 applied our approach to the Java Crypto API and showed
                 that it is effective: (i) our abstraction effectively
                 filters non-semantic code changes (over 99\% of all
                 changes) without removing security fixes, and (ii) over
                 80\% of the code changes are security fixes identifying
                 security rules. Based on our results, we identified 13
                 rules, including new ones not supported by existing
                 security checkers.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGPLAN Notices",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J706",
  remark =       "PLDI '18 proceedings.",
}

@Article{Park:2018:OTP,
  author =       "Chang-Seop Park",
  title =        "One-time password based on hash chain without shared
                 secret and re-registration",
  journal =      j-COMPUT-SECUR,
  volume =       "75",
  number =       "??",
  pages =        "138--146",
  month =        jun,
  year =         "2018",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:54 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404818301391",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Parveen:2018:IEE,
  author =       "Farhana Parveen and Shaahin Angizi and Deliang Fan",
  title =        "{IMFlexCom}: Energy Efficient In-Memory Flexible
                 Computing Using Dual-Mode {SOT-MRAM}",
  journal =      j-JETC,
  volume =       "14",
  number =       "3",
  pages =        "35:1--35:??",
  month =        oct,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3223047",
  ISSN =         "1550-4832",
  bibdate =      "Thu Nov 1 16:44:41 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jetc.bib",
  abstract =     "In this article, we propose an In-Memory Flexible
                 Computing platform (IMFlexCom) using a novel Spin Orbit
                 Torque Magnetic Random Access Memory (SOT-MRAM) array
                 architecture, which could work in dual mode: memory
                 mode and computing mode. Such intrinsic in-memory logic
                 (AND/OR/XOR) could be used to process data within
                 memory to greatly reduce power-hungry and long distance
                 massive data communication in conventional Von Neumann
                 computing systems. A comprehensive reliability analysis
                 is performed, which confirms $ \approx $90mV and $
                 \approx $10mV (worst-case) sense margin for memory and
                 in-memory logic operation in variations on
                 resistance-area product and tunnel magnetoresistance.
                 We further show that sense margin for in-memory logic
                 computation can be significantly increased by
                 increasing the oxide thickness. Furthermore, we employ
                 bulk bitwise vector operation and data encryption
                 engine as case studies to investigate the performance
                 of our proposed design. IMFlexCom shows $ \approx 35
                 \times $ energy saving and $ \approx 18 \times $
                 speedup for bulk bitwise in-memory vector AND/OR
                 operation compared to DRAM-based in-memory logic.
                 Again, IMFlexCom can achieve 77.27\% and 85.4\% lower
                 energy consumption compared to CMOS-ASIC- and
                 CMOL-based Advanced Encryption Standard (AES)
                 implementations, respectively. It offers almost similar
                 energy consumption as recent DW-AES implementation with
                 66.7\% less area overhead.",
  acknowledgement = ack-nhfb,
  articleno =    "35",
  fjournal =     "ACM Journal on Emerging Technologies in Computing
                 Systems (JETC)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J967",
}

@Article{Patel:2018:LLA,
  author =       "Hasmukh Patel and Devesh C. Jinwala",
  title =        "{LPM}: A lightweight authenticated packet marking
                 approach for {IP} traceback",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "140",
  number =       "??",
  pages =        "41--50",
  day =          "20",
  month =        jul,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1016/j.comnet.2018.04.014",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Thu May 31 13:40:46 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1389128618301786",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286/",
}

@Article{Peris-Lopez:2018:EAC,
  author =       "Pedro Peris-Lopez and Lorena Gonz{\'a}lez-Manzano and
                 Carmen Camara and Jos{\'e} Mar{\'\i}a de Fuentes",
  title =        "Effect of attacker characterization in {ECG}-based
                 continuous authentication mechanisms for {Internet of
                 Things}",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "81",
  number =       "??",
  pages =        "67--77",
  month =        apr,
  year =         "2018",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Tue Dec 26 08:55:44 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X17300407",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Phuong:2018:CBE,
  author =       "Tran Viet Xuan Phuong and Guomin Yang and Willy
                 Susilo",
  title =        "Criteria-Based Encryption",
  journal =      j-COMP-J,
  volume =       "61",
  number =       "4",
  pages =        "512--525",
  day =          "1",
  month =        apr,
  year =         "2018",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxx088",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Fri Aug 3 11:54:19 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://academic.oup.com/comjnl/article/61/4/512/4430306",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Pizzi:2018:ETM,
  author =       "Sara Pizzi and Chiara Suraci and Leonardo Militano and
                 Antonino Orsino and Antonella Molinaro and Antonio Iera
                 and Giuseppe Araniti",
  title =        "Enabling Trustworthy Multicast Wireless Services
                 through {D2D} Communications in {5G} Networks",
  journal =      j-FUTURE-INTERNET,
  volume =       "10",
  number =       "7",
  pages =        "66",
  day =          "11",
  month =        jul,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi10070066",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:51:01 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/10/7/66",
  abstract =     "Device-to-device (D2D) communication is considered as
                 one of the key enabling technologies for
                 fifth-generation (5G) networks as it allows data
                 offloading generated by the huge number of connected
                 devices. In this respect, group-oriented services are
                 among the most interesting usage scenarios. Indeed, D2D
                 can improve the performance of the conventional
                 multicast scheme (CMS) in cellular networks, which is
                 known to suffer from low spectral efficiency. Security
                 is a further key field of investigation for 5G systems,
                 as any threat to privacy and security may lead to both
                 deteriorated user experience and inefficient network
                 resources' utilization. Security issues are even more
                 in focus for D2D connections between devices that are
                 in mutual proximity. To improve the CMS performance and
                 also sustain security requirements of the 5G network,
                 this work proposes a secure D2D data transmission
                 algorithm. Making use of mechanisms such as encryption
                 and signature, this algorithm aims to protect the
                 exchanged data and the privacy of the devices involved
                 in the communication. A simulation campaign conducted
                 using MATLAB shows the ability of the proposed solution
                 to take advantage of the establishment of secure D2D
                 communications and efficiently utilize network
                 resources.",
  acknowledgement = ack-nhfb,
}

@Article{Pournaghi:2018:NNE,
  author =       "Seyed Morteza Pournaghi and Behnam Zahednejad and
                 Majid Bayat and Yaghoub Farjami",
  title =        "{NECPPA}: A novel and efficient conditional
                 privacy-preserving authentication scheme for {VANET}",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "134",
  number =       "??",
  pages =        "78--92",
  day =          "7",
  month =        apr,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1016/j.comnet.2018.01.015",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Sat Mar 17 13:11:52 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1389128618300227",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286/",
}

@Article{Pramila:2018:ICA,
  author =       "Anu Pramila and Anja Keskinarkaus and Tapio
                 Sepp{\"a}nen",
  title =        "Increasing the capturing angle in print-cam robust
                 watermarking",
  journal =      j-J-SYST-SOFTW,
  volume =       "135",
  number =       "??",
  pages =        "205--215",
  month =        jan,
  year =         "2018",
  CODEN =        "JSSODM",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Mon Nov 13 10:11:01 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0164121217302522",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Qiao:2018:CTC,
  author =       "Huidong Qiao and Jiangchun Ren and Zhiying Wang and
                 Haihe Ba and Huaizhe Zhou",
  title =        "Compulsory traceable ciphertext-policy attribute-based
                 encryption against privilege abuse in fog computing",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "88",
  number =       "??",
  pages =        "107--116",
  month =        nov,
  year =         "2018",
  CODEN =        "FGSEVI",
  DOI =          "https://doi.org/10.1016/j.future.2018.05.032",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Tue Sep 18 14:07:58 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X17328820",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Qin:2018:BRO,
  author =       "Baodong Qin and Qinglan Zhao and Dong Zheng",
  title =        "Bounded Revocable and Outsourceable {ABE} for Secure
                 Data Sharing",
  journal =      j-COMP-J,
  volume =       "61",
  number =       "8",
  pages =        "1259--1268",
  day =          "1",
  month =        aug,
  year =         "2018",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxy063",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Fri Aug 3 11:54:57 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://academic.oup.com/comjnl/article/61/8/1259/5045945",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  keywords =     "ABE (attribute-based encryption)",
}

@Article{Qin:2018:NUW,
  author =       "C. Qin and P. Ji and C. Chang and J. Dong and X. Sun",
  title =        "Non-uniform Watermark Sharing Based on Optimal
                 Iterative {BTC} for Image Tampering Recovery",
  journal =      j-IEEE-MULTIMEDIA,
  volume =       "25",
  number =       "3",
  pages =        "36--48",
  month =        jul # "\slash " # sep,
  year =         "2018",
  CODEN =        "IEMUE4",
  DOI =          "https://doi.org/10.1109/MMUL.2018.112142509",
  ISSN =         "1070-986x (print), 1941-0166 (electronic)",
  ISSN-L =       "1070-986X",
  bibdate =      "Fri Aug 2 10:38:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeemultimedia.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE MultiMedia",
  journal-URL =  "http://www.computer.org/multimedia/",
  keywords =     "Authentication; content recovery; image coding; Image
                 coding; Image reconstruction; image self-embedding
                 scheme; image tampering recovery; image watermarking;
                 iterative BTC; Iterative decoding; Multimedia
                 communication; non-uniform sharing; nonuniform
                 watermark sharing; optimal iterative block truncation
                 coding; Self-embedding; self-embedding watermarking;
                 tampering detection; Visualization; Watermarking",
}

@Article{Qiu:2018:QDS,
  author =       "Lirong Qiu and Feng Cai and Guixian Xu",
  title =        "Quantum digital signature for the access control of
                 sensitive data in the big data era",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "86",
  number =       "??",
  pages =        "372--379",
  month =        sep,
  year =         "2018",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Wed Jun 20 10:38:06 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167739X18301250",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Quaglia:2018:SVA,
  author =       "Elizabeth A. Quaglia and Ben Smyth",
  title =        "Secret, verifiable auctions from elections",
  journal =      j-THEOR-COMP-SCI,
  volume =       "730",
  number =       "??",
  pages =        "44--92",
  day =          "19",
  month =        jun,
  year =         "2018",
  CODEN =        "TCSCDI",
  DOI =          "https://doi.org/10.1016/j.tcs.2018.03.022",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Sat May 12 14:56:37 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2015.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S030439751830183X",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{R:2018:SDM,
  author =       "Jithin R and Priya Chandran",
  title =        "Secure and Dynamic Memory Management Architecture for
                 Virtualization Technologies in {IoT} Devices",
  journal =      j-FUTURE-INTERNET,
  volume =       "10",
  number =       "12",
  pages =        "119",
  day =          "30",
  month =        nov,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi10120119",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:51:03 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/future-internet.bib;
                 https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  URL =          "https://www.mdpi.com/1999-5903/10/12/119",
  abstract =     "The introduction of the internet in embedded devices
                 led to a new era of technology --- the Internet of
                 Things (IoT) era. The IoT technology-enabled device
                 market is growing faster by the day, due to its
                 complete acceptance in diverse areas such as domicile
                 systems, the automobile industry, and beyond. The
                 introduction of internet connectivity in objects that
                 are frequently used in daily life raises the question
                 of security --- how secure is the information and the
                 infrastructure handled by these devices when they are
                 connected to the internet? Security enhancements
                 through standard cryptographic techniques are not
                 suitable due to the power and performance constraints
                 of IoT devices. The introduction of virtualization
                 technology into IoT devices is a recent development,
                 meant for fulfilling security and performance needs.
                 However, virtualization augments the vulnerability
                 present in IoT devices, due to the addition of one more
                 software layer --- namely, the hypervisor, which
                 enables the sharing of resources among different users.
                 This article proposes the adaptation of ASMI
                 (Architectural Support for Memory Isolation --- a
                 general architecture available in the literature for
                 the improvement of the performance and security of
                 virtualization technology) on the popular MIPS
                 (Microprocessor without Interlocked Pipeline Stages)
                 embedded virtualization platform, which could be
                 adopted in embedded virtualization architectures for
                 IoT devices. The article illustrates the performance
                 enhancement achieved by the proposed architecture with
                 the existing architectures.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue IoT Security and Privacy.",
}

@Article{Raisaro:2018:PPS,
  author =       "Jean Louis Raisaro and Gwangbae Choi and Sylvain
                 Pradervand and Raphael Colsenet and Nathalie Jacquemont
                 and Nicolas Rosat and Vincent Mooser and Jean-Pierre
                 Hubaux",
  title =        "Protecting Privacy and Security of Genomic Data in
                 i2b2 with Homomorphic Encryption and Differential
                 Privacy",
  journal =      j-TCBB,
  volume =       "15",
  number =       "5",
  pages =        "1413--1426",
  month =        sep,
  year =         "2018",
  CODEN =        "ITCBCY",
  DOI =          "https://doi.org/10.1109/TCBB.2018.2854782",
  ISSN =         "1545-5963 (print), 1557-9964 (electronic)",
  ISSN-L =       "1545-5963",
  bibdate =      "Thu Nov 8 06:18:46 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcbb.bib",
  abstract =     "Re-use of patients' health records can provide
                 tremendous benefits for clinical research. Yet, when
                 researchers need to access sensitive/identifying data,
                 such as genomic data, in order to compile cohorts of
                 well-characterized patients for specific studies,
                 privacy and security concerns represent major obstacles
                 that make such a procedure extremely difficult if not
                 impossible. In this paper, we address the challenge of
                 designing and deploying in a real operational setting
                 an efficient privacy-preserving explorer for genetic
                 cohorts. Our solution is built on top of the i2b2
                 Informatics for Integrating Biology and the Bedside
                 framework and leverages cutting-edge privacy-enhancing
                 technologies such as homomorphic encryption and
                 differential privacy. Solutions involving homomorphic
                 encryption are often believed to be costly and immature
                 for use in operational environments. Here, we show
                 that, for specific applications, homomorphic encryption
                 is actually a very efficient enabler. Indeed, our
                 solution outperforms prior work by enabling a
                 researcher to securely compute simple statistics on
                 more than 3,000 encrypted genetic variants
                 simultaneously for a cohort of 5,000 individuals in
                 less than 5 seconds with commodity hardware. To the
                 best of our knowledge, our privacy-preserving solution
                 is the first to also be successfully deployed and
                 tested in a operation setting Lausanne University
                 Hospital.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE/ACM Transactions on Computational Biology and
                 Bioinformatics",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J954",
}

@Article{Rakshit:2018:LLO,
  author =       "Joydeep Rakshit and Kartik Mohanram",
  title =        "{LEO}: Low Overhead Encryption {ORAM} for Non-Volatile
                 Memories",
  journal =      j-IEEE-COMPUT-ARCHIT-LETT,
  volume =       "17",
  number =       "2",
  pages =        "100--104",
  month =        jul # "\slash " # dec,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/LCA.2018.2795621",
  ISSN =         "1556-6056 (print), 1556-6064 (electronic)",
  ISSN-L =       "1556-6056",
  bibdate =      "Thu Jun 20 17:18:18 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeecomputarchitlett.bib",
  abstract =     "Data confidentiality attacks utilizing memory access
                 patterns threaten exposure of data in modern main
                 memories. Oblivious RAM (ORAM) is an effective
                 cryptographic primitive developed to thwart
                 access-pattern-based attacks in DRAM-based systems.
                 However, in emerging non-volatile memory (NVM) systems,
                 the increased writes due to encryption of multiple data
                 blocks on every Path ORAM (state-of-the-art efficient
                 ORAM) access impose significant energy, lifetime, and
                 performance overheads. LEO (Low overhead Encryption
                 ORAM) is an efficient Path ORAM encryption architecture
                 that addresses the high write overheads of ORAM
                 integration in NVMs, while providing security
                 equivalent to the baseline Path ORAM. LEO reduces NVM
                 cell writes by securely decreasing the number of block
                 encryptions during the write phase of a Path ORAM
                 access. LEO uses a secure, two-level counter mode
                 encryption framework that opportunistically eliminates
                 re-encryption of unmodified blocks, reducing NVM
                 writes. Our evaluations show that on average, LEO
                 decreases NVM energy by 60 percent, improves lifetime
                 by 1.51 x, and increases performance by 9 percent over
                 the baseline Path ORAM.",
  acknowledgement = ack-nhfb,
  affiliation =  "Rakshit, J (Reprint Author), Univ Pittsburgh, Dept
                 Elect \& Comp Engn, Pittsburgh, PA 15260 USA. Rakshit,
                 Joydeep; Mohanram, Kartik, Univ Pittsburgh, Dept Elect
                 \& Comp Engn, Pittsburgh, PA 15260 USA.",
  author-email = "joydeep.rakshit@pitt.edu kmram@pitt.edu",
  da =           "2019-06-20",
  doc-delivery-number = "GP4TI",
  eissn =        "1556-6064",
  fjournal =     "IEEE Computer Architecture Letters",
  journal-iso =  "IEEE Comput. Archit. Lett.",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=10208",
  keywords =     "memory security; non-volatile memory; Oblivious RAM",
  number-of-cited-references = "21",
  ORCID-numbers = "Rakshit, Joydeep/0000-0002-3670-4814",
  research-areas = "Computer Science",
  times-cited =  "0",
  unique-id =    "Rakshit:2018:LLO",
  web-of-science-categories = "Computer Science, Hardware \&
                 Architecture",
}

@Article{Reaves:2018:CSS,
  author =       "Bradley Reaves and Luis Vargas and Nolen Scaife and
                 Dave Tian and Logan Blue and Patrick Traynor and Kevin
                 R. B. Butler",
  title =        "Characterizing the Security of the {SMS} Ecosystem
                 with Public Gateways",
  journal =      j-TOPS,
  volume =       "22",
  number =       "1",
  pages =        "2:1--2:??",
  month =        jan,
  year =         "2018",
  DOI =          "https://doi.org/10.1145/3268932",
  ISSN =         "2471-2566 (print), 2471-2574 (electronic)",
  bibdate =      "Sat Sep 21 08:26:24 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tops.bib",
  URL =          "https://dl.acm.org/citation.cfm?id=3268932",
  abstract =     "Recent years have seen the Short Message Service (SMS)
                 become a critical component of the security
                 infrastructure, assisting with tasks including identity
                 verification and second-factor authentication. At the
                 same time, this messaging infrastructure has become
                 dramatically more open and connected to public networks
                 than ever before. However, the implications of this
                 openness, the security practices of benign services,
                 and the malicious misuse of this ecosystem are not well
                 understood. In this article, we provide a comprehensive
                 longitudinal study to answer these questions, analyzing
                 over 900,000 text messages sent to public online SMS
                 gateways over the course of 28 months. From this data,
                 we uncover the geographical distribution of spam
                 messages, study SMS as a transmission medium of
                 malicious content, and find that changes in benign and
                 malicious behaviors in the SMS ecosystem have been
                 minimal during our collection period. The key takeaways
                 of this research show many services sending sensitive
                 security-based messages through an unencrypted medium,
                 implementing low entropy solutions for one-use codes,
                 and behaviors indicating that public gateways are
                 primarily used for evading account creation policies
                 that require verified phone numbers. This latter
                 finding has significant implications for combating
                 phone-verified account fraud and demonstrates that such
                 evasion will continue to be difficult to detect and
                 prevent.",
  acknowledgement = ack-nhfb,
  articleno =    "2",
  fjournal =     "ACM Transactions on Privacy and Security (TOPS)",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J1547",
}

@Article{Ren:2018:IAS,
  author =       "Shuai Ren and Yan Shi and Maolin Cai and Weiqing Xu",
  title =        "Influence of Airway Secretion on Airflow Dynamics of
                 Mechanical Ventilated Respiratory System",
  journal =      j-TCBB,
  volume =       "15",
  number =       "5",
  pages =        "1660--1668",
  month =        sep,
  year =         "2018",
  CODEN =        "ITCBCY",
  DOI =          "https://doi.org/10.1109/TCBB.2017.2737621",
  ISSN =         "1545-5963 (print), 1557-9964 (electronic)",
  ISSN-L =       "1545-5963",
  bibdate =      "Thu Nov 8 06:18:46 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcbb.bib",
  abstract =     "Secretions in the airways of mechanical ventilated
                 patients are extremely dangerous to patients' health.
                 In recent studies, the continuous constant airflow is
                 adopted, however, it is not consistent with a clinical
                 situation. To study respiratory airflow dynamic
                 characteristics with secretion in the airways, a
                 mathematical model based on clinical mechanical
                 ventilation is established in this paper. To illustrate
                 the secretion's influence on the airflow dynamics of
                 mechanical ventilated respiratory system, three key
                 parameters which are cross section area ratio of
                 secretion/ pipe, air-secretion contact area, and
                 secretion viscosity are involved in the study. Through
                 the experimental study, the accuracy and dependability
                 of the model are confirmed. By the simulation study, we
                 find that: based on the model which combines two
                 airways and two model lungs, when one of the airways
                 was covered with secretion, the maximum pressure of the
                 model lung which is attached to the end of this airway
                 maintains constant when the cross section area ratio is
                 less than 66 percent, and then it tends to decline
                 sharply with the ratio increasing, but it remains
                 constant with the augment of air-secretion contact
                 area, the maximum flow declines both with the
                 increasing of cross section area ratio and
                 air-secretion contact area. Furthermore, as for the
                 other airway, the maximum pressure of the model lung
                 has no significant changes with the augment of area
                 ratio and air-secretion contact area, however, along
                 with the increasing of area ratio and air-secretion
                 contact area, the maximum flow rises up. Moreover, the
                 secretion viscosity has barely any influence on airflow
                 dynamics. According to our analysis results, we
                 conclude that the cross section area ratio of
                 secretion/pipe has bigger influence on airflow dynamic
                 characteristics than air-secretion contact area and
                 secretion viscosity. This paper lays the foundation for
                 the further study of efficacy and safety in mechanical
                 ventilation and the secretion clearance of mechanical
                 ventilated patients. In addition, the mathematical
                 model proposed in this paper can also be referred to
                 study on the secretion movement in human airways.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE/ACM Transactions on Computational Biology and
                 Bioinformatics",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J954",
}

@Article{Rexha:2018:ITF,
  author =       "Blerim Rexha and Gresa Shala and Valon Xhafa",
  title =        "Increasing Trustworthiness of Face Authentication in
                 Mobile Devices by Modeling Gesture Behavior and
                 Location Using Neural Networks",
  journal =      j-FUTURE-INTERNET,
  volume =       "10",
  number =       "2",
  pages =        "17",
  day =          "05",
  month =        feb,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi10020017",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:59 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/10/2/17",
  abstract =     "Personal mobile devices currently have access to a
                 significant portion of their user's private sensitive
                 data and are increasingly used for processing mobile
                 payments. Consequently, securing access to these mobile
                 devices is a requirement for securing access to the
                 sensitive data and potentially costly services. Face
                 authentication is one of the promising biometrics-based
                 user authentication mechanisms that has been widely
                 available in this era of mobile computing. With a
                 built-in camera capability on smartphones, tablets, and
                 laptops, face authentication provides an attractive
                 alternative of legacy passwords for its memory-less
                 authentication process, which is so sophisticated that
                 it can unlock the device faster than a fingerprint.
                 Nevertheless, face authentication in the context of
                 smartphones has proven to be vulnerable to attacks. In
                 most current implementations, a sufficiently
                 high-resolution face image displayed on another mobile
                 device will be enough to circumvent security measures
                 and bypass the authentication process. In order to
                 prevent such bypass attacks, gesture recognition
                 together with location is proposed to be additionally
                 modeled. Gestures provide a faster and more convenient
                 method of authentication compared to a complex
                 password. The focus of this paper is to build a secure
                 authentication system with face, location and gesture
                 recognition as components. User gestures and location
                 data are a sequence of time series; therefore, in this
                 paper we propose to use unsupervised learning in the
                 long short-term memory recurrent neural network to
                 actively learn to recognize, group and discriminate
                 user gestures and location. Moreover, a
                 clustering-based technique is also implemented for
                 recognizing gestures and location.",
  acknowledgement = ack-nhfb,
}

@InProceedings{Reyhani-Masoleh:2018:NAR,
  author =       "Arash Reyhani-Masoleh and Mostafa Taha and Doaa
                 Ashmawy",
  title =        "New Area Record for the {AES} Combined {S}-Box\slash
                 Inverse {S}-Box",
  crossref =     "Tenca:2018:PIS",
  pages =        "145--152",
  year =         "2018",
  DOI =          "https://doi.org/10.1109/ARITH.2018.8464780",
  bibdate =      "Fri Jan 31 08:05:31 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/fparith.bib",
  abstract =     "The AES combined S-box/inverse S-box is a single
                 construction that is shared between the encryption and
                 decryption data paths of the AES. The currently most
                 compact implementation of the AES combined
                 S-box/inverse S-box is Canright's design, introduced
                 back in 2005. Since then, the research community has
                 introduced several optimizations over the S-box only,
                 however the combined S-boxlinverse S-box received
                 little attention. In this paper, we propose a new AES
                 combined S-boxlinverse S-box design that is both
                 smaller and faster than Canright's design. We achieve
                 this goal by proposing to use new tower field and
                 optimizing each and every block inside the combined
                 architecture for this field. Our complexity analysis
                 and ASIC implementation results in the CMOS STM 65nm
                 and NanGate 15nm technologies show that our design
                 outperforms the counterparts in terms of area and
                 speed.",
  acknowledgement = ack-nhfb,
  keywords =     "AES combined S-box-inverse S-box; application specific
                 integrated circuits; ARITH-25; Canright design; circuit
                 optimisation; CMOS STM; Complexity theory; Computer
                 architecture; cryptography; decryption data paths;
                 Encryption; encryption data paths; Generators; Logic
                 gates; Multiplexing; NanGate; Poles and towers; size
                 15.0 nm; size 65.0 nm",
}

@Article{Roetteler:2018:QCC,
  author =       "M. Roetteler and K. M. Svore",
  title =        "Quantum Computing: Codebreaking and Beyond",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "5",
  pages =        "22--36",
  month =        sep # "\slash " # oct,
  year =         "2018",
  DOI =          "https://doi.org/10.1109/MSP.2018.3761710",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
  keywords =     "AES; Computational modeling; Computer security;
                 cryptographic applications; cryptographic protocols;
                 Cryptography; cryptography; Logic gates; postquantum
                 cryptography; quantum algorithms; quantum computer;
                 quantum computing; Quantum computing; quantum
                 cryptanalysis; quantum cryptography; quantum mechanical
                 systems; quantum programming; quantum security
                 parameters; quantum simulation; quantum theory; RSA;
                 security; SHA; Training",
}

@Article{Rouhani:2018:RRT,
  author =       "Bita Darvish Rouhani and Siam Umar Hussain and Kristin
                 Lauter and Farinaz Koushanfar",
  title =        "{ReDCrypt}: Real-Time Privacy-Preserving Deep Learning
                 Inference in Clouds Using {FPGAs}",
  journal =      j-TRETS,
  volume =       "11",
  number =       "3",
  pages =        "21:1--21:??",
  month =        dec,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3242899",
  ISSN =         "1936-7406 (print), 1936-7414 (electronic)",
  ISSN-L =       "1936-7406",
  bibdate =      "Sat Oct 19 17:43:00 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/trets.bib",
  abstract =     "Artificial Intelligence (AI) is increasingly
                 incorporated into the cloud business in order to
                 improve the functionality (e.g., accuracy) of the
                 service. The adoption of AI as a cloud service raises
                 serious privacy concerns in applications where the risk
                 of data leakage is not acceptable. Examples of such
                 applications include scenarios where clients hold
                 potentially sensitive private information such as
                 medical records, financial data, and/or location. This
                 article proposes ReDCrypt, the first reconfigurable
                 hardware-accelerated framework that empowers
                 privacy-preserving inference of deep learning models in
                 cloud servers. ReDCrypt is well-suited for streaming
                 (a.k.a., real-time AI) settings where clients need to
                 dynamically analyze their data as it is collected over
                 time without having to queue the samples to meet a
                 certain batch size. Unlike prior work, ReDCrypt neither
                 requires to change how AI models are trained nor relies
                 on two non-colluding servers to perform. The
                 privacy-preserving computation in ReDCrypt is executed
                 using Yao's Garbled Circuit (GC) protocol. We break
                 down the deep learning inference task into two phases:
                 (i) privacy-insensitive (local) computation, and (ii)
                 privacy-sensitive (interactive) computation. We devise
                 a high-throughput and power-efficient implementation of
                 GC protocol on FPGA for the privacy-sensitive phase.
                 ReDCrypt's accompanying API provides support for
                 seamless integration of ReDCrypt into any deep learning
                 framework. Proof-of-concept evaluations for different
                 DL applications demonstrate up to 57-fold higher
                 throughput per core compared to the best prior solution
                 with no drop in the accuracy.",
  acknowledgement = ack-nhfb,
  articleno =    "21",
  fjournal =     "ACM Transactions on Reconfigurable Technology and
                 Systems (TRETS)",
  journal-URL =  "http://portal.acm.org/toc.cfm?id=J1151",
}

@Article{Roy:2018:HFB,
  author =       "Sujoy Sinha Roy and Kimmo J{\"a}rvinen and Jo Vliegen
                 and Frederik Vercauteren and Ingrid Verbauwhede",
  title =        "{HEPCloud}: An {FPGA}-Based Multicore Processor for
                 {FV} Somewhat Homomorphic Function Evaluation",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "67",
  number =       "11",
  pages =        "1637--1650",
  month =        nov,
  year =         "2018",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2018.2816640",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Fri Mar 15 08:10:14 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  URL =          "https://ieeexplore.ieee.org/document/8318681/",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Roy:2018:HIR,
  author =       "Aniket Roy and Arpan Kumar Maiti and Kuntal Ghosh",
  title =        "An {HVS} Inspired Robust Non-blind Watermarking Scheme
                 in {YCbCr} Color Space",
  journal =      j-INT-J-IMAGE-GRAPHICS,
  volume =       "18",
  number =       "3",
  pages =        "??--??",
  month =        jul,
  year =         "2018",
  DOI =          "https://doi.org/10.1142/S0219467818500158",
  ISSN =         "0219-4678",
  ISSN-L =       "0219-4678",
  bibdate =      "Fri Nov 9 06:55:48 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijig.bib",
  URL =          "https://www.worldscientific.com/doi/10.1142/S0219467818500158",
  abstract =     "Digital Watermarking is an important tool for
                 copyright protection. A good quality watermarking
                 scheme should provide both perceptual transparency as
                 well as robustness against attacks. Many efficient
                 schemes exist for grayscale image watermarking, but
                 relatively less attention has been paid to watermarking
                 for color images. Moreover, the existing works do not
                 provide adequate justification for the possible choice
                 of color space. In this paper, justification is
                 provided for the choice of YCbCr color space for
                 watermark embedding. A human visual system
                 (HVS)-inspired image-adaptive non-blind watermarking
                 scheme in the YCbCr space has subsequently been
                 proposed. This new algorithm has been referred to as
                 the Additive Embedding Scheme (AES). It comprises of a
                 modified watermarking strength parameter (
                 {\textalpha}mean {\textalpha}mean {\textalpha}mean ),
                 in combination with the discrete wavelet transform and
                 singular value decomposition (DWT-SVD). Experimental
                 results demonstrate that the proposed watermarking
                 scheme in YCbCr color space provides better perceptual
                 quality as well as robustness against attacks as
                 compared to existing schemes. We have further
                 improvised the aforementioned scheme to come up with a
                 Multiplicative Embedding Scheme (MES) for additional
                 robustness against a special type of attack, viz. the
                 Singular Value Exchange Attack.",
  acknowledgement = ack-nhfb,
  articleno =    "1850015",
  fjournal =     "International Journal of Image and Graphics (IJIG)",
  journal-URL =  "http://www.worldscientific.com/worldscinet/ijig",
}

@Article{S:2018:EDS,
  author =       "Prabu S and Gpinath Ganapathy and Ranjan Goyal",
  title =        "Enhanced Data Security for Public Cloud Environment
                 with Secured Hybrid Encryption Authentication
                 Mechanisms",
  journal =      j-SCPE,
  volume =       "19",
  number =       "4",
  pages =        "351--360",
  month =        "????",
  year =         "2018",
  CODEN =        "????",
  ISSN =         "1895-1767",
  ISSN-L =       "1895-1767",
  bibdate =      "Mon Jan 7 06:46:51 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/scpe.bib",
  URL =          "https://www.scpe.org/index.php/scpe/article/view/1422",
  acknowledgement = ack-nhfb,
  fjournal =     "Scalable Computing: Practice and Experience",
  journal-URL =  "http://www.scpe.org/",
}

@Article{Saadeh:2018:HAP,
  author =       "Maha Saadeh and Azzam Sleit and Khair Eddin Sabri and
                 Wesam Almobaideen",
  title =        "Hierarchical architecture and protocol for mobile
                 object authentication in the context of {IoT} smart
                 cities",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "121",
  number =       "??",
  pages =        "1--19",
  day =          "1",
  month =        nov,
  year =         "2018",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Mon Oct 14 14:16:27 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804518302339",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Safkhani:2018:SRO,
  author =       "Masoumeh Safkhani and Nasour Bagheri and Mahyar
                 Shariat",
  title =        "On the Security of Rotation Operation Based
                 Ultra-Lightweight Authentication Protocols for {RFID}
                 Systems",
  journal =      j-FUTURE-INTERNET,
  volume =       "10",
  number =       "9",
  pages =        "82",
  day =          "21",
  month =        aug,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi10090082",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:51:02 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/10/9/82",
  abstract =     "Passive Radio Frequency IDentification (RFID) tags are
                 generally highly constrained and cannot support
                 conventional encryption systems to meet the required
                 security. Hence, designers of security protocols may
                 try to achieve the desired security only using limited
                 ultra-lightweight operations. In this paper, we show
                 that the security of such protocols is not provided by
                 using rotation functions. In the following, for an
                 example, we investigate the security of an RFID
                 authentication protocol that has been recently
                 developed using rotation function named ULRAS, which
                 stands for an Ultra-Lightweight RFID Authentication
                 Scheme and show its security weaknesses. More
                 precisely, we show that the ULRAS protocol is
                 vulnerable against de-synchronization attack. The given
                 attack has the success probability of almost
                 \&lsquo;1', with the complexity of only one session of
                 the protocol. In addition, we show that the given
                 attack can be used as a traceability attack against the
                 protocol if the parameters' lengths are an integer
                 power of 2, e.g., 128. Moreover, we propose a new
                 authentication protocol named UEAP, which stands for an
                 Ultra-lightweight Encryption based Authentication
                 Protocol, and then informally and formally, using
                 Scyther tool, prove that the UEAP protocol is secure
                 against all known active and passive attacks.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue New Developments in RFID Technologies
                 and Applications and Their Integration into IoT.",
}

@Article{Saha:2018:ASS,
  author =       "Seemanta Saha and Ismet Burak Kadron and William Eiers
                 and Lucas Bang and Tevfik Bultan",
  title =        "Attack Synthesis for Strings using Meta-Heuristics",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "4",
  pages =        "56--56",
  month =        oct,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3282517.3282527",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Sat Oct 19 18:11:10 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Information leaks are a significant problem in modern
                 computer systems and string manipulation is prevalent
                 in modern software. We present techniques for automated
                 synthesis of side-channel attacks that recover secret
                 string values based on timing observations on string
                 manipulating code. Our attack synthesis techniques
                 iteratively generate inputs which, when fed to code
                 that accesses the secret, reveal partial information
                 about the secret based on the timing observations,
                 leading to recovery of the secret at the end of the
                 attack sequence. We use symbolic execution to extract
                 path constraints, automata-based model counting to
                 estimate the probability of execution paths, and
                 meta-heuristic methods to maximize information gain
                 based on entropy for synthesizing adaptive attack
                 steps.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/citation.cfm?id=J728",
}

@Article{Salman:2018:BMM,
  author =       "S. M. Salman and A. A. Elsadany",
  title =        "On the bifurcation of {Marotto}'s map and its
                 application in image encryption",
  journal =      j-J-COMPUT-APPL-MATH,
  volume =       "328",
  number =       "??",
  pages =        "177--196",
  day =          "15",
  month =        jan,
  year =         "2018",
  CODEN =        "JCAMDI",
  ISSN =         "0377-0427 (print), 1879-1778 (electronic)",
  ISSN-L =       "0377-0427",
  bibdate =      "Mon Oct 2 12:20:15 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcomputapplmath2015.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0377042717303515",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Computational and Applied Mathematics",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03770427",
}

@Article{Sarier:2018:MBI,
  author =       "Neyire Deniz Sarier",
  title =        "Multimodal biometric {Identity Based Encryption}",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "80",
  number =       "??",
  pages =        "112--125",
  month =        mar,
  year =         "2018",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Sat Dec 2 16:58:42 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X17302613",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Sasaki:2018:QKD,
  author =       "M. Sasaki",
  title =        "Quantum Key Distribution and Its Applications",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "5",
  pages =        "42--48",
  month =        sep # "\slash " # oct,
  year =         "2018",
  DOI =          "https://doi.org/10.1109/MSP.2018.3761713",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
  keywords =     "Authentication; continental-scale QKD networks;
                 Encryption; one-time pad; postquantum cryptography;
                 Protocols; QKD; Quantum computing; quantum
                 cryptography; quantum key distribution; secret key;
                 Servers; telecommunication security; unlimited
                 computational ability",
}

@Article{Schneier:2018:CAA,
  author =       "B. Schneier",
  title =        "Cryptography after the Aliens Land",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "5",
  pages =        "86--88",
  month =        sep # "\slash " # oct,
  year =         "2018",
  DOI =          "https://doi.org/10.1109/MSP.2018.3761724",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
  keywords =     "cryptography; postquantum; quantum cryptography;
                 security",
}

@Article{Scriber:2018:FDB,
  author =       "B. A. Scriber",
  title =        "A Framework for Determining Blockchain Applicability",
  journal =      j-IEEE-SOFTWARE,
  volume =       "35",
  number =       "4",
  pages =        "70--77",
  month =        jul # "\slash " # aug,
  year =         "2018",
  CODEN =        "IESOEG",
  DOI =          "https://doi.org/10.1109/MS.2018.2801552",
  ISSN =         "0740-7459 (print), 1937-4194 (electronic)",
  ISSN-L =       "0740-7459",
  bibdate =      "Fri Aug 2 09:25:48 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesoft.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Software",
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/software",
  keywords =     "architectural alignment; Blockchain; blockchain
                 technology; blockchains; Computer architecture;
                 Cryptography; design decisions; distributed ledgers;
                 Ecosystems; efficiency; identity; immutability;
                 investment; optimal technology; optimisation; patterns;
                 software architecture; software architectures; software
                 development; software engineering; transaction;
                 transparency; trust; trust-based problems",
}

@Article{Seo:2018:AOF,
  author =       "Jae Hong Seo and Keita Emura and Keita Xagawa and
                 Kazuki Yoneyama",
  title =        "Accumulable optimistic fair exchange from verifiably
                 encrypted homomorphic signatures",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "2",
  pages =        "193--220",
  month =        apr,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0367-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Mar 3 09:41:24 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0367-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Seo:2018:CIA,
  author =       "Hwajeong Seo and Ilwoong Jeong and Jungkeun Lee and
                 Woo-Hwan Kim",
  title =        "Compact Implementations of {ARX}-Based Block Ciphers
                 on {IoT} Processors",
  journal =      j-TECS,
  volume =       "17",
  number =       "3",
  pages =        "60:1--60:??",
  month =        jun,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3173455",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Thu Oct 17 18:16:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tecs.bib",
  abstract =     "In this article, we present implementations for
                 Addition, Rotation, and eXclusive-or (ARX)-based block
                 ciphers, including LEA and HIGHT, on IoT devices,
                 including 8-bit AVR, 16-bit MSP, 32-bit ARM, and 32-bit
                 ARM-NEON processors. We optimized 32-/8-bitwise ARX
                 operations for LEA and HIGHT block ciphers by
                 considering variations in word size, the number of
                 general purpose registers, and the instruction set of
                 the target IoT devices. Finally, we achieved the most
                 compact implementations of LEA and HIGHT block ciphers.
                 The implementations were fairly evaluated through the
                 Fair Evaluation of Lightweight Cryptographic Systems
                 framework, and implementations won the competitions in
                 the first and the second rounds.",
  acknowledgement = ack-nhfb,
  articleno =    "60",
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J840",
}

@Article{Seo:2018:CSI,
  author =       "Hwajeong Seo",
  title =        "Compact Software Implementation of Public-Key
                 Cryptography on {MSP430X}",
  journal =      j-TECS,
  volume =       "17",
  number =       "3",
  pages =        "66:1--66:??",
  month =        jun,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3190855",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Thu Oct 17 18:16:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tecs.bib",
  abstract =     "On the low-end embedded processors, the
                 implementations of Elliptic Curve Cryptography (ECC)
                 are considered to be a challenging task due to the
                 limited computation power and storage of the low-end
                 embedded processors. Particularly, the multi-precision
                 multiplication and squaring operations are the most
                 expensive operations for ECC implementations. In order
                 to enhance the performance, many works presented
                 efficient multiplication and squaring routines on the
                 target devices. Recent works show that 128-bit security
                 level ECC is available within a second and this is
                 practically fast enough for IoT services. However,
                 previous approaches missed the other important storage
                 issues (i.e., program size, ROM). Considering that the
                 embedded processors only have a few KB ROM, we need to
                 pay attention to the compact ROM size with reasonable
                 performance. In this article, we present very compact
                 and generic implementations of multiplication and
                 squaring operations on the 16-bit MSP430X processors
                 for the ECC. The implementations utilize the new 32-bit
                 multiplier and advanced multiplication and squaring
                 routines. Since the proposed routines are generic, the
                 arbitrary length of operand is available with
                 high-speed and small code size. With proposed
                 multiplication and squaring routines, we implemented
                 Curve25519 on the MSP430X processors. The scalar
                 multiplication is performed within 6,666,895 clock
                 cycles and 4,054 bytes. Compared with previous works
                 based on the speed-optimized version, our
                 memory-efficient version reduces the code size by
                 59.8\%, sacrificing the execution timing by 20.5\%.",
  acknowledgement = ack-nhfb,
  articleno =    "66",
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J840",
}

@Article{Sepczuk:2018:NRB,
  author =       "Mariusz Sepczuk and Zbigniew Kotulski",
  title =        "A new risk-based authentication management model
                 oriented on user's experience",
  journal =      j-COMPUT-SECUR,
  volume =       "73",
  number =       "??",
  pages =        "17--33",
  month =        mar,
  year =         "2018",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:53 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404817302079",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Sharma:2018:CSS,
  author =       "Himani Sharma and D. C. Mishra and R. K. Sharma and
                 Naveen Kumar",
  title =        "Crypto-stego System for Securing Text and Image Data",
  journal =      j-INT-J-IMAGE-GRAPHICS,
  volume =       "18",
  number =       "4",
  pages =        "??--??",
  month =        oct,
  year =         "2018",
  DOI =          "https://doi.org/10.1142/S0219467818500201",
  ISSN =         "0219-4678",
  ISSN-L =       "0219-4678",
  bibdate =      "Fri Nov 9 06:55:50 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijig.bib",
  URL =          "https://www.worldscientific.com/doi/10.1142/S0219467818500201",
  abstract =     "Conventional techniques for security of data, designed
                 by using only one of the security mechanisms,
                 cryptography or steganography, are suitable for limited
                 applications only. In this paper, we propose a
                 crypto-stego system that would be appropriate for
                 secure transmission of different forms of data. In the
                 proposed crypto-stego system, we present a mechanism to
                 provide secure transmission of data by multiple safety
                 measures, firstly by applying encryption using Affine
                 Transform and Discrete Cosine Transform (DCT) and then
                 merging this encrypted data with an image, randomly
                 chosen from a set of available images, and sending the
                 image so obtained to the receiver at the other end
                 through the network. The data to be sent over a
                 communication channel may be a gray-scale or colored
                 image, or a text document (doc, .txt, or .pdf file). As
                 it is encrypted and sent hidden in an image, it avoids
                 any attention to itself by the observers in the
                 network. At the receiver's side, reverse
                 transformations are applied to obtain the original
                 information. The experimental results, security
                 analysis and statistical analysis for gray-scale
                 images, RGB images, text documents (.doc, .txt, .pdf
                 files), show robustness and appropriateness of the
                 proposed crypto-stego system for secure transmission of
                 the data through unsecured network. The security
                 analysis and key space analysis demonstrate that the
                 proposed technique is immune from cryptanalysis.",
  acknowledgement = ack-nhfb,
  articleno =    "1850020",
  fjournal =     "International Journal of Image and Graphics (IJIG)",
  journal-URL =  "http://www.worldscientific.com/worldscinet/ijig",
}

@Article{Shen:2018:CAL,
  author =       "Jian Shen and Ziyuan Gui and Sai Ji and Jun Shen and
                 Haowen Tan and Yi Tang",
  title =        "Cloud-aided lightweight certificateless authentication
                 protocol with anonymity for wireless body area
                 networks",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "106",
  number =       "??",
  pages =        "117--123",
  day =          "15",
  month =        mar,
  year =         "2018",
  CODEN =        "JNCAF3",
  DOI =          "https://doi.org/10.1016/j.jnca.2018.01.003",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Sat Mar 3 15:22:11 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804518300031",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Shwartz:2018:DMI,
  author =       "Ofir Shwartz and Yitzhak Birk",
  title =        "Distributed Memory Integrity Trees",
  journal =      j-IEEE-COMPUT-ARCHIT-LETT,
  volume =       "17",
  number =       "2",
  pages =        "159--162",
  month =        jul # "\slash " # dec,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/LCA.2018.2822705",
  ISSN =         "1556-6056 (print), 1556-6064 (electronic)",
  ISSN-L =       "1556-6056",
  bibdate =      "Thu Jun 20 17:18:18 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeecomputarchitlett.bib",
  abstract =     "Ensuring the correct execution of a program running on
                 untrusted computing platforms, wherein the OS,
                 hypervisor, and all off-CPU-chip hardware, including
                 memory, are untrusted, (also) requires protecting the
                 integrity of the memory content against replay attacks.
                 This requires dedicated tracking structures and in-chip
                 state storage. For this purpose, integrity trees are
                 used in various forms, varying in complexity, size, and
                 performance; yet, existing integrity trees do not
                 address distributed, shared-memory computations, for
                 which one must also ensure the integrity of the
                 coherence state of the memory. Observing that a block
                 not residing at a given node merely needs to be known
                 by that node as such, we present the novel Distributed
                 Integrity Tree (DIT) method, and show that it can be
                 used effectively to extend existing integrity trees to
                 parallel and distributed environments. Using DIT, we
                 constructed a Distributed Merkle Tree, a Distributed
                 Bonsai Merkle Tree, and a distributed Intel SGX's
                 Memory Encryption Engine integrity mechanism. All these
                 extensions entail negligible overhead.",
  acknowledgement = ack-nhfb,
  affiliation =  "Shwartz, O (Reprint Author), Technion, Elect Engn
                 Dept, IL-3200003 Haifa, Israel. Shwartz, Ofir; Birk,
                 Yitzhak, Technion, Elect Engn Dept, IL-3200003 Haifa,
                 Israel.",
  author-email = "ofirshw@tx.technion.ac.il birk@ee.technion.ac.il",
  da =           "2019-06-20",
  doc-delivery-number = "GP4TI",
  eissn =        "1556-6064",
  fjournal =     "IEEE Computer Architecture Letters",
  funding-acknowledgement = "Hasso Plattner Institute",
  funding-text = "This work was supported in part by the Hasso Plattner
                 Institute.",
  journal-iso =  "IEEE Comput. Archit. Lett.",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=10208",
  keywords =     "computer security; Distributed computing; integrity
                 tree; shared memory",
  keywords-plus = "PERFORMANCE",
  number-of-cited-references = "11",
  research-areas = "Computer Science",
  times-cited =  "0",
  unique-id =    "Shwartz:2018:DMI",
  web-of-science-categories = "Computer Science, Hardware \&
                 Architecture",
}

@Article{Silva-Garcia:2018:SBG,
  author =       "V. M. Silva-Garc{\'\i}a and R. Flores-Carapia and C.
                 Renter{\'\i}a-M{\'a}rquez and B. Luna-Benoso and M.
                 Aldape-P{\'e}rez",
  title =        "Substitution box generation using {Chaos}: An image
                 encryption application",
  journal =      j-APPL-MATH-COMP,
  volume =       "332",
  number =       "??",
  pages =        "123--135",
  day =          "1",
  month =        sep,
  year =         "2018",
  CODEN =        "AMHCBQ",
  DOI =          "https://doi.org/10.1016/j.amc.2018.03.019",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Mon Apr 23 08:50:53 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/applmathcomput2015.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S009630031830184X",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Singh:2018:MWT,
  author =       "Amit Kumar Singh and Basant Kumar and Sanjay Kumar
                 Singh and S. P. Ghrera and Anand Mohan",
  title =        "Multiple watermarking technique for securing online
                 social network contents using Back Propagation Neural
                 Network",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "86",
  number =       "??",
  pages =        "926--939",
  month =        sep,
  year =         "2018",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Wed Jun 20 10:38:06 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167739X16306628",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Singh:2018:SDD,
  author =       "Priyanka Singh and Nishant Agarwal and Balasubramanian
                 Raman",
  title =        "Secure data deduplication using secret sharing schemes
                 over cloud",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "88",
  number =       "??",
  pages =        "156--167",
  month =        nov,
  year =         "2018",
  CODEN =        "FGSEVI",
  DOI =          "https://doi.org/10.1016/j.future.2018.04.097",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Tue Sep 18 14:07:58 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X17327474",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Sluganovic:2018:ARE,
  author =       "Ivo Sluganovic and Marc Roeschlin and Kasper B.
                 Rasmussen and Ivan Martinovic",
  title =        "Analysis of Reflexive Eye Movements for Fast
                 Replay-Resistant Biometric Authentication",
  journal =      j-TOPS,
  volume =       "22",
  number =       "1",
  pages =        "4:1--4:??",
  month =        jan,
  year =         "2018",
  DOI =          "https://doi.org/10.1145/3281745",
  ISSN =         "2471-2566 (print), 2471-2574 (electronic)",
  bibdate =      "Sat Sep 21 08:26:24 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tops.bib",
  URL =          "https://dl.acm.org/citation.cfm?id=3281745",
  abstract =     "Eye tracking devices have recently become increasingly
                 popular as an interface between people and
                 consumer-grade electronic devices. Due to the fact that
                 human eyes are fast, responsive, and carry information
                 unique to an individual, analyzing person's gaze is
                 particularly attractive for rapid biometric
                 authentication. Unfortunately, previous proposals for
                 gaze-based authentication systems either suffer from
                 high error rates or requires long authentication times.
                 We build on the fact that some eye movements can be
                 reflexively and predictably triggered and develop an
                 interactive visual stimulus for elicitation of
                 reflexive eye movements that support the extraction of
                 reliable biometric features in a matter of seconds,
                 without requiring any memorization or cognitive effort
                 on the part of the user. As an important benefit, our
                 stimulus can be made unique for every authentication
                 attempt and thus incorporated in a challenge-response
                 biometric authentication system. This allows us to
                 prevent replay attacks, which are possibly the most
                 applicable attack vectors against biometric
                 authentication. Using a gaze tracking device, we build
                 a prototype of our system and perform a series of
                 systematic user experiments with 30 participants from
                 the general public. We thoroughly analyze various
                 system parameters and evaluate the performance and
                 security guarantees under several different attack
                 scenarios. The results show that our system matches or
                 surpasses existing gaze-based authentication methods in
                 achieved equal error rates (6.3\%) while achieving
                 significantly lower authentication times (5s).",
  acknowledgement = ack-nhfb,
  articleno =    "4",
  fjournal =     "ACM Transactions on Privacy and Security (TOPS)",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J1547",
}

@Article{Son:2018:GFD,
  author =       "Yunmok Son and Juhwan Noh and Jaeyeong Choi and
                 Yongdae Kim",
  title =        "{GyrosFinger}: Fingerprinting Drones for Location
                 Tracking Based on the Outputs of {MEMS} Gyroscopes",
  journal =      j-TOPS,
  volume =       "21",
  number =       "2",
  pages =        "10:1--10:??",
  month =        feb,
  year =         "2018",
  DOI =          "https://doi.org/10.1145/3177751",
  ISSN =         "2471-2566 (print), 2471-2574 (electronic)",
  bibdate =      "Sat Sep 21 08:26:23 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tops.bib",
  URL =          "https://dl.acm.org/citation.cfm?id=3177751",
  abstract =     "Drones are widely used for various purposes such as
                 delivery, aerial photography, and surveillance.
                 Considering the increasing drone-related services,
                 tracking the locations of drones can cause security
                 threats such as escaping from drone surveillance,
                 disturbing drone-related services, and capturing
                 drones. For wirelessly monitoring the status of drones,
                 telemetry is used, and this status information contains
                 various data such as latitude and longitude, calibrated
                 sensor outputs, and sensor offsets. Because most of the
                 telemetry implementation supports neither
                 authentication nor encryption, an attacker can obtain
                 the status information of the drones by using an
                 appropriate wireless communication device such as
                 software-defined radio. While the attacker knows the
                 locations of the drones from the status information,
                 this information is not sufficient for tracking drones
                 because the status information does not include any
                 identity information that can bind the identity of the
                 drone with its location. \In this article, we propose a
                 fingerprinting method for drones in motion for the
                 binding of the identity of the drone with its location.
                 Our fingerprinting method is based on the sensor
                 outputs included in the status information, i.e., the
                 offsets of micro-electro mechanical systems (MEMS)
                 gyroscope, an essential sensor for maintaining the
                 attitude of drones. We found that the offsets of MEMS
                 gyroscopes are different from each other because of
                 manufacturing mismatches, and the offsets of five
                 drones obtained through their telemetry are
                 distinguishable and constant during their flights. To
                 evaluate the performance of our fingerprinting method
                 on a larger scale, we collected the offsets from 70
                 stand-alone MEMS gyroscopes to generate fingerprints.
                 Our experimental results show that, when using the
                 offsets of three and two axes calculated from 128
                 samples of the raw outputs per axis as fingerprints,
                 the F-scores of the proposed method reach 98.78\% and
                 94.47\%, respectively. The offsets collected after a
                 month are also fingerprinted with F-scores of 96.58\%
                 and 78.45\% under the same condition, respectively. The
                 proposed fingerprinting method is effective, robust,
                 and persistent. Additionally, unless the MEMS gyroscope
                 is not replaced, our fingerprinting method can be used
                 for drone tracking even when the target drones are
                 flying.",
  acknowledgement = ack-nhfb,
  articleno =    "10",
  fjournal =     "ACM Transactions on Privacy and Security (TOPS)",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J1547",
}

@Article{Stobert:2018:TAL,
  author =       "E. Stobert and E. Cavar and L. Malisa and D. Sommer",
  title =        "Teaching Authentication as a Life Skill",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "5",
  pages =        "82--85",
  month =        sep # "\slash " # oct,
  year =         "2018",
  DOI =          "https://doi.org/10.1109/MSP.2018.3761712",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
  keywords =     "Authentication; authentication; authentication
                 teaching; computer aided instruction; computer science
                 education; daily living move; education; educational
                 courses; educational institutions; Fingerprint
                 recognition; integral life skill; message
                 authentication; Password; password security; security;
                 security curriculum modules; security management tasks;
                 Swiss high schoolers; Task analysis; teaching",
}

@Article{Streit:2018:PQK,
  author =       "Silvan Streit and Fabrizio {De Santis}",
  title =        "Post-Quantum Key Exchange on {ARMv8-A}: a New Hope for
                 {NEON} Made Simple",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "67",
  number =       "11",
  pages =        "1651--1662",
  month =        nov,
  year =         "2018",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2017.2773524",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Fri Mar 15 08:10:14 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  URL =          "https://ieeexplore.ieee.org/document/8107588/",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Sun:2018:RPP,
  author =       "Weiwei Sun and Jiantao Zhou and Shuyuan Zhu and Yuan
                 Yan Tang",
  title =        "Robust Privacy-Preserving Image Sharing over Online
                 Social Networks {(OSNs)}",
  journal =      j-TOMM,
  volume =       "14",
  number =       "1",
  pages =        "14:1--14:??",
  month =        jan,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3165265",
  ISSN =         "1551-6857 (print), 1551-6865 (electronic)",
  ISSN-L =       "1551-6857",
  bibdate =      "Tue Jan 16 18:18:12 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tomccap.bib",
  abstract =     "Sharing images online has become extremely easy and
                 popular due to the ever-increasing adoption of mobile
                 devices and online social networks (OSNs). The privacy
                 issues arising from image sharing over OSNs have
                 received significant attention in recent years. In this
                 article, we consider the problem of designing a secure,
                 robust, high-fidelity, storage-efficient image-sharing
                 scheme over Facebook, a representative OSN that is
                 widely accessed. To accomplish this goal, we first
                 conduct an in-depth investigation on the manipulations
                 that Facebook performs to the uploaded images. Assisted
                 by such knowledge, we propose a DCT-domain image
                 encryption/decryption framework that is robust against
                 these lossy operations. As verified theoretically and
                 experimentally, superior performance in terms of data
                 privacy, quality of the reconstructed images, and
                 storage cost can be achieved.",
  acknowledgement = ack-nhfb,
  articleno =    "14",
  fjournal =     "ACM Transactions on Multimedia Computing,
                 Communications, and Applications",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J961",
}

@Article{Suomalainen:2018:SAS,
  author =       "Jani Suomalainen and Kimmo Ahola and Mikko Majanen and
                 Olli M{\"a}mmel{\"a} and Pekka Ruuska",
  title =        "Security Awareness in Software-Defined Multi-Domain
                 {5G} Networks",
  journal =      j-FUTURE-INTERNET,
  volume =       "10",
  number =       "3",
  pages =        "27",
  day =          "08",
  month =        mar,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi10030027",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:50:59 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/10/3/27",
  abstract =     "Fifth generation (5G) technologies will boost the
                 capacity and ease the management of mobile networks.
                 Emerging virtualization and softwarization technologies
                 enable more flexible customization of network services
                 and facilitate cooperation between different actors.
                 However, solutions are needed to enable users,
                 operators, and service providers to gain an up-to-date
                 awareness of the security and trustworthiness of 5G
                 systems. We describe a novel framework and enablers for
                 security monitoring, inferencing, and trust measuring.
                 The framework leverages software-defined networking and
                 big data technologies to customize monitoring for
                 different applications. We present an approach for
                 sharing security measurements across administrative
                 domains. We describe scenarios where the correlation of
                 multi-domain information improves the accuracy of
                 security measures with respect to two threats: end-user
                 location tracking and Internet of things (IoT)
                 authentication storms. We explore the security
                 characteristics of data flows in software networks
                 dedicated to different applications with a mobile
                 network testbed.",
  acknowledgement = ack-nhfb,
}

@Article{Sutar:2018:DPI,
  author =       "Soubhagya Sutar and Arnab Raha and Devadatta Kulkarni
                 and Rajeev Shorey and Jeffrey Tew and Vijay
                 Raghunathan",
  title =        "{D-PUF}: an Intrinsically Reconfigurable {DRAM PUF}
                 for Device Authentication and Random Number
                 Generation",
  journal =      j-TECS,
  volume =       "17",
  number =       "1",
  pages =        "17:1--17:??",
  month =        jan,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3105915",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Thu Oct 17 18:16:34 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib;
                 https://www.math.utah.edu/pub/tex/bib/tecs.bib",
  abstract =     "Physically Unclonable Functions (PUFs) have proved to
                 be an effective and low-cost measure against
                 counterfeiting by providing device authentication and
                 secure key storage services. Memory-based PUF
                 implementations are an attractive option due to the
                 ubiquitous nature of memory in electronic devices and
                 the requirement of minimal (or no) additional
                 circuitry. Dynamic Random Access Memory-- (DRAM) based
                 PUFs are particularly advantageous due to their large
                 address space and multiple controllable parameters
                 during response generation. However, prior works on
                 DRAM PUFs use a static response-generation mechanism
                 making them vulnerable to security attacks. Further,
                 they result in slow device authentication, are not
                 applicable to commercial off-the-shelf devices, or
                 require DRAM power cycling prior to authentication. In
                 this article, we propose D-PUF, an intrinsically
                 reconfigurable DRAM PUF based on the idea of DRAM
                 refresh pausing. A key feature of the proposed DRAM PUF
                 is reconfigurability, that is, by varying the DRAM
                 refresh-pause interval, the challenge-response behavior
                 of the PUF can be altered, making it robust to various
                 attacks. The article is broadly divided into two parts.
                 In the first part, we demonstrate the use of D-PUF in
                 performing device authentication through a secure,
                 low-overhead methodology. In the second part, we show
                 the generation of true random numbers using D-PUF. The
                 design is implemented and validated using an Altera
                 Stratix IV GX FPGA-based Terasic TR4-230 development
                 board and several off-the-shelf 1GB DDR3 DRAM modules.
                 Our experimental results demonstrate a $ 4.3 \times
                 $--$ 6.4 \times $ reduction in authentication time
                 compared to prior work. Using controlled temperature
                 and accelerated aging tests, we also demonstrate the
                 robustness of our authentication mechanism to
                 temperature variations and aging effects. Finally, the
                 ability of the design to generate random numbers is
                 verified using the NIST Statistical Test Suite.",
  acknowledgement = ack-nhfb,
  articleno =    "17",
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J840",
}

@Article{Swami:2018:AAS,
  author =       "Shivam Swami and Kartik Mohanram",
  title =        "{ARSENAL}: Architecture for Secure Non-Volatile
                 Memories",
  journal =      j-IEEE-COMPUT-ARCHIT-LETT,
  volume =       "17",
  number =       "2",
  pages =        "192--196",
  month =        jul # "\slash " # dec,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/LCA.2018.2863281",
  ISSN =         "1556-6056 (print), 1556-6064 (electronic)",
  ISSN-L =       "1556-6056",
  bibdate =      "Thu Jun 20 17:18:18 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeecomputarchitlett.bib",
  abstract =     "Whereas data persistence in non-volatile memories
                 (NVMs) enables instant data recovery (IDR) in the face
                 of power/system failures, it also exposes NVMs to data
                 confidentiality and integrity attacks. Counter mode
                 encryption and Merkle Tree authentication are
                 established measures to thwart data confidentiality and
                 integrity attacks, respectively, in NVMs. However,
                 these security mechanisms require high overhead atomic
                 security meta-data updates on every write-back in order
                 to support IDR in NVMs. This increases memory traffic
                 and negatively impacts system performance and memory
                 lifetime. Architecture for Secure Non-Volatile Memories
                 (ARSENAL) is an IDR-preserving, low cost, high
                 performance security solution that protects NVM systems
                 against data confidentiality and integrity attacks.
                 ARSENAL synergistically integrates (i) Smart Writes for
                 Faster Transactions (SWIFT), a novel technique to
                 reduce the performance overhead of atomic security
                 meta-data updates on every write-back, with (ii)
                 Terminal BMT Updates (TBU), a novel
                 BMT-consistency-preserving technique, to facilitate IDR
                 in the face of power/system failures. Our evaluations
                 show that on average, ARSENAL improves system
                 performance (measured in IPC) by 2.26x (4x), reduces
                 memory traffic overhead by 1.47x (1.88x), and improves
                 memory lifetime by 2x (3.5x) in comparison to
                 conventional IDR-preserving 64-bit (128-bit)
                 encryption+authentication.",
  acknowledgement = ack-nhfb,
  affiliation =  "Mohanram, K (Reprint Author), Univ Pittsburgh, Dept
                 Elect \& Comp Engn, Pittsburgh, PA 15260 USA. Swami,
                 Shivam; Mohanram, Kartik, Univ Pittsburgh, Dept Elect
                 \& Comp Engn, Pittsburgh, PA 15260 USA.",
  author-email = "shs173@pitt.edu kmram@pitt.edu",
  da =           "2019-06-20",
  doc-delivery-number = "GT5EV",
  eissn =        "1556-6064",
  fjournal =     "IEEE Computer Architecture Letters",
  funding-acknowledgement = "NSF [CCF-1217738]",
  funding-text = "This research was supported by NSF Award CCF-1217738.
                 We also thank the editor and the reviewers for their
                 constructive comments that have helped us elaborate and
                 improve the content of the paper.",
  journal-iso =  "IEEE Comput. Archit. Lett.",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=10208",
  keywords =     "authentication; encryption; hardware security;
                 Non-volatile memories",
  keywords-plus = "ENCRYPTION; PERFORMANCE",
  number-of-cited-references = "28",
  research-areas = "Computer Science",
  times-cited =  "0",
  unique-id =    "Swami:2018:AAS",
  web-of-science-categories = "Computer Science, Hardware \&
                 Architecture",
}

@Article{Taassori:2018:VRP,
  author =       "Meysam Taassori and Ali Shafiee and Rajeev
                 Balasubramonian",
  title =        "{VAULT}: Reducing Paging Overheads in {SGX} with
                 Efficient Integrity Verification Structures",
  journal =      j-SIGPLAN,
  volume =       "53",
  number =       "2",
  pages =        "665--678",
  month =        feb,
  year =         "2018",
  CODEN =        "SINODQ",
  DOI =          "https://doi.org/10.1145/3296957.3177155",
  ISSN =         "0362-1340 (print), 1523-2867 (print), 1558-1160
                 (electronic)",
  ISSN-L =       "0362-1340",
  bibdate =      "Wed Oct 16 14:12:56 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigplan2010.bib",
  abstract =     "Intel's SGX offers state-of-the-art security features,
                 including confidentiality, integrity, and
                 authentication (CIA) when accessing sensitive pages in
                 memory. Sensitive pages are placed in an Enclave Page
                 Cache (EPC) within the physical memory before they can
                 be accessed by the processor. To control the overheads
                 imposed by CIA guarantees, the EPC operates with a
                 limited capacity (currently 128 MB). Because of this
                 limited EPC size, sensitive pages must be frequently
                 swapped between EPC and non-EPC regions in memory. A
                 page swap is expensive (about 40K cycles) because it
                 requires an OS system call, page copying, updates to
                 integrity trees and metadata, etc. Our analysis shows
                 that the paging overhead can slow the system on average
                 by 5$ \times $, and other studies have reported even
                 higher slowdowns for memory-intensive workloads. The
                 paging overhead can be reduced by growing the size of
                 the EPC to match the size of physical memory, while
                 allowing the EPC to also accommodate non-sensitive
                 pages. However, at least two important problems must be
                 addressed to enable this growth in EPC: (i) the depth
                 of the integrity tree and its cacheability must be
                 improved to keep memory bandwidth overheads in check,
                 (ii) the space overheads of integrity verification
                 (tree and MACs) must be reduced. We achieve both goals
                 by introducing a variable arity unified tree (VAULT)
                 organization that is more compact and has lower depth.
                 We further reduce the space overheads with techniques
                 that combine MAC sharing and compression. With
                 simulations, we show that the combination of our
                 techniques can address most inefficiencies in SGX
                 memory access and improve overall performance by 3.7$
                 \times $, relative to an SGX baseline, while incurring
                 a memory capacity over-head of only 4.7\%.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGPLAN Notices",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J706",
  remark =       "ASPLOS '18 proceedings.",
}

@Article{Talbi:2018:SIW,
  author =       "Mourad Talbi and Med Salim Bouhlel",
  title =        "Secure Image Watermarking Based on {LWT} and {SVD}",
  journal =      j-INT-J-IMAGE-GRAPHICS,
  volume =       "18",
  number =       "4",
  pages =        "??--??",
  month =        oct,
  year =         "2018",
  DOI =          "https://doi.org/10.1142/S0219467818500213",
  ISSN =         "0219-4678",
  ISSN-L =       "0219-4678",
  bibdate =      "Fri Nov 9 06:55:50 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijig.bib",
  URL =          "https://www.worldscientific.com/doi/10.1142/S0219467818500213",
  abstract =     "Nowadays, digital watermarking is employed for
                 authentication and copyright protection. In this paper,
                 a secure image watermarking scheme based on lifting
                 wavelet transform (LWT) and singular value
                 decomposition (SVD), is proposed. Both LWT and SVD are
                 used as mathematical tools for embedding watermark in
                 the host image. In this work, the watermark is a speech
                 signal which is segmented into shorted portions having
                 the same length. This length is equal to 256 and these
                 different portions constitute the different columns of
                 a speech image. The latter is then embedded into a
                 grayscale or color image (the host image). This
                 procedure is performed in order to insert into an image
                 a confidential data which is in our case a speech
                 signal. But instead of embedding this speech signal
                 directly into the image, we transform it into a matrix
                 and treated it as an image (``a speech image''). Of
                 course, this speech signal transformation permits us to
                 use LWT-2D and SVD to both the host image and the
                 watermark (``a speech image''). The proposed technique
                 is applied to a number of grayscale and color images.
                 The obtained results from peak signal-to-noise ratio
                 (PSNR) and structural similarity (SSIM) computations
                 show the performance of the proposed technique.
                 Experimental evaluation also shows that the proposed
                 scheme is able to withstand a number of attacks such as
                 JPEG compression, mean and median attacks. In our
                 evaluation of the proposed technique, we used another
                 technique of secure image watermarking based on DWT-2D
                 and SVD.",
  acknowledgement = ack-nhfb,
  articleno =    "1850021",
  fjournal =     "International Journal of Image and Graphics (IJIG)",
  journal-URL =  "http://www.worldscientific.com/worldscinet/ijig",
}

@Article{Tankard:2018:LAA,
  author =       "Colin Tankard",
  title =        "A layered approach to authentication",
  journal =      j-NETWORK-SECURITY,
  volume =       "2018",
  number =       "12",
  pages =        "20--20",
  month =        dec,
  year =         "2018",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Thu Sep 12 12:58:03 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485818301284",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Tao:2018:AAC,
  author =       "Ming Tao and Kaoru Ota and Mianxiong Dong and Zhuzhong
                 Qian",
  title =        "{AccessAuth}: Capacity-aware security access
                 authentication in federated-{IoT}-enabled {V2G}
                 networks",
  journal =      j-J-PAR-DIST-COMP,
  volume =       "118 (part 1)",
  number =       "??",
  pages =        "107--117",
  month =        aug,
  year =         "2018",
  CODEN =        "JPDCER",
  DOI =          "https://doi.org/10.1016/j.jpdc.2017.09.004",
  ISSN =         "0743-7315 (print), 1096-0848 (electronic)",
  ISSN-L =       "0743-7315",
  bibdate =      "Sat May 12 16:27:31 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jpardistcomp.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0743731517302587",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Parallel and Distributed Computing",
  journal-URL =  "http://www.sciencedirect.com/science/journal/07437315",
}

@Article{Teng:2018:KPA,
  author =       "Sheng-Hua Teng",
  title =        "{2018 Knuth Prize} is Awarded to {Johan H{\aa}stad}",
  journal =      j-SIGACT,
  volume =       "49",
  number =       "3",
  pages =        "78--79",
  month =        sep,
  year =         "2018",
  CODEN =        "SIGNDM",
  DOI =          "https://doi.org/10.1145/3289137.3289152",
  ISSN =         "0163-5700 (print), 1943-5827 (electronic)",
  ISSN-L =       "0163-5700",
  bibdate =      "Tue Oct 22 09:39:54 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib",
  abstract =     "The 2018 Donald E. Knuth Prize will be awarded to
                 Johan H{\aa}stad of KTH Royal Institute of Technology
                 for his long and sustained record of milestone
                 breakthroughs at the foundations of computer science,
                 with huge impact on many areas including optimization,
                 cryptography, parallel computing, and complexity
                 theory. H{\aa}stad's multiple seminal works have not
                 only resolved longstanding deepest problems central to
                 circuit lower bounds, pseudorandom generation, and
                 approximability, but also introduced transformative
                 techniques that have fundamentally influenced much of
                 the subsequent work in these areas.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGACT News",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J697",
}

@Article{Toor:2018:VQA,
  author =       "Andeep S. Toor and Harry Wechsler and Michele Nappi
                 and Kim-Kwang Raymond Choo",
  title =        "Visual Question Authentication Protocol {(VQAP)}",
  journal =      j-COMPUT-SECUR,
  volume =       "76",
  number =       "??",
  pages =        "285--294",
  month =        jul,
  year =         "2018",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:55 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404817302547",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Tsoutsos:2018:EDM,
  author =       "Nektarios Georgios Tsoutsos and Michail Maniatakos",
  title =        "Efficient Detection for Malicious and Random Errors in
                 Additive Encrypted Computation",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "67",
  number =       "1",
  pages =        "16--31",
  month =        jan,
  year =         "2018",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2017.2722440",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Thu Dec 14 07:11:27 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  URL =          "http://ieeexplore.ieee.org/document/7967774/",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
  keywords =     "Additives; Computational modeling; Encrypted
                 computation; Encryption; Fault detection; Hardware;
                 homomorphic encryption; memory integrity; Mersenne
                 primes; residue numbering",
}

@TechReport{Turan:2018:RES,
  author =       "Meltem S{\"o}nmez Turan and Elaine Barker and John
                 Kelsey and Kerry A. McKay and Mary L. Baish and Mike
                 Boyle",
  title =        "Recommendation for the entropy sources used for random
                 bit generation",
  type =         "{NIST} Special Publication",
  number =       "800-90B",
  institution =  "National Institute of Standards and Technology, U.S.
                 Department of Commerce",
  address =      "Gaithersburg, MD, USA",
  month =        jan,
  year =         "2018",
  DOI =          "https://doi.org/10.6028/NIST.SP.800-90B",
  bibdate =      "Fri Jul 29 08:14:53 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://csrc.nist.gov/publications/detail/sp/800-90b/final",
  abstract =     "This Recommendation specifies the design principles
                 and requirements for the entropy sources used by Random
                 Bit Generators, and the tests for the validation of
                 entropy sources. These entropy sources are intended to
                 be combined with Deterministic Random Bit Generator
                 mechanisms that are specified in SP 800-90A to
                 construct Random Bit Generators, as specified in SP
                 800-90C.",
  acknowledgement = ack-nhfb,
}

@Book{Turing:2018:XYZ,
  author =       "Dermot Turing",
  title =        "{X}, {Y} and {Z}: the Real Story of How {Enigma} Was
                 Broken",
  publisher =    "The History Press",
  address =      "Gloucestershire, UK",
  pages =        "319 + 1",
  year =         "2018",
  ISBN =         "0-7509-8782-0 (hardcover), 0-7509-8967-X (ePub)",
  ISBN-13 =      "978-0-7509-8782-0 (hardcover), 978-0-7509-8967-1
                 (ePub)",
  LCCN =         "D810.C88 T87 2018",
  bibdate =      "Fri Feb 4 16:28:59 MST 2022",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/bibnet/authors/t/turing-alan-mathison.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/master.bib",
  abstract =     "X, Y and Z describes how French, British and Polish
                 secret services came together to unravel the Enigma
                 machine. It tells of how, under the very noses of the
                 Germans, Enigma code-breaking continued in Vichy
                 France. And how code-breakers from Poland continued
                 their work for Her Majesty's Secret Service, watching
                 the USSR's first steps of the Cold War. The people of
                 X, Y and Z were eccentric, colourful and caught up in
                 world events that they could watch not control. This is
                 their story \ldots{}.",
  acknowledgement = ack-nhfb,
  subject =      "Enigma (maszyna szyfruj{\'y}aca).; Wojna {\'y}swiatowa
                 (1939-1945); s{\'y}u{\'y}zby wywiadowcze; Wielka
                 Brytania; Enigma cipher system; World War, 1939-1945;
                 Military intelligence; Great Britain; Enigma cipher
                 system.; Military intelligence.",
  tableofcontents = "List of Maps \\
                 Foreword \\
                 Dramatis Personae \\
                 Timeline \\
                 Introduction \\
                 1 Nulle Part \\
                 2 Enter the King \\
                 3 Mighty Pens \\
                 4 The Scarlet Pimpernels \\
                 5 How They Brought the Good News from Ghent to Aix \\
                 6 Monstrous Pile \\
                 7 The Mirror Crack'd from Side to Side \\
                 8 Into Three Parts \\
                 9 A Mystery Inside an Enigma \\
                 10 Hide and Seek \\
                 11 The Last Play \\
                 Epilogue \\
                 Appendix \\
                 Notes \\
                 Abbreviations \\
                 Select Bibliography",
}

@Article{Uzunkol:2018:SWU,
  author =       "Osmanbey Uzunkol and Mehmet Sabir Kiraz",
  title =        "Still wrong use of pairings in cryptography",
  journal =      j-APPL-MATH-COMP,
  volume =       "333",
  number =       "??",
  pages =        "467--479",
  day =          "15",
  month =        sep,
  year =         "2018",
  CODEN =        "AMHCBQ",
  DOI =          "https://doi.org/10.1016/j.amc.2018.03.062",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Wed May 16 08:01:07 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/applmathcomput2015.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0096300318302352",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{vanderWalt:2018:CSI,
  author =       "Estee van der Walt and J. H. P. Eloff and Jacomine
                 Grobler",
  title =        "Cyber-security: Identity deception detection on social
                 media platforms",
  journal =      j-COMPUT-SECUR,
  volume =       "78",
  number =       "??",
  pages =        "76--89",
  month =        sep,
  year =         "2018",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:57 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404818306503",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{VanDijkhuizen:2018:SNT,
  author =       "Niels {Van Dijkhuizen} and Jeroen {Van Der Ham}",
  title =        "A Survey of Network Traffic Anonymisation Techniques
                 and Implementations",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "3",
  pages =        "52:1--52:??",
  month =        jul,
  year =         "2018",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3182660",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:35 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  abstract =     "Many networking research activities are dependent on
                 the availability of network captures. Even outside
                 academic research, there is a need for sharing network
                 captures to cooperate on threat assessments or for
                 debugging. However, most network captures cannot be
                 shared due to privacy concerns. Anonymisation of
                 network captures has been a subject of research for
                 quite some time, and many different techniques exist.
                 In this article, we present an overview of the
                 currently available techniques and implementations for
                 network capture anonymisation. There have been many
                 advances in the understanding of anonymisation and
                 cryptographic methods, which have changed the
                 perspective on the effectiveness of many anonymisation
                 techniques. However, these advances, combined with the
                 increase of computational abilities, may have also made
                 it feasible to perform anonymisation in real time. This
                 may make it easier to collect and distribute network
                 captures both for research and for other applications.
                 This article surveys the literature over the period of
                 1998-2017 on network traffic anonymisation techniques
                 and implementations. The aim is to provide an overview
                 of the current state of the art and to highlight how
                 advances in related fields have shed new light on
                 anonymisation and pseudonimisation methodologies. The
                 few currently maintained implementations are also
                 reviewed. Last, we identify future research directions
                 to enable easier sharing of network traffic, which in
                 turn can enable new insights in network traffic
                 analysis.",
  acknowledgement = ack-nhfb,
  articleno =    "52",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Varadharajan:2018:AUR,
  author =       "V. S. Varadharajan and D. S. Onge and C. Gu{\ss} and
                 G. Beltrame",
  title =        "Over-the-Air Updates for Robotic Swarms",
  journal =      j-IEEE-SOFTWARE,
  volume =       "35",
  number =       "2",
  pages =        "44--50",
  month =        mar # "\slash " # apr,
  year =         "2018",
  CODEN =        "IESOEG",
  DOI =          "https://doi.org/10.1109/MS.2018.111095718",
  ISSN =         "0740-7459 (print), 1937-4194 (electronic)",
  ISSN-L =       "0740-7459",
  bibdate =      "Fri Aug 2 09:25:48 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesoft.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Software",
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/software",
  keywords =     "active sensor arrays; AI; artificial intelligence;
                 autonomous vehicles; code updates; code version;
                 computers and society; Cryptography; currently deployed
                 code; distributed applications; distributed artificial
                 intelligence; distributed systems; helicopters;
                 information technology; Internet of Things; mobile
                 robots; multiagent systems; OTA; over-the-air;
                 over-the-air code update; over-the-air updates;
                 particle swarm optimisation; Robot sensing systems;
                 robotic devices; robotic swarms; robotics; robots;
                 sensor arrays; software development; Software
                 development management; Software engineering; software
                 engineering; Software tools; swarm intelligence
                 ensures; UAVs; unmanned aerial vehicles; update
                 process; wireless sensor networks",
}

@Article{Vasisht:2018:DEU,
  author =       "Deepak Vasisht and Anubhav Jain and Chen-Yu Hsu and
                 Zachary Kabelac and Dina Katabi",
  title =        "{Duet}: Estimating User Position and Identity in Smart
                 Homes Using Intermittent and Incomplete {RF-Data}",
  journal =      j-IMWUT,
  volume =       "2",
  number =       "2",
  pages =        "1--21",
  month =        jul,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3214287",
  ISSN =         "2474-9567 (electronic)",
  bibdate =      "Thu Jan 23 12:37:01 MST 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/imwut.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3214287",
  abstract =     "Although past work on RF-based indoor localization has
                 delivered important advances, it typically makes
                 assumptions that hinder its adoption in smart home
                 applications. Most localization systems assume that
                 users carry their phones on them at home, an \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "84",
  fjournal =     "Proceedings of the ACM on Interactive, Mobile,
                 Wearable and Ubiquitous Technologies (IMWUT)",
  journal-URL =  "https://dl.acm.org/loi/imwut",
}

@Article{Viswanathan:2018:EEG,
  author =       "Sreejaya Viswanathan and Rui Tan and David K. Y. Yau",
  title =        "Exploiting Electrical Grid for Accurate and Secure
                 Clock Synchronization",
  journal =      j-TOSN,
  volume =       "14",
  number =       "2",
  pages =        "12:1--12:??",
  month =        jul,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3195182",
  ISSN =         "1550-4859 (print), 1550-4867 (electronic)",
  ISSN-L =       "1550-4859",
  bibdate =      "Wed Oct 2 09:20:25 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tosn.bib",
  abstract =     "Desynchronized clocks among network nodes in critical
                 infrastructures can degrade system performance and even
                 lead to safety incidents. Clock synchronization
                 protocols based on network message exchanges, though
                 widely used in current network systems, are susceptible
                 to delay attacks against the packet transmission. This
                 vulnerability cannot be solved by conventional security
                 measures, such as encryption, and remains an open
                 problem. This article proposes to use the sine voltage
                 waveform of a utility power grid to synchronize network
                 nodes connected to the same grid. Our experiments
                 demonstrate that minute fluctuations of the voltage's
                 cycle length encode fine-grained global time
                 information in Singapore's utility grid. Based on this
                 key result, we develop a clock synchronization approach
                 that achieves good accuracy and is provably secure
                 against packet-delay attacks. Implementation results
                 show that our approach achieves an average
                 synchronization error of 0.1 ms between two network
                 nodes that are deployed in office and residential
                 buildings 10 km apart. When the proposed system is
                 deployed within the same floor of an office building,
                 the error reduces to 10 $ \mu $ s. When there are heavy
                 industrial loads close to one of the two nodes 10 km
                 apart, the system can still maintain subsecond
                 accuracy. Moreover, when the two nodes are deployed
                 within the same building floor with industrial loads
                 nearby, the average synchronization error is 34 $ \mu $
                 s",
  acknowledgement = ack-nhfb,
  articleno =    "12",
  fjournal =     "ACM Transactions on Sensor Networks (TOSN)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J981",
}

@Article{Walter:2018:RCS,
  author =       "Kenny Walter",
  title =        "Researchers Close Security Vulnerability in Popular
                 Encryption Program",
  journal =      "{R\&D} Magazine",
  volume =       "??",
  number =       "??",
  pages =        "??--??",
  day =          "9",
  month =        aug,
  year =         "2018",
  bibdate =      "Thu Aug 09 17:50:02 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.rdmag.com/article/2018/08/researchers-close-security-vulnerability-popular-encryption-program",
  acknowledgement = ack-nhfb,
  remark =       "From the article about a vulnerability in OpenSSL on
                 mobile devices: ``unlike previous attacks that require
                 analyzing several logins, this attack was conducted by
                 just listening in on one decryption cycle and was the
                 first attack that showed a single recoding of a
                 cryptography key trace was enough to break 2,048 bits
                 of a private RSA key.\par

                 ``This is something that could be done at an airport to
                 steal people's information without arousing suspicion
                 and makes the so-called `coffee shop attack' much more
                 realistic,'' Prvulovic said. ``The designers of
                 encryption software now have another issue that they
                 need to take into account because continuous snooping
                 over long periods of time would no longer be required
                 to steal this information.''\,''",
}

@Article{Wang:2018:AMB,
  author =       "Rong Wang and Yan Zhu and Tung-Shou Chen and Chin-Chen
                 Chang",
  title =        "An Authentication Method Based on the Turtle Shell
                 Algorithm for Privacy-Preserving Data Mining",
  journal =      j-COMP-J,
  volume =       "61",
  number =       "8",
  pages =        "1123--1132",
  day =          "1",
  month =        aug,
  year =         "2018",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxy024",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Fri Aug 3 11:54:57 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://academic.oup.com/comjnl/article/61/8/1123/4925401",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Wang:2018:CIW,
  author =       "Xiang-yang Wang and Huan Xu and Si-yu Zhang and
                 Lin-lin Liang and Pan-pan Niu and Hong-ying Yang",
  title =        "A Color Image Watermarking Approach Based on
                 Synchronization Correction",
  journal =      j-FUND-INFO,
  volume =       "158",
  number =       "4",
  pages =        "385--407",
  month =        "????",
  year =         "2018",
  CODEN =        "FUMAAJ",
  DOI =          "https://doi.org/10.3233/FI-2018-1654",
  ISSN =         "0169-2968 (print), 1875-8681 (electronic)",
  ISSN-L =       "0169-2968",
  bibdate =      "Fri Sep 21 07:16:36 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/fundinfo2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Fundamenta Informaticae",
  journal-URL =  "http://content.iospress.com/journals/fundamenta-informaticae",
}

@Article{Wang:2018:ERS,
  author =       "Hong Wang and Jie Guan and Lin Ding",
  title =        "On Equivalence Relations of State Diagram of Cascade
                 Connection of an {LFSR} into an {NFSR}",
  journal =      j-INT-J-FOUND-COMP-SCI,
  volume =       "29",
  number =       "7",
  pages =        "??--??",
  month =        nov,
  year =         "2018",
  DOI =          "https://doi.org/10.1142/S0129054118500235",
  ISSN =         "0129-0541",
  ISSN-L =       "0129-0541",
  bibdate =      "Mon Nov 12 14:26:50 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijfcs.bib",
  URL =          "https://www.worldscientific.com/doi/10.1142/S0129054118500235",
  abstract =     "Grain is one of the hardware-oriented finalists of the
                 eSTREAM. The cipher has a cascade connection of an LFSR
                 into an NFSR which is denoted by Cascade Model. In this
                 paper, we study the equivalence relations between state
                 diagrams of two functions, and apply them to the
                 Cascade Models, then some results regarding their
                 equivalence relations are obtained.",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Foundations of Computer
                 Science (IJFCS)",
  journal-URL =  "http://www.worldscientific.com/loi/ijfcs",
}

@Article{Wang:2018:GAD,
  author =       "Lin Wang and Zhi Hu",
  title =        "On Graph Algorithms for Degeneracy Test and Recursive
                 Description of Stream Ciphers",
  journal =      j-FUND-INFO,
  volume =       "160",
  number =       "3",
  pages =        "343--359",
  month =        "????",
  year =         "2018",
  CODEN =        "FUMAAJ",
  DOI =          "https://doi.org/10.3233/FI-2018-1686",
  ISSN =         "0169-2968 (print), 1875-8681 (electronic)",
  ISSN-L =       "0169-2968",
  bibdate =      "Fri Sep 21 07:16:46 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/fundinfo2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Fundamenta Informaticae",
  journal-URL =  "http://content.iospress.com/journals/fundamenta-informaticae",
}

@Article{Wang:2018:LRI,
  author =       "Zhiwei Wang",
  title =        "Leakage resilient {ID}-based proxy re-encryption
                 scheme for access control in fog computing",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "87",
  number =       "??",
  pages =        "679--685",
  month =        oct,
  year =         "2018",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Tue Jun 26 08:47:57 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167739X17310075",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Wang:2018:PPA,
  author =       "Zhiwei Wang",
  title =        "A privacy-preserving and accountable authentication
                 protocol for {IoT} end-devices with weaker identity",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "82",
  number =       "??",
  pages =        "342--348",
  month =        may,
  year =         "2018",
  CODEN =        "FGSEVI",
  DOI =          "https://doi.org/10.1016/j.future.2017.09.042",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Sun Feb 18 14:42:10 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167739X17307495",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Wang:2018:SEA,
  author =       "Haijiang Wang and Xiaolei Dong and Zhenfu Cao and
                 Dongmei Li",
  title =        "Secure and Efficient Attribute-Based Encryption with
                 Keyword Search",
  journal =      j-COMP-J,
  volume =       "61",
  number =       "8",
  pages =        "1133--1142",
  day =          "1",
  month =        aug,
  year =         "2018",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxy031",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Fri Aug 3 11:54:57 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://academic.oup.com/comjnl/article/61/8/1133/4975828",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Wang:2018:SNU,
  author =       "King-Hang Wang and Chien-Ming Chen and Weicheng Fang
                 and Tsu-Yang Wu",
  title =        "On the security of a new ultra-lightweight
                 authentication protocol in {IoT} environment for {RFID}
                 tags",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "74",
  number =       "1",
  pages =        "65--70",
  month =        jan,
  year =         "2018",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-017-2105-8",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Sat Jan 6 08:59:19 MST 2018",
  bibsource =    "http://link.springer.com/journal/11227/74/1;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Article{Wang:2018:VMF,
  author =       "Nana Wang and Mohan Kankanhalli",
  title =        "{$2$D} Vector Map Fragile Watermarking with Region
                 Location",
  journal =      j-TSAS,
  volume =       "4",
  number =       "4",
  pages =        "12:1--12:??",
  month =        oct,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3239163",
  ISSN =         "2374-0353",
  bibdate =      "Fri Dec 6 16:16:50 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tsas.bib",
  URL =          "https://dl.acm.org/citation.cfm?id=3239163",
  abstract =     "Locating the original region of tampered features is a
                 challenging task for existing 2D vector map fragile
                 watermarking methods. This article presents a 2D vector
                 map fragile watermarking framework that locates not
                 only the current but also the original region of
                 tampered feature groups. In particular, we propose
                 dividing the features of the host vector map into
                 groups, and embedding a watermark consisting of
                 location-bits and check-bits into each group at the
                 sender side. At the receiver side, by comparing the
                 extracted and calculated check-bits, one can identify
                 tampered groups and locate their current regions. Then
                 the location-bits extracted from the mapping groups are
                 used to indicate the original regions of the tampered
                 groups. To demonstrate and analyze the applicability of
                 this framework, we instantiate it by proposing a
                 simulated annealing (SA)-based group division method, a
                 group mapping method, a minimum encasing rectangle
                 (MER) based location-bits generation method and a
                 check-bits generation method, and use an existing
                 reversible data hiding method for watermark embedding.
                 The experimental results show that the proposed
                 framework can locate all the regions influenced by
                 tampering, and the SA-based group division method can
                 get a better region location ability.",
  acknowledgement = ack-nhfb,
  articleno =    "12",
  fjournal =     "ACM Transactions on Spatial Algorithms and Systems
                 (TSAS)",
  journal-URL =  "http://dl.acm.org/pub.cfm?id=J1514",
}

@Article{Wazid:2018:AKM,
  author =       "Mohammad Wazid and Ashok Kumar Das and Athanasios V.
                 Vasilakos",
  title =        "Authenticated key management protocol for
                 cloud-assisted body area sensor networks",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "123",
  number =       "??",
  pages =        "112--126",
  day =          "1",
  month =        dec,
  year =         "2018",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Mon Oct 14 14:16:28 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804518302960",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Wei:2018:GCQ,
  author =       "Chun-Yan Wei and Xiao-Qiu Cai and Bin Liu and Tian-Yin
                 Wang and Fei Gao",
  title =        "A Generic Construction of
                 Quantum-Oblivious-Key-Transfer-Based Private Query with
                 Ideal Database Security and Zero Failure",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "67",
  number =       "1",
  pages =        "2--8",
  month =        jan,
  year =         "2018",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2017.2721404",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Thu Dec 14 07:11:27 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  URL =          "http://ieeexplore.ieee.org/document/7962191/",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
  keywords =     "Cryptography; Databases; low-shift and addition;
                 Optical wavelength conversion; Photonics; Protocols;
                 Quantum computing; quantum oblivious key transfer;
                 Quantum private query; simulation; weak coherent
                 source",
}

@Article{Williams:2018:FPD,
  author =       "Michael Williams",
  title =        "The First Public Discussion of the Secret {Colossus
                 Project}",
  journal =      j-IEEE-ANN-HIST-COMPUT,
  volume =       "40",
  number =       "1",
  pages =        "84--87",
  month =        jan # "\slash " # mar,
  year =         "2018",
  CODEN =        "IAHCEX",
  ISSN =         "1058-6180 (print), 1934-1547 (electronic)",
  ISSN-L =       "1058-6180",
  bibdate =      "Thu May 10 07:18:20 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeeannhistcomput.bib",
  URL =          "https://www.computer.org/csdl/mags/an/2018/01/man2018010084.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=85",
  remark =       "See \url{https://history.computer.org/annals/dtp/} for
                 additional notes, corrections, interviews, and
                 photographs.",
}

@Article{Wu:2018:ESS,
  author =       "Libing Wu and Biwen Chen and Kim-Kwang Raymond Choo
                 and Debiao He",
  title =        "Efficient and secure searchable encryption protocol
                 for cloud-based {Internet of Things}",
  journal =      j-J-PAR-DIST-COMP,
  volume =       "111",
  number =       "??",
  pages =        "152--161",
  month =        jan,
  year =         "2018",
  CODEN =        "JPDCER",
  ISSN =         "0743-7315 (print), 1096-0848 (electronic)",
  ISSN-L =       "0743-7315",
  bibdate =      "Tue Oct 24 15:08:48 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jpardistcomp.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S074373151730237X",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Parallel and Distributed Computing",
  journal-URL =  "http://www.sciencedirect.com/science/journal/07437315",
}

@Article{Wu:2018:SMI,
  author =       "Pin Wu and Yang Yang and Xiaoqiang Li",
  title =        "{StegNet}: Mega Image Steganography Capacity with Deep
                 Convolutional Network",
  journal =      j-FUTURE-INTERNET,
  volume =       "10",
  number =       "6",
  pages =        "54",
  day =          "15",
  month =        jun,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi10060054",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:51:00 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/10/6/54",
  abstract =     "Traditional image steganography often leans interests
                 towards safely embedding hidden information into cover
                 images with payload capacity almost neglected. This
                 paper combines recent deep convolutional neural network
                 methods with image-into-image steganography. It
                 successfully hides the same size images with a decoding
                 rate of 98.2\% or bpp (bits per pixel) of 23.57 by
                 changing only 0.76\% of the cover image on average. Our
                 method directly learns end-to-end mappings between the
                 cover image and the embedded image and between the
                 hidden image and the decoded image. We further show
                 that our embedded image, while with mega payload
                 capacity, is still robust to statistical analysis.",
  acknowledgement = ack-nhfb,
}

@Article{Xiang:2018:SSA,
  author =       "Y. Xiang and I. Natgunanathan and D. Peng and G. Hua
                 and B. Liu",
  title =        "Spread Spectrum Audio Watermarking Using Multiple
                 Orthogonal {PN} Sequences and Variable Embedding
                 Strengths and Polarities",
  journal =      j-IEEE-ACM-TASLP,
  volume =       "26",
  number =       "3",
  pages =        "529--539",
  month =        mar,
  year =         "2018",
  DOI =          "https://doi.org/10.1109/TASLP.2017.2782487",
  ISSN =         "2329-9290",
  bibdate =      "Sat Aug 3 09:10:28 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeeacmtaslp.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE\slash ACM Transactions on Audio, Speech, and
                 Language Processing",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6570655",
  keywords =     "audio coding; audio data; audio signal; audio signal
                 processing; Audio watermarking; audio watermarking;
                 compression attacks; copyright; Copyright protection;
                 copyright protection; Discrete cosine transforms;
                 Electronic mail; embedding capacity; existing audio
                 watermarking methods; high robustness; Interference;
                 Multiple Orthogonal PN Sequences; noise addition;
                 Robustness; Speech; spread spectrum; spread spectrum
                 audio watermarking; SS-based audio watermarking method;
                 Variable Embedding Strengths; watermark bits;
                 Watermarking",
}

@Article{Xiao:2018:FEI,
  author =       "Chang Xiao and Cheng Zhang and Changxi Zheng",
  title =        "{FontCode}: Embedding Information in Text Documents
                 Using Glyph Perturbation",
  journal =      j-TOG,
  volume =       "37",
  number =       "2",
  pages =        "15:1--15:??",
  month =        jul,
  year =         "2018",
  CODEN =        "ATGRDF",
  DOI =          "https://doi.org/10.1145/3152823",
  ISSN =         "0730-0301 (print), 1557-7368 (electronic)",
  ISSN-L =       "0730-0301",
  bibdate =      "Thu Nov 29 17:19:42 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tog.bib",
  abstract =     "We introduce FontCode, an information embedding
                 technique for text documents. Provided a text document
                 with specific fonts, our method embeds user-specified
                 information in the text by perturbing the glyphs of
                 text characters while preserving the text content. We
                 devise an algorithm to choose unobtrusive yet
                 machine-recognizable glyph perturbations, leveraging a
                 recently developed generative model that alters the
                 glyphs of each character continuously on a font
                 manifold. We then introduce an algorithm that embeds a
                 user-provided message in the text document and produces
                 an encoded document whose appearance is minimally
                 perturbed from the original document. We also present a
                 glyph recognition method that recovers the embedded
                 information from an encoded document stored as a vector
                 graphic or pixel image, or even on a printed paper. In
                 addition, we introduce a new error-correction coding
                 scheme that rectifies a certain number of recognition
                 errors. Lastly, we demonstrate that our technique
                 enables a wide array of applications, using it as a
                 text document metadata holder, an unobtrusive optical
                 barcode, a cryptographic message embedding scheme, and
                 a text document signature.",
  acknowledgement = ack-nhfb,
  articleno =    "15",
  fjournal =     "ACM Transactions on Graphics",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J778",
}

@Article{Xiao:2018:KRL,
  author =       "Dianyan Xiao and Yang Yu",
  title =        "Klepto for Ring-{LWE} Encryption",
  journal =      j-COMP-J,
  volume =       "61",
  number =       "8",
  pages =        "1228--1239",
  day =          "1",
  month =        aug,
  year =         "2018",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxy060",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Fri Aug 3 11:54:57 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://academic.oup.com/comjnl/article/61/8/1228/5035449",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Xu:2018:DFH,
  author =       "Jian Xu and Laiwen Wei and Yu Zhang and Andi Wang and
                 Fucai Zhou and Chong-zhi Gao",
  title =        "Dynamic Fully Homomorphic encryption-based {Merkle}
                 Tree for lightweight streaming authenticated data
                 structures",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "107",
  number =       "??",
  pages =        "113--124",
  day =          "1",
  month =        apr,
  year =         "2018",
  CODEN =        "JNCAF3",
  DOI =          "https://doi.org/10.1016/j.jnca.2018.01.014",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Sun May 27 08:10:13 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804518300286",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Xu:2018:SKS,
  author =       "Li Xu and Chi-Yao Weng and Lun-Pin Yuan and Mu-En Wu
                 and Raylin Tso and Hung-Min Sun",
  title =        "A shareable keyword search over encrypted data in
                 cloud computing",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "74",
  number =       "3",
  pages =        "1001--1023",
  month =        mar,
  year =         "2018",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-015-1515-8",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Fri Mar 2 12:22:02 MST 2018",
  bibsource =    "http://link.springer.com/journal/11227/74/3;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Article{Xue:2018:SNN,
  author =       "W. Xue and H. Li and Y. Peng and J. Cui and Y. Shi",
  title =        "Secure $k$ Nearest Neighbors Query for
                 High-Dimensional Vectors in Outsourced Environments",
  journal =      j-IEEE-TRANS-BIG-DATA,
  volume =       "4",
  number =       "4",
  pages =        "586--599",
  month =        dec,
  year =         "2018",
  DOI =          "https://doi.org/10.1109/TBDATA.2017.2740954",
  ISSN =         "2332-7790",
  bibdate =      "Fri Aug 2 11:24:47 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetransbigdata.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Big Data",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6687317",
  keywords =     "Cloud computing; Data privacy; Encryption; encryption;
                 quantization; query processing; Secure$k$nearest
                 neighbors query; Security of data; Servers",
}

@Article{Yan:2018:FPS,
  author =       "Qiuchen Yan and Stephen McCamant",
  title =        "{Fast PokeEMU}: Scaling Generated Instruction Tests
                 Using Aggregation and State Chaining",
  journal =      j-SIGPLAN,
  volume =       "53",
  number =       "3",
  pages =        "71--83",
  month =        mar,
  year =         "2018",
  CODEN =        "SINODQ",
  DOI =          "https://doi.org/10.1145/3296975.3186417",
  ISSN =         "0362-1340 (print), 1523-2867 (print), 1558-1160
                 (electronic)",
  ISSN-L =       "0362-1340",
  bibdate =      "Wed Oct 16 14:12:57 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigplan2010.bib",
  abstract =     "Software that emulates a CPU has many applications,
                 but is difficult to implement correctly and requires
                 extensive testing. Since a large number of test cases
                 are required for full coverage, it is important that
                 the tests execute efficiently. We explore techniques
                 for combining many instruction tests into one program
                 to amortize overheads such as booting an emulator. To
                 ensure the results of each test are reflected in a
                 final result, we use the outputs of one instruction
                 test as an input to the next, and adopt the ``Feistel
                 network'' construction from cryptography so that each
                 step is invertible. We evaluate this approach by
                 applying it to PokeEMU, a tool that generates emulator
                 tests using symbolic execution. The combined tests run
                 much faster, but still reveal most of the same behavior
                 differences as when run individually.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGPLAN Notices",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J706",
  remark =       "VEE '18 proceedings.",
}

@Article{Yang:2018:AIW,
  author =       "Zhi-Fang Yang and Chih-Ting Kuo and Te-Hsi Kuo",
  title =        "Authorization Identification by Watermarking in
                 Log-polar Coordinate System",
  journal =      j-COMP-J,
  volume =       "61",
  number =       "11",
  pages =        "1710--1723",
  day =          "1",
  month =        nov,
  year =         "2018",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxy048",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Sat Nov 3 07:20:54 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://academic.oup.com/comjnl/article/61/11/1710/4993056",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Yang:2018:CDD,
  author =       "Yang Yang and Xianghan Zheng and Ximeng Liu and
                 Shangping Zhong and Victor Chang",
  title =        "Cross-domain dynamic anonymous authenticated group key
                 management with symptom-matching for e-health social
                 system",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "84",
  number =       "??",
  pages =        "160--176",
  month =        jul,
  year =         "2018",
  CODEN =        "FGSEVI",
  DOI =          "https://doi.org/10.1016/j.future.2017.06.025",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Mon Apr 16 14:45:08 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167739X1730554X",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Yang:2018:CPG,
  author =       "Hongbin Yang and Shuxiong Jiang and Wenfeng Shen and
                 Zhou Lei",
  title =        "Certificateless Provable Group Shared Data Possession
                 with Comprehensive Privacy Preservation for Cloud
                 Storage",
  journal =      j-FUTURE-INTERNET,
  volume =       "10",
  number =       "6",
  pages =        "49",
  day =          "07",
  month =        jun,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi10060049",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:51:00 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/10/6/49",
  abstract =     "Provable Data Possession (PDP) protocol makes it
                 possible for cloud users to check whether the cloud
                 servers possess their original data without downloading
                 all the data. However, most of the existing PDP schemes
                 are based on either public key infrastructure (PKI) or
                 identity-based cryptography, which will suffer from
                 issues of expensive certificate management or key
                 escrow. In this paper, we propose a new construction of
                 certificateless provable group shared data possession
                 (CL-PGSDP) protocol by making use of certificateless
                 cryptography, which will eliminate the above issues.
                 Meanwhile, by taking advantage of zero-knowledge
                 protocol and randomization method, the proposed
                 CL-PGSDP protocol leaks no information of the stored
                 data and the group user's identity to the verifiers
                 during the verifying process, which is of the property
                 of comprehensive privacy preservation. In addition, our
                 protocol also supports efficient user revocation from
                 the group. Security analysis and experimental
                 evaluation indicate that our CL-PGSDP protocol provides
                 strong security with desirable efficiency.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Big Data and Internet of Thing.",
}

@Article{Yang:2018:EEC,
  author =       "Wencheng Yang and Song Wang and Guanglou Zheng and
                 Junaid Chaudhry and Craig Valli",
  title =        "{ECB4CI}: an enhanced cancelable biometric system for
                 securing critical infrastructures",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "74",
  number =       "10",
  pages =        "4893--4909",
  month =        oct,
  year =         "2018",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-018-2266-0",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Thu Oct 10 15:31:09 MDT 2019",
  bibsource =    "http://link.springer.com/journal/11227/74/10;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Article{Yang:2018:HEP,
  author =       "Kun Yang and Haoting Shen and Domenic Forte and Swarup
                 Bhunia and Mark Tehranipoor",
  title =        "Hardware-Enabled Pharmaceutical Supply Chain
                 Security",
  journal =      j-TODAES,
  volume =       "23",
  number =       "2",
  pages =        "23:1--23:??",
  month =        jan,
  year =         "2018",
  CODEN =        "ATASFO",
  DOI =          "https://doi.org/10.1145/3144532",
  ISSN =         "1084-4309 (print), 1557-7309 (electronic)",
  ISSN-L =       "1084-4309",
  bibdate =      "Fri Mar 22 16:58:39 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/todaes.bib",
  abstract =     "The pharmaceutical supply chain is the pathway through
                 which prescription and over-the-counter (OTC) drugs are
                 delivered from manufacturing sites to patients.
                 Technological innovations, price fluctuations of raw
                 materials, as well as tax, regulatory, and market
                 demands are driving change and making the
                 pharmaceutical supply chain more complex. Traditional
                 supply chain management methods struggle to protect the
                 pharmaceutical supply chain, maintain its integrity,
                 enhance customer confidence, and aid regulators in
                 tracking medicines. To develop effective measures that
                 secure the pharmaceutical supply chain, it is important
                 that the community is aware of the state-of-the-art
                 capabilities available to the supply chain owners and
                 participants. In this article, we will be presenting a
                 survey of existing hardware-enabled pharmaceutical
                 supply chain security schemes and their limitations. We
                 also highlight the current challenges and point out
                 future research directions. This survey should be of
                 interest to government agencies, pharmaceutical
                 companies, hospitals and pharmacies, and all others
                 involved in the provenance and authenticity of
                 medicines and the integrity of the pharmaceutical
                 supply chain.",
  acknowledgement = ack-nhfb,
  articleno =    "23",
  fjournal =     "ACM Transactions on Design Automation of Electronic
                 Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J776",
}

@Article{Yang:2018:IAC,
  author =       "Xiaokun Yang and Wujie Wen and Ming Fan",
  title =        "Improving {AES} Core Performance via an Advanced
                 {ASBUS} Protocol",
  journal =      j-JETC,
  volume =       "14",
  number =       "1",
  pages =        "6:1--6:??",
  month =        mar,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3110713",
  ISSN =         "1550-4832",
  bibdate =      "Thu Nov 1 16:44:40 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jetc.bib",
  abstract =     "Security is becoming a de-facto requirement of
                 System-on-Chips (SoC), leading up to a significant
                 share of circuit design cost. In this article, we
                 propose an advanced SBUS protocol (ASBUS), to improve
                 the data feeding efficiency of the Advanced Encryption
                 Standard (AES) encrypted circuits. As a case study, the
                 direct memory access (DMA) combined with AES engine and
                 memory controller are implemented as our
                 design-under-test (DUT) using field-programmable gate
                 arrays (FPGA). The results show that our presented
                 ASBUS structure outperforms the AXI-based design for
                 cipher tests. As an example, the 32-bit ASBUS design
                 costs less in terms of hardware resources and achieves
                 higher throughput ($ 1.30 \times $) than the 32-bit AXI
                 implementation, and the dynamic energy consumed by the
                 ASBUS cipher test is reduced to 71.27\% compared with
                 the AXI test.",
  acknowledgement = ack-nhfb,
  articleno =    "6",
  fjournal =     "ACM Journal on Emerging Technologies in Computing
                 Systems (JETC)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J967",
}

@Article{Yang:2018:NSS,
  author =       "Zheng Yang and Chao Liu and Wanping Liu and Daigu
                 Zhang and Song Luo",
  title =        "A new strong security model for stateful authenticated
                 group key exchange",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "4",
  pages =        "423--440",
  month =        aug,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0373-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Jul 25 08:53:56 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0373-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Yang:2018:PBC,
  author =       "Rupeng Yang and Qiuliang Xu and Man Ho Au and Zuoxia
                 Yu and Hao Wang and Lu Zhou",
  title =        "Position based cryptography with location privacy: a
                 step for {Fog Computing}",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "78 (part 2)",
  number =       "??",
  pages =        "799--806",
  month =        jan,
  year =         "2018",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Mon Sep 25 09:24:12 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X17311032",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Yang:2018:RKF,
  author =       "Li Yang and Ziyi Han and Zhengan Huang and Jianfeng
                 Ma",
  title =        "A remotely keyed file encryption scheme under mobile
                 cloud computing",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "106",
  number =       "??",
  pages =        "90--99",
  day =          "15",
  month =        mar,
  year =         "2018",
  CODEN =        "JNCAF3",
  DOI =          "https://doi.org/10.1016/j.jnca.2017.12.017",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Sat Mar 3 15:22:11 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804517304241",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Yang:2018:RRE,
  author =       "Kun Yang and Domenic Forte and Mark Tehranipoor",
  title =        "{ReSC}: an {RFID-Enabled} Solution for Defending {IoT}
                 Supply Chain",
  journal =      j-TODAES,
  volume =       "23",
  number =       "3",
  pages =        "29:1--29:??",
  month =        apr,
  year =         "2018",
  CODEN =        "ATASFO",
  DOI =          "https://doi.org/10.1145/3174850",
  ISSN =         "1084-4309 (print), 1557-7309 (electronic)",
  ISSN-L =       "1084-4309",
  bibdate =      "Fri Mar 22 16:58:39 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/todaes.bib",
  abstract =     "The Internet of Things (IoT), an emerging global
                 network of uniquely identifiable embedded computing
                 devices within the existing Internet infrastructure, is
                 transforming how we live and work by increasing the
                 connectedness of people and things on a scale that was
                 once unimaginable. In addition to facilitated
                 information and service exchange between connected
                 objects, enhanced computing power and analytic
                 capabilities of individual objects, and increased
                 interaction between objects and their environments, the
                 IoT also raises new security and privacy challenges.
                 Hardware trust across the IoT supply chain is the
                 foundation of IoT security and privacy. Two major
                 supply chain issues --- disappearance/theft of
                 authentic IoT devices and appearance of unauthentic
                 ones --- have to be addressed to secure the IoT supply
                 chain and lay the foundation for further security and
                 privacy-defensive measures. Comprehensive solutions
                 that enable IoT device authentication and traceability
                 across the entire supply chain (i.e., during
                 distribution and after being provisioned) need to be
                 established. Existing hardware, software, and network
                 protection methods, however, do not address IoT supply
                 chain issues. To mitigate this shortcoming, we propose
                 an RFID-enabled solution called ReSC that aims at
                 defending the IoT supply chain. By incorporating three
                 techniques-one-to-one mapping between RFID tag identity
                 and control chip identity; unique tag trace, which
                 records tag provenance and history information; and
                 neighborhood attestation of IoT devices-ReSC is
                 resistant to split attacks (i.e., separating tag from
                 product, swapping tags), counterfeit injection, product
                 theft throughout the entire supply chain, device
                 recycling, and illegal network service access (e.g.,
                 Internet, cable TV, online games, remote firmware
                 updates). Simulations, theoretical analysis, and
                 experimental results based on a printed circuit board
                 (PCB) prototype demonstrate the effectiveness of ReSC.
                 Finally, we evaluate the security of our proposed
                 scheme against various attacks.",
  acknowledgement = ack-nhfb,
  articleno =    "29",
  fjournal =     "ACM Transactions on Design Automation of Electronic
                 Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J776",
}

@Article{Ye:2018:ISS,
  author =       "Jun Ye and Zheng Xu and Yong Ding",
  title =        "Image search scheme over encrypted database",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "87",
  number =       "??",
  pages =        "251--258",
  month =        oct,
  year =         "2018",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Tue Jun 26 08:47:57 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167739X17324354",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Ye:2018:VBA,
  author =       "Guixin Ye and Zhanyong Tang and Dingyi Fang and
                 Xiaojiang Chen and Willy Wolff and Adam J. Aviv and
                 Zheng Wang",
  title =        "A Video-based Attack for {Android} Pattern Lock",
  journal =      j-TOPS,
  volume =       "21",
  number =       "4",
  pages =        "19:1--19:??",
  month =        oct,
  year =         "2018",
  DOI =          "https://doi.org/10.1145/3230740",
  ISSN =         "2471-2566 (print), 2471-2574 (electronic)",
  bibdate =      "Sat Sep 21 08:26:24 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tops.bib",
  URL =          "https://dl.acm.org/citation.cfm?id=3230740",
  abstract =     "Pattern lock is widely used for identification and
                 authentication on Android devices. This article
                 presents a novel video-based side channel attack that
                 can reconstruct Android locking patterns from video
                 footage filmed using a smartphone. As a departure from
                 previous attacks on pattern lock, this new attack does
                 not require the camera to capture any content displayed
                 on the screen. Instead, it employs a computer vision
                 algorithm to track the fingertip movement trajectory to
                 infer the pattern. Using the geometry information
                 extracted from the tracked fingertip motions, the
                 method can accurately infer a small number of (often
                 one) candidate patterns to be tested by an attacker. We
                 conduct extensive experiments to evaluate our approach
                 using 120 unique patterns collected from 215
                 independent users. Experimental results show that the
                 proposed attack can reconstruct over 95\% of the
                 patterns in five attempts. We discovered that, in
                 contrast to most people's belief, complex patterns do
                 not offer stronger protection under our attacking
                 scenarios. This is demonstrated by the fact that we are
                 able to break all but one complex patterns (with a
                 97.5\% success rate) as opposed to 60\% of the simple
                 patterns in the first attempt. We demonstrate that this
                 video-side channel is a serious concern for not only
                 graphical locking patterns but also PIN-based
                 passwords, as algorithms and analysis developed from
                 the attack can be easily adapted to target PIN-based
                 passwords. As a countermeasure, we propose to change
                 the way the Android locking pattern is constructed and
                 used. We show that our proposal can successfully defeat
                 this video-based attack. We hope the results of this
                 article can encourage the community to revisit the
                 design and practical use of Android pattern lock.",
  acknowledgement = ack-nhfb,
  articleno =    "19",
  fjournal =     "ACM Transactions on Privacy and Security (TOPS)",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J1547",
}

@Article{Youn:2018:DAH,
  author =       "Taek-Young Youn and Nam-Su Jho and Ku-Young Chang",
  title =        "Design of additive homomorphic encryption with
                 multiple message spaces for secure and practical
                 storage services over encrypted data",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "74",
  number =       "8",
  pages =        "3620--3638",
  month =        aug,
  year =         "2018",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-016-1796-6",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Thu Oct 10 15:31:14 MDT 2019",
  bibsource =    "http://link.springer.com/journal/11227/74/8;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Article{Zhan:2018:EKG,
  author =       "Furui Zhan and Nianmin Yao and Zhenguo Gao and Haitao
                 Yu",
  title =        "Efficient key generation leveraging wireless channel
                 reciprocity for {MANETs}",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "103",
  number =       "??",
  pages =        "18--28",
  day =          "1",
  month =        feb,
  year =         "2018",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Fri Jan 12 10:10:21 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804517303909",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Zhang:2018:AAG,
  author =       "Qikun Zhang and Yong Gan and Lu Liu and Xianmin Wang
                 and Xiangyang Luo and Yuanzhang Li",
  title =        "An authenticated asymmetric group key agreement based
                 on attribute encryption",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "123",
  number =       "??",
  pages =        "1--10",
  day =          "1",
  month =        dec,
  year =         "2018",
  CODEN =        "JNCAF3",
  DOI =          "https://doi.org/10.1016/j.jnca.2018.08.013",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Mon Oct 14 14:16:28 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804518302704",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Zhang:2018:AKE,
  author =       "Yuexin Zhang and Yang Xiang and Tao Wang and Wei Wu
                 and Jian Shen",
  title =        "An over-the-air key establishment protocol using
                 keyless cryptography",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "79 (part 1)",
  number =       "??",
  pages =        "284--294",
  year =         "2018",
  CODEN =        "FGSEVI",
  DOI =          "https://doi.org/10.1016/j.future.2016.12.013",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Fri Nov 24 15:16:17 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167739X1630752X",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
  keywords =     "Anonymous channel; Key establishment; Security; Source
                 indistinguishability",
}

@Article{Zhang:2018:PPE,
  author =       "Yin Zhang and Raffaele Gravina and Huimin Lu and
                 Massimo Villari and Giancarlo Fortino",
  title =        "{PEA}: Parallel electrocardiogram-based authentication
                 for smart healthcare systems",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "117",
  number =       "??",
  pages =        "10--16",
  day =          "1",
  month =        sep,
  year =         "2018",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Mon Oct 14 14:16:26 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804518301693",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Zhang:2018:SPF,
  author =       "Jianhong Zhang and Jian Mao",
  title =        "On the Security of a Pairing-Free Certificateless
                 Signcryption Scheme",
  journal =      j-COMP-J,
  volume =       "61",
  number =       "4",
  pages =        "469--471",
  day =          "1",
  month =        apr,
  year =         "2018",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxx081",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Fri Aug 3 11:54:19 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://academic.oup.com/comjnl/article/61/4/469/4107198",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Zhang:2018:SSH,
  author =       "Yinghui Zhang and Robert H. Deng and Gang Han and Dong
                 Zheng",
  title =        "Secure smart health with privacy-aware aggregate
                 authentication and access control in {Internet of
                 Things}",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "123",
  number =       "??",
  pages =        "89--100",
  day =          "1",
  month =        dec,
  year =         "2018",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Mon Oct 14 14:16:28 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804518302935",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Zhang:2018:VPA,
  author =       "Yuexin Zhang and Yang Xiang and Wei Wu and Abdulhameed
                 Alelaiwi",
  title =        "A variant of password authenticated key exchange
                 protocol",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "78 (part 2)",
  number =       "??",
  pages =        "699--711",
  month =        jan,
  year =         "2018",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Mon Sep 25 09:24:12 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X17302145",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Zheng:2018:GDP,
  author =       "Zhigao Zheng and Nitin Saxena and K. K. Mishra and
                 Arun Kumar Sangaiah",
  title =        "Guided dynamic particle swarm optimization for
                 optimizing digital image watermarking in industry
                 applications",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "88",
  number =       "??",
  pages =        "92--106",
  month =        nov,
  year =         "2018",
  CODEN =        "FGSEVI",
  DOI =          "https://doi.org/10.1016/j.future.2018.05.027",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Tue Sep 18 14:07:58 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X18307945",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Zhou:2018:CBG,
  author =       "Caixue Zhou and Guangyong Gao and Zongmin Cui and
                 Zhiqiang Zhao",
  title =        "Certificate-Based Generalized Ring Signcryption
                 Scheme",
  journal =      j-INT-J-FOUND-COMP-SCI,
  volume =       "29",
  number =       "6",
  pages =        "1063--1088",
  month =        sep,
  year =         "2018",
  DOI =          "https://doi.org/10.1142/S0129054118500211",
  ISSN =         "0129-0541",
  ISSN-L =       "0129-0541",
  bibdate =      "Mon Nov 12 14:26:47 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijfcs.bib",
  URL =          "https://www.worldscientific.com/doi/10.1142/S0129054118500211",
  abstract =     "Generalized ring signcryption (GRSC) can realize ring
                 signature and ring signcryption functions with only one
                 key pair and one algorithm. It is very useful for a
                 system with a large number of users, or whose function
                 may be changed, or with limited storage space. We give
                 a formal definition and security model of GRSC in the
                 certificate-based cryptosystem setting and propose a
                 concrete scheme by using bilinear pairings. The
                 confidentiality of our scheme can be proved under the
                 GBDH and CDH assumptions and the unforgeability of our
                 scheme can be proved under GDH' and CDH assumptions in
                 the random oracle model, and what is more, our scheme
                 has unconditional anonymity. Compared with other
                 certificateless ring signcryption schemes that use
                 bilinear pairings, it is a highly efficient one.",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Foundations of Computer
                 Science (IJFCS)",
  journal-URL =  "http://www.worldscientific.com/loi/ijfcs",
}

@Article{Zhou:2018:CLR,
  author =       "Yanwei Zhou and Bo Yang and Yi Mu",
  title =        "Continuous Leakage-Resilient Identity-Based Encryption
                 without Random Oracles",
  journal =      j-COMP-J,
  volume =       "61",
  number =       "4",
  pages =        "586--600",
  day =          "1",
  month =        apr,
  year =         "2018",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxy003",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Fri Aug 3 11:54:19 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://academic.oup.com/comjnl/article/61/4/586/4824746",
  acknowledgement = ack-nhfb,
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Zhou:2018:QTA,
  author =       "Lu Zhou and Quanlong Wang and Xin Sun and Piotr
                 Kulicki and Arcangelo Castiglione",
  title =        "Quantum technique for access control in cloud
                 computing {II}: Encryption and key distribution",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "103",
  number =       "??",
  pages =        "178--184",
  day =          "1",
  month =        feb,
  year =         "2018",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Fri Jan 12 10:10:21 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804517303922",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Zhou:2018:SAE,
  author =       "Yukun Zhou and Dan Feng and Yu Hua and Wen Xia and Min
                 Fu and Fangting Huang and Yucheng Zhang",
  title =        "A similarity-aware encrypted deduplication scheme with
                 flexible access control in the cloud",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "84",
  number =       "??",
  pages =        "177--189",
  month =        jul,
  year =         "2018",
  CODEN =        "FGSEVI",
  DOI =          "https://doi.org/10.1016/j.future.2017.10.014",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Mon Apr 16 14:45:08 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167739X17309238",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Zhou:2018:TPW,
  author =       "Lu Zhou and Chunhua Su and Yamin Wen and Weijie Li and
                 Zheng Gong",
  title =        "Towards practical white-box lightweight block cipher
                 implementations for {IoTs}",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "86",
  number =       "??",
  pages =        "507--514",
  month =        sep,
  year =         "2018",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Wed Jun 20 10:38:06 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167739X17326705",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Zhu:2018:CAC,
  author =       "Biaokai Zhu and Jumin Zhao and Dengao Li and Hong Wang
                 and Ruiqin Bai and Yanxia Li and Hao Wu",
  title =        "Cloud access control authentication system using
                 dynamic accelerometers data",
  journal =      j-CCPE,
  volume =       "30",
  number =       "20",
  pages =        "e4474:1--e4474:??",
  day =          "25",
  month =        oct,
  year =         "2018",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.4474",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Thu Mar 28 08:07:52 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "15 April 2018",
}

@Article{Zoni:2018:CSC,
  author =       "Davide Zoni and Alessandro Barenghi and Gerardo Pelosi
                 and William Fornaciari",
  title =        "A Comprehensive Side-Channel Information Leakage
                 Analysis of an In-Order {RISC CPU} Microarchitecture",
  journal =      j-TODAES,
  volume =       "23",
  number =       "5",
  pages =        "57:1--57:??",
  month =        oct,
  year =         "2018",
  CODEN =        "ATASFO",
  DOI =          "https://doi.org/10.1145/3212719",
  ISSN =         "1084-4309 (print), 1557-7309 (electronic)",
  ISSN-L =       "1084-4309",
  bibdate =      "Fri Mar 22 16:58:40 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/todaes.bib",
  abstract =     "Side-channel attacks are a prominent threat to the
                 security of embedded systems. To perform them, an
                 adversary evaluates the goodness of fit of a set of
                 key-dependent power consumption models to a collection
                 of side-channel measurements taken from an actual
                 device, identifying the secret key value as the one
                 yielding the best-fitting model. In this work, we
                 analyze for the first time the microarchitectural
                 components of a 32-bit in-order RISC CPU, showing which
                 one of them is accountable for unexpected side-channel
                 information leakage. We classify the leakage sources,
                 identifying the data serialization points in the
                 microarchitecture and providing a set of hints that can
                 be fruitfully exploited to generate implementations
                 resistant against side-channel attacks, either writing
                 or generating proper assembly code.",
  acknowledgement = ack-nhfb,
  articleno =    "57",
  fjournal =     "ACM Transactions on Design Automation of Electronic
                 Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J776",
}

@Article{Zuo:2018:CSA,
  author =       "Cong Zuo and Jun Shao and Guiyi Wei and Mande Xie and
                 Min Ji",
  title =        "{CCA}-secure {ABE} with outsourced decryption for fog
                 computing",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "78 (part 2)",
  number =       "??",
  pages =        "730--738",
  month =        jan,
  year =         "2018",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Mon Sep 25 09:24:12 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X16304745",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Abouaroek:2019:NAU,
  author =       "Musaeed Abouaroek and Khaleel Ahmad",
  title =        "Node Authentication Using {NTRU} Algorithm in
                 Opportunistic Network",
  journal =      j-SCPE,
  volume =       "20",
  number =       "1",
  pages =        "83--92",
  month =        "????",
  year =         "2019",
  CODEN =        "????",
  ISSN =         "1895-1767",
  ISSN-L =       "1895-1767",
  bibdate =      "Thu Oct 3 07:39:16 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/scpe.bib",
  URL =          "https://www.scpe.org/index.php/scpe/article/view/1481",
  acknowledgement = ack-nhfb,
  fjournal =     "Scalable Computing: Practice and Experience",
  journal-URL =  "http://www.scpe.org/",
}

@Article{Abraham:2019:DPL,
  author =       "Ittai Abraham and Danny Dolev and Joseph Y. Halpern",
  title =        "Distributed Protocols for Leader Election: a
                 Game-Theoretic Perspective",
  journal =      j-TEAC,
  volume =       "7",
  number =       "1",
  pages =        "4:1--4:??",
  month =        feb,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3303712",
  ISSN =         "2167-8375 (print), 2167-8383 (electronic)",
  ISSN-L =       "2167-8375",
  bibdate =      "Sat Oct 19 12:38:46 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/teac.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3303712",
  abstract =     "We do a game-theoretic analysis of leader election,
                 under the assumption that each agent prefers to have
                 some leader than no leader at all. We show that it is
                 possible to obtain a fair Nash equilibrium, where each
                 agent has an equal probability of being elected leader,
                 in a completely connected network, in a bidirectional
                 ring, and a unidirectional ring, in the synchronous
                 setting. In the asynchronous setting, Nash equilibrium
                 is not quite the right solution concept. Rather, we
                 must consider ex post Nash equilibrium; this means that
                 we have a Nash equilibrium no matter what a scheduling
                 adversary does. We show that ex post Nash equilibrium
                 is attainable in the asynchronous setting in all the
                 networks we consider, using a protocol with bounded
                 running time. However, in the asynchronous setting, we
                 require that n \&gt; 2. We show that we can get a fair
                 ex post \epsilon -Nash equilibrium if n =2 in the
                 asynchronous setting under some cryptographic
                 assumptions (specifically, the existence of a one-way
                 functions), using a commitment protocol. We then
                 generalize these results to a setting where we can have
                 deviations by a coalition of size k. In this case, we
                 can get what we call a fair k -resilient equilibrium in
                 a completely connected network if n \&gt; 2 k; under
                 the same cryptographic assumptions, we can a get a k
                 -resilient equilibrium in a completely connected
                 network, unidirectional ring, or bidirectional ring if
                 n \&gt; k. Finally, we show that under minimal
                 assumptions, not only do our protocols give a Nash
                 equilibrium, they also give a sequential equilibrium,
                 so players even play optimally off the equilibrium
                 path.",
  acknowledgement = ack-nhfb,
  articleno =    "4",
  fjournal =     "ACM Transactions on Economics and Computation",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=2542174",
}

@Article{Abro:2019:LEE,
  author =       "Adeel Abro and Zhongliang Deng and Kamran Ali Memon",
  title =        "A Lightweight Elliptic-{Elgamal}-Based Authentication
                 Scheme for Secure Device-to-Device Communication",
  journal =      j-FUTURE-INTERNET,
  volume =       "11",
  number =       "5",
  pages =        "108",
  day =          "07",
  month =        may,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi11050108",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:51:06 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/11/5/108",
  abstract =     "Device-to-Device (D2D) is a major part of 5G that will
                 facilitate deployments with extended coverage where
                 devices can act as users or relays. These relays
                 normally act as decode and forward relays
                 (semi-intelligent devices) with limited computational
                 and storage capabilities. However, introducing such a
                 technology, where users can act as relays, presents a
                 wide range of security threats, in particular, rogue
                 relay devices or man in the middle attacks (M-I-T-M).
                 Second, passing fewer control messages is always
                 advisable when considering authenticity and secrecy. To
                 mitigate M-I-T-M and to reduce communication costs,
                 this paper presents a lightweight
                 elliptic-ElGamal-based authentication scheme using PKI
                 (FHEEP) in D2D communication. Pollard's rho and Baby
                 Step, Giant Step (BSGS) methods are used to evaluate
                 the authenticity and secrecy of our proposed scheme.
                 The communication cost is calculated based on the
                 comparative analysis indicating that our proposed
                 scheme outperforms the baseline protocol. The proposed
                 scheme can be used for any infrastructure architecture
                 that will enhance the security of any D2D settings with
                 better performance.",
  acknowledgement = ack-nhfb,
  remark =       "Section Internet of Things.",
}

@Article{Aceto:2019:MME,
  author =       "Giuseppe Aceto and Domenico Ciuonzo and Antonio
                 Montieri and Antonio Pescap{\`e}",
  title =        "{MIMETIC}: {Mobile} encrypted traffic classification
                 using multimodal deep learning",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "165",
  number =       "??",
  pages =        "Article 106944",
  day =          "24",
  month =        dec,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1016/j.comnet.2019.106944",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Fri Aug 14 09:46:25 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1389128619304669",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286/",
}

@Article{Aditya:2019:ISF,
  author =       "B. P. Aditya and U. G. K. Avaneesh and K. Adithya and
                 Akshay Murthy and R. Sandeep and B. Kavyashree",
  title =        "Invisible Semi-Fragile Watermarking and Steganography
                 of Digital Videos for Content Authentication and Data
                 Hiding",
  journal =      j-INT-J-IMAGE-GRAPHICS,
  volume =       "19",
  number =       "3",
  pages =        "??--??",
  year =         "2019",
  DOI =          "https://doi.org/10.1142/S0219467819500153",
  ISSN =         "0219-4678",
  ISSN-L =       "0219-4678",
  bibdate =      "Tue Jul 23 06:58:38 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijig.bib",
  URL =          "https://www.worldscientific.com/doi/10.1142/S0219467819500153",
  abstract =     "In the current digital age, the piracy of digital
                 media content has become rampant. Illegal distribution
                 of movies and video clips on a global scale causes a
                 significant loss to the media industry. To prevent such
                 theft and distribution of content, we use a
                 watermarking technique for videos where copyright
                 information is hidden inside the original video in the
                 form of a watermark video. Using a video as the
                 watermark facilitates the user in hiding a large amount
                 of information. The watermarking scheme used in this
                 paper is semi-fragile, such that tampering of videos
                 can be detected with relative ease. To improve the
                 robustness of the watermark, we embed the watermark in
                 frequency domain, where we use DWT+DCT+SVD to embed the
                 watermark. The original video and watermark video are
                 transformed by using the DWT and DCT sequentially, then
                 the singular values of the watermark with some
                 embedding strength are added to the singular values of
                 the original video thus obtaining a watermarked video.
                 Some detection tools which are available today cannot
                 detect the watermark video inside the original video.
                 This method equalizes the frames of the watermark and
                 original video to reduce time consumed as well as
                 complexity. The effects of various attacks on the
                 watermarked video have been analyzed using the
                 calculated PSNR values.",
  acknowledgement = ack-nhfb,
  articleno =    "1950015",
  fjournal =     "International Journal of Image and Graphics (IJIG)",
  journal-URL =  "http://www.worldscientific.com/worldscinet/ijig",
}

@Article{Adrian:2019:IFS,
  author =       "David Adrian and Karthikeyan Bhargavan and Zakir
                 Durumeric and Pierrick Gaudry and Matthew Green and J.
                 Alex Halderman and Nadia Heninger and Drew Springall
                 and Emmanuel Thom{\'e} and Luke Valenta and Benjamin
                 VanderSloot and Eric Wustrow and Santiago
                 Zanella-B{\'e}guelin and Paul Zimmermann",
  title =        "Imperfect forward secrecy: how {Diffie--Hellman} fails
                 in practice",
  journal =      j-CACM,
  volume =       "62",
  number =       "1",
  pages =        "106--114",
  month =        jan,
  year =         "2019",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/3292035",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Dec 20 07:08:41 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://cacm.acm.org/magazines/2019/1/233523/fulltext",
  abstract =     "We investigate the security of Diffie--Hellman key
                 exchange as used in popular Internet protocols and find
                 it to be less secure than widely believed. First, we
                 present Logjam, a novel flaw in TLS that lets a
                 man-in-the-middle downgrade connections to
                 ``export-grade'' Diffie--Hellman. To carry out this
                 attack, we implement the number field sieve discrete
                 logarithm algorithm. After a week-long precomputation
                 for a specified 512-bit group, we can compute arbitrary
                 discrete logarithms in that group in about a minute. We
                 find that 82\% of vulnerable servers use a single
                 512-bit group, and that 8.4\% of Alexa Top Million
                 HTTPS sites are vulnerable to the attack. In response,
                 major browsers have changed to reject short groups. We
                 go on to consider Diffie--Hellman with 768- and
                 1024-bit groups. We estimate that even in the 1024-bit
                 case, the computations are plausible given nation-state
                 resources. A small number of fixed or standardized
                 groups are used by millions of servers; performing
                 precomputation for a single 1024-bit group would allow
                 passive eavesdropping on 18\% of popular HTTPS sites,
                 and a second group would allow decryption of traffic to
                 66\% of IPsec VPNs and 26\% of SSH servers. A close
                 reading of published NSA leaks shows that the agency's
                 attacks on VPNs are consistent with having achieved
                 such a break. We conclude that moving to stronger key
                 exchange methods should be a priority for the Internet
                 community.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Aghili:2019:LLT,
  author =       "Seyed Farhad Aghili and Hamid Mala and Mohammad
                 Shojafar and Pedro Peris-Lopez",
  title =        "{LACO}: Lightweight Three-Factor Authentication,
                 Access Control and Ownership Transfer Scheme for
                 E-Health Systems in {IoT}",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "96",
  number =       "??",
  pages =        "410--424",
  month =        jul,
  year =         "2019",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Mon Oct 14 16:09:56 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X18331297",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Aghili:2019:SSL,
  author =       "Seyed Farhad Aghili and Hamid Mala and Pallavi Kaliyar
                 and Mauro Conti",
  title =        "{SecLAP}: Secure and lightweight {RFID} authentication
                 protocol for {Medical IoT}",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "101",
  number =       "??",
  pages =        "621--634",
  month =        dec,
  year =         "2019",
  CODEN =        "FGSEVI",
  DOI =          "https://doi.org/10.1016/j.future.2019.07.004",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Mon Feb 10 12:55:02 MST 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X19304777",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Ahmad:2019:PQE,
  author =       "Awais Ahmad and Mudassar Ahmad and Muhammad Asif Habib
                 and Shahzad Sarwar and Junaid Chaudhry and Muhammad
                 Ahsan Latif and Saadat Hanif Dar and Muhammad Shahid",
  title =        "Parallel query execution over encrypted data in
                 database-as-a-service {(DaaS)}",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "75",
  number =       "4",
  pages =        "2269--2288",
  month =        apr,
  year =         "2019",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-019-02831-8",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Thu Oct 10 15:31:18 MDT 2019",
  bibsource =    "http://link.springer.com/journal/11227/75/4;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Article{Akdogan:2019:SKA,
  author =       "Dilara Akdogan and Duygu Karaoglan Altop and Albert
                 Levi",
  title =        "Secure key agreement based on ordered biometric
                 features",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "163",
  number =       "??",
  pages =        "Article 106885",
  month =        "????",
  year =         "2019",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Mon Oct 14 17:22:05 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1389128618313975",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286/",
}

@Article{Aldaya:2019:MTA,
  author =       "Alejandro Cabrera Aldaya and Billy Bob Brumley and
                 Alejandro J. Cabrera Sarmiento and Santiago
                 S{\'a}nchez-Solano",
  title =        "Memory Tampering Attack on Binary {GCD} Based
                 Inversion Algorithms",
  journal =      j-INT-J-PARALLEL-PROG,
  volume =       "47",
  number =       "4",
  pages =        "621--640",
  month =        aug,
  year =         "2019",
  CODEN =        "IJPPE5",
  DOI =          "https://doi.org/10.1007/s10766-018-0610-x",
  ISSN =         "0885-7458 (print), 1573-7640 (electronic)",
  ISSN-L =       "0885-7458",
  bibdate =      "Fri Oct 11 08:37:52 MDT 2019",
  bibsource =    "http://link.springer.com/journal/10766/47/4;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjparallelprogram.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Parallel Programming",
  journal-URL =  "http://link.springer.com/journal/10766",
}

@Article{Alghamdi:2019:RAM,
  author =       "Wael Alghamdi and Mohsen Rezvani and Hui Wu and Salil
                 S. Kanhere",
  title =        "Routing-Aware and Malicious Node Detection in a
                 Concealed Data Aggregation for {WSNs}",
  journal =      j-TOSN,
  volume =       "15",
  number =       "2",
  pages =        "18:1--18:??",
  month =        apr,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3293537",
  ISSN =         "1550-4859 (print), 1550-4867 (electronic)",
  ISSN-L =       "1550-4859",
  bibdate =      "Wed Oct 2 09:20:26 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tosn.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3293537",
  abstract =     "Data aggregation in Wireless Sensor Networks (WSNs)
                 can effectively reduce communication overheads and
                 reduce the energy consumption of sensor nodes. A WSN
                 needs to be not only energy efficient but also secure.
                 Various attacks may make data aggregation unsecure. We
                 investigate the reliable and secure end-to-end data
                 aggregation problem considering selective forwarding
                 attacks and modification attacks in homogeneous WSNs,
                 and propose two data aggregation approaches. Our
                 approaches, namely Sign-Share and Sham-Share, use
                 secret sharing and signatures to allow aggregators to
                 aggregate the data without understanding the contents
                 of messages and the base station to verify the
                 aggregated data and retrieve the raw data from the
                 aggregated data. To the best of our knowledge, this is
                 the first lightweight en-routing malicious node
                 detection in concealed data aggregation. We have
                 performed an extensive simulation to compare our
                 approaches and the two state-of-the-art approaches PIP
                 and RCDA-HOMO. The simulation results show that both
                 Sign-Share and Sham-Share consume a reasonable amount
                 of time in processing and aggregating the data. The
                 simulation results show that our first approach
                 achieved an average network lifetime of 102.33\% over
                 PIP and average aggregation energy consumption of
                 74.93\%. In addition, it achieved an average
                 aggregation processing time and sensor data processing
                 time of 95.4\% and 90.34\% over PIP and 98.7\% and
                 92.07\% over RCDA-HOMO, respectively, and it achieved
                 an average network delay of 71.95\% over PIP. Although
                 RCDA-HOMO is completely a different technique, a
                 comparison was performed to measure the computational
                 overhead.",
  acknowledgement = ack-nhfb,
  articleno =    "18",
  fjournal =     "ACM Transactions on Sensor Networks (TOSN)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J981",
}

@Article{Ali:2019:PRD,
  author =       "Zulfiqar Ali and Muhammad Imran and Sally McClean and
                 Naveed Khan and Muhammad Shoaib",
  title =        "Protection of records and data authentication based on
                 secret shares and watermarking",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "98",
  number =       "??",
  pages =        "331--341",
  month =        sep,
  year =         "2019",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Mon Oct 14 16:09:57 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X18328802",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Allender:2019:NIN,
  author =       "Eric Allender and Shuichi Hirahara",
  title =        "New Insights on the (Non-)Hardness of Circuit
                 Minimization and Related Problems",
  journal =      j-TOCT,
  volume =       "11",
  number =       "4",
  pages =        "27:1--27:??",
  month =        sep,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3349616",
  ISSN =         "1942-3454 (print), 1942-3462 (electronic)",
  ISSN-L =       "1942-3454",
  bibdate =      "Tue Oct 22 10:25:11 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/toct.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3349616",
  abstract =     "The Minimum Circuit Size Problem (MCSP) and a related
                 problem (MKTP) that deal with time-bounded Kolmogorov
                 complexity are prominent candidates for NP-intermediate
                 status. We show that, under very modest cryptographic
                 assumptions (such as the existence of one-way
                 functions), the problem of approximating the minimum
                 circuit size (or time-bounded Kolmogorov complexity)
                 within a factor of n$^{1 - o (1)}$ is indeed
                 NP-intermediate. To the best of our knowledge, these
                 problems are the first natural NP-intermediate problems
                 under the existence of an arbitrary one-way function.
                 Our technique is quite general; we use it also to show
                 that approximating the size of the largest clique in a
                 graph within a factor of n$^{1 - o (1)}$ is also
                 NP-intermediate unless NP \subseteq P/poly. We also
                 prove that MKTP is hard for the complexity class DET
                 under non-uniform NC$^0$ reductions. This is
                 surprising, since prior work on MCSP and MKTP had
                 highlighted weaknesses of ``local'' reductions such as
                 \leq $^{NC 0}$ $_m$. We exploit this local reduction to
                 obtain several new consequences: --- MKTP is not in
                 AC$^0$ [ p ]. --- Circuit size lower bounds are
                 equivalent to hardness of a relativized version
                 MKTP$^A$ of MKTP under a class of uniform AC$^0$
                 reductions, for a significant class of sets A. ---
                 Hardness of MCSP$^A$ implies hardness of MCSP$^A$ for a
                 significant class of sets A. This is the first result
                 directly relating the complexity of MCSP$^A$ and
                 MCSP$^A$, for any A.",
  acknowledgement = ack-nhfb,
  articleno =    "27",
  fjournal =     "ACM Transactions on Computation Theory",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1190",
}

@Article{Altakrori:2019:AAA,
  author =       "Malik H. Altakrori and Farkhund Iqbal and Benjamin C.
                 M. Fung and Steven H. H. Ding and Abdallah Tubaishat",
  title =        "{Arabic} Authorship Attribution: an Extensive Study on
                 {Twitter} Posts",
  journal =      j-TALLIP,
  volume =       "18",
  number =       "1",
  pages =        "5:1--5:??",
  month =        jan,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3236391",
  ISSN =         "2375-4699 (print), 2375-4702 (electronic)",
  ISSN-L =       "2375-4699",
  bibdate =      "Wed Oct 2 10:34:32 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tallip.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3236391",
  abstract =     "Law enforcement faces problems in tracing the true
                 identity of offenders in cybercrime investigations.
                 Most offenders mask their true identity, impersonate
                 people of high authority, or use identity deception and
                 obfuscation tactics to avoid detection and
                 traceability. To address the problem of anonymity,
                 authorship analysis is used to identify individuals by
                 their writing styles without knowing their actual
                 identities. Most authorship studies are dedicated to
                 English due to its widespread use over the Internet,
                 but recent cyber-attacks such as the distribution of
                 Stuxnet indicate that Internet crimes are not limited
                 to a certain community, language, culture, ideology, or
                 ethnicity. To effectively investigate cybercrime and to
                 address the problem of anonymity in online
                 communication, there is a pressing need to study
                 authorship analysis of languages such as Arabic,
                 Chinese, Turkish, and so on. Arabic, the focus of this
                 study, is the fourth most widely used language on the
                 Internet. This study investigates authorship of Arabic
                 discourse/text, especially tiny text, Twitter posts. We
                 benchmark the performance of a profile-based approach
                 that uses n-grams as features and compare it with
                 state-of-the-art instance-based classification
                 techniques. Then we adapt an event-visualization tool
                 that is developed for English to accommodate both
                 Arabic and English languages and visualize the result
                 of the attribution evidence. In addition, we
                 investigate the relative effect of the training set,
                 the length of tweets, and the number of authors on
                 authorship classification accuracy. Finally, we show
                 that diacritics have an insignificant effect on the
                 attribution process and part-of-speech tags are less
                 effective than character-level and word-level
                 n-grams.",
  acknowledgement = ack-nhfb,
  articleno =    "5",
  fjournal =     "ACM Transactions on Asian and Low-Resource Language
                 Information Processing (TALLIP)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1521",
}

@PhdThesis{Alzahrani:2019:SAC,
  author =       "Naif Saeed Alzahrani",
  title =        "A Secure Anti-Counterfeiting System Using Near Field
                 Communication, Public Key Cryptography, Blockchain, and
                 {Bayesian} Games",
  type =         "{Ph.D.}",
  school =       "Portland State University",
  address =      "Portland, OR, USA",
  pages =        "176",
  year =         "2019",
  ISBN =         "1-08-830493-1",
  ISBN-13 =      "978-1-08-830493-8",
  bibdate =      "Fri Nov 29 08:59:46 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://search.proquest.com/pqdtglobal/docview/2305527274",
  abstract =     "Counterfeit products, especially in the pharmaceutical
                 sector, have plagued the international community for
                 decades [56]. To combat this problem, many
                 anti-counterfeiting approaches have been proposed
                 [43,79,88,99]. They use either Radio Frequency
                 Identification (RFID) or Near Field Communication (NFC)
                 physical tags affixed to the products. Current
                 anti-counterfeiting approaches detect two
                 counterfeiting attacks: (1) modifications to a
                 product's tag details, such as changing the expiration
                 date; and (2) cloning of a genuine product's details to
                 reuse on counterfeit products. In addition, these
                 anti-counterfeiting approaches track-and-trace the
                 physical locations of products as the products flow
                 through supply chains.",
  acknowledgement = ack-nhfb,
  advisor =      "Nirupama Bulusu",
  keywords =     "0984:Computer science; Anti-Counterfeiting; Bayesian
                 Games; Blockchain; Computer science; Consensus
                 protocols; Near Field Communication; Public Key
                 Cryptography",
  ris-m1 =       "13900130",
}

@Article{Anderson:2019:QCN,
  author =       "Mark Anderson",
  title =        "Quantum cryptography needs a reboot: A failed security
                 product could someday power large-scale quantum
                 computing --- [News]",
  journal =      j-IEEE-SPECTRUM,
  volume =       "56",
  number =       "10",
  pages =        "9--10",
  month =        oct,
  year =         "2019",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.2019.8847578",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 07:02:09 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
}

@Article{Anonymous:2019:GES,
  author =       "Anonymous",
  title =        "Guest editorial: Special Issue on {Information Systems
                 Security, Privacy, Security and Cryptography (ICISSP
                 2017 and SECRYPT 2017)}",
  journal =      j-COMPUT-SECUR,
  volume =       "86",
  number =       "??",
  pages =        "419--419",
  month =        sep,
  year =         "2019",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:47:02 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404819301233",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2019:HCC,
  author =       "Anonymous",
  title =        "The History of Cryptography and Codes",
  journal =      j-BRITISH-J-HIST-MATH,
  volume =       "34",
  number =       "1",
  pages =        "71--72",
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1080/17498430.2018.1542200",
  ISSN =         "2637-5494",
  ISSN-L =       "????",
  bibdate =      "Mon Feb 4 14:38:29 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bshm.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.tandfonline.com/doi/full/10.1080/17498430.2018.1542200",
  acknowledgement = ack-nhfb,
  ajournal =     "Br. J. Hist. Math.",
  fjournal =     "British Journal for the History of Mathematics",
  journal-URL =  "http://www.tandfonline.com/loi/tbsh21",
  onlinedate =   "08 Jan 2019",
}

@Article{Anonymous:2019:PBT,
  author =       "Anonymous",
  title =        "Preface: Blockchain: From Technology to Solutions",
  journal =      j-IBM-JRD,
  volume =       "63",
  number =       "2--3",
  pages =        "1--2",
  month =        mar # "\slash " # may,
  year =         "2019",
  CODEN =        "IBMJAE",
  DOI =          "https://doi.org/10.1147/JRD.2019.2912087",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  ISSN-L =       "0018-8646",
  bibdate =      "Thu Jul 25 15:06:42 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ibmjrd.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IBM Journal of Research and Development",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5288520",
  keywords =     "Blockchain; Computer architecture; Cryptography;
                 Fabrics; History; Smart contracts; Supply chains",
}

@Article{Arab:2019:IEM,
  author =       "Alireza Arab and Mohammad Javad Rostami and Behnam
                 Ghavami",
  title =        "An image encryption method based on chaos system and
                 {AES} algorithm",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "75",
  number =       "10",
  pages =        "6663--6682",
  month =        oct,
  year =         "2019",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-019-02878-7",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Thu Oct 10 15:31:16 MDT 2019",
  bibsource =    "http://link.springer.com/journal/11227/75/10;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/s11227-019-02878-7.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Article{Araghi:2019:EHI,
  author =       "Tanya Koohpayeh Araghi and Azizah Abd Manaf",
  title =        "An enhanced hybrid image watermarking scheme for
                 security of medical and non-medical images based on
                 {DWT} and {$2$-D SVD}",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "101",
  number =       "??",
  pages =        "1223--1246",
  month =        dec,
  year =         "2019",
  CODEN =        "FGSEVI",
  DOI =          "https://doi.org/10.1016/j.future.2019.07.064",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Mon Feb 10 12:55:02 MST 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X19310842",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Arfaoui:2019:CAA,
  author =       "Amel Arfaoui and Ali Kribeche and Sidi-Mohammed
                 Senouci",
  title =        "Context-aware anonymous authentication protocols in
                 the {Internet of Things} dedicated to e-health
                 applications",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "159",
  number =       "??",
  pages =        "23--36",
  day =          "4",
  month =        aug,
  year =         "2019",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Mon Oct 14 17:19:56 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1389128619300465",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286/",
}

@Article{Arias-Cabarcos:2019:SAA,
  author =       "Patricia Arias-Cabarcos and Christian Krupitzer and
                 Christian Becker",
  title =        "A Survey on Adaptive Authentication",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "4",
  pages =        "80:1--80:??",
  month =        sep,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3336117",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 29 09:52:56 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3336117",
  abstract =     "Adaptive Authentication allows a system to dynamically
                 select the best mechanism(s) for authenticating a user
                 depending on contextual factors, such as location,
                 proximity to devices, and other attributes. Though this
                 technology has the potential to change the current
                 password-dominated authentication landscape, research
                 to date has not led to practical solutions that
                 transcend to our daily lives. Motivated to find out how
                 to improve adaptive authentication design, we provide a
                 structured survey of the existing literature to date
                 and analyze it to identify and discuss current research
                 challenges and future directions.",
  acknowledgement = ack-nhfb,
  articleno =    "80",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Misc{Armasu:2019:IFA,
  author =       "Lucian Armasu",
  title =        "{Intel} Follows {AMD}'s Lead on Full Memory
                 Encryption",
  howpublished = "Web site",
  day =          "27",
  month =        may,
  year =         "2019",
  bibdate =      "Mon Oct 07 10:58:17 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.tomshardware.com/news/intel-mktme-amd-memory-encryption,39467.html",
  abstract =     "Intel announced a new patchset for the next version of
                 the Linux kernel that will enable Multi-Key Total
                 Memory Encryption (MKTME). The feature is an extension
                 of Intel's Total Memory Encryption that brings support
                 for encrypting multiple pages in memory with different
                 encryption keys (up to 64 in total).",
  acknowledgement = ack-nhfb,
  remark =       "From the article: ``What about Spectre/MDS Attacks? Do
                 these encryption features protect against side-channel
                 attacks such as the Spectre and MDS family? No, not so
                 much. Researchers have warned before that memory
                 encryption is not an effective way of stopping
                 side-channel attacks, and in fact blocking or
                 restricting memory access to certain parts of the
                 system is a far better way to prevent this type of
                 attack from happening. Researchers have also found
                 several flaws in AMD's SEV feature that allow attackers
                 to steal data. Even if Intel's feature comes with a few
                 improvements, it likely won't stand the test of time,
                 especially considering that Intel's chips seem to be
                 more vulnerable to side-channel attacks than AMD's.''",
}

@Article{Athmani:2019:EED,
  author =       "Samir Athmani and Azeddine Bilami and Djallel Eddine
                 Boubiche",
  title =        "{EDAK}: An Efficient Dynamic Authentication and Key
                 Management Mechanism for heterogeneous {WSNs}",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "92",
  number =       "??",
  pages =        "789--799",
  month =        mar,
  year =         "2019",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Tue Feb 5 08:15:51 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167739X17315388",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Atighehchi:2019:GHC,
  author =       "Kevin Atighehchi and Loubna Ghammam and Morgan Barbier
                 and Christophe Rosenberger",
  title =        "{GREYC-Hashing}: Combining biometrics and secret for
                 enhancing the security of protected templates",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "101",
  number =       "??",
  pages =        "819--830",
  month =        dec,
  year =         "2019",
  CODEN =        "FGSEVI",
  DOI =          "https://doi.org/10.1016/j.future.2019.07.022",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Mon Feb 10 12:55:02 MST 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X1833125X",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Avoine:2019:SDB,
  author =       "Gildas Avoine and Muhammed Ali Bing{\"o}l and Ioana
                 Boureanu and Srdjan Capkun and Gerhard Hancke and
                 S{\"u}leyman Kardas and Chong Hee Kim and C{\'e}dric
                 Lauradoux and Benjamin Martin and Jorge Munilla and
                 Alberto Peinado and Kasper Bonne Rasmussen and Dave
                 Singel{\'e}e and Aslan Tchamkerten and Rolando
                 Trujillo-Rasua and Serge Vaudenay",
  title =        "Security of Distance-Bounding: a Survey",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "5",
  pages =        "94:1--94:??",
  month =        jan,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3264628",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:36 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3264628",
  abstract =     "Distance-bounding protocols allow a verifier to both
                 authenticate a prover and evaluate whether the latter
                 is located in his vicinity. These protocols are of
                 particular interest in contactless systems, e.g.,
                 electronic payment or access control systems, which are
                 vulnerable to distance-based frauds. This survey
                 analyzes and compares in a unified manner many existing
                 distance-bounding protocols with respect to several key
                 security and complexity features.",
  acknowledgement = ack-nhfb,
  articleno =    "94",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Babamir:2019:DDB,
  author =       "Faezeh Sadat Babamir and Murvet Kirci",
  title =        "Dynamic digest based authentication for client-server
                 systems using biometric verification",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "101",
  number =       "??",
  pages =        "112--126",
  month =        dec,
  year =         "2019",
  CODEN =        "FGSEVI",
  DOI =          "https://doi.org/10.1016/j.future.2019.05.025",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Mon Feb 10 12:55:02 MST 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X19304480",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Bai:2019:HAF,
  author =       "Xu Bai and Jiajia Yang and Qiong Dai and Zhaolin
                 Chen",
  title =        "A hybrid {ARM-FPGA} cluster for cryptographic
                 algorithm acceleration",
  journal =      j-CCPE,
  volume =       "31",
  number =       "24",
  pages =        "e5257:1--e5257:??",
  day =          "25",
  month =        dec,
  year =         "2019",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.5257",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Wed Mar 31 07:52:11 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "Concurr. Comput.",
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "12 August 2019",
}

@Article{Bai:2019:LMD,
  author =       "Tong Bai and Jinzhao Lin and Guoquan Li and Huiqian
                 Wang and Peng Ran and Zhangyong Li and Dan Li and Yu
                 Pang and Wei Wu and Gwanggil Jeon",
  title =        "A lightweight method of data encryption in {BANs}
                 using electrocardiogram signal",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "92",
  number =       "??",
  pages =        "800--811",
  month =        mar,
  year =         "2019",
  CODEN =        "FGSEVI",
  DOI =          "https://doi.org/10.1016/j.future.2018.01.031",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Tue Feb 5 08:15:51 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167739X17310361",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Baillot:2019:ICC,
  author =       "Patrick Baillot and Gilles Barthe and Ugo {Dal Lago}",
  title =        "Implicit Computational Complexity of Subrecursive
                 Definitions and Applications to Cryptographic Proofs",
  journal =      j-J-AUTOM-REASON,
  volume =       "63",
  number =       "4",
  pages =        "813--855",
  month =        dec,
  year =         "2019",
  CODEN =        "JAREEW",
  DOI =          "https://doi.org/10.1007/s10817-019-09530-2",
  ISSN =         "0168-7433 (print), 1573-0670 (electronic)",
  ISSN-L =       "0168-7433",
  bibdate =      "Fri Oct 11 15:17:40 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jautomreason.bib",
  URL =          "http://link.springer.com/article/10.1007/s10817-019-09530-2",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Automated Reasoning",
  journal-URL =  "http://link.springer.com/journal/10817",
}

@Article{Bala:2019:SAG,
  author =       "Suman Bala and Gaurav Sharma and Himani Bansal and
                 Tarunpreet Bhatia",
  title =        "On the Security of Authenticated Group Key Agreement
                 Protocols",
  journal =      j-SCPE,
  volume =       "20",
  number =       "1",
  pages =        "93--99",
  month =        "????",
  year =         "2019",
  CODEN =        "????",
  ISSN =         "1895-1767",
  ISSN-L =       "1895-1767",
  bibdate =      "Thu Oct 3 07:39:16 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/scpe.bib",
  URL =          "https://www.scpe.org/index.php/scpe/article/view/1440",
  acknowledgement = ack-nhfb,
  fjournal =     "Scalable Computing: Practice and Experience",
  journal-URL =  "http://www.scpe.org/",
}

@Article{Balagurusamy:2019:CA,
  author =       "V. S. K. Balagurusamy and C. Cabral and S.
                 Coomaraswamy and E. Delamarche and D. N. Dillenberger
                 and G. Dittmann and D. Friedman and O. G{\"o}k{\c{c}}e
                 and N. Hinds and J. Jelitto and A. Kind and A. D. Kumar
                 and F. Libsch and J. W. Ligman and S. Munetoh and C.
                 Narayanaswami and A. Narendra and A. Paidimarri and M.
                 A. P. Delgado and J. Rayfield and C. Subramanian and R.
                 Vaculin",
  title =        "Crypto anchors",
  journal =      j-IBM-JRD,
  volume =       "63",
  number =       "2--3",
  pages =        "4:1--4:12",
  month =        mar # "\slash " # may,
  year =         "2019",
  CODEN =        "IBMJAE",
  DOI =          "https://doi.org/10.1147/JRD.2019.2900651",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  ISSN-L =       "0018-8646",
  bibdate =      "Thu Jul 25 15:06:42 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ibmjrd.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IBM Journal of Research and Development",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5288520",
  keywords =     "Authentication; Blockchain; Cryptography; Databases;
                 Supply chains",
}

@Article{Bana:2019:VMC,
  author =       "Gergei Bana and Rohit Chadha and Ajay Kumar Eeralla
                 and Mitsuhiro Okada",
  title =        "Verification Methods for the Computationally Complete
                 Symbolic Attacker Based on Indistinguishability",
  journal =      j-TOCL,
  volume =       "21",
  number =       "1",
  pages =        "2:1--2:??",
  month =        oct,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3343508",
  ISSN =         "1529-3785 (print), 1557-945X (electronic)",
  ISSN-L =       "1529-3785",
  bibdate =      "Wed Oct 23 06:27:14 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tocl.bib",
  abstract =     "In recent years, a new approach has been developed for
                 verifying security protocols with the aim of combining
                 the benefits of symbolic attackers and the benefits of
                 unconditional soundness: the technique of the
                 computationally complete symbolic attacker of Bana and
                 Comon (BC) [8]. In this article, we argue that the real
                 breakthrough of this technique is the recent
                 introduction of its version for indistinguishability
                 [9], because, with the extensions we introduce here,
                 for the first time, there is a computationally sound
                 symbolic technique that is syntactically strikingly
                 simple, to which translating standard computational
                 security notions is a straightforward matter, and that
                 can be effectively used for verification of not only
                 equivalence properties but trace properties of
                 protocols as well. We first fully develop the core
                 elements of this newer version by introducing several
                 new axioms. We illustrate the power and the diverse use
                 of the introduced axioms on simple examples first. We
                 introduce an axiom expressing the Decisional
                 Diffie--Hellman property. We analyze the
                 Diffie--Hellman key exchange, both in its simplest form
                 and an authenticated version as well. We provide
                 computationally sound verification of real-or-random
                 secrecy of the Diffie--Hellman key exchange protocol
                 for multiple sessions, without any restrictions on the
                 computational implementation other than the DDH
                 assumption. We also show authentication for a
                 simplified version of the station-to-station protocol
                 using UF-CMA assumption for digital signatures.
                 Finally, we axiomatize IND-CPA, IND-CCA1, and IND-CCA2
                 security properties and illustrate their usage. We have
                 formalized the axiomatic system in an interactive
                 theorem prover, Coq, and have machine-checked the
                 proofs of various auxiliary theorems and security
                 properties of Diffie--Hellman and station-to-station
                 protocol.",
  acknowledgement = ack-nhfb,
  articleno =    "2",
  fjournal =     "ACM Transactions on Computational Logic",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J773",
}

@Article{Barbareschi:2019:PBM,
  author =       "Mario Barbareschi and Alessandra {De Benedictis} and
                 Erasmo {La Montagna} and Antonino Mazzeo and Nicola
                 Mazzocca",
  title =        "A {PUF}-based mutual authentication scheme for
                 Cloud-Edges {IoT} systems",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "101",
  number =       "??",
  pages =        "246--261",
  month =        dec,
  year =         "2019",
  CODEN =        "FGSEVI",
  DOI =          "https://doi.org/10.1016/j.future.2019.06.012",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Mon Feb 10 12:55:02 MST 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X19301293",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Bard:2019:DWG,
  author =       "Gregory V. Bard",
  title =        "Determining whether a given cryptographic function is
                 a permutation of another given cryptographic function
                 --- a problem in intellectual property",
  journal =      j-THEOR-COMP-SCI,
  volume =       "800",
  number =       "??",
  pages =        "3--14",
  day =          "31",
  month =        dec,
  year =         "2019",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Tue Nov 19 07:57:39 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2015.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0304397519306395",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@TechReport{Barker:2019:TUC,
  author =       "Elaine Barker and Allen Roginsky",
  title =        "Transitioning the Use of Cryptographic Algorithms and
                 Key Lengths",
  type =         "NIST Special Publication",
  number =       "800-131A Revision 2",
  institution =  pub-NIST,
  address =      pub-NIST:adr,
  pages =        "iv + 27",
  month =        mar,
  year =         "2019",
  DOI =          "https://doi.org/10.6028/NIST.SP.800-131Ar2",
  bibdate =      "Thu Jun 16 06:53:49 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "The National Institute of Standards and Technology
                 (NIST) provides cryptographic key management guidance
                 for defining and implementing appropriate key
                 management procedures, using algorithms that adequately
                 protect sensitive information, and planning ahead for
                 possible changes in the use of cryptography because of
                 algorithm breaks or the availability of more powerful
                 computing techniques. NIST Special Publication (SP)
                 800- 57, Part 1, Recommendation for Key Management:
                 General, includes a general approach for transitioning
                 from one algorithm or key length to another. This
                 Recommendation (SP 800-131A) provides more specific
                 guidance for transitions to the use of stronger
                 cryptographic keys and more robust algorithms",
  acknowledgement = ack-nhfb,
  keywords =     "cryptographic algorithm; digital signatures;
                 encryption; hash function; key agreement; key
                 derivation functions; key management; key transport;
                 key wrapping; message authentication codes;
                 post-quantum algorithms; random number generation;
                 security strength; transition",
}

@Article{Barthe:2019:SLN,
  author =       "Gilles Barthe and Gustavo Betarte and Juan Diego Campo
                 and Carlos Luna",
  title =        "System-Level Non-interference of Constant-Time
                 Cryptography. {Part I}: Model",
  journal =      j-J-AUTOM-REASON,
  volume =       "63",
  number =       "1",
  pages =        "1--51",
  month =        jun,
  year =         "2019",
  CODEN =        "JAREEW",
  DOI =          "https://doi.org/10.1007/s10817-017-9441-5",
  ISSN =         "0168-7433 (print), 1573-0670 (electronic)",
  ISSN-L =       "0168-7433",
  bibdate =      "Fri Oct 11 15:17:38 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jautomreason.bib",
  URL =          "http://link.springer.com/article/10.1007/s10817-017-9441-5",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Automated Reasoning",
  journal-URL =  "http://link.springer.com/journal/10817",
}

@Article{Bartoli:2019:VEW,
  author =       "Alberto Bartoli and Eric Medvet and Andrea {De
                 Lorenzo} and Fabiano Tarlao",
  title =        "Viewpoint: Enterprise wi-fi: we need devices that are
                 secure by default",
  journal =      j-CACM,
  volume =       "62",
  number =       "5",
  pages =        "33--35",
  month =        may,
  year =         "2019",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sat Apr 27 18:22:12 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://cacm.acm.org/magazines/2019/5/236421/fulltext",
  abstract =     "Seeking to increase awareness of WPA2 Enterprise
                 network security technology flaws and reduce risk to
                 users.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Baskaran:2019:TEL,
  author =       "Annie Gilda Roselin Arockia Baskaran and Priyadarsi
                 Nanda and Surya Nepal and Sean He",
  title =        "Testbed evaluation of Lightweight Authentication
                 Protocol {(LAUP)} for {6LoWPAN} wireless sensor
                 networks",
  journal =      j-CCPE,
  volume =       "31",
  number =       "23",
  pages =        "e4868:1--e4868:??",
  day =          "10",
  month =        dec,
  year =         "2019",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.4868",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Wed Mar 31 07:52:10 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "Concurr. Comput.",
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "27 August 2018",
}

@Article{Batina:2019:ISI,
  author =       "Lejla Batina and Sherman S. M. Chow and Gerhard Hancke
                 and Zhe Liu",
  title =        "Introduction to the Special Issue on Cryptographic
                 Engineering for {Internet of Things}: Security
                 Foundations, Lightweight Solutions, and Attacks",
  journal =      j-TECS,
  volume =       "18",
  number =       "3",
  pages =        "22:1--22:??",
  month =        jun,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3322641",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Thu Oct 17 18:16:43 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tecs.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3322641",
  acknowledgement = ack-nhfb,
  articleno =    "22",
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J840",
}

@Article{Belkhouja:2019:BBA,
  author =       "Taha Belkhouja and Xiaojiang Du and Amr Mohamed and
                 Abdulla K. Al-Ali and Mohsen Guizani",
  title =        "Biometric-based authentication scheme for Implantable
                 Medical Devices during emergency situations",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "98",
  number =       "??",
  pages =        "109--119",
  month =        sep,
  year =         "2019",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Mon Oct 14 16:09:57 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X18325792",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Belleville:2019:ASP,
  author =       "Nicolas Belleville and Damien Courouss{\'e} and Karine
                 Heydemann and Henri-Pierre Charles",
  title =        "Automated Software Protection for the Masses Against
                 Side-Channel Attacks",
  journal =      j-TACO,
  volume =       "15",
  number =       "4",
  pages =        "47:1--47:??",
  month =        jan,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3281662",
  ISSN =         "1544-3566 (print), 1544-3973 (electronic)",
  ISSN-L =       "1544-3566",
  bibdate =      "Tue Jan 8 17:20:00 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/taco.bib",
  abstract =     "We present an approach and a tool to answer the need
                 for effective, generic, and easily applicable
                 protections against side-channel attacks. The
                 protection mechanism is based on code polymorphism, so
                 that the observable behaviour of the protected
                 component is variable and unpredictable to the
                 attacker. Our approach combines lightweight specialized
                 runtime code generation with the optimization
                 capabilities of static compilation. It is extensively
                 configurable. Experimental results show that programs
                 secured by our approach present strong security levels
                 and meet the performance requirements of constrained
                 systems.",
  acknowledgement = ack-nhfb,
  articleno =    "47",
  fjournal =     "ACM Transactions on Architecture and Code Optimization
                 (TACO)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J924",
}

@Article{Bellovin:2019:LI,
  author =       "S. M. Bellovin",
  title =        "Layered Insecurity",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "3",
  pages =        "96--95",
  month =        may # "\slash " # jun,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2906807",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
  keywords =     "Computer security; Cryptography; Encryption; Special
                 issues and sections",
}

@Article{Bendiab:2019:FNF,
  author =       "Keltoum Bendiab and Stavros Shiaeles and Samia
                 Boucherkha and Bogdan Ghita",
  title =        "{FCMDT}: a novel fuzzy cognitive maps dynamic trust
                 model for cloud federated identity management",
  journal =      j-COMPUT-SECUR,
  volume =       "86",
  number =       "??",
  pages =        "270--290",
  month =        sep,
  year =         "2019",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:47:02 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404818312252",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Benhamouda:2019:SPD,
  author =       "F. Benhamouda and S. Halevi and T. Halevi",
  title =        "Supporting private data on {Hyperledger Fabric} with
                 secure multiparty computation",
  journal =      j-IBM-JRD,
  volume =       "63",
  number =       "2--3",
  pages =        "3:1--3:8",
  month =        mar # "\slash " # may,
  year =         "2019",
  CODEN =        "IBMJAE",
  DOI =          "https://doi.org/10.1147/JRD.2019.2913621",
  ISSN =         "0018-8646 (print), 2151-8556 (electronic)",
  ISSN-L =       "0018-8646",
  bibdate =      "Thu Jul 25 15:06:42 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ibmjrd.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IBM Journal of Research and Development",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5288520",
  keywords =     "Blockchain; Computer architecture; Cryptography;
                 Fabrics; Peer-to-peer computing; Smart contracts",
}

@Article{Benyamina:2019:ANE,
  author =       "Zakarya Benyamina and Khelifa Benahmed and Fateh
                 Bounaama",
  title =        "{ANEL}: a novel efficient and lightweight
                 authentication scheme for vehicular ad hoc networks",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "164",
  number =       "??",
  pages =        "Article 106899",
  day =          "9",
  month =        dec,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1016/j.comnet.2019.106899",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Fri Aug 14 09:46:24 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1389128619306012",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286/",
}

@Article{Bingol:2019:EPP,
  author =       "Muhammed Ali Bing{\"o}l and Osman Bi{\c{c}}er and
                 Mehmet Sabir Kiraz and Albert Levi",
  title =        "An Efficient 2-Party Private Function Evaluation
                 Protocol Based on Half Gates",
  journal =      j-COMP-J,
  volume =       "62",
  number =       "4",
  pages =        "598--613",
  month =        apr,
  year =         "2019",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxy136",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Apr 2 12:10:39 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://academic.oup.com/comjnl/article/62/4/598/5259181",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Blais:2019:DTL,
  author =       "Eric Blais and Cl{\'e}ment L. Canonne and Tom Gur",
  title =        "Distribution Testing Lower Bounds via Reductions from
                 Communication Complexity",
  journal =      j-TOCT,
  volume =       "11",
  number =       "2",
  pages =        "6:1--6:??",
  month =        apr,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3305270",
  ISSN =         "1942-3454 (print), 1942-3462 (electronic)",
  ISSN-L =       "1942-3454",
  bibdate =      "Tue Oct 22 10:25:10 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/toct.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3305270",
  abstract =     "We present a new methodology for proving distribution
                 testing lower bounds, establishing a connection between
                 distribution testing and the simultaneous message
                 passing (SMP) communication model. Extending the
                 framework of Blais, Brody, and Matulef [15], we show a
                 simple way to reduce (private-coin) SMP problems to
                 distribution testing problems. This method allows us to
                 prove new distribution testing lower bounds, as well as
                 to provide simple proofs of known lower bounds. Our
                 main result is concerned with testing identity to a
                 specific distribution, p, given as a parameter. In a
                 recent and influential work, Valiant and Valiant [55]
                 showed that the sample complexity of the aforementioned
                 problem is closely related to the l$_{2 / 3}$
                 -quasinorm of p. We obtain alternative bounds on the
                 complexity of this problem in terms of an arguably more
                 intuitive measure and using simpler proofs. More
                 specifically, we prove that the sample complexity is
                 essentially determined by a fundamental operator in the
                 theory of interpolation of Banach spaces, known as
                 Peetre's K-functional. We show that this quantity is
                 closely related to the size of the effective support of
                 p (loosely speaking, the number of supported elements
                 that constitute the vast majority of the mass of p ).
                 This result, in turn, stems from an unexpected
                 connection to functional analysis and refined
                 concentration of measure inequalities, which arise
                 naturally in our reduction.",
  acknowledgement = ack-nhfb,
  articleno =    "6",
  fjournal =     "ACM Transactions on Computation Theory",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1190",
}

@Article{Boche:2019:SMT,
  author =       "Holger Boche and Minglai Cai and Janis N{\"o}tzel and
                 Christian Deppe",
  title =        "Secret message transmission over quantum channels
                 under adversarial quantum noise: Secrecy capacity and
                 super-activation",
  journal =      j-J-MATH-PHYS,
  volume =       "60",
  number =       "6",
  pages =        "062202",
  month =        jun,
  year =         "2019",
  CODEN =        "JMAPAQ",
  DOI =          "https://doi.org/10.1063/1.5019461",
  ISSN =         "0022-2488 (print), 1089-7658 (electronic), 1527-2427",
  ISSN-L =       "0022-2488",
  bibdate =      "Fri Sep 6 15:08:00 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jmathphys2015.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Mathematical Physics",
  journal-URL =  "http://jmp.aip.org/",
}

@Article{Bogatov:2019:CEO,
  author =       "Dmytro Bogatov and George Kollios and Leonid Reyzin",
  title =        "A comparative evaluation of order-revealing encryption
                 schemes and secure range-query protocols",
  journal =      j-PROC-VLDB-ENDOWMENT,
  volume =       "12",
  number =       "8",
  pages =        "933--947",
  month =        apr,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.14778/3324301.3324309",
  ISSN =         "2150-8097",
  bibdate =      "Wed Oct 2 06:49:01 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/vldbe.bib",
  abstract =     "Database query evaluation over encrypted data can
                 allow database users to maintain the privacy of their
                 data while outsourcing data processing.
                 Order-Preserving Encryption (OPE) and Order-Revealing
                 Encryption (ORE) were designed to enable efficient
                 query execution, but provide only partial privacy. More
                 private protocols, based on Searchable Symmetric
                 Encryption (SSE), Oblivious RAM (ORAM) or custom
                 encrypted data structures, have also been designed. In
                 this paper, we develop a framework to provide the first
                 comprehensive comparison among a number of range query
                 protocols that ensure varying levels of privacy of user
                 data. We evaluate five ORE-based and five generic range
                 query protocols. We analyze and compare them both
                 theoretically and experimentally and measure their
                 performance over database indexing and query
                 evaluation. We report not only execution time but also
                 I/O performance, communication amount, and usage of
                 cryptographic primitive operations. Our comparison
                 reveals some interesting insights concerning the
                 relative security and performance of these approaches
                 in database settings.",
  acknowledgement = ack-nhfb,
  fjournal =     "Proceedings of the VLDB Endowment",
  journal-URL =  "http://portal.acm.org/citation.cfm?id=J1174",
}

@Article{Boneh:2019:ACK,
  author =       "Dan Boneh",
  title =        "Attacking cryptographic key exchange with
                 precomputation: technical perspective",
  journal =      j-CACM,
  volume =       "62",
  number =       "1",
  pages =        "105--105",
  month =        jan,
  year =         "2019",
  CODEN =        "CACMA2",
  DOI =          "https://doi.org/10.1145/3292033",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Thu Dec 20 07:08:41 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://cacm.acm.org/magazines/2019/1/233522/fulltext",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Bos:2019:ACI,
  author =       "J. W. Bos and S. J. Friedberger",
  title =        "Arithmetic Considerations for Isogeny-Based
                 Cryptography",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "68",
  number =       "7",
  pages =        "979--990",
  month =        jul,
  year =         "2019",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2018.2851238",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Thu Jul 11 09:46:20 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/fparith.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
  keywords =     "arithmetic; arithmetic considerations; arithmetic
                 techniques; Computer architecture; cryptographic
                 protocols; curve models; digital arithmetic; efficient
                 addition-subtraction chains; efficient arithmetic
                 modulo; efficient chains; elliptic curve scalar
                 multiplication; Elliptic curves; isogeny-based
                 cryptography; Montgomery curves; Montgomery reduction;
                 NIST; Optimization; post-quantum public-key arena;
                 Protocols; Public key cryptography; quadratic extension
                 field; scalar multiplication arithmetic; SIDH setting;
                 special shape; supersingular isogeny Diffie-Hellman
                 key-exchange protocol; systematic overview; twisted
                 Edwards curves",
}

@Misc{Boudot:2019:BFD,
  author =       "Fabrice Boudot and Pierrick Gaudry and Aurore
                 Guillevic and Nadia Heninger and Emmanuel Thom{\'e} and
                 Paul Zimmermann",
  title =        "795-bit factoring and discrete logarithms",
  howpublished = "Cado-nfs-discuss mailing list.",
  day =          "2",
  month =        dec,
  year =         "2019",
  bibdate =      "Tue Dec 03 07:19:25 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://lists.gforge.inria.fr/pipermail/cado-nfs-discuss/2019-December/001139.html",
  acknowledgement = ack-nhfb,
  remark =       "The authors announced the simultaneous cracking of the
                 challenges RSA-240 (795 bits) and DLP-240 (768 bits),
                 at a cost of about 4000 core years on Intel Xeon Gold
                 6130 CPUs. They write: ``More details will be given in
                 a forthcoming scientific publication.''",
}

@InProceedings{Breitner:2019:BNS,
  author =       "Joachum Breitner and Nadia Heninger",
  editor =       "I. Godberg and T. Moore",
  booktitle =    "{Financial Cryptography and Data Security: 23rd
                 International Conference, FC 2019, Frigate Bay, St.
                 Kitts and Nevis, February 18--22, 2019, Revised
                 Selected Papers}",
  title =        "Biased nonce sense: lattice attacks against weak
                 {ECDSA} signatures in cryptocurrencies.",
  volume =       "11598",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "3--20",
  year =         "2019",
  DOI =          "https://doi.org/10.1007/978-3-030-32101-7_1",
  bibdate =      "Fri Jul 29 07:36:25 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  series =       ser-LNCS,
  URL =          "https://www.springerprofessional.de/en/biased-nonce-sense-lattice-attacks-against-weak-ecdsa-signatures/17265526",
  acknowledgement = ack-nhfb,
}

@Article{Bronzino:2019:ISV,
  author =       "Francesco Bronzino and Paul Schmitt and Sara Ayoubi
                 and Guilherme Martins and Renata Teixeira and Nick
                 Feamster",
  title =        "Inferring Streaming Video Quality from Encrypted
                 Traffic: Practical Models and Deployment Experience",
  journal =      j-POMACS,
  volume =       "3",
  number =       "3",
  pages =        "56:1--56:25",
  month =        dec,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3366704",
  ISSN =         "2476-1249",
  ISSN-L =       "2476-1249",
  bibdate =      "Mon Mar 29 10:31:32 MDT 2021",
  bibsource =    "http://portal.acm.org/https://www.math.utah.edu/pub/tex/bib/pomacs.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3366704",
  abstract =     "Inferring the quality of streaming video applications
                 is important for Internet service providers, but the
                 fact that most video streams are encrypted makes it
                 difficult to do so. We develop models that infer
                 quality metrics(i.e., startup delay and resolution) for
                 encrypted streaming video services. Our paper builds on
                 previous work, but extends it in several ways. First,
                 the models work in deployment settings where the video
                 sessions and segments must be identified from a mix of
                 traffic and the time precision of the collected traffic
                 statistics is more coarse (e.g., due to aggregation).
                 Second, we develop a single composite model that works
                 for a range of different services (i.e., Netflix,
                 YouTube, Amazon, and Twitch), as opposed to just a
                 single service. Third, unlike many previous models, our
                 models perform predictions at finer granularity (e.g.,
                 the precise startup delay instead of just detecting
                 short versus long delays) allowing to draw better
                 conclusions on the ongoing streaming quality. Fourth,
                 we demonstrate the models are practical through a
                 16-month deployment in 66 homes and provide new
                 insights about the relationships between Internet
                 ``speed'' and the quality of the corresponding video
                 streams, for a variety of services; we find that higher
                 speeds provide only minimal improvements to startup
                 delay and resolution.",
  acknowledgement = ack-nhfb,
  articleno =    "56",
  fjournal =     "Proceedings of the ACM on Measurement and Analysis of
                 Computing Systems (POMACS)",
  journal-URL =  "https://dl.acm.org/loi/pomacs",
}

@Article{Broumandnia:2019:MCM,
  author =       "Ali Broumandnia",
  title =        "The {$3$D} modular chaotic map to digital color image
                 encryption",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "99",
  number =       "??",
  pages =        "489--499",
  month =        oct,
  year =         "2019",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Mon Oct 14 16:09:56 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X19300214",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Bruguera:2019:GEI,
  author =       "J. D. Bruguera and F. de Dinechin",
  title =        "{Guest Editors} Introduction: Special Section on
                 Computer Arithmetic",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "68",
  number =       "7",
  pages =        "951--952",
  month =        jul,
  year =         "2019",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2019.2918447",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Thu Jul 11 09:46:20 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/fparith.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
  keywords =     "Cryptography; Digital arithmetic; Mathematics;
                 Software algorithms; Special issues and sections",
}

@InProceedings{Buhren:2019:IUP,
  author =       "Robert Buhren and Christian Werling and Jean-Pierre
                 Seifert",
  booktitle =    "Proceedings of the {2019 ACM SIGSAC Conference on
                 Computer and Communications Security --- CCS '19}",
  title =        "Insecure Until Proven Updated: Analyzing {AMD SEV}'s
                 Remote Attestation",
  publisher =    pub-ACM,
  address =      pub-ACM:adr,
  pages =        "1--13",
  year =         "2019",
  DOI =          "https://doi.org/10.1145/3319535.3354216",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://arxiv.org/abs/1908.11680",
  abstract =     "Customers of cloud services have to trust the cloud
                 providers, as they control the building blocks that
                 form the cloud. This includes the hypervisor enabling
                 the sharing of a single hardware platform among
                 multiple tenants. AMD Secure Encrypted Virtualization
                 (SEV) claims a new level of protection in cloud
                 scenarios. AMD SEV encrypts the main memory of virtual
                 machines with VM-specific keys, thereby denying the
                 higher-privileged hypervisor access to a guest's
                 memory. To enable the cloud customer to verify the
                 correct deployment of his virtual machine, SEV
                 additionally introduces a remote attestation
                 protocol.This paper analyzes the firmware components
                 that implement the SEV remote attestation protocol on
                 the current AMD Epyc Naples CPU series. We demonstrate
                 that it is possible to extract critical CPU-specific
                 keys that are fundamental for the security of the
                 remote attestation protocol.Building on the extracted
                 keys, we propose attacks that allow a malicious cloud
                 provider a complete circumvention of the SEV protection
                 mechanisms. Although the underlying firmware issues
                 were already fixed by AMD, we show that the current
                 series of AMD Epyc CPUs, i.e., the Naples series, does
                 not prevent the installation of previous firmware
                 versions. We show that the severity of our proposed
                 attacks is very high as no purely software-based
                 mitigations are possible. This effectively renders the
                 SEV technology on current AMD Epyc CPUs useless when
                 confronted with an untrusted cloud provider. To
                 overcome these issues, we also propose robust changes
                 to the SEV design that allow future generations of the
                 SEV technology to mitigate the proposed attacks.",
  acknowledgement = ack-nhfb,
}

@Article{Cai:2019:UMD,
  author =       "Hongyun Cai and Fuzhi Zhang",
  title =        "An Unsupervised Method for Detecting Shilling Attacks
                 in Recommender Systems by Mining Item Relationship and
                 Identifying Target Items",
  journal =      j-COMP-J,
  volume =       "62",
  number =       "4",
  pages =        "579--597",
  month =        apr,
  year =         "2019",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxy124",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Apr 2 12:10:39 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://academic.oup.com/comjnl/article/62/4/579/5255729",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Calegari:2019:WPH,
  author =       "Patrice Calegari and Marc Levrier and Pawe{\l}
                 Balczy{\'n}ski",
  title =        "{Web} Portals for High-performance Computing: a
                 Survey",
  journal =      j-TWEB,
  volume =       "13",
  number =       "1",
  pages =        "5:1--5:??",
  month =        feb,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3197385",
  ISSN =         "1559-1131 (print), 1559-114X (electronic)",
  ISSN-L =       "1559-1131",
  bibdate =      "Tue Oct 22 08:10:06 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tweb.bib",
  abstract =     "This article addresses web interfaces for
                 High-performance Computing (HPC) simulation software.
                 First, it presents a brief history, starting in the
                 1990s with Java applets, of web interfaces used for
                 accessing and making best possible use of remote HPC
                 resources. It introduces HPC web-based portal use
                 cases. Then it identifies and discusses the key
                 features, among functional and non-functional
                 requirements, that characterize such portals. A brief
                 state of the art is then presented. The design and
                 development of Bull extreme factory Computing Studio v3
                 (XCS3) is chosen as a common thread for showing how the
                 identified key features can all be implemented in one
                 software: multi-tenancy, multi-scheduler compatibility,
                 complete control through an HTTP RESTful API,
                 customizable user interface with Responsive Web Design,
                 HPC application template framework, remote
                 visualization, and access through the Authentication,
                 Authorization, and Accounting security framework with
                 the Role-Based Access Control permission model.
                 Non-functional requirements (security, usability,
                 performance, reliability) are discussed, and the
                 article concludes by giving perspective for future
                 work.",
  acknowledgement = ack-nhfb,
  articleno =    "5",
  fjournal =     "ACM Transactions on the Web (TWEB)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J1062",
}

@Article{Cao:2019:AML,
  author =       "Nanyuan Cao and Zhenfu Cao and Zhen Liu and Xiaolei
                 Dong and Xiaopeng Zhao",
  title =        "All-But-Many Lossy Trapdoor Functions under Decisional
                 {RSA} Subgroup Assumption and Application",
  journal =      j-COMP-J,
  volume =       "62",
  number =       "8",
  pages =        "1148--1157",
  month =        aug,
  year =         "2019",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxz008",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Aug 19 07:31:49 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://academic.oup.com/comjnl/article/62/8/1148/5369686",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Cao:2019:PPS,
  author =       "Yang Cao and Yonghui Xiao and Li Xiong and Liquan Bai
                 and Masatoshi Yoshikawa",
  title =        "{PriSTE}: protecting spatiotemporal event privacy in
                 continuous location-based services",
  journal =      j-PROC-VLDB-ENDOWMENT,
  volume =       "12",
  number =       "12",
  pages =        "1866--1869",
  month =        aug,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.14778/3352063.3352086",
  ISSN =         "2150-8097",
  bibdate =      "Wed Oct 2 06:49:02 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/vldbe.bib",
  abstract =     "Location privacy-preserving mechanisms (LPPMs) have
                 been extensively studied for protecting a user's
                 location in location-based services. However, when
                 user's perturbed locations are released continuously,
                 existing LPPMs may not protect users' sensitive
                 spatiotemporal event, such as ``visited hospital in the
                 last week'' or ``regularly commuting between location 1
                 and location 2 every morning and afternoon'' (it is
                 easy to infer that locations 1 and 2 may be home and
                 office). In this demonstration, we demonstrate PriSTE
                 for protecting spatiotemporal event privacy in
                 continuous location release. First, to raise users'
                 awareness of such a new privacy goal, we design an
                 interactive tool to demonstrate how accurate an
                 adversary could infer a secret spatiotemporal event
                 from a sequence of locations or even LPPM-protected
                 locations. The attendees can find that some
                 spatiotemporal events are quite risky and even these
                 state-of-the-art LPPMs do not always protect
                 spatiotemporal event privacy. Second, we demonstrate
                 how a user can use PriSTE to automatically or manually
                 convert an LPPM for location privacy into one
                 protecting spatiotemporal event privacy in continuous
                 location-based services. Finally, we visualize the
                 trade-off between privacy and utility so that users can
                 choose appropriate privacy parameters in different
                 application scenarios.",
  acknowledgement = ack-nhfb,
  fjournal =     "Proceedings of the VLDB Endowment",
  journal-URL =  "http://portal.acm.org/citation.cfm?id=J1174",
}

@Article{Chakraborty:2019:TIP,
  author =       "Nilesh Chakraborty and Vijay S. Anand and Samrat
                 Mondal",
  title =        "Towards identifying and preventing behavioral side
                 channel attack on recording attack resilient unaided
                 authentication services",
  journal =      j-COMPUT-SECUR,
  volume =       "84",
  number =       "??",
  pages =        "193--205",
  month =        jul,
  year =         "2019",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:47:00 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404818302062",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Chang:2019:GTS,
  author =       "Jinyong Chang and Yanyan Ji and Maozhi Xu and Rui
                 Xue",
  title =        "General transformations from single-generation to
                 multi-generation for homomorphic message authentication
                 schemes in network coding",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "91",
  number =       "??",
  pages =        "416--425",
  month =        feb,
  year =         "2019",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Tue Feb 5 08:15:51 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167739X17330170",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Chang:2019:KCS,
  author =       "Jinyong Chang and Genqing Bian and Yanyan Ji and
                 Maozhi Xu",
  title =        "On the {KDM--CCA} Security from Partial Trapdoor
                 One-Way Family in the Random Oracle Model",
  journal =      j-COMP-J,
  volume =       "62",
  number =       "8",
  pages =        "1232--1245",
  month =        aug,
  year =         "2019",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxz044",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Aug 19 07:31:49 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://academic.oup.com/comjnl/article/62/8/1232/5492772",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Chang:2019:PPN,
  author =       "Sang-Yoon Chang and Sristi Lakshmi Sravana Kumar and
                 Yih-Chun Hu and Younghee Park",
  title =        "Power-Positive Networking: Wireless-Charging-Based
                 Networking to Protect Energy against Battery {DoS}
                 Attacks",
  journal =      j-TOSN,
  volume =       "15",
  number =       "3",
  pages =        "27:1--27:??",
  month =        aug,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3317686",
  ISSN =         "1550-4859 (print), 1550-4867 (electronic)",
  ISSN-L =       "1550-4859",
  bibdate =      "Wed Oct 2 09:20:26 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tosn.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3317686",
  abstract =     "Energy is required for networking and computation and
                 is a valuable resource for unplugged systems such as
                 mobile, sensor, and embedded systems. Energy
                 denial-of-service (DoS) attack where a remote attacker
                 exhausts the victim's battery via networking remains a
                 critical challenge for the device availability. While
                 prior literature proposes mitigation- and
                 detection-based solutions, we propose to eliminate the
                 vulnerability entirely by offloading the power
                 requirements to the entity who makes the networking
                 requests. To do so, we build communication channels
                 using wireless charging signals (as opposed to the
                 traditional radio-frequency signals), so that the
                 communication and the power transfer are simultaneous
                 and inseparable, and use the channels to build
                 power-positive networking (PPN). PPN also offloads the
                 computation-based costs to the requester, enabling
                 authentication and other tasks considered too
                 power-hungry for battery-operated devices. In this
                 article, we study the energy DoS attack impacts on
                 off-the-shelf embedded system platforms (Raspberry Pi
                 and the ESP 8266 system-on-chip (SoC) module), present
                 PPN, implement and build a
                 Qi-charging-technology-compatible prototype, and use
                 the prototype for evaluations and analyses. Our
                 prototype, built on the hardware already available for
                 wireless charging, effectively defends against energy
                 DoS and supports simultaneous power and data
                 transfer.",
  acknowledgement = ack-nhfb,
  articleno =    "27",
  fjournal =     "ACM Transactions on Sensor Networks (TOSN)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J981",
}

@Article{Chattopadhyay:2019:QIL,
  author =       "Sudipta Chattopadhyay and Moritz Beck and Ahmed Rezine
                 and Andreas Zeller",
  title =        "Quantifying the Information Leakage in Cache Attacks
                 via Symbolic Execution",
  journal =      j-TECS,
  volume =       "18",
  number =       "1",
  pages =        "7:1--7:??",
  month =        feb,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3288758",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Thu Oct 17 18:16:42 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tecs.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3288758",
  abstract =     "Cache attacks allow attackers to infer the properties
                 of a secret execution by observing cache hits and
                 misses. But how much information can actually leak
                 through such attacks? For a given program, a cache
                 model, and an input, our CHALICE framework leverages
                 symbolic execution to compute the amount of information
                 that can possibly leak through cache attacks. At the
                 core of CHALICE is a novel approach to quantify
                 information leakage that can highlight critical cache
                 side-channel leakage on arbitrary binary code. In our
                 evaluation on real-world programs from OpenSSL and
                 Linux GDK libraries, CHALICE effectively quantifies
                 information leakage: For an AES-128 implementation on
                 Linux, for instance, CHALICE finds that a cache attack
                 can leak as much as 127 out of 128 bits of the
                 encryption key.",
  acknowledgement = ack-nhfb,
  articleno =    "7",
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J840",
}

@Article{Chen:2019:BBS,
  author =       "Lanxiang Chen and Wai-Kong Lee and Chin-Chen Chang and
                 Kim-Kwang Raymond Choo and Nan Zhang",
  title =        "Blockchain based searchable encryption for electronic
                 health record sharing",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "95",
  number =       "??",
  pages =        "420--429",
  month =        jun,
  year =         "2019",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Mon Oct 14 16:09:56 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X18314134",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Chen:2019:IAS,
  author =       "Yi-Cheng Chen and Yueh-Peng Chou and Yung-Chen Chou",
  title =        "An Image Authentication Scheme Using {Merkle} Tree
                 Mechanisms",
  journal =      j-FUTURE-INTERNET,
  volume =       "11",
  number =       "7",
  pages =        "149",
  day =          "06",
  month =        jul,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi11070149",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:51:06 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/11/7/149",
  abstract =     "Research on digital image processing has become quite
                 popular and rapid in recent years, and scholars have
                 proposed various image verification mechanisms.
                 Similarly, blockchain technology has also become very
                 popular in recent years. This paper proposes a new
                 image verification mechanism based on the Merkle tree
                 technique in the blockchain. The Merkle tree root in
                 the blockchain mechanism provides a reliable
                 environment for storage of image features. In image
                 verification, the verification of each image can be
                 performed by the Merkle tree mechanism to obtain the
                 hash value of the Merkle tree node on the path. In
                 addition, the method combines the Inter-Planetary File
                 System (IPFS) to improve the availability of images.
                 The main purpose of this paper is to achieve the goal
                 of image integrity verification. The proposed method
                 can not only verify the integrity of the image but also
                 restore the tampered area in the case of image
                 tampering. Since the proposed method employs the
                 blockchain mechanism, the image verification mechanism
                 does not need third party resources. The verification
                 method is performed by each node in the blockchain
                 network. The experimental results demonstrate that the
                 proposed method successfully achieved the goal of image
                 authentication and tampered area restoration.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Blockchain Theory and Its
                 Applications.",
}

@Article{Chen:2019:IBS,
  author =       "Jiahui Chen and Jie Ling and Jianting Ning and Jintai
                 Ding",
  title =        "Identity-Based Signature Schemes for Multivariate
                 Public Key Cryptosystems",
  journal =      j-COMP-J,
  volume =       "62",
  number =       "8",
  pages =        "1132--1147",
  month =        aug,
  year =         "2019",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxz013",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Aug 19 07:31:49 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://academic.oup.com/comjnl/article/62/8/1132/5369678",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Chen:2019:MBR,
  author =       "Lele Chen and Gaoli Wang and GuoYan Zhang",
  title =        "{MILP}-based Related-Key Rectangle Attack and Its
                 Application to {GIFT}, {Khudra}, {MIBS}",
  journal =      j-COMP-J,
  volume =       "62",
  number =       "12",
  pages =        "1805--1821",
  month =        dec,
  year =         "2019",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxz076",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Dec 23 06:38:51 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://academic.oup.com/comjnl/article/62/12/1805/5587703",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Chen:2019:WBS,
  author =       "Yu-Chi Chen and Xin Xie and Peter Shaojui Wang and
                 Raylin Tso",
  title =        "Witness-based searchable encryption with optimal
                 overhead for cloud-edge computing",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "100",
  number =       "??",
  pages =        "715--723",
  month =        nov,
  year =         "2019",
  CODEN =        "FGSEVI",
  DOI =          "https://doi.org/10.1016/j.future.2019.05.038",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Mon Feb 10 12:55:01 MST 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X19301086",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Chikouche:2019:PPC,
  author =       "Noureddine Chikouche and Pierre-Louis Cayrel and El
                 Hadji Modou Mboup and Brice Odilon Boidje",
  title =        "A privacy-preserving code-based authentication
                 protocol for {Internet of Things}",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "75",
  number =       "12",
  pages =        "8231--8261",
  month =        dec,
  year =         "2019",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-019-03003-4",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Sat Jul 25 07:17:52 MDT 2020",
  bibsource =    "http://link.springer.com/journal/11227/75/12;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Article{Choi:2019:PTE,
  author =       "Hoyul Choi and Jongmin Jeong and Simon S. Woo and
                 Kyungtae Kang and Junbeom Hur",
  title =        "Password typographical error resilience in honey
                 encryption",
  journal =      j-COMPUT-SECUR,
  volume =       "87",
  number =       "??",
  pages =        "Article 101411",
  month =        nov,
  year =         "2019",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2018.07.020",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Jan 22 15:25:37 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404818311246",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Chretien:2019:TMF,
  author =       "R{\'e}my Chr{\'e}tien and V{\'e}ronique Cortier and
                 Antoine Dallon and St{\'e}phanie Delaune",
  title =        "Typing Messages for Free in Security Protocols",
  journal =      j-TOCL,
  volume =       "21",
  number =       "1",
  pages =        "1:1--1:??",
  month =        oct,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3343507",
  ISSN =         "1529-3785 (print), 1557-945X (electronic)",
  ISSN-L =       "1529-3785",
  bibdate =      "Wed Oct 23 06:27:14 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tocl.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3343507",
  abstract =     "Security properties of cryptographic protocols are
                 typically expressed as reachability or equivalence
                 properties. Secrecy and authentication are examples of
                 reachability properties, while privacy properties such
                 as untraceability, vote secrecy, or anonymity are
                 generally expressed as behavioral equivalence in a
                 process algebra that models security protocols. Our
                 main contribution is to reduce the search space for
                 attacks for reachability as well as equivalence
                 properties. Specifically, we show that if there is an
                 attack then there is one that is well-typed. Our result
                 holds for a large class of typing systems, a family of
                 equational theories that encompasses all standard
                 primitives, and protocols without else branches. For
                 many standard protocols, we deduce that it is
                 sufficient to look for attacks that follow the format
                 of the messages expected in an honest execution,
                 therefore considerably reducing the search space.",
  acknowledgement = ack-nhfb,
  articleno =    "1",
  fjournal =     "ACM Transactions on Computational Logic",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J773",
}

@Article{Conti:2019:BUB,
  author =       "Mauro Conti and Muhammad Hassan and Chhagan Lal",
  title =        "{BlockA{\em uth}}: {BlockChain} based distributed
                 producer authentication in {ICN}",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "164",
  number =       "??",
  pages =        "Article 106888",
  day =          "9",
  month =        dec,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1016/j.comnet.2019.106888",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Fri Aug 14 09:46:24 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1389128619308308",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286/",
}

@Article{Courtois:2019:RRR,
  author =       "J. Courtois and L. Abbas-Turki and J. Bajard",
  title =        "Resilience of Randomized {RNS} Arithmetic with Respect
                 to Side-Channel Leaks of Cryptographic Computation",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "68",
  number =       "12",
  pages =        "1720--1730",
  month =        dec,
  year =         "2019",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2019.2924630",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Thu Nov 7 11:20:24 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/fparith.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
  keywords =     "CPA; DPA; ECC; Elliptic curve cryptography; Elliptic
                 curves; Hamming distance; Hamming weight; information
                 leakage; Maximum likelihood estimation; maximum
                 likelihood estimator; moduli randomization; Monte
                 Carlo; Multiprotocol label switching; Resilience; RNS;
                 side channel",
}

@Article{Cremers:2019:SAG,
  author =       "Cas Cremers and Martin Dehnel-Wild and Kevin Milner",
  title =        "Secure authentication in the grid: a formal analysis
                 of {DNP3 SAv5}",
  journal =      j-J-COMP-SECUR,
  volume =       "27",
  number =       "2",
  pages =        "203--232",
  month =        "????",
  year =         "2019",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-181139",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 23 05:47:21 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Cui:2019:ABS,
  author =       "H. Cui and R. H. Deng and Y. Li and G. Wu",
  title =        "Attribute-Based Storage Supporting Secure
                 Deduplication of Encrypted Data in Cloud",
  journal =      j-IEEE-TRANS-BIG-DATA,
  volume =       "5",
  number =       "3",
  pages =        "330--342",
  month =        sep,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/TBDATA.2017.2656120",
  ISSN =         "2332-7790",
  ISSN-L =       "2332-7790",
  bibdate =      "Tue Oct 29 11:08:44 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetransbigdata.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Big Data",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6687317",
  keywords =     "ABE; access policy; attribute-based storage system;
                 authorisation; Cloud computing; cloud computing; cloud
                 service provider; cryptography; data confidentiality;
                 data deduplication systems; data provider;
                 deduplication; duplicate copies; duplicate detection;
                 encrypted data; encryption; Encryption; hybrid cloud
                 setting; identical data; network bandwidth;
                 outsourcing; private cloud; public cloud; secure
                 deduplication; Secure storage; security notion;
                 semantic security; Semantics; standard ABE system;
                 Standards; storage; storage management; storage space",
}

@Article{Cui:2019:CPA,
  author =       "Yuzhao Cui and Qiong Huang and Jianye Huang and Hongbo
                 Li and Guomin Yang",
  title =        "Ciphertext-Policy Attribute-Based Encrypted Data
                 Equality Test and Classification",
  journal =      j-COMP-J,
  volume =       "62",
  number =       "8",
  pages =        "1166--1177",
  month =        aug,
  year =         "2019",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxz036",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Aug 19 07:31:49 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://academic.oup.com/comjnl/article/62/8/1166/5480373",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Culnane:2019:KKR,
  author =       "C. Culnane and A. Essex and S. J. Lewis and O. Pereira
                 and V. Teague",
  title =        "Knights and Knaves Run Elections: {Internet} Voting
                 and Undetectable Electoral Fraud",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "4",
  pages =        "62--70",
  month =        jul # "\slash " # aug,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2915398",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
  keywords =     "cryptographic weaknesses; cryptography; Cryptography;
                 e-voting system; electoral fraud; Electronic voting;
                 fraud; government data processing; Internet; Internet
                 voting systems; politics; trusted computing;
                 trustworthy elections",
}

@Article{Dai:2019:SAM,
  author =       "Hua Dai and Xuelong Dai and Xun Yi and Geng Yang and
                 Haiping Huang",
  title =        "Semantic-aware multi-keyword ranked search scheme over
                 encrypted cloud data",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "147",
  number =       "??",
  pages =        "??--??",
  day =          "1",
  month =        dec,
  year =         "2019",
  CODEN =        "JNCAF3",
  DOI =          "https://doi.org/10.1016/j.jnca.2019.102442",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Mon May 24 15:12:30 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804519303029",
  acknowledgement = ack-nhfb,
  articleno =    "102442",
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Dang:2019:SBS,
  author =       "Van Tuyen Dang and Truong Thu Huong and Nguyen Huu
                 Thanh and Pham Ngoc Nam and Nguyen Ngoc Thanh and Alan
                 Marshall",
  title =        "{SDN}-Based {SYN} Proxy --- A Solution to Enhance
                 Performance of Attack Mitigation Under {TCP} {SYN}
                 Flood",
  journal =      j-COMP-J,
  volume =       "62",
  number =       "4",
  pages =        "518--534",
  month =        apr,
  year =         "2019",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxy117",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Apr 2 12:10:39 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://academic.oup.com/comjnl/article/62/4/518/5183521",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{DeMarsico:2019:SGR,
  author =       "Maria {De Marsico} and Alessio Mecca",
  title =        "A Survey on Gait Recognition via Wearable Sensors",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "4",
  pages =        "86:1--86:??",
  month =        sep,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3340293",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 29 09:52:56 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3340293",
  abstract =     "Gait is a biometric trait that can allow user
                 authentication, though it is classified as a ``soft''
                 one due to a certain lack in permanence and to
                 sensibility to specific conditions. The earliest
                 research relies on computer vision, especially applied
                 in video surveillance. More recently, the spread of
                 wearable sensors, especially those embedded in mobile
                 devices, has spurred a different research line. In
                 fact, they are able to capture the dynamics of the
                 walking pattern through simpler one-dimensional
                 signals. This capture modality can avoid some problems
                 related to computer vision-based techniques but suffers
                 from specific limitations. Related research is still in
                 a less advanced phase with respect to other biometric
                 traits. However, many factors --- the promising results
                 achieved so far, the increasing accuracy of sensors,
                 the ubiquitous presence of mobile devices, and the low
                 cost of related techniques --- contribute to making
                 this biometrics attractive and suggest continuing
                 investigating. This survey provides interested readers
                 with a reasoned and systematic overview of problems,
                 approaches, and available benchmarks.",
  acknowledgement = ack-nhfb,
  articleno =    "86",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Demay:2019:PSS,
  author =       "Gr{\'e}gory Demay and Peter Ga{\v{z}}i and Ueli Maurer
                 and Bj{\"o}rn Tackmann",
  title =        "Per-session security: Password-based cryptography
                 revisited",
  journal =      j-J-COMP-SECUR,
  volume =       "27",
  number =       "1",
  pages =        "75--111",
  month =        "????",
  year =         "2019",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-181131",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 23 05:47:20 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Deng:2019:DMS,
  author =       "Cheng Deng and Zhao Li and Xinbo Gao and Dacheng Tao",
  title =        "Deep Multi-scale Discriminative Networks for Double
                 {JPEG} Compression Forensics",
  journal =      j-TIST,
  volume =       "10",
  number =       "2",
  pages =        "20:1--20:??",
  month =        feb,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3301274",
  ISSN =         "2157-6904 (print), 2157-6912 (electronic)",
  ISSN-L =       "2157-6904",
  bibdate =      "Tue Oct 22 11:55:44 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tist.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3301274",
  abstract =     "As JPEG is the most widely used image format, the
                 importance of tampering detection for JPEG images in
                 blind forensics is self-evident. In this area,
                 extracting effective statistical characteristics from a
                 JPEG image for classification remains a challenge.
                 Effective features are designed manually in traditional
                 methods, suggesting that extensive labor-consuming
                 research and derivation is required. In this article,
                 we propose a novel image tampering detection method
                 based on deep multi-scale discriminative networks
                 (MSD-Nets). The multi-scale module is designed to
                 automatically extract multiple features from the
                 discrete cosine transform (DCT) coefficient histograms
                 of the JPEG image. This module can capture the
                 characteristic information in different scale spaces.
                 In addition, a discriminative module is also utilized
                 to improve the detection effect of the networks in
                 those difficult situations when the first compression
                 quality ( QF 1) is higher than the second one ( QF 2).
                 A special network in this module is designed to
                 distinguish the small statistical difference between
                 authentic and tampered regions in these cases. Finally,
                 a probability map can be obtained and the specific
                 tampering area is located using the last classification
                 results. Extensive experiments demonstrate the
                 superiority of our proposed method in both quantitative
                 and qualitative metrics when compared with
                 state-of-the-art approaches.",
  acknowledgement = ack-nhfb,
  articleno =    "20",
  fjournal =     "ACM Transactions on Intelligent Systems and Technology
                 (TIST)",
  journal-URL =  "http://portal.acm.org/citation.cfm?id=J1318",
}

@Article{DeOliveiraNunes:2019:SSC,
  author =       "Ivan {De Oliveira Nunes} and Karim Eldefrawy and
                 Tancr{\`e}de Lepoint",
  title =        "{SNUSE}: a secure computation approach for large-scale
                 user re-enrollment in biometric authentication
                 systems",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "98",
  number =       "??",
  pages =        "259--273",
  month =        sep,
  year =         "2019",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Mon Oct 14 16:09:57 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X1833098X",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@InProceedings{Didier:2019:RAP,
  author =       "Laurent-Stephane Didier and Fangan-Yssouf Dosso and
                 Nadia {El Mrabet} and Jeremy Marrez and Pascal
                 V{\'e}ron",
  title =        "Randomization of Arithmetic Over Polynomial Modular
                 Number System",
  crossref =     "Takagi:2019:ISC",
  pages =        "199--206",
  month =        jun,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/ARITH.2019.00048",
  bibdate =      "Fri Jan 31 08:18:07 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/fparith.bib",
  abstract =     "The Polynomial Modular Number System (PMNS) is an
                 integer number system designed to speed up arithmetic
                 operations modulo a prime p. Such a system is defined
                 by a tuple B = (p, n, , , E) where E Z[X] and E() = 0
                 mod p. In a PMNS, an element a of Z/pZ is represented
                 by a polynomial A such that: A() = a mod p, deg A <; n
                 ||A|| <; p. In [6], the authors mentioned that PMNS can
                 be highly redundant but they didn't really take
                 advantage of this possibility. In this paper we use,
                 for the first time, the redundancy of PMNS to protect
                 algorithms against Side Channel Attacks (SCA). More
                 precisely, we focus on elliptic curve cryptography. We
                 show how to randomize the modular multiplication in
                 order to be safe against existing SCA and we
                 demonstrate the resistance of our construction. We
                 describe the generation of a PMNS while guaranteeing,
                 for all elements of Z/pZ, the minimum number of
                 distinct representations we want. We also show how to
                 reach all these representations.",
  acknowledgement = ack-nhfb,
  keywords =     "ARITH-26; arithmetic operations; digital arithmetic;
                 elliptic curve cryptography; Elliptic curve
                 cryptography; Elliptic curves; integer number system;
                 Lattices; Manganese; modular multiplication; PMNS;
                 polynomial modular number system; Polynomial Modular
                 Number System, Side Channel Countermeasure, Modular
                 Arithmetic; polynomials; Protocols; public key
                 cryptography; Resistance; side channel attacks;
                 Side-channel attacks",
}

@Article{Dixit:2019:FBD,
  author =       "Umesh D. Dixit and M. S. Shirdhonkar",
  title =        "Fingerprint-Based Document Image Retrieval",
  journal =      j-INT-J-IMAGE-GRAPHICS,
  volume =       "19",
  number =       "2",
  pages =        "??--??",
  year =         "2019",
  DOI =          "https://doi.org/10.1142/S0219467819500086",
  ISSN =         "0219-4678",
  ISSN-L =       "0219-4678",
  bibdate =      "Fri May 10 09:47:18 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijig.bib",
  URL =          "https://www.worldscientific.com/doi/10.1142/S0219467819500086",
  abstract =     "Most of the documents use fingerprint impression for
                 authentication. Property related documents, bank
                 checks, application forms, etc., are the examples of
                 such documents. Fingerprint-based document image
                 retrieval system aims to provide a solution for
                 searching and browsing of such digitized documents. The
                 major challenges in implementing fingerprint-based
                 document image retrieval are an efficient method for
                 fingerprint detection and an effective feature
                 extraction method. In this work, we propose a method
                 for automatic detection of a fingerprint from given
                 query document image employing Discrete Wavelet
                 Transform (DWT)-based features and SVM classifier. In
                 this paper, we also propose and investigate two feature
                 extraction schemes, DWT and Stationary Wavelet
                 Transform (SWT)-based Local Binary Pattern (LBP)
                 features for fingerprint-based document image
                 retrieval. The standardized Euclidean distance is
                 employed for matching and ranking of the documents.
                 Proposed method is tested on a database of 1200
                 document images and is also compared with current
                 state-of-art. The proposed scheme provided 98.87\% of
                 detection accuracy and 73.08\% of Mean Average Precision
                 (MAP) for document image retrieval.",
  acknowledgement = ack-nhfb,
  articleno =    "1950008",
  fjournal =     "International Journal of Image and Graphics (IJIG)",
  journal-URL =  "http://www.worldscientific.com/worldscinet/ijig",
}

@InProceedings{Djath:2019:HAR,
  author =       "Libey Djath and Karim Bigou and Arnaud Tisserand",
  title =        "Hierarchical Approach in {RNS} Base Extension for
                 Asymmetric Cryptography",
  crossref =     "Takagi:2019:ISC",
  pages =        "46--53",
  month =        jun,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/ARITH.2019.00016",
  bibdate =      "Fri Jan 31 08:18:07 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/fparith.bib",
  abstract =     "Base extension is a critical operation in RNS
                 implementations of asymmetric cryptosystems. In this
                 paper, we propose a new way to perform base extensions
                 using a hierarchical approach for computing the Chinese
                 remainder theorem. For well chosen parameters, it
                 significantly reduces the computational cost and still
                 ensures a high level of internal parallelism. We
                 illustrate the interest of the proposed approach on the
                 cost of typical arithmetic primitives used in
                 asymmetric cryptography. We also demonstrate
                 improvements in FPGA implementations of base extensions
                 on typical elliptic curve cryptography field sizes
                 using high-level synthesis tools.",
  acknowledgement = ack-nhfb,
  keywords =     "ARITH-26; asymmetric cryptosystems; Cathode ray tubes;
                 Chinese remainder theorem; Computer architecture;
                 computer arithmetic; cryptography; Elliptic curve
                 cryptography; elliptic curve cryptography field sizes;
                 field programmable gate arrays; FPGA implementations;
                 hardware implementation; high level synthesis;
                 high-level synthesis tools; modular reduction; Parallel
                 processing; residue number system; residue number
                 systems; RNS base extension; RNS implementations;
                 Signal processing algorithms; Standards",
}

@Article{Dobre:2019:PWR,
  author =       "D. Dobre and G. O. Karame and W. Li and M. Majuntke
                 and N. Suri and M. {Vukoli }",
  title =        "Proofs of Writing for Robust Storage",
  journal =      j-IEEE-TRANS-PAR-DIST-SYS,
  volume =       "30",
  number =       "11",
  pages =        "2547--2566",
  month =        nov,
  year =         "2019",
  CODEN =        "ITDSEO",
  DOI =          "https://doi.org/10.1109/TPDS.2019.2919285",
  ISSN =         "1045-9219 (print), 1558-2183 (electronic)",
  ISSN-L =       "1045-9219",
  bibdate =      "Thu Dec 19 09:20:35 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranspardistsys.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Parallel and Distributed
                 Systems",
  journal-URL =  "http://www.computer.org/portal/web/csdl/transactions/tpds",
  keywords =     "BFT storage; Byzantine fault tolerant storage;
                 Byzantine fault tolerant storage solutions; Byzantine
                 storage servers; commitment schemes; Computer crashes;
                 crash fault tolerance; crash-faulty writers;
                 cryptography; data storage protocol; data storage
                 technique; distributed processing; fault tolerance;
                 Fault tolerance; fault tolerant computing; History;
                 lightweight cryptography coding; meta data; Metadata;
                 metadata write-backs; PoW; PoWerStore robustness;
                 proofs of writing; Proofs of Writing; Protocols;
                 Servers; software fault tolerance; storage management;
                 Writing",
}

@Article{Dolev:2019:AAC,
  author =       "Shlomi Dolev and Niv Gilboa and Ximing Li",
  title =        "Accumulating automata and cascaded equations automata
                 for communicationless information theoretically secure
                 multi-party computation",
  journal =      j-THEOR-COMP-SCI,
  volume =       "795",
  number =       "??",
  pages =        "81--99",
  day =          "26",
  month =        nov,
  year =         "2019",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Wed Oct 16 07:39:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2015.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0304397519303883",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{Dong:2019:FOI,
  author =       "Shi Dong and Raj Jain",
  title =        "Flow online identification method for the encrypted
                 {Skype}",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "132",
  number =       "??",
  pages =        "75--85",
  day =          "15",
  month =        apr,
  year =         "2019",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Mon Oct 14 14:16:31 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804519300074",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Dou:2019:DTE,
  author =       "Y. Dou and H. C. B. Chan and M. H. Au",
  title =        "A Distributed Trust Evaluation Protocol with Privacy
                 Protection for Intercloud",
  journal =      j-IEEE-TRANS-PAR-DIST-SYS,
  volume =       "30",
  number =       "6",
  pages =        "1208--1221",
  month =        jun,
  year =         "2019",
  CODEN =        "ITDSEO",
  DOI =          "https://doi.org/10.1109/TPDS.2018.2883080",
  ISSN =         "1045-9219 (print), 1558-2183 (electronic)",
  ISSN-L =       "1045-9219",
  bibdate =      "Fri Aug 30 06:09:58 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranspardistsys.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Parallel and Distributed
                 Systems",
  journal-URL =  "http://www.computer.org/portal/web/csdl/transactions/tpds",
  keywords =     "Business; Cloud computing; cloud computing;
                 Computational modeling; cryptographic protocols;
                 Cryptography; data protection; distributed trust
                 evaluation protocol; formal security model; formal
                 verification; homomorphic encryption; Intercloud; Logic
                 gates; privacy; Privacy; privacy protection; Protocols;
                 reputation; resource allocation; resource sharing;
                 trust evaluation; trusted computing; verifiable secret
                 sharing",
}

@Article{Drozdz:2019:SCC,
  author =       "Stanis{\l}aw Drozdz and Ludovico Minati and Pawe{\l}
                 O{\'s}wi{\k{e}}cimka and Marek Stanuszek and Marcin
                 W{\k{a}}torek",
  title =        "Signatures of the Crypto-Currency Market Decoupling
                 from the {Forex}",
  journal =      j-FUTURE-INTERNET,
  volume =       "11",
  number =       "7",
  pages =        "154",
  day =          "10",
  month =        jul,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi11070154",
  ISSN =         "1999-5903",
  ISSN-L =       "1999-5903",
  bibdate =      "Thu Nov 21 16:51:06 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/11/7/154",
  abstract =     "Based on the high-frequency recordings from Kraken, a
                 cryptocurrency exchange and professional trading
                 platform that aims to bring Bitcoin and other
                 cryptocurrencies into the mainstream, the multiscale
                 cross-correlations involving the Bitcoin (BTC),
                 Ethereum (ETH), Euro (EUR) and US dollar (USD) are
                 studied over the period between 1 July 2016 and 31
                 December 2018. It is shown that the multiscaling
                 characteristics of the exchange rate fluctuations
                 related to the cryptocurrency market approach those of
                 the Forex. This, in particular, applies to the BTC/ETH
                 exchange rate, whose Hurst exponent by the end of 2018
                 started approaching the value of 0.5, which is
                 characteristic of the mature world markets.
                 Furthermore, the BTC/ETH direct exchange rate has
                 already developed multifractality, which manifests
                 itself via broad singularity spectra. A particularly
                 significant result is that the measures applied for
                 detecting cross-correlations between the dynamics of
                 the BTC/ETH and EUR/USD exchange rates do not show any
                 noticeable relationships. This could be taken as an
                 indication that the cryptocurrency market has begun
                 decoupling itself from the Forex.",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://www.mdpi.com/journal/futureinternet",
  remark =       "Special Issue Blockchain Theory and Its
                 Applications.",
}

@Article{Dyakonov:2019:WWU,
  author =       "M. Dyakonov",
  title =        "When will useful quantum computers be constructed?
                 {Not} in the foreseeable future, this physicist argues.
                 {Here}'s why: The case against: Quantum computing",
  journal =      j-IEEE-SPECTRUM,
  volume =       "56",
  number =       "3",
  pages =        "24--29",
  month =        mar,
  year =         "2019",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.2019.8651931",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 07:02:09 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "artificial intelligence; Computers; cryptography; drug
                 discovery; encryption; IBM notes; Internet; Logic
                 gates; Microsoft; quantum computing; Quantum computing;
                 Quantum mechanics; Qubit; Transistors; useful quantum
                 computers",
}

@Article{El-Hadedy:2019:RPR,
  author =       "Mohamed El-Hadedy and Amit Kulkarni and Dirk
                 Stroobandt and Kevin Skadron",
  title =        "{Reco-Pi}: a reconfigurable Cryptoprocessor for $ \pi
                 $-Cipher",
  journal =      j-J-PAR-DIST-COMP,
  volume =       "133",
  number =       "??",
  pages =        "420--431",
  month =        nov,
  year =         "2019",
  CODEN =        "JPDCER",
  ISSN =         "0743-7315 (print), 1096-0848 (electronic)",
  ISSN-L =       "0743-7315",
  bibdate =      "Fri Sep 13 10:25:21 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jpardistcomp.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0743731517301636",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Parallel and Distributed Computing",
  journal-URL =  "http://www.sciencedirect.com/science/journal/07437315",
}

@Article{Elrabaa:2019:PPP,
  author =       "Muhammad E. S. Elrabaa and Mohamed A. Al-Asli and
                 Marwan H. Abu-Amara",
  title =        "A Protection and Pay-per-use Licensing Scheme for
                 On-cloud {FPGA} Circuit {IPs}",
  journal =      j-TRETS,
  volume =       "12",
  number =       "3",
  pages =        "13:1--13:??",
  month =        sep,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3329861",
  ISSN =         "1936-7406 (print), 1936-7414 (electronic)",
  ISSN-L =       "1936-7406",
  bibdate =      "Sat Oct 19 17:43:02 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/trets.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3329861",
  abstract =     "Using security primitives, a novel scheme for
                 licensing hardware intellectual properties (HWIPs) on
                 Field Programmable Gate Arrays (FPGAs) in public clouds
                 is proposed. The proposed scheme enforces a pay-per-use
                 model, allows HWIP's installation only on specific
                 on-cloud FPGAs, and efficiently protects the HWIPs from
                 being cloned, reverse engineered, or used without the
                 owner's authorization by any party, including a cloud
                 insider. It also provides protection for the users'
                 designs integrated with the HWIP on the same FPGA. This
                 enables cloud tenants to license HWIPs in the cloud
                 from the HWIP vendors at a relatively low price based
                 on usage instead of paying the expensive unlimited HWIP
                 license fee. The scheme includes a protocol for FPGA
                 authentication, HWIP secure decryption, and usage by
                 the clients without the need for the HWIP vendor to be
                 involved or divulge their secret keys. A complete
                 prototype test-bed implementation showed that the
                 proposed scheme is very feasible with relatively low
                 resource utilization. Experiments also showed that a
                 HWIP could be licensed and set up in the on-cloud FPGA
                 in 0.9s. This is 15 times faster than setting up the
                 same HWIP from outside the cloud, which takes about 14s
                 based on the average global Internet speed.",
  acknowledgement = ack-nhfb,
  articleno =    "13",
  fjournal =     "ACM Transactions on Reconfigurable Technology and
                 Systems (TRETS)",
  journal-URL =  "http://portal.acm.org/toc.cfm?id=J1151",
}

@Article{Emura:2019:PPA,
  author =       "Keita Emura and Hayato Kimura and Toshihiro Ohigashi
                 and Tatsuya Suzuki",
  title =        "Privacy-Preserving Aggregation of Time-Series Data
                 with Public Verifiability from Simple Assumptions and
                 Its Implementations",
  journal =      j-COMP-J,
  volume =       "62",
  number =       "4",
  pages =        "614--630",
  month =        apr,
  year =         "2019",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxy135",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Apr 2 12:10:39 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://academic.oup.com/comjnl/article/62/4/614/5263983",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Erbagci:2019:SHE,
  author =       "Burak Erbagci and Nail Etkin Can Akkaya and Mudit
                 Bhargava and Rachel Dondero and Ken Mai",
  title =        "Secure hardware-entangled field programmable gate
                 arrays",
  journal =      j-J-PAR-DIST-COMP,
  volume =       "131",
  number =       "??",
  pages =        "81--96",
  month =        sep,
  year =         "2019",
  CODEN =        "JPDCER",
  DOI =          "https://doi.org/10.1016/j.jpdc.2019.04.002",
  ISSN =         "0743-7315 (print), 1096-0848 (electronic)",
  ISSN-L =       "0743-7315",
  bibdate =      "Mon Jun 10 07:36:16 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jpardistcomp.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0743731519302618",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Parallel and Distributed Computing",
  journal-URL =  "http://www.sciencedirect.com/science/journal/07437315",
}

@Article{Ermoshina:2019:SRC,
  author =       "Ksenia Ermoshina and Francesca Musiani",
  title =        "``{Standardising} by running code'': the {Signal}
                 protocol and {\em de facto\/} standardisation in
                 end-to-end encrypted messaging",
  journal =      j-INTERNET-HIST,
  volume =       "3",
  number =       "3--4",
  pages =        "343--363",
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1080/24701475.2019.1654697",
  ISSN =         "2470-1483",
  ISSN-L =       "2470-1483",
  bibdate =      "Tue Aug 29 08:11:04 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/internet-hist.bib",
  URL =          "http://www.tandfonline.com/doi/full/10.1080/24701475.2019.1654697",
  acknowledgement = ack-nhfb,
  ajournal =     "Internet Hist.",
  fjournal =     "Internet Histories",
  journal-URL =  "https://www.tandfonline.com/loi/rint20",
}

@Article{Esiner:2019:TFA,
  author =       "Ertem Esiner and Anwitaman Datta",
  title =        "Two-factor authentication for trusted third party free
                 dispersed storage",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "90",
  number =       "??",
  pages =        "291--306",
  month =        jan,
  year =         "2019",
  CODEN =        "FGSEVI",
  DOI =          "https://doi.org/10.1016/j.future.2018.08.001",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Tue Sep 18 14:07:59 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X17322859",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Faal:2019:MVE,
  author =       "Hossein Teimoori Faal",
  title =        "A Multiset Version of Even-Odd Permutations Identity",
  journal =      j-INT-J-FOUND-COMP-SCI,
  volume =       "30",
  number =       "5",
  pages =        "683--691",
  month =        aug,
  year =         "2019",
  DOI =          "https://doi.org/10.1142/S0129054119500163",
  ISSN =         "0129-0541",
  ISSN-L =       "0129-0541",
  bibdate =      "Fri Sep 20 10:48:00 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijfcs.bib;
                 http://www.worldscientific.com/loi/ijfcs",
  URL =          "https://www.worldscientific.com/doi/10.1142/S0129054119500163",
  abstract =     "In this paper, we present a multiset analogue of the
                 even-odd permutations identity in the context of
                 combinatorics of words. The multiset version is indeed
                 equivalent to the coin arrangements lemma which is a
                 key lemma in Sherman's proof of Feynman's conjecture
                 about combinatorial solution of Ising model in
                 statistical physics. Here, we give a bijective proof
                 which is based on the standard factorization of a
                 Lyndon word.",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Foundations of Computer
                 Science (IJFCS)",
  journal-URL =  "http://www.worldscientific.com/loi/ijfcs",
}

@Article{Fairley:2019:EWC,
  author =       "P. Fairley",
  title =        "{Ethereum} will cut back its absurd energy use",
  journal =      j-IEEE-SPECTRUM,
  volume =       "56",
  number =       "1",
  pages =        "29--32",
  month =        jan,
  year =         "2019",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.2019.8594790",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 07:02:09 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "Bitcoin; Blockchain; cryptocurrencies; Cryptocurrency;
                 Data mining; energy consumption; energy footprint;
                 energy use; energy waste; environmental economics;
                 Ethereum; Exoskeletons; Opprobrium; Robots; Smart
                 contracts; societal benefits",
}

@Article{Fan:2019:OVG,
  author =       "Hua Fan and Wojciech Golab",
  title =        "{Ocean Vista}: gossip-based visibility control for
                 speedy geo-distributed transactions",
  journal =      j-PROC-VLDB-ENDOWMENT,
  volume =       "12",
  number =       "11",
  pages =        "1471--1484",
  month =        jul,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.14778/3342263.3342627",
  ISSN =         "2150-8097",
  bibdate =      "Wed Oct 2 06:49:02 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/vldbe.bib",
  abstract =     "Providing ACID transactions under conflicts across
                 globally distributed data is the Everest of transaction
                 processing protocols. Transaction processing in this
                 scenario is particularly costly due to the high latency
                 of cross-continent network links, which inflates
                 concurrency control and data replication overheads. To
                 mitigate the problem, we introduce Ocean Vista --- a
                 novel distributed protocol that guarantees strict
                 serializability. We observe that concurrency control
                 and replication address different aspects of resolving
                 the visibility of transactions, and we address both
                 concerns using a multi-version protocol that tracks
                 visibility using version watermarks and arrives at
                 correct visibility decisions using efficient gossip.
                 Gossiping the watermarks enables asynchronous
                 transaction processing and acknowledging transaction
                 visibility in batches in the concurrency control and
                 replication protocols, which improves efficiency under
                 high cross-datacenter network delays. In particular,
                 Ocean Vista can process conflicting transactions in
                 parallel, and supports efficient write-quorum /
                 read-one access using one round trip in the common
                 case. We demonstrate experimentally in a
                 multi-data-center cloud environment that our design
                 outperforms a leading distributed transaction
                 processing engine (TAPIR) more than 10-fold in terms of
                 peak throughput, albeit at the cost of additional
                 latency for gossip. The latency penalty is generally
                 bounded by one wide area network (WAN) round trip time
                 (RTT), and in the best case (i.e., under light load)
                 our system nearly breaks even with TAPIR by committing
                 transactions in around one WAN RTT.",
  acknowledgement = ack-nhfb,
  fjournal =     "Proceedings of the VLDB Endowment",
  journal-URL =  "http://portal.acm.org/citation.cfm?id=J1174",
}

@Article{Fang:2019:PPO,
  author =       "Hongyu Fang and Sai Santosh Dayapule and Fan Yao and
                 Milo{\v{s}} Doroslova{\v{c}}ki and Guru Venkataramani",
  title =        "{PrODACT}: Prefetch-Obfuscator to Defend Against Cache
                 Timing Channels",
  journal =      j-INT-J-PARALLEL-PROG,
  volume =       "47",
  number =       "4",
  pages =        "571--594",
  month =        aug,
  year =         "2019",
  CODEN =        "IJPPE5",
  DOI =          "https://doi.org/10.1007/s10766-018-0609-3",
  ISSN =         "0885-7458 (print), 1573-7640 (electronic)",
  ISSN-L =       "0885-7458",
  bibdate =      "Fri Oct 11 08:37:52 MDT 2019",
  bibsource =    "http://link.springer.com/journal/10766/47/4;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjparallelprogram.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Parallel Programming",
  journal-URL =  "http://link.springer.com/journal/10766",
}

@Article{Faz-Hernandez:2019:HPI,
  author =       "Armando Faz-Hern{\'a}ndez and Julio L{\'o}pez and
                 Ricardo Dahab",
  title =        "High-performance Implementation of Elliptic Curve
                 Cryptography Using Vector Instructions",
  journal =      j-TOMS,
  volume =       "45",
  number =       "3",
  pages =        "25:1--25:??",
  month =        jul,
  year =         "2019",
  CODEN =        "ACMSCU",
  DOI =          "https://doi.org/10.1145/3309759",
  ISSN =         "0098-3500 (print), 1557-7295 (electronic)",
  ISSN-L =       "0098-3500",
  bibdate =      "Wed Jul 31 08:06:08 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/toms.bib",
  URL =          "https://dl.acm.org/citation.cfm?id=3309759",
  abstract =     "Elliptic curve cryptosystems are considered an
                 efficient alternative to conventional systems such as
                 DSA and RSA. Recently, Montgomery and Edwards elliptic
                 curves have been used to implement cryptosystems. In
                 particular, the elliptic curves Curve25519 and Curve448
                 were used for instantiating Diffie--Hellman protocols
                 named X25519 and X448. Mapping these curves to twisted
                 Edwards curves allowed deriving two new signature
                 instances, called Ed25519 and Ed448, of the Edwards
                 Digital Signature Algorithm. In this work, we focus on
                 the secure and efficient software implementation of
                 these algorithms using SIMD parallel processing. We
                 present software techniques that target the Intel AVX2
                 vector instruction set for accelerating prime field
                 arithmetic and elliptic curve operations. Our
                 contributions result in a high-performance software
                 library for AVX2-ready processors. For example, our
                 library computes digital signatures 19\% (for Ed25519)
                 and 29\% (for Ed448) faster than previous optimized
                 implementations. Also, our library improves by 10\% and
                 20\% the execution time of X25519 and X448,
                 respectively.",
  acknowledgement = ack-nhfb,
  articleno =    "25",
  fjournal =     "ACM Transactions on Mathematical Software (TOMS)",
  journal-URL =  "http://dl.acm.org/pub.cfm?id=J782",
}

@Article{Feigenbaum:2019:PSE,
  author =       "Joan Feigenbaum",
  title =        "Privacy and security: Encryption and surveillance",
  journal =      j-CACM,
  volume =       "62",
  number =       "5",
  pages =        "27--29",
  month =        may,
  year =         "2019",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sat Apr 27 18:22:12 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://cacm.acm.org/magazines/2019/5/236419/fulltext",
  abstract =     "Why the law-enforcement access question will not just
                 go away.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Feng:2019:SHO,
  author =       "J. Feng and L. T. Yang and G. Dai and W. Wang and D.
                 Zou",
  title =        "A Secure High-Order {Lanczos}-Based Orthogonal Tensor
                 {SVD} for Big Data Reduction in Cloud Environment",
  journal =      j-IEEE-TRANS-BIG-DATA,
  volume =       "5",
  number =       "3",
  pages =        "355--367",
  month =        sep,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/TBDATA.2018.2803841",
  ISSN =         "2332-7790",
  ISSN-L =       "2332-7790",
  bibdate =      "Tue Oct 29 11:08:44 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetransbigdata.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Big Data",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6687317",
  keywords =     "Big Data; big data applications; big data reduction;
                 big data techniques; Cloud computing; cloud computing;
                 Computational complexity; Cryptography; cyber
                 forensics; Cyber security; cyber security applications;
                 data reduction; data security; digital forensics;
                 garbled tensor; high-order big data reduction;
                 high-order data; high-order lanczos method; high-order
                 lanczos-based orthogonal tensor SVD algorithm; matrix
                 data; orthogonal tensor SVD; outsourcing; Protocols;
                 secure orthogonal tensor SVD method; singular value
                 decomposition; Tensile stress; tensors",
}

@Article{Ferretti:2019:FBS,
  author =       "Luca Ferretti and Mirco Marchetti and Michele
                 Colajanni",
  title =        "Fog-based Secure Communications for Low-power {IoT}
                 Devices",
  journal =      j-TOIT,
  volume =       "19",
  number =       "2",
  pages =        "27:1--27:??",
  month =        apr,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3284554",
  ISSN =         "1533-5399 (print), 1557-6051 (electronic)",
  ISSN-L =       "1533-5399",
  bibdate =      "Sat Sep 21 07:34:10 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/toit.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3284554",
  abstract =     "Designing secure, scalable, and resilient IoT networks
                 is a challenging task because of resource-constrained
                 devices and no guarantees of reliable network
                 connectivity. Fog computing improves the resiliency of
                 IoT, but its security model assumes that fog nodes are
                 fully trusted. We relax this latter constraint by
                 proposing a solution that guarantees confidentiality of
                 messages exchanged through semi-honest fog nodes thanks
                 to a lightweight proxy re-encryption scheme. We
                 demonstrate the feasibility of the solution by applying
                 it to IoT networks of low-power devices through
                 experiments on microcontrollers and ARM-based
                 architectures.",
  acknowledgement = ack-nhfb,
  articleno =    "27",
  fjournal =     "ACM Transactions on Internet Technology (TOIT)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J780",
}

@Article{Fomichev:2019:PZI,
  author =       "Mikhail Fomichev and Max Maass and Lars Almon and
                 Alejandro Molina and Matthias Hollick",
  title =        "Perils of Zero-Interaction Security in the {Internet
                 of Things}",
  journal =      j-IMWUT,
  volume =       "3",
  number =       "1",
  pages =        "1--38",
  month =        mar,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3314397",
  ISSN =         "2474-9567 (electronic)",
  bibdate =      "Thu Jan 23 12:37:08 MST 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/imwut.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3314397",
  abstract =     "The Internet of Things (IoT) demands authentication
                 systems which can provide both security and usability.
                 Recent research utilizes the rich sensing capabilities
                 of smart devices to build security schemes operating
                 without human interaction, such as \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "10",
  fjournal =     "Proceedings of the ACM on Interactive, Mobile,
                 Wearable and Ubiquitous Technologies (IMWUT)",
  journal-URL =  "https://dl.acm.org/loi/imwut",
}

@Article{Fotiadis:2019:TRF,
  author =       "Georgios Fotiadis and Elisavet Konstantinou",
  title =        "{TNFS} resistant families of pairing-friendly elliptic
                 curves",
  journal =      j-THEOR-COMP-SCI,
  volume =       "800",
  number =       "??",
  pages =        "73--89",
  day =          "31",
  month =        dec,
  year =         "2019",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Tue Nov 19 07:57:39 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2015.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0304397519306462",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{Fotiou:2019:NBS,
  author =       "Nikos Fotiou and George C. Polyzos",
  title =        "Name-Based Security for Information-Centric Networking
                 Architectures",
  journal =      j-FUTURE-INTERNET,
  volume =       "11",
  number =       "11",
  pages =        "232",
  day =          "01",
  month =        nov,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi11110232",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:51:08 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/11/11/232",
  abstract =     "Information-Centric Networking (ICN) is an emerging
                 communication paradigm built around content names.
                 Securing ICN using named-based security is, therefore,
                 a natural choice. For this paper, we designed and
                 evaluated name-based security solutions that satisfy
                 security requirements that are particular to ICN
                 architectures. In order to achieve our goal, we
                 leverage identity-based encryption, identity-based
                 proxy re-encryption, and the emerging paradigm of
                 decentralized identifiers. Our solutions support
                 outsourcing content storage, content integrity
                 protection and content authentication, and provenance
                 verification, as well as access control. We show that
                 our solutions have tolerable storage and computation
                 overhead, thus proving their feasibility.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Information-Centric Networking (ICN).",
}

@Article{Franken:2019:ECP,
  author =       "G. Franken and T. {Van Goethem} and W. Joosen",
  title =        "Exposing Cookie Policy Flaws Through an Extensive
                 Evaluation of Browsers and Their Extensions",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "4",
  pages =        "25--34",
  month =        jul # "\slash " # aug,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2909710",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
  keywords =     "Authentication; browser users incentive; Browsers;
                 cookie policy flaws; data privacy; extensions;
                 Internet; Law; online abuses; online front-ends;
                 Privacy; third-party cookie policies; user privacy",
}

@Article{Fyodorov:2019:SGM,
  author =       "Yan V. Fyodorov",
  title =        "A Spin Glass Model for Reconstructing Nonlinearly
                 Encrypted Signals Corrupted by Noise",
  journal =      j-J-STAT-PHYS,
  volume =       "175",
  number =       "5",
  pages =        "789--818",
  month =        jun,
  year =         "2019",
  CODEN =        "JSTPSB",
  DOI =          "https://doi.org/10.1007/s10955-018-02217-9",
  ISSN =         "0022-4715 (print), 1572-9613 (electronic)",
  ISSN-L =       "0022-4715",
  bibdate =      "Fri Sep 6 12:43:52 MDT 2019",
  bibsource =    "http://link.springer.com/journal/10955/175/5;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jstatphys2010.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/s10955-018-02217-9.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Statistical Physics",
  journal-URL =  "http://link.springer.com/journal/10955",
}

@Article{Gallin:2019:GFP,
  author =       "G. Gallin and A. Tisserand",
  title =        "Generation of Finely-Pipelined {GF($P$P)} Multipliers
                 for Flexible Curve Based Cryptography on {FPGAs}",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "68",
  number =       "11",
  pages =        "1612--1622",
  month =        nov,
  year =         "2019",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2019.2920352",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Tue Oct 29 11:08:44 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/fparith.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
  keywords =     "arithmetic operator generation; Clocks; Computer
                 architecture; Cryptography; elliptic curve
                 cryptography; Field programmable gate arrays; Hardware;
                 Modular arithmetic; Montgomery multiplication;
                 Pipelines; Tools",
}

@Article{Gao:2019:EUE,
  author =       "Yang Gao and Wei Wang and Vir V. Phoha and Wei Sun and
                 Zhanpeng Jin",
  title =        "{EarEcho}: Using Ear Canal Echo for Wearable
                 Authentication",
  journal =      j-IMWUT,
  volume =       "3",
  number =       "3",
  pages =        "1--24",
  month =        sep,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3351239",
  ISSN =         "2474-9567 (electronic)",
  bibdate =      "Thu Jan 23 12:37:13 MST 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/imwut.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3351239",
  abstract =     "Smart wearable devices have recently become one of the
                 major technological trends and been widely adopted by
                 the general public. Wireless earphones, in particular,
                 have seen a skyrocketing growth due to its great
                 usability and convenience. With the goal \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "81",
  fjournal =     "Proceedings of the ACM on Interactive, Mobile,
                 Wearable and Ubiquitous Technologies (IMWUT)",
  journal-URL =  "https://dl.acm.org/loi/imwut",
}

@Article{Gao:2019:LBD,
  author =       "Wen Gao and Liqun Chen and Yupu Hu and Christopher J.
                 P. Newton and Baocang Wang and Jiangshan Chen",
  title =        "Lattice-based deniable ring signatures",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "3",
  pages =        "355--370",
  month =        jun,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-018-0417-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Thu May 23 17:57:24 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-018-0417-1;
                 http://link.springer.com/content/pdf/10.1007/s10207-018-0417-1.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Gao:2019:VQS,
  author =       "Pengfei Gao and Jun Zhang and Fu Song and Chao Wang",
  title =        "Verifying and Quantifying Side-channel Resistance of
                 Masked Software Implementations",
  journal =      j-TOSEM,
  volume =       "28",
  number =       "3",
  pages =        "16:1--16:??",
  month =        aug,
  year =         "2019",
  CODEN =        "ATSMER",
  DOI =          "https://doi.org/10.1145/3330392",
  ISSN =         "1049-331X (print), 1557-7392 (electronic)",
  ISSN-L =       "1049-331X",
  bibdate =      "Tue Oct 22 07:57:09 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tosem.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3330392",
  abstract =     "Power side-channel attacks, capable of deducing secret
                 data using statistical analysis, have become a serious
                 threat. Random masking is a widely used countermeasure
                 for removing the statistical dependence between secret
                 data and side-channel information. Although there are
                 techniques for verifying whether a piece of software
                 code is perfectly masked, they are limited in accuracy
                 and scalability. To bridge this gap, we propose a
                 refinement-based method for verifying masking
                 countermeasures. Our method is more accurate than prior
                 type-inference-based approaches and more scalable than
                 prior model-counting-based approaches using SAT or SMT
                 solvers. Indeed, our method can be viewed as a gradual
                 refinement of a set of type-inference rules for
                 reasoning about distribution types. These rules are
                 kept abstract initially to allow fast deduction and
                 then made concrete when the abstract version is not
                 able to resolve the verification problem. We also
                 propose algorithms for quantifying the amount of
                 side-channel information leakage from a software
                 implementation using the notion of quantitative masking
                 strength. We have implemented our method in a software
                 tool and evaluated it on cryptographic benchmarks
                 including AES and MAC-Keccak. The experimental results
                 show that our method significantly outperforms
                 state-of-the-art techniques in terms of accuracy and
                 scalability.",
  acknowledgement = ack-nhfb,
  articleno =    "16",
  fjournal =     "ACM Transactions on Software Engineering and
                 Methodology",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J790",
}

@Article{Genge:2019:ESA,
  author =       "B{\'e}la Genge and Piroska Haller and Adrian-Vasile
                 Duka",
  title =        "Engineering security-aware control applications for
                 data authentication in smart industrial cyber-physical
                 systems",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "91",
  number =       "??",
  pages =        "206--222",
  month =        feb,
  year =         "2019",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Tue Feb 5 08:15:51 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167739X18303431",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Ghatak:2019:IBS,
  author =       "Debolina Ghatak and Bimal K. Roy",
  title =        "An Improved Bound for Security in an Identity
                 Disclosure Problem",
  journal =      j-INT-J-STAT-PROBAB,
  volume =       "8",
  number =       "3",
  pages =        "24--??",
  month =        "????",
  year =         "2019",
  CODEN =        "????",
  ISSN =         "1927-7032 (print), 1927-7040 (electronic)",
  ISSN-L =       "1927-7032",
  bibdate =      "Fri May 21 15:18:32 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjstatprobab.bib",
  URL =          "http://www.ccsenet.org/journal/index.php/ijsp/article/view/0/39033",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Statistics and Probability",
  journal-URL =  "http://www.ccsenet.org/journal/index.php/ijsp/issue/archive",
}

@Article{Ghosal:2019:NPP,
  author =       "Purnata Ghosal and B. V. Raghavendra Rao",
  title =        "A note on parameterized polynomial identity testing
                 using hitting set generators",
  journal =      j-INFO-PROC-LETT,
  volume =       "151",
  number =       "??",
  pages =        "Article 105839",
  month =        nov,
  year =         "2019",
  CODEN =        "IFPLAT",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Wed Oct 16 08:35:44 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S002001901930122X",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Ghoshal:2019:RSC,
  author =       "Sucheta Ghoshal and Amy Bruckman",
  title =        "The Role of Social Computing Technologies in
                 Grassroots Movement Building",
  journal =      j-TOCHI,
  volume =       "26",
  number =       "3",
  pages =        "18:1--18:??",
  month =        jun,
  year =         "2019",
  CODEN =        "ATCIF4",
  DOI =          "https://doi.org/10.1145/3318140",
  ISSN =         "1073-0516 (print), 1557-7325 (electronic)",
  ISSN-L =       "1073-0516",
  bibdate =      "Tue Oct 22 08:21:01 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tochi.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3318140",
  abstract =     "Social movement organizing is becoming increasingly
                 dependent on communication technologies. How can
                 Computer-Supported Cooperative Work systems support
                 grassroots organizations in facilitating collective
                 action through democratic participation? In this
                 article, we study Science for the People-Atlanta, a
                 social movement organization dedicated to building a
                 grassroots movement around science activism. We used
                 action research, both participating in the organization
                 and studying it. We use the Freirean model of
                 participatory communication theory to unpack the
                 movement-building process of SftP-Atlanta. The Freirean
                 model provides a three-step, iterative process for
                 sustainable movement building: forming a collective
                 identity, moving toward collective action, and engaging
                 in reflexive dialog. We analyze both the perceived
                 strengths and weaknesses of their sociotechnical
                 practices in supporting the organization as they
                 iteratively go through the phases of the Freirean
                 model. Finally, we identify inclusivity,
                 privacy/security, and social translucence as three
                 values desirable for sociotechnical practices of
                 grassroots organizing.",
  acknowledgement = ack-nhfb,
  articleno =    "18",
  fjournal =     "ACM Transactions on Computer-Human Interaction",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J756",
}

@Article{Gonzalez-Manzano:2019:LUR,
  author =       "Lorena Gonzalez-Manzano and Jose M. {De Fuentes} and
                 Arturo Ribagorda",
  title =        "Leveraging User-related {Internet of Things} for
                 Continuous Authentication: a Survey",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "3",
  pages =        "53:1--53:??",
  month =        jul,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3314023",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3314023",
  abstract =     "Among all Internet of Things (IoT) devices, a subset
                 of them are related to users. Leveraging these
                 user-related IoT elements, it is possible to ensure the
                 identity of the user for a period of time, thus
                 avoiding impersonation. This need is known as
                 Continuous Authentication (CA). Since 2009, a plethora
                 of IoT-based CA academic research and industrial
                 contributions have been proposed. We offer a
                 comprehensive overview of 58 research papers regarding
                 the main components of such a CA system. The status of
                 the industry is studied as well, covering 32 market
                 contributions, research projects, and related
                 standards. Lessons learned, challenges, and open issues
                 to foster further research in this area are finally
                 presented.",
  acknowledgement = ack-nhfb,
  articleno =    "53",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Gope:2019:LLA,
  author =       "Prosanta Gope",
  title =        "{LAAP}: Lightweight anonymous authentication protocol
                 for {D2D}-Aided fog computing paradigm",
  journal =      j-COMPUT-SECUR,
  volume =       "86",
  number =       "??",
  pages =        "223--237",
  month =        sep,
  year =         "2019",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:47:02 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481831160X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gottel:2019:SPE,
  author =       "Christian G{\"o}ttel and Rafael Pires and Isabelly
                 Rocha and S{\'e}bastien Vaucher and Pascal Felber and
                 Marcelo Pasin and Valerio Schiavoni",
  title =        "Security, Performance and Energy Trade-offs of
                 Hardware-assisted Memory Protection Mechanisms",
  journal =      "arXiv.org",
  volume =       "??",
  number =       "??",
  pages =        "1--11",
  day =          "26",
  month =        jun,
  year =         "2019",
  bibdate =      "Mon Oct 07 10:53:26 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://arxiv.org/pdf/1903.04203.pdf",
  abstract =     "The deployment of large-scale distributed systems,
                 e.g., publish--subscribe platforms, that operate over
                 sensitive data using the infrastructure of public cloud
                 providers, is nowadays heavily hindered by the surging
                 lack of trust toward the cloud operators. Although
                 purely software-based solutions exist to protect the
                 confidentiality of data and the processing itself, such
                 as homomorphic encryption schemes, their performance is
                 far from being practical under real-world
                 workloads.\par

                 The performance trade-offs of two novel
                 hardware-assisted memory protection mechanisms, namely
                 AMD SEV and Intel SGX --- currently available on the
                 market to tackle this problem, are described in this
                 practical experience.\par

                 Specifically, we implement and evaluate a
                 publish/subscribe use-case and evaluate the impact of
                 the memory protection mechanisms and the resulting
                 performance. This paper reports on the experience
                 gained while building this system, in particular when
                 having to cope with the technical limitations imposed
                 by SEV and SGX.\par

                 Several trade-offs that provide valuable insights in
                 terms of latency, throughput, processing time and
                 energy requirements are exhibited by means of micro-
                 and macro-benchmarks.",
  acknowledgement = ack-nhfb,
}

@Article{Green:2019:RMC,
  author =       "Frederic Green",
  title =        "Review of {{\booktitle{Modern Cryptography and
                 Elliptic Curves, A Beginner's Guide}} by Thomas R.
                 Shemanske}",
  journal =      j-SIGACT,
  volume =       "50",
  number =       "2",
  pages =        "12--14",
  month =        jun,
  year =         "2019",
  CODEN =        "SIGNDM",
  DOI =          "https://doi.org/10.1145/3351452.3351457",
  ISSN =         "0163-5700 (print), 1943-5827 (electronic)",
  ISSN-L =       "0163-5700",
  bibdate =      "Tue Oct 22 09:39:55 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib",
  abstract =     "The equation $ y^2 = x^3 + a x^2 + b x + c $ might
                 seem a little innocuous at first. However, studying the
                 sets of rational points $ (x; y) $ obeying this
                 equation has proven to be one of the most far-reaching
                 and fruitful areas of mathematics. For example, it led,
                 aided and abetted by much of the most powerful
                 mathematics of the past century, to Wiles' proof of
                 Fermat's Last Theorem. And furthermore, these so-called
                 ``elliptic curves'' (the terminology having little to
                 do with ellipses) are actually useful. You can factor
                 numbers with them! And send secret messages!",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGACT News",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J697",
}

@Article{Green:2019:RNT,
  author =       "Frederic Green",
  title =        "Review of {{\booktitle{Number Theory: an Introduction
                 via the Density of Primes}}, second edition}",
  journal =      j-SIGACT,
  volume =       "50",
  number =       "1",
  pages =        "9--13",
  month =        mar,
  year =         "2019",
  CODEN =        "SIGNDM",
  DOI =          "https://doi.org/10.1145/3319627.3319630",
  ISSN =         "0163-5700 (print), 1943-5827 (electronic)",
  ISSN-L =       "0163-5700",
  bibdate =      "Tue Oct 22 09:39:55 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib",
  abstract =     "There are probably at least as many different
                 approaches to number theory as there are books written
                 about it. Some broad distinctions include those taking
                 an historical versus (say) a purely modern approach,
                 with many gradations in between, or those that are
                 algebraically oriented (e.g., with an emphasis on
                 reciprocity laws, or questions that relate to algebraic
                 geometry), or still others that are more analytic. The
                 book under review is definitely in the latter category.
                 The ``message'' of the book is in the title, as primes
                 and their density are the principle concern. In
                 accordance with that theme, a highlight of the book is
                 a complete proof of the prime number theorem. However,
                 the theme and its variations are taken as springboards
                 to other important fields, including aspects of
                 algebraic number theory, as well as applications, such
                 as primality testing and cryptography.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGACT News",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J697",
}

@Article{Grondahl:2019:TAA,
  author =       "Tommi Gr{\"o}ndahl and N. Asokan",
  title =        "Text Analysis in Adversarial Settings: Does Deception
                 Leave a Stylistic Trace?",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "3",
  pages =        "45:1--45:??",
  month =        jul,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3310331",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3310331",
  abstract =     "Textual deception constitutes a major problem for
                 online security. Many studies have argued that
                 deceptiveness leaves traces in writing style, which
                 could be detected using text classification techniques.
                 By conducting an extensive literature review of
                 existing empirical work, we demonstrate that while
                 certain linguistic features have been indicative of
                 deception in certain corpora, they fail to generalize
                 across divergent semantic domains. We suggest that
                 deceptiveness as such leaves no content-invariant
                 stylistic trace, and textual similarity measures
                 provide a superior means of classifying texts as
                 potentially deceptive. Additionally, we discuss forms
                 of deception beyond semantic content, focusing on
                 hiding author identity by writing style obfuscation.
                 Surveying the literature on both author identification
                 and obfuscation techniques, we conclude that current
                 style transformation methods fail to achieve reliable
                 obfuscation while simultaneously ensuring semantic
                 faithfulness to the original text. We propose that
                 future work in style transformation should pay
                 particular attention to disallowing semantically
                 drastic changes.",
  acknowledgement = ack-nhfb,
  articleno =    "45",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Gu:2019:GRM,
  author =       "Z. Gu and S. Li",
  title =        "A Generalized {RNS} {Mclaughlin} Modular
                 Multiplication with Non-Coprime Moduli Sets",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "68",
  number =       "11",
  pages =        "1689--1696",
  month =        nov,
  year =         "2019",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2019.2917433",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Tue Oct 29 11:08:44 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/fparith.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
  keywords =     "Digital arithmetic; Elliptic curve cryptography;
                 Indexes; McLaughlin modular multiplication;
                 Microelectronics; Montgomery modular multiplication;
                 Performance evaluation; Residue number systems",
}

@Article{Guimaraes:2019:OIQ,
  author =       "Antonio Guimar{\~a}es and Diego F. Aranha and Edson
                 Borin",
  title =        "Optimized implementation of {QC--MDPC} code-based
                 cryptography",
  journal =      j-CCPE,
  volume =       "31",
  number =       "18",
  pages =        "e5089:1--e5089:??",
  day =          "25",
  month =        sep,
  year =         "2019",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.5089",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Sat Oct 12 11:00:05 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "16 December 2018",
}

@Article{Gunleifsen:2019:PCD,
  author =       "H{\aa}kon Gunleifsen and Thomas Kemmerich and
                 Vasileios Gkioulos",
  title =        "A Proof-of-Concept Demonstration of Isolated and
                 Encrypted Service Function Chains",
  journal =      j-FUTURE-INTERNET,
  volume =       "11",
  number =       "9",
  pages =        "183",
  day =          "24",
  month =        aug,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi11090183",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:51:07 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/11/9/183",
  abstract =     "Contemporary Service Function Chaining (SFC), and the
                 requirements arising from privacy concerns, call for
                 the increasing integration of security features such as
                 encryption and isolation across Network Function
                 Virtualisation (NFV) domains. Therefore, suitable
                 adaptations of automation and encryption concepts for
                 the development of interconnected data centre
                 infrastructures are essential. Nevertheless, packet
                 isolation constraints related to the current NFV
                 infrastructure and SFC protocols, render current NFV
                 standards insecure. Accordingly, the goal of our work
                 was an experimental demonstration of a new SFC packet
                 forwarding standard that enables contemporary data
                 centres to overcome these constraints. This article
                 presents a comprehensive view of the developed
                 architecture, focusing on the elements that constitute
                 a new forwarding standard of encrypted SFC packets.
                 Through a Proof-of-Concept demonstration, we present
                 our closing experimental results of how the
                 architecture fulfils the requirements defined in our
                 use case.",
  acknowledgement = ack-nhfb,
  remark =       "Section Network Virtualization and Edge/Fog
                 Computing.",
}

@Article{Guo:2019:EER,
  author =       "Y. Guo and X. Yuan and X. Wang and C. Wang and B. Li
                 and X. Jia",
  title =        "Enabling Encrypted Rich Queries in Distributed
                 Key--Value Stores",
  journal =      j-IEEE-TRANS-PAR-DIST-SYS,
  volume =       "30",
  number =       "6",
  pages =        "1283--1297",
  month =        jun,
  year =         "2019",
  CODEN =        "ITDSEO",
  DOI =          "https://doi.org/10.1109/TPDS.2018.2885519",
  ISSN =         "1045-9219 (print), 1558-2183 (electronic)",
  ISSN-L =       "1045-9219",
  bibdate =      "Fri Aug 30 06:09:58 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranspardistsys.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Parallel and Distributed
                 Systems",
  journal-URL =  "http://www.computer.org/portal/web/csdl/transactions/tpds",
  keywords =     "cloud computing; cloud services; cloud storage;
                 cryptography; data privacy; data values; distributed
                 data stores; Distributed databases; distributed
                 key-value stores; EncKV; encrypted data; encrypted
                 distributed indexes; encrypted key-value pairs;
                 Encrypted key-value store; encrypted rich queries;
                 Encryption; exact-match queries; Indexes;
                 order-revealing encryption; parallel processing;
                 Protocols; query processing; range-match queries;
                 searchable encryption; searchable symmetric encryption;
                 Servers; storage management",
}

@Article{Guo:2019:NBT,
  author =       "Qian Guo and Thomas Johansson",
  title =        "A new birthday-type algorithm for attacking the fresh
                 re-keying countermeasure",
  journal =      j-INFO-PROC-LETT,
  volume =       "146",
  number =       "??",
  pages =        "30--34",
  month =        jun,
  year =         "2019",
  CODEN =        "IFPLAT",
  DOI =          "https://doi.org/10.1016/j.ipl.2019.02.005",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Mon Mar 18 10:10:09 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019019300420",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Guo:2019:NTP,
  author =       "Hui Guo and Zhenfeng Zhang and Jing Xu and Ningyu An",
  title =        "Non-transferable Proxy Re-encryption",
  journal =      j-COMP-J,
  volume =       "62",
  number =       "4",
  pages =        "490--506",
  month =        apr,
  year =         "2019",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxy096",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Apr 2 12:10:39 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://academic.oup.com/comjnl/article/62/4/490/5146175",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Gupta:2019:DRB,
  author =       "Sandeep Gupta and Attaullah Buriro and Bruno Crispo",
  title =        "{DriverAuth}: a risk-based multi-modal biometric-based
                 driver authentication scheme for ride-sharing
                 platforms",
  journal =      j-COMPUT-SECUR,
  volume =       "83",
  number =       "??",
  pages =        "122--139",
  month =        jun,
  year =         "2019",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:47:00 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404818310113",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gupta:2019:LAU,
  author =       "Ankur Gupta and Meenakshi Tripathi and Tabish Jamil
                 Shaikh and Aakar Sharma",
  title =        "A lightweight anonymous user authentication and key
                 establishment scheme for wearable devices",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "149",
  number =       "??",
  pages =        "29--42",
  day =          "11",
  month =        feb,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1016/j.comnet.2018.11.021",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Tue Jan 22 16:29:25 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1389128618304389",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286/",
}

@Article{Gupta:2019:OIT,
  author =       "Peeyush Gupta and Yin Li and Sharad Mehrotra and Nisha
                 Panwar and Shantanu Sharma and Sumaya Almanee",
  title =        "{Obscure}: information-theoretic oblivious and
                 verifiable aggregation queries",
  journal =      j-PROC-VLDB-ENDOWMENT,
  volume =       "12",
  number =       "9",
  pages =        "1030--1043",
  month =        may,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.14778/3329772.3329779",
  ISSN =         "2150-8097",
  bibdate =      "Wed Oct 2 06:49:01 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/vldbe.bib",
  abstract =     "Despite extensive research on cryptography, secure and
                 efficient query processing over outsourced data remains
                 an open challenge. We develop communication-efficient
                 and information-theoretically secure algorithms for
                 privacy-preserving aggregation queries using
                 multi-party computation (MPC). Specifically, query
                 processing techniques over secret-shared data
                 outsourced by single or multiple database owners are
                 developed. These algorithms allow a user to execute
                 queries on the secret-shared database and also prevent
                 the network and the (adversarial) clouds to learn the
                 user's queries, results, or the database. We further
                 develop (non-mandatory) privacy-preserving result
                 verification algorithms that detect malicious
                 behaviors, and experimentally validate the efficiency
                 of our approach over large datasets, the size of which
                 prior approaches to secret-sharing or MPC systems have
                 not scaled to.",
  acknowledgement = ack-nhfb,
  fjournal =     "Proceedings of the VLDB Endowment",
  journal-URL =  "http://portal.acm.org/citation.cfm?id=J1174",
}

@Article{Hadlington:2019:ERW,
  author =       "Lee Hadlington and Masa Popovac and Helge Janicke and
                 Iryna Yevseyeva and Kevin Jones",
  title =        "Exploring the role of work identity and work locus of
                 control in information security awareness",
  journal =      j-COMPUT-SECUR,
  volume =       "81",
  number =       "??",
  pages =        "41--48",
  month =        mar,
  year =         "2019",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:59 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404818308897",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hajiali:2019:PPA,
  author =       "Mahdi Hajiali and Maryam Amirmazlaghani and Hossain
                 Kordestani",
  title =        "Preventing phishing attacks using text and image
                 watermarking",
  journal =      j-CCPE,
  volume =       "31",
  number =       "13",
  pages =        "e5083:1--e5083:??",
  day =          "10",
  month =        jul,
  year =         "2019",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.5083",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Sat Oct 12 11:00:03 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "18 November 2018",
}

@Article{Hajihassani:2019:FAI,
  author =       "O. Hajihassani and S. K. Monfared and S. H. Khasteh
                 and S. Gorgin",
  title =        "Fast {AES} Implementation: A High-Throughput Bitsliced
                 Approach",
  journal =      j-IEEE-TRANS-PAR-DIST-SYS,
  volume =       "30",
  number =       "10",
  pages =        "2211--2222",
  month =        oct,
  year =         "2019",
  CODEN =        "ITDSEO",
  DOI =          "https://doi.org/10.1109/TPDS.2019.2911278",
  ISSN =         "1045-9219 (print), 1558-2183 (electronic)",
  ISSN-L =       "1045-9219",
  bibdate =      "Thu Dec 19 09:20:35 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranspardistsys.bib;
                 https://www.math.utah.edu/pub/tex/bib/pvm.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Parallel and Distributed
                 Systems",
  journal-URL =  "http://www.computer.org/portal/web/csdl/transactions/tpds",
  keywords =     "AES; byte-wise operations; computing process;
                 cryptography; CTR; CUDA; CUDA-enabled GPU; Data models;
                 data representation; data representation scheme; ECB;
                 Encryption; encryption throughput; fast AES
                 implementation; GPU; Graphics processing units;
                 high-performance; high-throughput bitsliced AES
                 implementation; high-throughput bitsliced approach;
                 logic circuits; parallel architectures; parallelization
                 capability; parallelization unit; S-box logic circuit;
                 ShiftRows; Standards; substitute bytes stage; Table
                 lookup; Throughput",
}

@Article{Hall:2019:BIA,
  author =       "Calum C. Hall and Lynsay A. Shepherd and Natalie
                 Coull",
  title =        "{BlackWatch}: Increasing Attack Awareness within {Web}
                 Applications",
  journal =      j-FUTURE-INTERNET,
  volume =       "11",
  number =       "2",
  pages =        "44",
  day =          "15",
  month =        feb,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi11020044",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:51:04 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/11/2/44",
  abstract =     "Web applications are relied upon by many for the
                 services they provide. It is essential that
                 applications implement appropriate security measures to
                 prevent security incidents. Currently, web applications
                 focus resources towards the preventative side of
                 security. While prevention is an essential part of the
                 security process, developers must also implement a
                 level of attack awareness into their web applications.
                 Being able to detect when an attack is occurring
                 provides applications with the ability to execute
                 responses against malicious users in an attempt to slow
                 down or deter their attacks. This research seeks to
                 improve web application security by identifying
                 malicious behavior from within the context of web
                 applications using our tool BlackWatch. The tool is a
                 Python-based application which analyzes suspicious
                 events occurring within client web applications, with
                 the objective of identifying malicious patterns of
                 behavior. This approach avoids issues typically
                 encountered with traditional web application firewalls.
                 Based on the results from a preliminary study,
                 BlackWatch was effective at detecting attacks from both
                 authenticated and unauthenticated users. Furthermore,
                 user tests with developers indicated BlackWatch was
                 user-friendly, and was easy to integrate into existing
                 applications. Future work seeks to develop the
                 BlackWatch solution further for public release.",
  acknowledgement = ack-nhfb,
}

@Article{Hamidi:2019:ADS,
  author =       "Hodjat Hamidi",
  title =        "An approach to develop the smart health using
                 {Internet of Things} and authentication based on
                 biometric technology",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "91",
  number =       "??",
  pages =        "434--449",
  month =        feb,
  year =         "2019",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Tue Feb 5 08:15:51 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167739X18313517",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Hammad:2019:NTD,
  author =       "Mohamed Hammad and Shanzhuo Zhang and Kuanquan Wang",
  title =        "A novel two-dimensional {ECG} feature extraction and
                 classification algorithm based on convolution neural
                 network for human authentication",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "101",
  number =       "??",
  pages =        "180--196",
  month =        dec,
  year =         "2019",
  CODEN =        "FGSEVI",
  DOI =          "https://doi.org/10.1016/j.future.2019.06.008",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Mon Feb 10 12:55:02 MST 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X18329923",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Hammad:2019:PSF,
  author =       "Mohamed Hammad and Kuanquan Wang",
  title =        "Parallel score fusion of {ECG} and fingerprint for
                 human authentication based on convolution neural
                 network",
  journal =      j-COMPUT-SECUR,
  volume =       "81",
  number =       "??",
  pages =        "107--122",
  month =        mar,
  year =         "2019",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:59 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404818308411",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Han:2019:ABI,
  author =       "Jinguang Han and Maoxuan Bei and Liqun Chen and Yang
                 Xiang and Jie Cao and Fuchun Guo and Weizhi Meng",
  title =        "Attribute-Based Information Flow Control",
  journal =      j-COMP-J,
  volume =       "62",
  number =       "8",
  pages =        "1214--1231",
  month =        aug,
  year =         "2019",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxz018",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Aug 19 07:31:49 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://academic.oup.com/comjnl/article/62/8/1214/5488733",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Handa:2019:SES,
  author =       "Rohit Handa and C. Rama Krishna and Naveen Aggarwal",
  title =        "Searchable encryption: a survey on privacy-preserving
                 search schemes on encrypted outsourced data",
  journal =      j-CCPE,
  volume =       "31",
  number =       "17",
  pages =        "e5201:1--e5201:??",
  day =          "10",
  month =        sep,
  year =         "2019",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.5201",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Sat Oct 12 11:00:05 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "02 April 2019",
}

@Article{Hanocka:2019:APS,
  author =       "Rana Hanocka and Noa Fish and Zhenhua Wang and Raja
                 Giryes and Shachar Fleishman and Daniel Cohen-Or",
  title =        "{ALIGNet}: Partial-Shape Agnostic Alignment via
                 Unsupervised Learning",
  journal =      j-TOG,
  volume =       "38",
  number =       "1",
  pages =        "1:1--1:??",
  month =        feb,
  year =         "2019",
  CODEN =        "ATGRDF",
  DOI =          "https://doi.org/10.1145/3267347",
  ISSN =         "0730-0301 (print), 1557-7368 (electronic)",
  ISSN-L =       "0730-0301",
  bibdate =      "Tue Oct 22 12:28:15 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tog.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3267347",
  abstract =     "The process of aligning a pair of shapes is a
                 fundamental operation in computer graphics. Traditional
                 approaches rely heavily on matching corresponding
                 points or features to guide the alignment, a paradigm
                 that falters when significant shape portions are
                 missing. These techniques generally do not incorporate
                 prior knowledge about expected shape characteristics,
                 which can help compensate for any misleading cues left
                 by inaccuracies exhibited in the input shapes. We
                 present an approach based on a deep neural network,
                 leveraging shape datasets to learn a shape-aware prior
                 for source-to-target alignment that is robust to shape
                 incompleteness. In the absence of ground truth
                 alignments for supervision, we train a network on the
                 task of shape alignment using incomplete shapes
                 generated from full shapes for self-supervision. Our
                 network, called ALIGNet, is trained to warp complete
                 source shapes to incomplete targets, as if the target
                 shapes were complete, thus essentially rendering the
                 alignment partial-shape agnostic. We aim for the
                 network to develop specialized expertise over the
                 common characteristics of the shapes in each dataset,
                 thereby achieving a higher-level understanding of the
                 expected shape space to which a local approach would be
                 oblivious. We constrain ALIGNet through an anisotropic
                 total variation identity regularization to promote
                 piecewise smooth deformation fields, facilitating both
                 partial-shape agnosticism and post-deformation
                 applications. We demonstrate that ALIGNet learns to
                 align geometrically distinct shapes and is able to
                 infer plausible mappings even when the target shape is
                 significantly incomplete. We show that our network
                 learns the common expected characteristics of shape
                 collections without over-fitting or memorization,
                 enabling it to produce plausible deformations on unseen
                 data during test time.",
  acknowledgement = ack-nhfb,
  articleno =    "1",
  fjournal =     "ACM Transactions on Graphics",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J778",
}

@Article{Hanzlik:2019:CPC,
  author =       "Lucjan Hanzlik and Kamil Kluczniak and Miros{\l}aw
                 Kuty{\l}owski",
  title =        "{CTRL-PACE}: Controlled Randomness for e-Passport
                 Password Authentication",
  journal =      j-FUND-INFO,
  volume =       "169",
  number =       "4",
  pages =        "295--330",
  month =        "????",
  year =         "2019",
  CODEN =        "FUMAAJ",
  DOI =          "https://doi.org/10.3233/FI-2019-1849",
  ISSN =         "0169-2968 (print), 1875-8681 (electronic)",
  ISSN-L =       "0169-2968",
  bibdate =      "Wed Mar 24 12:51:47 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/fundinfo2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Fundamenta Informaticae",
  journal-URL =  "http://content.iospress.com/journals/fundamenta-informaticae",
}

@Article{Hao:2019:IDP,
  author =       "Y. Hao and T. Isobe and L. Jiao and C. Li and W. Meier
                 and Y. Todo and Q. Wang",
  title =        "Improved Division Property Based Cube Attacks
                 Exploiting Algebraic Properties of {Superpoly}",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "68",
  number =       "10",
  pages =        "1470--1486",
  month =        oct,
  year =         "2019",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2019.2909871",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Thu Sep 12 13:33:25 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
  keywords =     "Acorn; Analytical models; Ciphers; Complexity theory;
                 Computational modeling; Correlation; Cube attack;
                 division property; grain-128a; kreyvium; milp;
                 TriviA-SC1/2; Trivium; Upper bound",
}

@Article{Harb:2019:FIE,
  author =       "Salah Harb and Moath Jarrah",
  title =        "{FPGA} Implementation of the {ECC} Over {$ {\rm
                 GF}(2^m) $} for Small Embedded Applications",
  journal =      j-TECS,
  volume =       "18",
  number =       "2",
  pages =        "17:1--17:??",
  month =        apr,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3310354",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Thu Oct 17 18:16:43 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tecs.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3310354",
  abstract =     "In this article, we propose a compact elliptic curve
                 cryptographic core over GF($ 2^m$). The proposed
                 architecture is based on the Lopez-Dahab projective
                 point arithmetic operations. To achieve efficiency in
                 resources usage, an iterative method that uses a
                 ROM-based state machine is developed for the elliptic
                 curve cryptography (ECC) point doubling and addition
                 operations. The compact ECC core has been implemented
                 using Virtex FPGA devices. The number of the required
                 slices is 2,102 at 321MHz and 6,738 slices at 262MHz
                 for different GF($ 2^m$). Extensive experiments were
                 conducted to compare our solution to existing methods
                 in the literature. Our compact core consumes less area
                 than all previously proposed methods. It also provides
                 an excellent performance for scalar multiplication. In
                 addition, the ECC core is implemented in ASIC 0.18 $
                 \mu $ m CMOS technology, and the results show excellent
                 performance. Therefore, our proposed ECC core method
                 provides a balance in terms of speed, area, and power
                 consumption. This makes the proposed design the right
                 choice for cryptosystems in limited-resource devices
                 such as cell phones, IP cores of SoCs, and smart cards.
                 Moreover, side-channel attack resistance is implemented
                 to prevent power analysis.",
  acknowledgement = ack-nhfb,
  articleno =    "17",
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J840",
}

@Article{UlHassan:2019:DPR,
  author =       "Muneeb {Ul Hassan} and Mubashir Husain Rehmani and
                 Ramamohanarao Kotagiri and Jiekui Zhang and Jinjun Chen",
  title =        "Differential privacy for renewable energy resources
                 based smart metering",
  journal =      j-J-PAR-DIST-COMP,
  volume =       "131",
  number =       "??",
  pages =        "69--80",
  month =        sep,
  year =         "2019",
  CODEN =        "JPDCER",
  DOI =          "https://doi.org/10.1016/j.jpdc.2019.04.012",
  ISSN =         "0743-7315 (print), 1096-0848 (electronic)",
  ISSN-L =       "0743-7315",
  bibdate =      "Mon Jun 10 07:36:16 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jpardistcomp.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0743731518309201",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Parallel and Distributed Computing",
  journal-URL =  "http://www.sciencedirect.com/science/journal/07437315",
}

@Article{Hejun:2019:OAI,
  author =       "Zhu Hejun and Zhu Liehuang",
  title =        "Online and automatic identification of encryption
                 network behaviors in big data environment",
  journal =      j-CCPE,
  volume =       "31",
  number =       "12",
  pages =        "e4849:1--e4849:??",
  day =          "25",
  month =        jun,
  year =         "2019",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.4849",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Sat Oct 12 11:00:03 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "25 October 2018",
}

@Article{Herardian:2019:SUC,
  author =       "R. Herardian",
  title =        "The Soft Underbelly of Cloud Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "3",
  pages =        "90--93",
  month =        may # "\slash " # jun,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2904112",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
  keywords =     "Cloud computing; Computer hacking; Computer security;
                 Encryption; Firewalls; Software tools",
}

@Article{Hibschman:2019:ISS,
  author =       "Joshua Hibschman and Darren Gergle and Eleanor
                 O'Rourke and Haoqi Zhang",
  title =        "{Isopleth}: Supporting Sensemaking of Professional
                 {Web} Applications to Create Readily Available Learning
                 Experiences",
  journal =      j-TOCHI,
  volume =       "26",
  number =       "3",
  pages =        "16:1--16:??",
  month =        jun,
  year =         "2019",
  CODEN =        "ATCIF4",
  DOI =          "https://doi.org/10.1145/3310274",
  ISSN =         "1073-0516 (print), 1557-7325 (electronic)",
  ISSN-L =       "1073-0516",
  bibdate =      "Tue Oct 22 08:21:01 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tochi.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3310274",
  abstract =     "Online resources can help novice developers learn
                 basic programming skills, but few resources support
                 progressing from writing working code to learning
                 professional web development practices. We address this
                 gap by advancing Readily Available Learning
                 Experiences, a conceptual approach for transforming all
                 professional web applications into opportunities for
                 authentic learning. This article presents Isopleth, a
                 web-based platform that helps learners make sense of
                 complex code constructs and hidden asynchronous
                 relationships in professional web code. Isopleth embeds
                 sensemaking scaffolds informed by the learning sciences
                 to (1) expose hidden functional and event-driven
                 relationships, (2) surface functionally related slices
                 of code, and (3) support learners manipulating the
                 provided code representations. To expose event-driven
                 relationships, Isopleth implements a novel technique
                 called Serialized Deanonymization to determine and
                 visualize asynchronous functional relationships. To
                 evaluate Isopleth, we conducted a case study across 12
                 professional websites and a user study with 14 junior
                 and senior developers. Results show that Isopleth's
                 sensemaking scaffolds helped to surface implementation
                 approaches in event binding, web application design,
                 and complex interactive features across a range of
                 complex professional web applications. Moreover,
                 Isopleth helped junior developers improve the accuracy
                 of their conceptual models of how features are
                 implemented by 31\% on average.",
  acknowledgement = ack-nhfb,
  articleno =    "16",
  fjournal =     "ACM Transactions on Computer-Human Interaction",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J756",
}

@Article{Hiemenz:2019:DSS,
  author =       "Benedikt Hiemenz and Michel Kr{\"a}mer",
  title =        "Dynamic searchable symmetric encryption for storing
                 geospatial data in the cloud",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "3",
  pages =        "333--354",
  month =        jun,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-018-0414-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Thu May 23 17:57:24 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-018-0414-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Hintze:2019:CUR,
  author =       "Daniel Hintze and Matthias F{\"u}ller and Sebastian
                 Scholz and Rainhard D. Findling and Muhammad Muaaz and
                 Philipp Kapfer and Eckhard Koch and Ren{\'e}
                 Mayrhofer",
  title =        "{CORMORANT}: Ubiquitous Risk-Aware Multi-Modal
                 Biometric Authentication across Mobile Devices",
  journal =      j-IMWUT,
  volume =       "3",
  number =       "3",
  pages =        "1--23",
  month =        sep,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3351243",
  ISSN =         "2474-9567 (electronic)",
  bibdate =      "Thu Jan 23 12:37:13 MST 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/imwut.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3351243",
  abstract =     "People own and carry an increasing number of
                 ubiquitous mobile devices, such as smartphones,
                 tablets, and notebooks. Being small and mobile, those
                 devices have a high propensity to become lost or
                 stolen. Since mobile devices provide access to their
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "85",
  fjournal =     "Proceedings of the ACM on Interactive, Mobile,
                 Wearable and Ubiquitous Technologies (IMWUT)",
  journal-URL =  "https://dl.acm.org/loi/imwut",
}

@Article{Hisil:2019:KLF,
  author =       "Huseyin Hisil and Joost Renes",
  title =        "On {Kummer} Lines with Full Rational 2-torsion and
                 Their Usage in Cryptography",
  journal =      j-TOMS,
  volume =       "45",
  number =       "4",
  pages =        "39:1--39:17",
  month =        dec,
  year =         "2019",
  CODEN =        "ACMSCU",
  DOI =          "https://doi.org/10.1145/3361680",
  ISSN =         "0098-3500 (print), 1557-7295 (electronic)",
  ISSN-L =       "0098-3500",
  bibdate =      "Fri Dec 27 14:56:25 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/toms.bib",
  URL =          "https://dl.acm.org/citation.cfm?id=3361680",
  abstract =     "A paper by Karati and Sarkar at Asiacrypt'17 has
                 pointed out the potential for Kummer lines in genus 1,
                 by observing that their SIMD-friendly arithmetic is
                 competitive with the status quo. A more recent preprint
                 explores the connection with (twisted) Edwards curves.
                 In this article, we extend this work and significantly
                 simplify the treatment of Karati and Sarkar. We show
                 that their Kummer line is the x -line of a Montgomery
                 curve translated by a point of order two, and exhibit a
                 natural isomorphism to the y -line of a twisted Edwards
                 curve. Moreover, we show that the Kummer line presented
                 by Gaudry and Lubicz can be obtained via the action of
                 a point of order two on the y -line of an Edwards
                 curve. The maps connecting these curves and lines are
                 all very simple. As a result, a cryptographic
                 implementation can use the arithmetic that is optimal
                 for its instruction set at negligible cost.",
  acknowledgement = ack-nhfb,
  articleno =    "39",
  fjournal =     "ACM Transactions on Mathematical Software (TOMS)",
  journal-URL =  "http://dl.acm.org/pub.cfm?id=J782",
}

@Article{Hodgson:2019:SSC,
  author =       "Roderick Hodgson",
  title =        "Solving the security challenges of {IoT} with public
                 key cryptography",
  journal =      j-NETWORK-SECURITY,
  volume =       "2019",
  number =       "1",
  pages =        "17--19",
  month =        jan,
  year =         "2019",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Thu Sep 12 12:58:05 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S135348581930011X",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Hong:2019:MCP,
  author =       "Haibo Hong and Licheng Wang and Jun Shao and Jianhua
                 Yan and Haseeb Ahmad and Guiyi Wei and Mande Xie and
                 Yixian Yang",
  title =        "A Miniature {CCA} Public Key Encryption Scheme Based
                 on Non-abelian Factorization Problem in Finite Groups
                 of {Lie} Type",
  journal =      j-COMP-J,
  volume =       "62",
  number =       "12",
  pages =        "1840--1848",
  month =        dec,
  year =         "2019",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxz068",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Dec 23 06:38:51 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://academic.oup.com/comjnl/article/62/12/1840/5627776",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Horsman:2019:CPE,
  author =       "G. Horsman",
  title =        "A Call for the Prohibition of Encryption: Panacea or
                 Problem?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "2",
  pages =        "59--66",
  month =        mar # "\slash " # apr,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2018.2888776",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
  keywords =     "cryptography; encrypted channels; encryption;
                 Encryption; evolved form; Organizations; Privacy;
                 Standards organizations; Surveillance; terror attack;
                 Terrorism; terrorism; western civilization",
}

@Article{Hosny:2019:RCI,
  author =       "Khalid M. Hosny and Mohamed M. Darwish",
  title =        "Resilient Color Image Watermarking Using Accurate
                 Quaternion Radial Substituted {Chebyshev} Moments",
  journal =      j-TOMM,
  volume =       "15",
  number =       "2",
  pages =        "46:1--46:??",
  month =        jun,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3325193",
  ISSN =         "1551-6857 (print), 1551-6865 (electronic)",
  ISSN-L =       "1551-6857",
  bibdate =      "Wed Oct 2 10:12:46 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tomccap.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3325193",
  abstract =     "In this work, a new quaternion-based method for color
                 image watermarking is proposed. In this method, a novel
                 set of quaternion radial substituted Chebyshev moments
                 (QRSCMs) is presented for robust geometrically
                 invariant image watermarking. An efficient
                 computational method is proposed for highly accurate,
                 fast, and numerically stable QRSCMs in polar
                 coordinates. The proposed watermarking method consists
                 of three stages. In the first stage, the Arnold
                 transform is used to improve the security of the
                 watermarking scheme by scrambling the binary watermark.
                 In the second stage, the proposed accurate and stable
                 QRSCMs of the host color image are computed. In the
                 third stage, the encrypted binary watermark is embedded
                 into the host image by employing the quantization
                 technique on selected-magnitude QRSCMs where the
                 watermarked color image is obtained by adding the
                 original host color image to the compensation image.
                 Then, the binary watermark can be extracted directly
                 without using the original image from the magnitudes of
                 QRSCMs. Numerical experiments are performed where the
                 performance of proposed method is compared with the
                 existing quaternion moment-based watermarking methods.
                 The comparison clearly shows that the proposed method
                 is very efficient in terms of the visual
                 imperceptibility capability and the robustness under
                 different attacks compared to the existing quaternion
                 moment-based watermarking algorithms.",
  acknowledgement = ack-nhfb,
  articleno =    "46",
  fjournal =     "ACM Transactions on Multimedia Computing,
                 Communications, and Applications",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J961",
}

@Article{Hu:2019:AAA,
  author =       "Yupu Hu and Zhizhu Lian and Jiangshan Chen and Baocang
                 Wang and Shanshan Zhang",
  title =        "Algebraic Attacks Against Several Weak Variants of
                 {GVW 13 ABE}",
  journal =      j-INT-J-FOUND-COMP-SCI,
  volume =       "30",
  number =       "4",
  pages =        "607--618",
  month =        jun,
  year =         "2019",
  DOI =          "https://doi.org/10.1142/S012905411940015X",
  ISSN =         "0129-0541",
  ISSN-L =       "0129-0541",
  bibdate =      "Fri Sep 20 10:48:00 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijfcs.bib",
  URL =          "https://www.worldscientific.com/doi/10.1142/S012905411940015X",
  abstract =     "Attribute-based encryption (ABE) is an active research
                 area in the public-key cryptography. Among large amount
                 of ABE schemes, the scheme GVW 13 (STOC13) is an
                 well-known candidate for realizing ABE via lattice
                 mechanism, whose security relies on learning with
                 errors (LWE). This ABE scheme has very exquisite
                 structure, and its crucial component lies in using that
                 two-to-one recoding (TOR) algorithm. However, the main
                 shortcoming of GVW 13 is the use of the huge key-size.
                 Therefore, it encourages people to find out some more
                 simplified variants of GVW 13. In this paper, we first
                 propose three variants of GVW 13 for reducing the size
                 of secret key, which would be the feasible strategies
                 to improve GVW 13 with great possibility.
                 Unfortunately, we can still present three related
                 attacks against these three proposals under the same
                 collusion scenario, respectively.",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Foundations of Computer
                 Science (IJFCS)",
  journal-URL =  "http://www.worldscientific.com/loi/ijfcs",
  remark =       "Special Issue Cryptography and Provable Security",
}

@Article{Hu:2019:CAC,
  author =       "Chengyu Hu and Rupeng Yang and Pengtao Liu and Tong Li
                 and Fanyu Kong",
  title =        "A countermeasure against cryptographic key leakage in
                 cloud: public-key encryption with continuous leakage
                 and tampering resilience",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "75",
  number =       "6",
  pages =        "3099--3122",
  month =        jun,
  year =         "2019",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-018-2534-z",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Thu Oct 10 15:31:20 MDT 2019",
  bibsource =    "http://link.springer.com/journal/11227/75/6;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Article{Huang:2019:AIA,
  author =       "Anna Huang and Dong Wang and Run Zhao and Qian Zhang",
  title =        "{Au-Id}: Automatic User Identification and
                 Authentication through the Motions Captured from
                 Sequential Human Activities Using {RFID}",
  journal =      j-IMWUT,
  volume =       "3",
  number =       "2",
  pages =        "1--26",
  month =        jun,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3328919",
  ISSN =         "2474-9567 (electronic)",
  bibdate =      "Thu Jan 23 12:37:11 MST 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/imwut.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3328919",
  abstract =     "The advancements of ambient intelligence and
                 ubiquitous computing are driving the unprecedented
                 development of smart spaces where enhanced services are
                 provided based on activity recognition. Meanwhile, user
                 identification, which can enable the \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "48",
  fjournal =     "Proceedings of the ACM on Interactive, Mobile,
                 Wearable and Ubiquitous Technologies (IMWUT)",
  journal-URL =  "https://dl.acm.org/loi/imwut",
}

@Article{Huang:2019:ILA,
  author =       "Bo-Yuan Huang and Hongce Zhang and Pramod Subramanyan
                 and Yakir Vizel and Aarti Gupta and Sharad Malik",
  title =        "Instruction-Level Abstraction {(ILA)}: a Uniform
                 Specification for System-on-Chip {(SoC)} Verification",
  journal =      j-TODAES,
  volume =       "24",
  number =       "1",
  pages =        "10:1--10:??",
  month =        jan,
  year =         "2019",
  CODEN =        "ATASFO",
  DOI =          "https://doi.org/10.1145/3282444",
  ISSN =         "1084-4309 (print), 1557-7309 (electronic)",
  ISSN-L =       "1084-4309",
  bibdate =      "Fri Mar 22 16:58:40 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/todaes.bib",
  abstract =     "Modern Systems-on-Chip (SoC) designs are increasingly
                 heterogeneous and contain specialized semi-programmable
                 accelerators in addition to programmable processors. In
                 contrast to the pre-accelerator era, when the ISA
                 played an important role in verification by enabling a
                 clean separation of concerns between software and
                 hardware, verification of these ``accelerator-rich''
                 SoCs presents new challenges. From the perspective of
                 hardware designers, there is a lack of a common
                 framework for formal functional specification of
                 accelerator behavior. From the perspective of software
                 developers, there exists no unified framework for
                 reasoning about software/hardware interactions of
                 programs that interact with accelerators. This article
                 addresses these challenges by providing a formal
                 specification and high-level abstraction for
                 accelerator functional behavior. It formalizes the
                 concept of an Instruction Level Abstraction (ILA),
                 developed informally in our previous work, and shows
                 its application in modeling and verification of
                 accelerators. This formal ILA extends the familiar
                 notion of instructions to accelerators and provides a
                 uniform, modular, and hierarchical abstraction for
                 modeling software-visible behavior of both accelerators
                 and programmable processors. We demonstrate the
                 applicability of the ILA through several case studies
                 of accelerators (for image processing, machine
                 learning, and cryptography), and a general-purpose
                 processor (RISC-V). We show how the ILA model
                 facilitates equivalence checking between two ILAs, and
                 between an ILA and its hardware finite-state machine
                 (FSM) implementation. Further, this equivalence
                 checking supports accelerator upgrades using the notion
                 of ILA compatibility, similar to processor upgrades
                 using ISA compatibility.",
  acknowledgement = ack-nhfb,
  articleno =    "10",
  fjournal =     "ACM Transactions on Design Automation of Electronic
                 Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J776",
}

@Article{Huber:2019:FCL,
  author =       "Manuel Huber and Julian Horsch and Junaid Ali and
                 Sascha Wessel",
  title =        "Freeze and Crypt: {Linux} kernel support for main
                 memory encryption",
  journal =      j-COMPUT-SECUR,
  volume =       "86",
  number =       "??",
  pages =        "420--436",
  month =        sep,
  year =         "2019",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:47:02 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/linux.bib;
                 https://www.math.utah.edu/pub/tex/bib/unix.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404818310435",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hurrah:2019:DWF,
  author =       "Nasir N. Hurrah and Shabir A. Parah and Nazir A. Loan
                 and Javaid A. Sheikh and Mohammad Elhoseny and Khan
                 Muhammad",
  title =        "Dual watermarking framework for privacy protection and
                 content authentication of multimedia",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "94",
  number =       "??",
  pages =        "654--673",
  month =        may,
  year =         "2019",
  CODEN =        "FGSEVI",
  DOI =          "https://doi.org/10.1016/j.future.2018.12.036",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Mon Oct 14 16:09:56 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X18317096",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Hwang:2019:BBR,
  author =       "S. O. Hwang and A. Mehmood",
  title =        "Blockchain-Based Resource Syndicate",
  journal =      j-COMPUTER,
  volume =       "52",
  number =       "5",
  pages =        "58--66",
  month =        may,
  year =         "2019",
  CODEN =        "CPTRB4",
  DOI =          "https://doi.org/10.1109/MC.2018.2888773",
  ISSN =         "0018-9162 (print), 1558-0814 (electronic)",
  ISSN-L =       "0018-9162",
  bibdate =      "Thu Jun 27 10:30:21 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/computer2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=2",
  keywords =     "automated structure; Blockchain; blockchain-based
                 resource syndicate; computational resources; consistent
                 replication; cryptocurrencies; data structures;
                 Encryption; financial transactions; Hash functions;
                 incorruptible distributed data structure; Internet;
                 meta data; multiple nodes; Peer-to-peer computing;
                 Receivers; Redundancy",
}

@Article{Hwang:2019:ELS,
  author =       "Min-Shiang Hwang and Cheng-Chi Lee and Shih-Ting Hsu",
  title =        "An {ElGamal}-like Secure Channel Free Public Key
                 Encryption with Keyword Search Scheme",
  journal =      j-INT-J-FOUND-COMP-SCI,
  volume =       "30",
  number =       "2",
  pages =        "??--??",
  month =        feb,
  year =         "2019",
  DOI =          "https://doi.org/10.1142/S0129054119500047",
  ISSN =         "0129-0541",
  ISSN-L =       "0129-0541",
  bibdate =      "Wed Mar 13 07:03:58 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijfcs.bib",
  abstract =     "The idea of public key encryption with keyword search
                 (PEKS), proposed by Boneh et al., enables one to send a
                 trapdoor containing a encrypted keyword to query data
                 without revealing the keyword. In Boneh et al.'s
                 design, the trapdoor has to be transferred through a
                 secure channel, which is both costly and inefficient.
                 Baek et al. then proposed an efficient secure channel
                 free public key encryption scheme with keyword search
                 (SCF-PEKS). After that, vast amounts of research have
                 focused on the protection against the off-line keyword
                 guessing attack (OKGA) by enhancing the model. However,
                 most of the PEKS/SCF-PEKS schemes developed so far are
                 constructed by applying bilinear pairing and are
                 susceptible to off-line keyword guessing attacks. In
                 this paper, we propose a new SCF-PEKS scheme based on
                 the ElGamal cryptosystem. The proposed scheme is not
                 only secure against off-line keyword guessing attacks
                 but also improves the efficiency.",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Foundations of Computer
                 Science (IJFCS)",
  journal-URL =  "http://www.worldscientific.com/loi/ijfcs",
}

@Article{Ibrahim:2019:RAM,
  author =       "Tahir Musa Ibrahim and Shafi'i Muhammad Abdulhamid and
                 Ala Abdusalam Alarood and Haruna Chiroma and Mohammed
                 Ali Al-garadi and Nadim Rana and Amina Nuhu Muhammad
                 and Adamu Abubakar and Khalid Haruna and Lubna A.
                 Gabralla",
  title =        "Recent advances in mobile touch screen security
                 authentication methods: a systematic literature
                 review",
  journal =      j-COMPUT-SECUR,
  volume =       "85",
  number =       "??",
  pages =        "1--24",
  month =        aug,
  year =         "2019",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2019.04.008",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:47:01 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404818305030",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Manual{Intel:2019:IAM,
  author =       "{Intel}",
  title =        "{Intel} Architecture Memory Encryption Technologies
                 Specification",
  organization = "{Intel Corporation}",
  address =      "????",
  edition =      "336907-002US (Revision 1.2)",
  month =        apr,
  year =         "2019",
  bibdate =      "Mon Oct 07 10:23:54 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "https://software.intel.com/sites/default/files/managed/a5/16/Multi-Key-Total-Memory-Encryption-Spec.pdf",
  abstract =     "This document describes the memory encryption support
                 targeting future Intel processors. Note that Intel
                 platforms support many different types of memory and
                 not all SOC implementations will support this
                 capability for all types of memory. Initial
                 implementation is likely to focus on traditional DRAM
                 and NVRAM.\par

                 Total Memory Encryption (TME) --- provides the
                 capability to encrypt the entirety of the physical
                 memory of a system. This capability is typically
                 enabled in the very early stages of the boot process
                 with a small change to BIOS, and once configured and
                 locked, will encrypt all the data on external memory
                 buses of an SOC using the NIST standard AES-XTS
                 algorithm with 128-bit keys. The encryption key used
                 for TME uses a hardware random number generator
                 implemented in the Intel SOC, and the keys are not
                 accessible by software or by using external interfaces
                 to the Intel SOC. TME capability is intended to provide
                 protections of AES-XTS to external memory buses and
                 DIMMs. The architecture is flexible and will support
                 additional memory protection schemes in the future.
                 This capability, when enabled, is intended to support
                 (unmodified) existing system and application software.
                 Overall performance impact of this capability is likely
                 to be relatively small and is highly dependent on
                 workload.",
  acknowledgement = ack-nhfb,
}

@Article{Jan:2019:PBM,
  author =       "Mian Ahmad Jan and Fazlullah Khan and Muhammad Alam
                 and Muhammad Usman",
  title =        "A payload-based mutual authentication scheme for
                 {Internet of Things}",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "92",
  number =       "??",
  pages =        "1028--1039",
  month =        mar,
  year =         "2019",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Tue Feb 5 08:15:51 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167739X17303898",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Jan:2019:SEE,
  author =       "Mian Ahmad Jan and Wenjing Zhang and Muhammad Usman
                 and Zhiyuan Tan and Fazlullah Khan and Entao Luo",
  title =        "{SmartEdge}: an end-to-end encryption framework for an
                 edge-enabled smart city application",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "137",
  number =       "??",
  pages =        "1--10",
  day =          "1",
  month =        jul,
  year =         "2019",
  CODEN =        "JNCAF3",
  DOI =          "https://doi.org/10.1016/j.jnca.2019.02.023",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Mon Oct 14 14:16:33 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804519300827",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Jannati:2019:SOR,
  author =       "Hoda Jannati and Ramtin Khosravi",
  title =        "On the security of one-round meeting location
                 determination protocol",
  journal =      j-INFO-PROC-LETT,
  volume =       "146",
  number =       "??",
  pages =        "35--38",
  month =        jun,
  year =         "2019",
  CODEN =        "IFPLAT",
  DOI =          "https://doi.org/10.1016/j.ipl.2019.02.004",
  ISSN =         "0020-0190 (print), 1872-6119 (electronic)",
  ISSN-L =       "0020-0190",
  bibdate =      "Mon Mar 18 10:10:09 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/infoproc2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0020019019300274",
  acknowledgement = ack-nhfb,
  fjournal =     "Information Processing Letters",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00200190",
}

@Article{Jiang:2019:PPP,
  author =       "Wenbo Jiang and Hongwei Li and Guowen Xu and Mi Wen
                 and Guishan Dong and Xiaodong Lin",
  title =        "{PTAS}: Privacy-preserving Thin-client Authentication
                 Scheme in blockchain-based {PKI}",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "96",
  number =       "??",
  pages =        "185--195",
  month =        jul,
  year =         "2019",
  CODEN =        "FGSEVI",
  DOI =          "https://doi.org/10.1016/j.future.2019.01.026",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Mon Oct 14 16:09:56 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X18315097",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Jiang:2019:SSL,
  author =       "Yichen Jiang and Jenny Hamer and Chenghong Wang and
                 Xiaoqian Jiang and Miran Kim and Yongsoo Song and Yuhou
                 Xia and Noman Mohammed and Md Nazmus Sadat and Shuang
                 Wang",
  title =        "{SecureLR}: Secure Logistic Regression Model via a
                 Hybrid Cryptographic Protocol",
  journal =      j-TCBB,
  volume =       "16",
  number =       "1",
  pages =        "113--123",
  month =        jan,
  year =         "2019",
  CODEN =        "ITCBCY",
  DOI =          "https://doi.org/10.1109/TCBB.2018.2833463",
  ISSN =         "1545-5963 (print), 1557-9964 (electronic)",
  ISSN-L =       "1545-5963",
  bibdate =      "Mon Mar 11 18:45:00 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcbb.bib",
  abstract =     "Machine learning applications are intensively utilized
                 in various science fields, and increasingly the
                 biomedical and healthcare sector. Applying predictive
                 modeling to biomedical data introduces privacy and
                 security concerns requiring additional protection to
                 prevent accidental disclosure or leakage of sensitive
                 patient information. Significant advancements in secure
                 computing methods have emerged in recent years,
                 however, many of which require substantial
                 computational and/or communication overheads, which
                 might hinder their adoption in biomedical applications.
                 In this work, we propose SecureLR, a novel framework
                 allowing researchers to leverage both the computational
                 and storage capacity of Public Cloud Servers to conduct
                 learning and predictions on biomedical data without
                 compromising data security or efficiency. Our model
                 builds upon homomorphic encryption methodologies with
                 hardware-based security reinforcement through Software
                 Guard Extensions SGX, and our implementation
                 demonstrates a practical hybrid cryptographic solution
                 to address important concerns in conducting machine
                 learning with public clouds.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE/ACM Transactions on Computational Biology and
                 Bioinformatics",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J954",
}

@Article{Jiao:2019:AMC,
  author =       "Y. Jiao and P. Wang and D. Niyato and K.
                 Suankaewmanee",
  title =        "Auction Mechanisms in Cloud\slash Fog Computing
                 Resource Allocation for Public Blockchain Networks",
  journal =      j-IEEE-TRANS-PAR-DIST-SYS,
  volume =       "30",
  number =       "9",
  pages =        "1975--1989",
  month =        sep,
  year =         "2019",
  CODEN =        "ITDSEO",
  DOI =          "https://doi.org/10.1109/TPDS.2019.2900238",
  ISSN =         "1045-9219 (print), 1558-2183 (electronic)",
  ISSN-L =       "1045-9219",
  bibdate =      "Fri Aug 30 06:09:58 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranspardistsys.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Parallel and Distributed
                 Systems",
  journal-URL =  "http://www.computer.org/portal/web/csdl/transactions/tpds",
  keywords =     "Approximation algorithms; auction; auction mechanism;
                 auction-based market model; block mining; Blockchain;
                 cloud computing; cloud/fog computing; computational
                 complexity; constant-demand bidding scheme;
                 cryptocurrencies; Cryptography; data mining;
                 decentralized data management applications;
                 decentralized secure data management platform;
                 distributed databases; electronic commerce; game
                 theory; mobile computing; multidemand bidding scheme;
                 Peer-to-peer computing; pricing; proof of work;
                 proof-of-work based consensus protocols; Protocols;
                 public blockchain networks; resource allocation;
                 Resource management; social welfare; Task analysis;
                 tendering",
}

@Article{Jin:2019:RPP,
  author =       "Hongyu Jin and Panos Papadimitratos",
  title =        "Resilient Privacy Protection for Location-Based
                 Services through Decentralization",
  journal =      j-TOPS,
  volume =       "22",
  number =       "4",
  pages =        "21:1--21:??",
  month =        dec,
  year =         "2019",
  DOI =          "https://doi.org/10.1145/3319401",
  ISSN =         "2471-2566 (print), 2471-2574 (electronic)",
  ISSN-L =       "2471-2566",
  bibdate =      "Wed Dec 18 14:55:10 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tops.bib",
  URL =          "https://dl.acm.org/citation.cfm?id=3319401",
  abstract =     "Location-Based Services (LBSs) provide valuable
                 services, with convenient features for mobile users.
                 However, the location and other information disclosed
                 through each query to the LBS erodes user privacy. This
                 is a concern especially because LBS providers can be
                 honest-but-curious, collecting queries and tracking
                 users' whereabouts and infer sensitive user data. This
                 motivated both centralized and decentralized location
                 privacy protection schemes for LBSs: anonymizing and
                 obfuscating LBS queries to not disclose exact
                 information, while still getting useful responses.
                 Decentralized schemes overcome disadvantages of
                 centralized schemes, eliminating anonymizers, and
                 enhancing users' control over sensitive information.
                 However, an insecure decentralized system could create
                 serious risks beyond private information leakage. More
                 so, attacking an improperly designed decentralized LBS
                 privacy protection scheme could be an effective and
                 low-cost step to breach user privacy. We address
                 exactly this problem, by proposing security
                 enhancements for mobile data sharing systems. We
                 protect user privacy while preserving accountability of
                 user activities, leveraging pseudonymous authentication
                 with mainstream cryptography. We show our scheme can be
                 deployed with off-the-shelf devices based on an
                 experimental evaluation of an implementation in a
                 static automotive testbed.",
  acknowledgement = ack-nhfb,
  articleno =    "21",
  fjournal =     "ACM Transactions on Privacy and Security (TOPS)",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J1547",
}

@Article{K:2019:IAM,
  author =       "Deepa K. and Radhamani G. and Vinod P. and Mohammad
                 Shojafar and Neeraj Kumar and Mauro Conti",
  title =        "Identification of {Android} malware using refined
                 system calls",
  journal =      j-CCPE,
  volume =       "31",
  number =       "20",
  pages =        "e5311:1--e5311:??",
  day =          "25",
  month =        oct,
  year =         "2019",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.5311",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Sat Oct 12 11:00:06 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/unix.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "09 May 2019",
}

@Article{Kabirirad:2019:HSG,
  author =       "Saeideh Kabirirad and Mahmood Fazlali and Ziba
                 Eslami",
  title =        "High-speed {GPU} implementation of a secret sharing
                 scheme based on cellular automata",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "75",
  number =       "11",
  pages =        "7314--7336",
  month =        nov,
  year =         "2019",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-019-02910-w",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Sat Jul 25 07:17:52 MDT 2020",
  bibsource =    "http://link.springer.com/journal/11227/75/11;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Article{Kalita:2019:NSM,
  author =       "Manashee Kalita and Themrichon Tuithung and Swanirbhar
                 Majumder",
  title =        "A New Steganography Method Using Integer Wavelet
                 Transform and Least Significant Bit Substitution",
  journal =      j-COMP-J,
  volume =       "62",
  number =       "11",
  pages =        "1639--1655",
  month =        nov,
  year =         "2019",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxz014",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Sat Nov 30 05:41:04 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://academic.oup.com/comjnl/article/62/11/1639/5369945",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Kammuller:2019:ATI,
  author =       "Florian Kamm{\"u}ller",
  title =        "Attack trees in {Isabelle} extended with probabilities
                 for quantum cryptography",
  journal =      j-COMPUT-SECUR,
  volume =       "87",
  number =       "??",
  pages =        "Article 101572",
  month =        nov,
  year =         "2019",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2019.101572",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Jan 22 15:25:37 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481930135X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kang:2019:NBK,
  author =       "Burong Kang and Xinyu Meng and Lei Zhang and Yinxia
                 Sun",
  title =        "Nonce-Based Key Agreement Protocol Against Bad
                 Randomness",
  journal =      j-INT-J-FOUND-COMP-SCI,
  volume =       "30",
  number =       "4",
  pages =        "619--633",
  month =        jun,
  year =         "2019",
  DOI =          "https://doi.org/10.1142/S0129054119400161",
  ISSN =         "0129-0541",
  ISSN-L =       "0129-0541",
  bibdate =      "Fri Sep 20 10:48:00 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijfcs.bib",
  URL =          "https://www.worldscientific.com/doi/10.1142/S0129054119400161",
  abstract =     "Most of the existing cryptographic schemes, e.g., key
                 agreement protocol, call for good randomness.
                 Otherwise, the security of these cryptographic schemes
                 cannot be fully guaranteed. Nonce-based cryptosystem is
                 recently introduced to improve the security of public
                 key encryption and digital signature schemes by
                 ensuring security when randomness fails. In this paper,
                 we first investigate the security of key agreement
                 protocols when randomness fails. Then we define the
                 security model for nonce-based key agreement protocols
                 and propose a nonce-based key agreement protocol that
                 protects against bad randomness. The new protocol is
                 proven to be secure in our proposed security model.",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Foundations of Computer
                 Science (IJFCS)",
  journal-URL =  "http://www.worldscientific.com/loi/ijfcs",
  remark =       "Special Issue Cryptography and Provable Security",
}

@Article{Kara:2019:ALS,
  author =       "Orhun Kara and Muhammed F. Esgin",
  title =        "On Analysis of Lightweight Stream Ciphers with Keyed
                 Update",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "68",
  number =       "1",
  pages =        "99--110",
  month =        "????",
  year =         "2019",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2018.2851239",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Wed Dec 26 06:35:11 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  URL =          "https://ieeexplore.ieee.org/document/8400392/",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@InProceedings{Kilgallin:2019:FRK,
  author =       "Jonathan Kilgallin and Ross Vasko",
  editor =       "{IEEE}",
  booktitle =    "{First IEEE International Conference on Trust, Privacy
                 and Security in Intelligent Systems and Applications
                 (TPS-ISA): 12--14 December 2019}",
  title =        "Factoring {RSA} keys in the {IoT} era",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "184--189",
  year =         "2019",
  bibdate =      "Fri Jul 29 08:02:15 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://ieeexplore.ieee.org/document/9014350",
  abstract =     "RSA keys are at risk of compromise when using improper
                 random number generation. Many weak keys can
                 efficiently be discovered and subsequently compromised
                 by finding reused prime factors in a large data set. We
                 collect and analyze 75 million RSA certificates from
                 the Internet, and find that 1 in 172 keys share a
                 factor with another. In contrast, only 5 of 100 million
                 certificates found in a sample from Certificate
                 Transparency logs are compromised by the same
                 technique. The discrepancy in rates of compromise is
                 overwhelmingly due to IoT devices exposed to the
                 Internet, which may be subject to design constraints
                 and limited entropy. The widespread susceptibility of
                 these IoT devices poses a potential risk to the public
                 due to their presence in sensitive settings. We
                 conclude that device manufacturers must ensure their
                 devices have access to sufficient entropy and adhere to
                 best practices in cryptography to protect consumers.",
  acknowledgement = ack-nhfb,
}

@Article{Kim:2019:AAI,
  author =       "Jihye Kim and Jiwon Lee and Hankyung Ko and Donghwan
                 Oh and Semin Han and Gwonho Jeong and Hyunok Oh",
  title =        "{AuthCropper}: Authenticated Image Cropper for Privacy
                 Preserving Surveillance Systems",
  journal =      j-TECS,
  volume =       "18",
  number =       "5s",
  pages =        "62:1--62:??",
  month =        oct,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3358195",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Thu Oct 17 18:16:44 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tecs.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3358195",
  abstract =     "As surveillance systems are popular, the privacy of
                 the recorded video becomes more important. On the other
                 hand, the authenticity of video images should be
                 guaranteed when used as evidence in court. It is
                 challenging to satisfy both (personal) privacy and
                 authenticity of a video simultaneously, since the
                 privacy requires modifications (e.g., partial
                 deletions) of an original video image while the
                 authenticity does not allow any modifications of the
                 original image. This paper proposes a novel method to
                 convert an encryption scheme to support partial
                 decryption with a constant number of keys and construct
                 a privacy-aware authentication scheme by combining with
                 a signature scheme. The security of our proposed scheme
                 is implied by the security of the underlying encryption
                 and signature schemes. Experimental results show that
                 the proposed scheme can handle the UHD video stream
                 with more than 17 fps on a real embedded system, which
                 validates the practicality of the proposed scheme.",
  acknowledgement = ack-nhfb,
  articleno =    "62",
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J840",
}

@Article{Kim:2019:IED,
  author =       "Jungwon Kim and Jeffrey S. Vetter",
  title =        "Implementing efficient data compression and encryption
                 in a persistent key--value store for {HPC}",
  journal =      j-IJHPCA,
  volume =       "33",
  number =       "6",
  pages =        "1098--1112",
  day =          "1",
  month =        nov,
  year =         "2019",
  CODEN =        "IHPCFL",
  DOI =          "https://doi.org/10.1177/1094342019847264",
  ISSN =         "1094-3420 (print), 1741-2846 (electronic)",
  ISSN-L =       "1094-3420",
  bibdate =      "Wed Oct 9 14:35:54 MDT 2019",
  bibsource =    "http://hpc.sagepub.com/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/datacompression.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijsa.bib",
  URL =          "https://journals.sagepub.com/doi/full/10.1177/1094342019847264",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of High Performance Computing
                 Applications",
  journal-URL =  "https://journals.sagepub.com/home/hpc",
}

@Article{Kolsch:2019:SBP,
  author =       "Johannes K{\"o}lsch and Christopher Heinz and Axel
                 Ratzke and Christoph Grimm",
  title =        "Simulation-Based Performance Validation of Homomorphic
                 Encryption Algorithms in the {Internet of Things}",
  journal =      j-FUTURE-INTERNET,
  volume =       "11",
  number =       "10",
  pages =        "218",
  day =          "22",
  month =        oct,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi11100218",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:51:08 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/11/10/218",
  abstract =     "IoT systems consist of Hardware/Software systems
                 (e.g., sensors) that are embedded in a physical world,
                 networked and that interact with complex software
                 platforms. The validation of such systems is a
                 challenge and currently mostly done by prototypes. This
                 paper presents the virtual environment for simulation,
                 emulation and validation of an IoT platform and its
                 semantic model in real life scenarios. It is based on a
                 decentralized, bottom up approach that offers
                 interoperability of IoT devices and the value-added
                 services they want to use across different domains. The
                 framework is demonstrated by a comprehensive case
                 study. The example consists of the complete IoT ``Smart
                 Energy'' use case with focus on data privacy by
                 homomorphic encryption. The performance of the network
                 is compared while using partially homomorphic
                 encryption, fully homomorphic encryption and no
                 encryption at all.As a major result, we found that our
                 framework is capable of simulating big IoT networks and
                 the overhead introduced by homomorphic encryption is
                 feasible for VICINITY.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Security and Reliability of
                 IoT---Selected Papers from SecRIoT 2019.",
}

@Article{Kompara:2019:REM,
  author =       "Marko Kompara and SK Hafizul Islam and Marko
                 H{\"o}lbl",
  title =        "A robust and efficient mutual authentication and key
                 agreement scheme with untraceability for {WBANs}",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "148",
  number =       "??",
  pages =        "196--213",
  day =          "15",
  month =        jan,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1016/j.comnet.2018.11.016",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Tue Jan 22 16:29:25 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1389128618303955",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286/",
}

@Article{Korac:2019:FMU,
  author =       "Dragan Kora{\'c} and Dejan Simi{\'c}",
  title =        "Fishbone model and universal authentication framework
                 for evaluation of multifactor authentication in mobile
                 environment",
  journal =      j-COMPUT-SECUR,
  volume =       "85",
  number =       "??",
  pages =        "313--332",
  month =        aug,
  year =         "2019",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:47:01 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404818307375",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@InProceedings{Kostic:2019:UNV,
  author =       "Dusan Kostic and Shay Gueron",
  title =        "Using the New {VPMADD} Instructions for the New Post
                 Quantum Key Encapsulation Mechanism {SIKE}",
  crossref =     "Takagi:2019:ISC",
  pages =        "215--218",
  month =        jun,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/ARITH.2019.00050",
  bibdate =      "Fri Jan 31 08:18:07 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/fparith.bib",
  abstract =     "This paper demonstrates the use of new processor
                 instructions VPMADD, intended to appear in the coming
                 generation of Intel processors (codename ``Cannon
                 Lake''), in order to accelerate the newly proposed key
                 encapsulation mechanism (KEM) named SIKE. SIKE is one
                 of the submissions to the NIST standardization process
                 on post-quantum cryptography, and is based on
                 pseudo-random walks in supersingular isogeny graphs.
                 While very small keys are the main advantage of SIKE,
                 its extreme computational intensiveness makes it one of
                 the slowest KEM proposals. Performance optimizations
                 are needed. We address here the ``Level 1'' parameters
                 that target 64-bit quantum security, and deemed
                 sufficient for the NIST standardization effort. Thus,
                 we focus on SIKE503 that operates over Fp2 with a
                 503-bit prime p. These short operands pose a
                 significant challenge on using VPMADD effectively. We
                 demonstrate several optimization methods to accelerate
                 Fp, Fp2, and the elliptic curve arithmetic, and predict
                 a potential speedup by a factor of 1.72x.",
  acknowledgement = ack-nhfb,
  keywords =     "ARITH-26; codename CannonLake; Computer architecture;
                 Encapsulation; extreme computational intensiveness;
                 Intel processors; KEM proposals; key encapsulation
                 mechanism; NIST; NIST standardization effort; NIST
                 standardization process; Optimization; post quantum key
                 encapsulation mechanism SIKE; post-quantum
                 cryptography; processor instructions VPMADD; Proposals;
                 pseudorandom walks; Quantum computing; quantum
                 cryptography; quantum security; Registers; SIKE503;
                 supersingular isogeny graphs; VPMADD instructions;
                 VPMADD processor instructions, software optimization,
                 post quantum cryptography, supersingular isogeny",
}

@Article{Kumar:2019:SSH,
  author =       "Chanchal Kumar and Mohammad Najmud Doja",
  title =        "A Secure Structure for Hiding Information in a
                 Cryptosystem based on Machine-learning Techniques and
                 Content-based Optimization using Portfolio Selection
                 Data",
  journal =      j-SCPE,
  volume =       "20",
  number =       "1",
  pages =        "161--180",
  month =        "????",
  year =         "2019",
  CODEN =        "????",
  ISSN =         "1895-1767",
  ISSN-L =       "1895-1767",
  bibdate =      "Thu Oct 3 07:39:16 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/scpe.bib",
  URL =          "https://www.scpe.org/index.php/scpe/article/view/1488",
  acknowledgement = ack-nhfb,
  fjournal =     "Scalable Computing: Practice and Experience",
  journal-URL =  "http://www.scpe.org/",
}

@Article{Lai:2019:NIB,
  author =       "Qiqi Lai and Bo Yang and Zhe Xia and Yannan Li and
                 Yuan Chen and Zhenlong Li",
  title =        "Novel Identity-Based Hash Proof System with Compact
                 Master Public Key from Lattices in the Standard Model",
  journal =      j-INT-J-FOUND-COMP-SCI,
  volume =       "30",
  number =       "4",
  pages =        "589--606",
  month =        jun,
  year =         "2019",
  DOI =          "https://doi.org/10.1142/S0129054119400148",
  ISSN =         "0129-0541",
  ISSN-L =       "0129-0541",
  bibdate =      "Fri Sep 20 10:48:00 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijfcs.bib",
  URL =          "https://www.worldscientific.com/doi/10.1142/S0129054119400148",
  abstract =     "As the progress of quantum computers, it is desired to
                 propose many more efficient cryptographic constructions
                 with post-quantum security. In the literatures, almost
                 all cryptographic schemes and protocols can be
                 explained and constructed modularly from certain
                 cryptographic primitives, among which an Identity-Based
                 Hash Proof System (IB-HPS) is one of the most basic and
                 important primitives. Therefore, we can utilize IB-HPSs
                 with post-quantum security to present several types of
                 post-quantum secure schemes and protocols. Up until
                 now, all known IB-HPSs with post-quantum security are
                 instantiated based on latticed-based assumptions.
                 However, all these lattice-based IB-HPSs are either in
                 the random oracle model or not efficient enough in the
                 standard model. Hence, it should be of great
                 significance to construct more efficient IB-HPSs from
                 lattices in the standard model. In this paper, we
                 propose a new smooth IB-HPS with anonymity based on the
                 Learning with Errors (LWE) assumption in the standard
                 model. This new construction is mainly inspired by a
                 classical identity-based encryption scheme based on LWE
                 due to Agreawal et al. in Eurocrypt 2010. And our
                 innovation is to employ the algorithm SampleGaussian
                 introduced by Gentry et al. and the property of random
                 lattice to simulate the identity secret key with
                 respect to the challenge identity. Compared with other
                 existing IB-HPSs in the standard model, our master
                 public key is quite compact. As a result, our
                 construction has much lower overheads on computation
                 and storage.",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Foundations of Computer
                 Science (IJFCS)",
  journal-URL =  "http://www.worldscientific.com/loi/ijfcs",
  remark =       "Special Issue Cryptography and Provable Security",
}

@Article{Le:2019:ADF,
  author =       "D. Le and S. L. Yeo and K. Khoo",
  title =        "Algebraic Differential Fault Analysis on {SIMON} Block
                 Cipher",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "68",
  number =       "11",
  pages =        "1561--1572",
  month =        nov,
  year =         "2019",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2019.2926081",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Tue Oct 29 11:08:44 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
  keywords =     "algebraic differential fault attacks; algebraic
                 techniques; Ciphers; Circuit faults; fault attacks;
                 Gr{\"o}bner basis; Hardware; Lightweight block ciphers;
                 Mathematical model; Performance evaluation; Registers;
                 SAT solver",
}

@Article{Lee:2019:CSS,
  author =       "Kwangsu Lee and Dong Hoon Lee and Jong Hwan Park and
                 Moti Yung",
  title =        "{CCA} Security for Self-Updatable Encryption:
                 Protecting Cloud Data When Clients Read\slash Write
                 Ciphertexts",
  journal =      j-COMP-J,
  volume =       "62",
  number =       "4",
  pages =        "545--562",
  month =        apr,
  year =         "2019",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxy122",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Apr 2 12:10:39 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://academic.oup.com/comjnl/article/62/4/545/5239643",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Lee:2019:TES,
  author =       "Wai-Kong Lee and Bok-Min Goi and Raphael C.-W. Phan",
  title =        "Terabit encryption in a second: Performance evaluation
                 of block ciphers in {GPU} with {Kepler}, {Maxwell}, and
                 {Pascal} architectures",
  journal =      j-CCPE,
  volume =       "31",
  number =       "11",
  pages =        "e5048:1--e5048:??",
  day =          "10",
  month =        jun,
  year =         "2019",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.5048",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Sat Oct 12 11:00:02 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "29 October 2018",
}

@Article{Lee:2019:VCS,
  author =       "Kyuin Lee and Neil Klingensmith and Suman Banerjee and
                 Younghyun Kim",
  title =        "{VoltKey}: Continuous Secret Key Generation Based on
                 Power Line Noise for Zero-Involvement Pairing and
                 Authentication",
  journal =      j-IMWUT,
  volume =       "3",
  number =       "3",
  pages =        "1--26",
  month =        sep,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3351251",
  ISSN =         "2474-9567 (electronic)",
  bibdate =      "Thu Jan 23 12:37:13 MST 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/imwut.bib",
  URL =          "https://dl.acm.org/doi/abs/10.1145/3351251",
  abstract =     "The explosive proliferation of Internet-of-Things
                 (IoT) ecosystem fuels the needs for a mechanism for the
                 user to easily and securely interconnect multiple
                 heterogeneous devices with minimal involvement.
                 However, the current paradigm of context-unaware
                 \ldots{}",
  acknowledgement = ack-nhfb,
  articleno =    "93",
  fjournal =     "Proceedings of the ACM on Interactive, Mobile,
                 Wearable and Ubiquitous Technologies (IMWUT)",
  journal-URL =  "https://dl.acm.org/loi/imwut",
}

@Article{Li:2019:APA,
  author =       "JiLiang Li and WeiGuo Zhang and Vivek Dabra and
                 Kim-Kwang Raymond Choo and Saru Kumari and Dieter
                 Hogrefe",
  title =        "{AEP-PPA}: an anonymous, efficient and provably-secure
                 privacy-preserving authentication protocol for mobile
                 services in smart cities",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "134",
  number =       "??",
  pages =        "52--61",
  day =          "15",
  month =        may,
  year =         "2019",
  CODEN =        "JNCAF3",
  DOI =          "https://doi.org/10.1016/j.jnca.2019.02.003",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Mon Oct 14 14:16:32 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804519300475",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Li:2019:ESM,
  author =       "Xingxin Li and Youwen Zhu and Jian Wang and Ji Zhang",
  title =        "Efficient and secure multi-dimensional geometric range
                 query over encrypted data in cloud",
  journal =      j-J-PAR-DIST-COMP,
  volume =       "131",
  number =       "??",
  pages =        "44--54",
  month =        sep,
  year =         "2019",
  CODEN =        "JPDCER",
  DOI =          "https://doi.org/10.1016/j.jpdc.2019.04.015",
  ISSN =         "0743-7315 (print), 1096-0848 (electronic)",
  ISSN-L =       "0743-7315",
  bibdate =      "Mon Jun 10 07:36:16 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jpardistcomp.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0743731518306294",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Parallel and Distributed Computing",
  journal-URL =  "http://www.sciencedirect.com/science/journal/07437315",
}

@Article{Li:2019:IID,
  author =       "Rongjia Li and Chenhui Jin and Ruya Fan",
  title =        "Improved Integral Distinguishers on Compression
                 Function of {GOST R} Hash Function",
  journal =      j-COMP-J,
  volume =       "62",
  number =       "4",
  pages =        "535--544",
  month =        apr,
  year =         "2019",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxy123",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Apr 2 12:10:39 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/datacompression.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  URL =          "http://academic.oup.com/comjnl/article/62/4/535/5224765",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Li:2019:PSA,
  author =       "Xiong Li and Fan Wu and Saru Kumari and Lili Xu and
                 Arun Kumar Sangaiah and Kim-Kwang Raymond Choo",
  title =        "A provably secure and anonymous message authentication
                 scheme for smart grids",
  journal =      j-J-PAR-DIST-COMP,
  volume =       "132",
  number =       "??",
  pages =        "242--249",
  month =        oct,
  year =         "2019",
  CODEN =        "JPDCER",
  DOI =          "https://doi.org/10.1016/j.jpdc.2017.11.008",
  ISSN =         "0743-7315 (print), 1096-0848 (electronic)",
  ISSN-L =       "0743-7315",
  bibdate =      "Fri Sep 13 10:25:20 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jpardistcomp.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0743731517303064",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Parallel and Distributed Computing",
  journal-URL =  "http://www.sciencedirect.com/science/journal/07437315",
}

@Article{Li:2019:TFA,
  author =       "Wenting Li and Ping Wang",
  title =        "Two-factor authentication in industrial
                 {Internet-of-Things}: Attacks, evaluation and new
                 construction",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "101",
  number =       "??",
  pages =        "694--708",
  month =        dec,
  year =         "2019",
  CODEN =        "FGSEVI",
  DOI =          "https://doi.org/10.1016/j.future.2019.06.020",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Mon Feb 10 12:55:02 MST 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X19307642",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Li:2019:VCM,
  author =       "Jing Li and Licheng Wang and Lihua Wang and Xianmin
                 Wang and Zhengan Huang and Jin Li",
  title =        "Verifiable {Chebyshev} maps-based chaotic encryption
                 schemes with outsourcing computations in the
                 cloud\slash fog scenarios",
  journal =      j-CCPE,
  volume =       "31",
  number =       "22",
  pages =        "e4523:1--e4523:??",
  day =          "25",
  month =        nov,
  year =         "2019",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.4523",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Wed Mar 31 07:52:10 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "Concurr. Comput.",
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "25 June 2018",
}

@Article{Liao:2019:ESO,
  author =       "W. Liao and C. Luo and S. Salinas and P. Li",
  title =        "Efficient Secure Outsourcing of Large-Scale Convex
                 Separable Programming for Big Data",
  journal =      j-IEEE-TRANS-BIG-DATA,
  volume =       "5",
  number =       "3",
  pages =        "368--378",
  month =        sep,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/TBDATA.2017.2787198",
  ISSN =         "2332-7790",
  ISSN-L =       "2332-7790",
  bibdate =      "Tue Oct 29 11:08:44 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetransbigdata.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Big Data",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6687317",
  keywords =     "Amazon Elastic cloud computing platform; Big Data; big
                 data; big data applications; chosen-plaintext attack;
                 cloud computing; Cloud computing; Companies;
                 computational complexity; computing resources;
                 confidential data; Convex separable programming; convex
                 separable programming problems; cryptography; data
                 analysis; data privacy; data security and privacy;
                 efficient secure outsourcing scheme; Encryption;
                 large-scale convex separable programming; large-scale
                 data analytics; Outsourcing; outsourcing; Programming;
                 time savings; vector transformation schemes; vectors",
}

@Article{Libert:2019:ZKA,
  author =       "Beno{\^\i}t Libert and San Ling and Fabrice Mouhartem
                 and Khoa Nguyen and Huaxiong Wang",
  title =        "Zero-knowledge arguments for matrix-vector relations
                 and lattice-based group encryption",
  journal =      j-THEOR-COMP-SCI,
  volume =       "759",
  number =       "??",
  pages =        "72--97",
  day =          "8",
  month =        feb,
  year =         "2019",
  CODEN =        "TCSCDI",
  DOI =          "https://doi.org/10.1016/j.tcs.2019.01.003",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Fri Jan 18 05:48:39 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2015.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0304397519300167",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{Lin:2019:CCA,
  author =       "Xi-Jun Lin and Lin Sun and Haipeng Qu and He-Qun
                 Xian",
  title =        "Cryptanalysis of a Compact Anonymous {HIBE} with
                 Constant Size Private Keys",
  journal =      j-COMP-J,
  volume =       "62",
  number =       "8",
  pages =        "1087--1091",
  month =        aug,
  year =         "2019",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxy130",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Aug 19 07:31:49 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://academic.oup.com/comjnl/article/62/8/1087/5253748",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Ling:2019:SAR,
  author =       "San Ling and Khoa Nguyen and Huaxiong Wang and
                 Juanyang Zhang",
  title =        "Server-Aided Revocable Predicate Encryption:
                 Formalization and Lattice-Based Instantiation",
  journal =      j-COMP-J,
  volume =       "62",
  number =       "12",
  pages =        "1849--1862",
  month =        dec,
  year =         "2019",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxz079",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Dec 23 06:38:51 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://academic.oup.com/comjnl/article/62/12/1849/5628022",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Liu:2019:DVP,
  author =       "Y. Liu and M. F. Ezerman and H. Wang",
  title =        "Double verification protocol via secret sharing for
                 low-cost {RFID} tags",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "90",
  number =       "??",
  pages =        "118--128",
  month =        jan,
  year =         "2019",
  CODEN =        "FGSEVI",
  DOI =          "https://doi.org/10.1016/j.future.2018.07.004",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Tue Sep 18 14:07:59 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X17323518",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Liu:2019:EEA,
  author =       "Peng Liu and Shunbin Li and Qingyuan Ding",
  title =        "An Energy-Efficient Accelerator Based on Hybrid
                 {CPU--FPGA} Devices for Password Recovery",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "68",
  number =       "2",
  pages =        "170--181",
  month =        feb,
  year =         "2019",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2018.2868191",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Mon Feb 4 19:28:55 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  URL =          "https://ieeexplore.ieee.org/document/8453825/",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Liu:2019:ICA,
  author =       "Hanqiu Liu and Chenhui Jin",
  title =        "An Improvement of the {CS} Attack to {DSC} Cipher",
  journal =      j-COMP-J,
  volume =       "62",
  number =       "8",
  pages =        "1158--1165",
  month =        aug,
  year =         "2019",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxz037",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Aug 19 07:31:49 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://academic.oup.com/comjnl/article/62/8/1158/5476715",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Liu:2019:IEU,
  author =       "Hongjun Liu and Yingqian Zhang and Abdurahman Kadir
                 and Yanqiu Xu",
  title =        "Image encryption using complex hyper chaotic system by
                 injecting impulse into parameters",
  journal =      j-APPL-MATH-COMP,
  volume =       "360",
  number =       "??",
  pages =        "83--93",
  day =          "1",
  month =        nov,
  year =         "2019",
  CODEN =        "AMHCBQ",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Fri Sep 6 09:21:24 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/applmathcomput2015.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0096300319303807",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Liu:2019:IMM,
  author =       "Ya Liu and Yifan Shi and Dawu Gu and Zhiqiang Zeng and
                 Fengyu Zhao and Wei Li and Zhiqiang Liu and Yang Bao",
  title =        "Improved Meet-in-the-Middle Attacks on Reduced-Round
                 {Kiasu-BC} and {Joltik-BC}",
  journal =      j-COMP-J,
  volume =       "62",
  number =       "12",
  pages =        "1761--1776",
  month =        dec,
  year =         "2019",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxz059",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Dec 23 06:38:51 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://academic.oup.com/comjnl/article/62/12/1761/5525447",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Liu:2019:OMM,
  author =       "W. Liu and J. Ni and Z. Liu and C. Liu and M. O.
                 Neill",
  title =        "Optimized Modular Multiplication for Supersingular
                 Isogeny {Diffie--Hellman}",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "68",
  number =       "8",
  pages =        "1249--1255",
  month =        aug,
  year =         "2019",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2019.2899847",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Thu Jul 11 09:46:20 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
  keywords =     "Computers; Elliptic curve cryptography; Hardware;
                 modular multiplication; Post-quantum cryptography;
                 Quantum computing; Software; Software algorithms;
                 supersingular isogeny Diffie--Hellman (SIDH)",
}

@Article{Liu:2019:RAS,
  author =       "Xin Liu and Ruisheng Zhang and Mingqi Zhao",
  title =        "A robust authentication scheme with dynamic password
                 for wireless body area networks",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "161",
  number =       "??",
  pages =        "220--234",
  day =          "9",
  month =        oct,
  year =         "2019",
  CODEN =        "????",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Mon Oct 14 17:19:57 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1389128618309885",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286/",
}

@Article{Liu:2019:SBC,
  author =       "Jian Liu and Wenting Li and Ghassan O. Karame and N.
                 Asokan",
  title =        "Scalable {Byzantine} Consensus via Hardware-Assisted
                 Secret Sharing",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "68",
  number =       "1",
  pages =        "139--151",
  month =        "????",
  year =         "2019",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2018.2860009",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Wed Dec 26 06:35:11 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  URL =          "https://ieeexplore.ieee.org/document/8419336/",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Liu:2019:TTR,
  author =       "Zhenhua Liu and Shuhong Duan and Peilin Zhou and
                 Baocang Wang",
  title =        "Traceable-then-revocable ciphertext-policy
                 attribute-based encryption scheme",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "93",
  number =       "??",
  pages =        "903--913",
  month =        apr,
  year =         "2019",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Tue Feb 5 08:15:52 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167739X17320964",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Liu:2019:XBL,
  author =       "Weiqiang Liu and Lei Zhang and Zhengran Zhang and
                 Chongyan Gu and Chenghua Wang and Maire O'neill and
                 Fabrizio Lombardi",
  title =        "{XOR}-Based Low-Cost Reconfigurable {PUFs} for {IoT}
                 Security",
  journal =      j-TECS,
  volume =       "18",
  number =       "3",
  pages =        "25:1--25:??",
  month =        jun,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3274666",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Thu Oct 17 18:16:43 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tecs.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3274666",
  abstract =     "With the rapid development of the Internet of Things
                 (IoT), security has attracted considerable interest.
                 Conventional security solutions that have been proposed
                 for the Internet based on classical cryptography cannot
                 be applied to IoT nodes as they are typically
                 resource-constrained. A physical unclonable function
                 (PUF) is a hardware-based security primitive and can be
                 used to generate a key online or uniquely identify an
                 integrated circuit (IC) by extracting its internal
                 random differences using so-called challenge-response
                 pairs (CRPs). It is regarded as a promising low-cost
                 solution for IoT security. A logic reconfigurable PUF
                 (RPUF) is highly efficient in terms of hardware cost.
                 This article first presents a new classification for
                 RPUFs, namely circuit-based RPUF (C-RPUF) and
                 algorithm-based RPUF (A-RPUF); two Exclusive OR
                 (XOR)-based RPUF circuits (an XOR-based reconfigurable
                 bistable ring PUF (XRBR PUF) and an XOR-based
                 reconfigurable ring oscillator PUF (XRRO PUF)) are
                 proposed. Both the XRBR and XRRO PUFs are implemented
                 on Xilinx Spartan-6 field-programmable gate arrays
                 (FPGAs). The implementation results are compared with
                 previous PUF designs and show good uniqueness and
                 reliability. Compared to conventional PUF designs, the
                 most significant advantage of the proposed designs is
                 that they are highly efficient in terms of hardware
                 cost. Moreover, the XRRO PUF is the most efficient
                 design when compared with previous RPUFs. Also, both
                 the proposed XRRO and XRBR PUFs require only 12.5\% of
                 the hardware resources of previous bitstable ring PUFs
                 and reconfigurable RO PUFs, respectively, to generate a
                 1-bit response. This confirms that the proposed XRBR
                 and XRRO PUFs are very efficient designs with good
                 uniqueness and reliability.",
  acknowledgement = ack-nhfb,
  articleno =    "25",
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J840",
}

@Article{LoIacono:2019:NGR,
  author =       "Luigi {Lo Iacono} and Hoai Viet Nguyen and Peter Leo
                 Gorski",
  title =        "On the Need for a General {REST}-Security Framework",
  journal =      j-FUTURE-INTERNET,
  volume =       "11",
  number =       "3",
  pages =        "56",
  day =          "27",
  month =        feb,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi11030056",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:51:05 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/11/3/56",
  abstract =     "Contemporary software is inherently distributed. The
                 principles guiding the design of such software have
                 been mainly manifested by the service-oriented
                 architecture (SOA) concept. In a SOA, applications are
                 orchestrated by software services generally operated by
                 distinct entities. Due to the latter fact, service
                 security has been of importance in such systems ever
                 since. A dominant protocol for implementing SOA-based
                 systems is SOAP, which comes with a well-elaborated
                 security framework. As an alternative to SOAP, the
                 architectural style representational state transfer
                 (REST) is gaining traction as a simple, lightweight and
                 flexible guideline for designing distributed service
                 systems that scale at large. This paper starts by
                 introducing the basic constraints representing REST.
                 Based on these foundations, the focus is afterwards
                 drawn on the security needs of REST-based service
                 systems. The limitations of transport-oriented
                 protection means are emphasized and the demand for
                 specific message-oriented safeguards is assessed. The
                 paper then reviews the current activities in respect to
                 REST-security and finds that the available schemes are
                 mostly HTTP-centered and very heterogeneous. More
                 importantly, all of the analyzed schemes contain
                 vulnerabilities. The paper contributes a methodology on
                 how to establish REST-security as a general security
                 framework for protecting REST-based service systems of
                 any kind by consistent and comprehensive protection
                 means. First adoptions of the introduced approach are
                 presented in relation to REST message authentication
                 with instantiations for REST-ful HTTP (web/cloud
                 services) and REST-ful constraint application protocol
                 (CoAP) (internet of things (IoT) services).",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue 10th Anniversary Feature Papers.",
}

@Article{Luo:2019:SCT,
  author =       "Chao Luo and Yunsi Fei and David Kaeli",
  title =        "Side-channel Timing Attack of {RSA} on a {GPU}",
  journal =      j-TACO,
  volume =       "16",
  number =       "3",
  pages =        "32:1--32:??",
  month =        aug,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3341729",
  ISSN =         "1544-3566 (print), 1544-3973 (electronic)",
  ISSN-L =       "1544-3566",
  bibdate =      "Sat Oct 12 15:27:40 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/taco.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3341729",
  abstract =     "To increase computation throughput, general purpose
                 Graphics Processing Units (GPUs) have been leveraged to
                 accelerate computationally intensive workloads. GPUs
                 have been used as cryptographic engines, improving
                 encryption/decryption throughput and leveraging the
                 GPU's Single Instruction Multiple Thread (SIMT) model.
                 RSA is a widely used public-key cipher and has been
                 ported onto GPUs for signing and decrypting large
                 files. Although performance has been significantly
                 improved, the security of RSA on GPUs is vulnerable to
                 side-channel timing attacks and is an exposure
                 overlooked in previous studies. GPUs tend to be
                 naturally resilient to side-channel attacks, given that
                 they execute a large number of concurrent threads,
                 performing many RSA operations on different data in
                 parallel. Given the degree of parallel execution on a
                 GPU, there will be a significant amount of noise
                 introduced into the timing channel given the thousands
                 of concurrent threads executing concurrently. In this
                 work, we build a timing model to capture the parallel
                 characteristics of an RSA public-key cipher implemented
                 on a GPU. We consider optimizations that include using
                 Montgomery multiplication and sliding-window
                 exponentiation to implement cryptographic operations.
                 Our timing model considers the challenges of parallel
                 execution, complications that do not occur in
                 single-threaded computing platforms. Based on our
                 timing model, we launch successful timing attacks on
                 RSA running on a GPU, extracting the private key of
                 RSA. We also present an effective error detection and
                 correction mechanism. Our results demonstrate that GPU
                 acceleration of RSA is vulnerable to side-channel
                 timing attacks. We propose several countermeasures to
                 defend against this class of attacks.",
  acknowledgement = ack-nhfb,
  articleno =    "32",
  fjournal =     "ACM Transactions on Architecture and Code Optimization
                 (TACO)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J924",
}

@Article{Lyu:2019:SPP,
  author =       "Lin Lyu and Shengli Liu and Dawu Gu",
  title =        "Structure-preserving public-key encryption with
                 leakage-resilient {CCA} security",
  journal =      j-THEOR-COMP-SCI,
  volume =       "795",
  number =       "??",
  pages =        "57--80",
  day =          "26",
  month =        nov,
  year =         "2019",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Wed Oct 16 07:39:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2015.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S030439751930386X",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{Ma:2019:PFC,
  author =       "Ruijun Ma and Haifeng Hu and Weixuan Wang and Jia Xu
                 and Zhengming Li",
  title =        "Photorealistic Face Completion with Semantic Parsing
                 and Face Identity-Preserving Features",
  journal =      j-TOMM,
  volume =       "15",
  number =       "1",
  pages =        "28:1--28:??",
  month =        feb,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3300940",
  ISSN =         "1551-6857 (print), 1551-6865 (electronic)",
  ISSN-L =       "1551-6857",
  bibdate =      "Wed Oct 2 10:12:46 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tomccap.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3300940",
  abstract =     "Tremendous progress on deep learning has shown
                 exciting potential for a variety of face completion
                 tasks. However, most learning-based methods are limited
                 to handle general or structure specified face images
                 (e.g., well-aligned faces). In this article, we propose
                 a novel face completion algorithm, called Learning and
                 Preserving Face Completion Network (LP-FCN), which
                 simultaneously parses face images and extracts face
                 identity-preserving (FIP) features. By tackling these
                 two tasks in a mutually boosting way, the LP-FCN can
                 guide an identity preserving inference and ensure pixel
                 faithfulness of completed faces. In addition, we adopt
                 a global discriminator and a local discriminator to
                 distinguish real images from synthesized ones. By
                 training with a combined identity preserving, semantic
                 parsing and adversarial loss, the LP-FCN encourages the
                 completion results to be semantically valid and
                 visually consistent for more complicated image
                 completion tasks. Experiments show that our approach
                 obtains similar visual quality, but achieves better
                 performance on unaligned faces completion and fine
                 detailed synthesis against the state-of-the-art
                 methods.",
  acknowledgement = ack-nhfb,
  articleno =    "28",
  fjournal =     "ACM Transactions on Multimedia Computing,
                 Communications, and Applications",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J961",
}

@Article{Ma:2019:TOP,
  author =       "Ziqiang Ma and Quanwei Cai and Jingqiang Lin and Bo
                 Luo and Jiwu Jing",
  title =        "Towards the optimal performance of integrating {Warm
                 and Delay} against remote cache timing side channels on
                 block ciphers",
  journal =      j-J-COMP-SECUR,
  volume =       "27",
  number =       "5",
  pages =        "547--580",
  month =        "????",
  year =         "2019",
  CODEN =        "JCSIET",
  DOI =          "https://doi.org/10.3233/JCS-191296",
  ISSN =         "0926-227X (print), 1875-8924 (electronic)",
  ISSN-L =       "0926-227X",
  bibdate =      "Mon Sep 23 05:47:24 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcompsecur.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "http://content.iospress.com/journals/journal-of-computer-security",
}

@Article{Mainardi:2019:PRA,
  author =       "Nicholas Mainardi and Alessandro Barenghi and Gerardo
                 Pelosi",
  title =        "Plaintext recovery attacks against linearly
                 decryptable fully homomorphic encryption schemes",
  journal =      j-COMPUT-SECUR,
  volume =       "87",
  number =       "??",
  pages =        "Article 101587",
  month =        nov,
  year =         "2019",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2019.101587",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Jan 22 15:25:37 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404819301403",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Marino:2019:ACN,
  author =       "Francesco Marino and Corrado Moiso and Matteo
                 Petracca",
  title =        "Automatic contract negotiation, service discovery and
                 mutual authentication solutions: a survey on the
                 enabling technologies of the forthcoming {IoT}
                 ecosystems",
  journal =      j-COMP-NET-AMSTERDAM,
  volume =       "148",
  number =       "??",
  pages =        "176--195",
  day =          "15",
  month =        jan,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1016/j.comnet.2018.11.011",
  ISSN =         "1389-1286 (print), 1872-7069 (electronic)",
  ISSN-L =       "1389-1286",
  bibdate =      "Tue Jan 22 16:29:25 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compnetamsterdam2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1389128618312167",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Networks (Amsterdam, Netherlands: 1999)",
  journal-URL =  "http://www.sciencedirect.com/science/journal/13891286/",
}

@InProceedings{Martins:2019:HHR,
  author =       "Paulo Martins and Jeremy Marrez and Jean-Claude Bajard
                 and Leonel Sousa",
  title =        "{HyPoRes}: An Hybrid Representation System for {ECC}",
  crossref =     "Takagi:2019:ISC",
  pages =        "207--214",
  month =        jun,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/ARITH.2019.00049",
  bibdate =      "Fri Jan 31 08:18:07 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/fparith.bib",
  abstract =     "The Residue Number System (RNS) is a numeral
                 representation enabling for more efficient addition and
                 multiplication implementations. However, due its
                 non-positional nature, modular reductions, required for
                 example by Elliptic Curve (EC) Cryptography (ECC),
                 become costlier. Traditional approaches to RNS modular
                 reduction resort to the Montgomery algorithm,
                 underpinned by large basis extensions. Recently,
                 Hybrid-Positional Residue Number Systems (HPRs) have
                 been proposed, providing a trade-off between the
                 efficiency of RNS and the flexibility of positional
                 number representations. Numbers are represented in a
                 positional representation with the coefficients
                 represented in RNS. By crafting primes of a special
                 form, the complexity of reductions modulo those primes
                 is mitigated, relying on extensions of smaller bases.
                 Due to the need of crafting special primes, this
                 approach is not directly extensible to group operations
                 over currently standardised elliptic curves. In this
                 paper, the Hybrid-Polynomial Residue Number System
                 (HyPoRes) is proposed, enabling for improved modular
                 reductions for any prime. Experimental results show
                 that the modular reduction of HyPoRes, although at most
                 1.4 times slower than HPR for HPR-crafted primes, is up
                 to 1.4 times faster than a generic RNS approach for
                 primes of ECC standards.",
  acknowledgement = ack-nhfb,
  keywords =     "ARITH-26; Art; Complexity theory; Dynamic range; ECC
                 standards; Elliptic Curve Cryp-tography; Elliptic curve
                 cryptography; elliptic curve cryptography; Elliptic
                 curves; generic RNS approach; HPR-crafted primes;
                 hybrid representation system; hybrid-polynomial residue
                 number system; hybrid-positional residue number
                 systems; HyPoRes; improved modular reductions;
                 Lattices; Modular Arithmetic; Montgomery algorithm;
                 multiplication implementations; polynomials; positional
                 number representations; public key cryptography;
                 Residue Number System; residue number systems; RNS
                 modular reduction",
}

@Article{Matthiessen:2019:RCM,
  author =       "Dana Matthiessen",
  title =        "The rise of cryptographic metaphors in {Boyle} and
                 their use for the mechanical philosophy",
  journal =      j-STUD-HIST-PHILOS-SCI,
  volume =       "73",
  number =       "??",
  pages =        "8--21",
  month =        feb,
  year =         "2019",
  CODEN =        "SHPSB5",
  DOI =          "https://doi.org/10.1016/j.shpsa.2018.07.002",
  ISSN =         "0039-3681 (print), 1879-2510 (electronic)",
  ISSN-L =       "0039-3681",
  bibdate =      "Mon Mar 25 06:29:02 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/shps-a.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0039368117302522",
  acknowledgement = ack-nhfb,
  fjournal =     "Studies in History and Philosophy of Science Part A",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00393681",
}

@InProceedings{Matula:2019:PCG,
  author =       "David W. Matula and Zizhen Chen",
  title =        "Precise and Concise Graphical Representation of the
                 Natural Numbers",
  crossref =     "Takagi:2019:ISC",
  pages =        "100--103",
  month =        jun,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/ARITH.2019.00027",
  bibdate =      "Fri Jan 31 08:18:07 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/fparith.bib",
  abstract =     "A graphical number representation system based on the
                 formal logic foundation of a recursively defined
                 function is presented. The function exposes a
                 one-to-one correspondence between the natural numbers
                 and the set of rooted trees. Secondly, a relation
                 between pairs of natural numbers is shown to partition
                 the integers into disjoint finite sets each visualized
                 as a tree in the forest of all finite trees. This
                 relation encapsulates in visual form the natural
                 structure and distribution of primes in a manner not
                 previously investigated. These representations allow
                 arithmeticians to visually experience natural numbers
                 in a 2D graphical layout. This form is free of cultural
                 choices such as the number of symbols in an alphabet
                 and/or one-dimensional symbol strings. The fundamental
                 nature of these mappings is argued to be accessible to
                 a creative mind independent of formal schooling. This
                 short note includes examples illustrating the
                 simplicity of the constructions.",
  acknowledgement = ack-nhfb,
  keywords =     "2D graphical layout; ARITH-26; Computer science;
                 disjoint finite sets; finite trees; Forestry; formal
                 logic foundation; graphical number representation
                 system; graphical representation; Labeling; natural
                 numbers; natural structure; number fonts;
                 one-dimensional symbol strings; one-to-one
                 correspondence; prime factorization; prime number
                 function; recursive function; recursive functions;
                 recursively defined function; rooted trees; trees
                 (mathematics); Two dimensional displays; Vegetation;
                 Visualization",
}

@Article{Mefenza:2019:CSA,
  author =       "Thierry Mefenza and Damien Vergnaud",
  title =        "Cryptanalysis of Server-Aided {RSA} Protocols with
                 Private-Key Splitting",
  journal =      j-COMP-J,
  volume =       "62",
  number =       "8",
  pages =        "1194--1213",
  month =        aug,
  year =         "2019",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxz040",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Aug 19 07:31:49 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://academic.oup.com/comjnl/article/62/8/1194/5488732",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Meng:2019:ESF,
  author =       "Weizhi Meng and Liqiu Zhu and Wenjuan Li and Jinguang
                 Han and Yan Li",
  title =        "Enhancing the security of {FinTech} applications with
                 map-based graphical password authentication",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "101",
  number =       "??",
  pages =        "1018--1027",
  month =        dec,
  year =         "2019",
  CODEN =        "FGSEVI",
  DOI =          "https://doi.org/10.1016/j.future.2019.07.038",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Mon Feb 10 12:55:02 MST 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X19302882",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Meng:2019:SDD,
  author =       "Wenjuan Meng and Jianhua Ge and Tao Jiang",
  title =        "Secure Data Deduplication with Reliable Data Deletion
                 in Cloud",
  journal =      j-INT-J-FOUND-COMP-SCI,
  volume =       "30",
  number =       "4",
  pages =        "551--570",
  month =        jun,
  year =         "2019",
  DOI =          "https://doi.org/10.1142/S0129054119400124",
  ISSN =         "0129-0541",
  ISSN-L =       "0129-0541",
  bibdate =      "Fri Sep 20 10:48:00 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijfcs.bib",
  URL =          "https://www.worldscientific.com/doi/10.1142/S0129054119400124",
  abstract =     "A cloud storage system which incorporates the deletion
                 and deduplication functionalities will have both
                 security and efficiency advantages over exiting
                 solutions which provide only one of them. However, the
                 security models of secure data deletion and data
                 deduplication functionalities are not compatible with
                 each other, which will cause security and efficiency
                 vulnerability under coercive adversaries. To solve
                 these security and efficiency challenges, we define and
                 construct a scheme, whose security relies on the proper
                 erasure of keys in the wrapped key tree and periodical
                 update of the deduplication encryption keys. Moreover,
                 we enhance the efficiency of the proposed scheme by
                 introducing incremental data update, where only the
                 changed part is encrypted/decrypted and
                 uploaded/downloaded in data updating. Further security
                 analysis shows that the proposed scheme is secure
                 against coercive attack. Finally, the practical
                 implementation shows that our scheme is performance
                 efficient in computation, storage and communication for
                 both the cloud storage server and users.",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Foundations of Computer
                 Science (IJFCS)",
  journal-URL =  "http://www.worldscientific.com/loi/ijfcs",
  remark =       "Special Issue Cryptography and Provable Security",
}

@Article{Mhenni:2019:DSA,
  author =       "Abir Mhenni and Estelle Cherrier and Christophe
                 Rosenberger and Najoua Essoukri {Ben Amara}",
  title =        "Double serial adaptation mechanism for keystroke
                 dynamics authentication based on a single password",
  journal =      j-COMPUT-SECUR,
  volume =       "83",
  number =       "??",
  pages =        "151--166",
  month =        jun,
  year =         "2019",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:47:00 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404818306059",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Miao:2019:PPT,
  author =       "Chenglin Miao and Wenjun Jiang and Lu Su and Yaliang
                 Li and Suxin Guo and Zhan Qin and Houping Xiao and Jing
                 Gao and Kui Ren",
  title =        "Privacy-Preserving Truth Discovery in Crowd Sensing
                 Systems",
  journal =      j-TOSN,
  volume =       "15",
  number =       "1",
  pages =        "9:1--9:??",
  month =        feb,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3277505",
  ISSN =         "1550-4859 (print), 1550-4867 (electronic)",
  ISSN-L =       "1550-4859",
  bibdate =      "Wed Oct 2 09:20:25 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tosn.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3277505",
  abstract =     "The recent proliferation of human-carried mobile
                 devices has given rise to the crowd sensing systems.
                 However, the sensory data provided by individual
                 participants are usually not reliable. To better
                 utilize such sensory data, the topic of truth
                 discovery, whose goal is to estimate user quality and
                 infer reliable aggregated results through quality-aware
                 data aggregation, has drawn significant attention.
                 Though able to improve aggregation accuracy, existing
                 truth discovery approaches fail to address the privacy
                 concerns of individual users. In this article, we
                 propose a novel privacy-preserving truth discovery
                 (PPTD) framework, which can protect not only users'
                 sensory data but also their reliability scores derived
                 by the truth discovery approaches. The key idea of the
                 proposed framework is to perform weighted aggregation
                 on users' encrypted data using a homomorphic
                 cryptosystem, which can guarantee both high accuracy
                 and strong privacy protection. In order to deal with
                 large-scale data, we also propose to parallelize PPTD
                 with MapReduce framework. Additionally, we design an
                 incremental PPTD scheme for the scenarios where the
                 sensory data are collected in a streaming manner.
                 Extensive experiments based on two real-world crowd
                 sensing systems demonstrate that the proposed framework
                 can generate accurate aggregated results while
                 protecting users' private information.",
  acknowledgement = ack-nhfb,
  articleno =    "9",
  fjournal =     "ACM Transactions on Sensor Networks (TOSN)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J981",
}

@Article{Misoczki:2019:TPS,
  author =       "R. Misoczki and S. Gulley and V. Gopal and M. G. Dixon
                 and H. Vrsalovic and W. K. Feghali",
  title =        "Toward Postquantum Security for Embedded Cores",
  journal =      j-IEEE-MICRO,
  volume =       "39",
  number =       "4",
  pages =        "17--26",
  month =        jul # "\slash " # aug,
  year =         "2019",
  CODEN =        "IEMIDZ",
  DOI =          "https://doi.org/10.1109/MM.2019.2920203",
  ISSN =         "0272-1732 (print), 1937-4143 (electronic)",
  ISSN-L =       "0272-1732",
  bibdate =      "Thu Jul 25 15:29:43 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeemicro.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Micro",
  journal-URL =  "http://www.computer.org/csdl/mags/mi/index.html",
  keywords =     "Digital signatures; Microcontrollers; NIST; Public
                 key; Task analysis",
}

@Article{Moghimi:2019:MFD,
  author =       "Ahmad Moghimi and Jan Wichelmann and Thomas Eisenbarth
                 and Berk Sunar",
  title =        "{MemJam}: a False Dependency Attack Against
                 Constant-Time Crypto Implementations",
  journal =      j-INT-J-PARALLEL-PROG,
  volume =       "47",
  number =       "4",
  pages =        "538--570",
  month =        aug,
  year =         "2019",
  CODEN =        "IJPPE5",
  DOI =          "https://doi.org/10.1007/s10766-018-0611-9",
  ISSN =         "0885-7458 (print), 1573-7640 (electronic)",
  ISSN-L =       "0885-7458",
  bibdate =      "Fri Oct 11 08:37:52 MDT 2019",
  bibsource =    "http://link.springer.com/journal/10766/47/4;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjparallelprogram.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Parallel Programming",
  journal-URL =  "http://link.springer.com/journal/10766",
}

@Article{Morawiecki:2019:MS,
  author =       "Pawe{\l} Morawiecki",
  title =        "Malicious {SHA-3}",
  journal =      j-FUND-INFO,
  volume =       "169",
  number =       "4",
  pages =        "331--343",
  month =        "????",
  year =         "2019",
  CODEN =        "FUMAAJ",
  DOI =          "https://doi.org/10.3233/FI-2019-1850",
  ISSN =         "0169-2968 (print), 1875-8681 (electronic)",
  ISSN-L =       "0169-2968",
  bibdate =      "Wed Mar 24 12:51:47 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/fundinfo2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Fundamenta Informaticae",
  journal-URL =  "http://content.iospress.com/journals/fundamenta-informaticae",
}

@InProceedings{Moriai:2019:PPD,
  author =       "Shiho Moriai",
  title =        "Privacy-Preserving Deep Learning via Additively
                 Homomorphic Encryption",
  crossref =     "Takagi:2019:ISC",
  pages =        "198--198",
  month =        jun,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/ARITH.2019.00047",
  bibdate =      "Fri Jan 31 08:18:07 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/fparith.bib",
  abstract =     "We aim at creating a society where we can resolve
                 various social challenges by incorporating the
                 innovations of the fourth industrial revolution (e.g.
                 IoT, big data, AI, robot, and the sharing economy) into
                 every industry and social life. By doing so the society
                 of the future will be one in which new values and
                 services are created continuously, making people's
                 lives more conformable and sustainable. This is Society
                 5.0, a super-smart society. Security and privacy are
                 key issues to be addressed to realize Society 5.0.
                 Privacy-preserving data analytics will play an
                 important role. In this talk we show our recent works
                 on privacy-preserving data analytics such as
                 privacy-preserving logistic regression and
                 privacy-preserving deep learning. Finally, we show our
                 ongoing research project under JST CREST AI . In this
                 project we are developing privacy-preserving financial
                 data analytics systems that can detect fraud with high
                 security and accuracy. To validate the systems, we will
                 perform demonstration tests with several financial
                 institutions and solve the problems necessary for their
                 implementation in the real world.",
  acknowledgement = ack-nhfb,
  keywords =     "additively homomorphic encryption; ARITH-26; Big Data;
                 data analysis; Data analysis; data privacy; Deep
                 learning; Digital arithmetic; Encryption; financial
                 data processing; financial institutions; fourth
                 industrial revolution; fraud; Information and
                 communication technology; IoT; JST CREST AI; neural
                 nets; privacy issues; privacy-preserving deep learning;
                 privacy-preserving financial data analytics systems;
                 privacy-preserving logistic regression; regression
                 analysis; social challenges; social life; social
                 sciences computing; Society 5.0; super-smart society",
}

@Article{Mukherjee:2019:EBV,
  author =       "Sankar Mukherjee and Daya Sagar Gupta and G. P.
                 Biswas",
  title =        "An efficient and batch verifiable conditional
                 privacy-preserving authentication scheme for {VANETs}
                 using lattice",
  journal =      j-COMPUTING,
  volume =       "101",
  number =       "12",
  pages =        "1763--1788",
  month =        dec,
  year =         "2019",
  CODEN =        "CMPTA2",
  DOI =          "https://doi.org/10.1007/s00607-018-0689-3",
  ISSN =         "0010-485X (print), 1436-5057 (electronic)",
  ISSN-L =       "0010-485X",
  bibdate =      "Tue May 12 18:02:14 MDT 2020",
  bibsource =    "http://link.springer.com/journal/607/101/12;
                 https://www.math.utah.edu/pub/tex/bib/computing.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computing",
  journal-URL =  "http://link.springer.com/journal/607",
}

@Article{Nagaraj:2019:RCC,
  author =       "S. V. Nagaraj",
  title =        "Review of {{\booktitle{Codes, Cryptology and Curves
                 with Computer Algebra}}}",
  journal =      j-SIGACT,
  volume =       "50",
  number =       "1",
  pages =        "14--16",
  month =        mar,
  year =         "2019",
  CODEN =        "SIGNDM",
  DOI =          "https://doi.org/10.1145/3319627.3319631",
  ISSN =         "0163-5700 (print), 1943-5827 (electronic)",
  ISSN-L =       "0163-5700",
  bibdate =      "Tue Oct 22 09:39:55 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/sigact.bib",
  abstract =     "Codes, cryptology and curves are widely used today for
                 secure as well as reliable communication. This book
                 aims to introduce these topics to students of computer
                 science, mathematics and physics at the masters level.
                 It also looks at the application of computer algebra
                 for solving related problems. It consists of twelve
                 chapters contributed by four authors and published by
                 Cambridge University Press. The book is also available
                 in hardback and e-book formats, the price / ISBN being
                 US\$160 / 978-0-521-81711-0, and US \$52 /
                 978-1-108-54782-6, respectively.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGACT News",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J697",
}

@Article{Najafi:2019:VRS,
  author =       "Aniseh Najafi and Hamid Haj Seyyed Javadi and Majid
                 Bayat",
  title =        "Verifiable ranked search over encrypted data with
                 forward and backward privacy",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "101",
  number =       "??",
  pages =        "410--419",
  month =        dec,
  year =         "2019",
  CODEN =        "FGSEVI",
  DOI =          "https://doi.org/10.1016/j.future.2019.06.018",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Mon Feb 10 12:55:02 MST 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X18323318",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Namasudra:2019:IAB,
  author =       "Suyel Namasudra",
  title =        "An improved attribute-based encryption technique
                 towards the data security in cloud computing",
  journal =      j-CCPE,
  volume =       "31",
  number =       "3",
  pages =        "e4364:1--e4364:??",
  day =          "10",
  month =        feb,
  year =         "2019",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.4364",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Thu Mar 28 08:07:55 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "08 December 2017",
}

@Article{Nejatollahi:2019:PQL,
  author =       "Hamid Nejatollahi and Nikil Dutt and Sandip Ray and
                 Francesco Regazzoni and Indranil Banerjee and Rosario
                 Cammarota",
  title =        "Post-Quantum Lattice-Based Cryptography
                 Implementations: a Survey",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "6",
  pages =        "129:1--129:??",
  month =        feb,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3292548",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:36 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3292548",
  abstract =     "The advent of quantum computing threatens to break
                 many classical cryptographic schemes, leading to
                 innovations in public key cryptography that focus on
                 post-quantum cryptography primitives and protocols
                 resistant to quantum computing threats. Lattice-based
                 cryptography is a promising post-quantum cryptography
                 family, both in terms of foundational properties as
                 well as in its application to both traditional and
                 emerging security problems such as encryption, digital
                 signature, key exchange, and homomorphic encryption.
                 While such techniques provide guarantees, in theory,
                 their realization on contemporary computing platforms
                 requires careful design choices and tradeoffs to manage
                 both the diversity of computing platforms (e.g.,
                 high-performance to resource constrained), as well as
                 the agility for deployment in the face of emerging and
                 changing standards. In this work, we survey trends in
                 lattice-based cryptographic schemes, some recent
                 fundamental proposals for the use of lattices in
                 computer security, challenges for their implementation
                 in software and hardware, and emerging needs for their
                 adoption. The survey means to be informative about the
                 math to allow the reader to focus on the mechanics of
                 the computation ultimately needed for mapping schemes
                 on existing hardware or synthesizing part or all of a
                 scheme on special-purpose hardware.",
  acknowledgement = ack-nhfb,
  articleno =    "129",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Norta:2019:SFB,
  author =       "Alex Norta and Raimundas Matulevicius and Benjamin
                 Leiding",
  title =        "Safeguarding a formalized Blockchain-enabled
                 identity-authentication protocol by applying security
                 risk-oriented patterns",
  journal =      j-COMPUT-SECUR,
  volume =       "86",
  number =       "??",
  pages =        "253--269",
  month =        sep,
  year =         "2019",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:47:02 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404818302670",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Odelu:2019:EPP,
  author =       "Vanga Odelu and Sourav Saha and Rajendra Prasath and
                 Lakshminarayana Sadineni and Mauro Conti and Minho Jo",
  title =        "Efficient privacy preserving device authentication in
                 {WBANs} for industrial e-health applications",
  journal =      j-COMPUT-SECUR,
  volume =       "83",
  number =       "??",
  pages =        "300--312",
  month =        jun,
  year =         "2019",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2019.03.002",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:47:00 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404818308204",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ohtake:2019:OSA,
  author =       "Go Ohtake and Reihaneh Safavi-Naini and Liang Feng
                 Zhang",
  title =        "Outsourcing scheme of {ABE} encryption secure against
                 malicious adversary",
  journal =      j-COMPUT-SECUR,
  volume =       "86",
  number =       "??",
  pages =        "437--452",
  month =        sep,
  year =         "2019",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:47:02 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404819300525",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Or-Meir:2019:DMA,
  author =       "Ori Or-Meir and Nir Nissim and Yuval Elovici and Lior
                 Rokach",
  title =        "Dynamic Malware Analysis in the Modern Era --- a State
                 of the Art Survey",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "5",
  pages =        "88:1--88:??",
  month =        oct,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3329786",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 29 09:52:57 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3329786",
  abstract =     "Although malicious software (malware) has been around
                 since the early days of computers, the sophistication
                 and innovation of malware has increased over the years.
                 In particular, the latest crop of ransomware has drawn
                 attention to the dangers of malicious software, which
                 can cause harm to private users as well as
                 corporations, public services (hospitals and
                 transportation systems), governments, and security
                 institutions. To protect these institutions and the
                 public from malware attacks, malicious activity must be
                 detected as early as possible, preferably before it
                 conducts its harmful acts. However, it is not always
                 easy to know what to look for-especially when dealing
                 with new and unknown malware that has never been seen.
                 Analyzing a suspicious file by static or dynamic
                 analysis methods can provide relevant and valuable
                 information regarding a file's impact on the hosting
                 system and help determine whether the file is malicious
                 or not, based on the method's predefined rules. While
                 various techniques (e.g., code obfuscation, dynamic
                 code loading, encryption, and packing) can be used by
                 malware writers to evade static analysis (including
                 signature-based anti-virus tools), dynamic analysis is
                 robust to these techniques and can provide greater
                 understanding regarding the analyzed file and
                 consequently can lead to better detection capabilities.
                 Although dynamic analysis is more robust than static
                 analysis, existing dynamic analysis tools and
                 techniques are imperfect, and there is no single tool
                 that can cover all aspects of malware behavior. The
                 most recent comprehensive survey performed in this area
                 was published in 2012. Since that time, the computing
                 environment has changed dramatically with new types of
                 malware (ransomware, cryptominers), new analysis
                 methods (volatile memory forensics, side-channel
                 analysis), new computing environments (cloud computing,
                 IoT devices), new machine-learning algorithms, and
                 more. The goal of this survey is to provide a
                 comprehensive and up-to-date overview of existing
                 methods used to dynamically analyze malware, which
                 includes a description of each method, its strengths
                 and weaknesses, and its resilience against malware
                 evasion techniques. In addition, we include an overview
                 of prominent studies presenting the usage of
                 machine-learning methods to enhance dynamic malware
                 analysis capabilities aimed at detection,
                 classification, and categorization.",
  acknowledgement = ack-nhfb,
  articleno =    "88",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Ortiz-Martin:2019:FAI,
  author =       "Lara Ortiz-Martin and Pablo Picazo-Sanchez and Pedro
                 Peris-Lopez and Juan Tapiador and Gerardo Schneider",
  title =        "Feasibility analysis of Inter-Pulse Intervals based
                 solutions for cryptographic token generation by two
                 electrocardiogram sensors",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "96",
  number =       "??",
  pages =        "283--296",
  month =        jul,
  year =         "2019",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Mon Oct 14 16:09:56 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X18330784",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Ostad-Sharif:2019:TPS,
  author =       "Arezou Ostad-Sharif and Hamed Arshad and Morteza
                 Nikooghadam and Dariush Abbasinezhad-Mood",
  title =        "Three party secure data transmission in {IoT} networks
                 through design of a lightweight authenticated key
                 agreement scheme",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "100",
  number =       "??",
  pages =        "882--892",
  month =        nov,
  year =         "2019",
  CODEN =        "FGSEVI",
  DOI =          "https://doi.org/10.1016/j.future.2019.04.019",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Mon Feb 10 12:55:01 MST 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X18309452",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Pankhuri:2019:PBM,
  author =       "Pankhuri and Akash Sinha and Gulshan Shrivastava and
                 Prabhat Kumar",
  title =        "A Pattern-Based Multi-Factor Authentication System",
  journal =      j-SCPE,
  volume =       "20",
  number =       "1",
  pages =        "101--112",
  month =        "????",
  year =         "2019",
  CODEN =        "????",
  ISSN =         "1895-1767",
  ISSN-L =       "1895-1767",
  bibdate =      "Thu Oct 3 07:39:16 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/scpe.bib",
  URL =          "https://www.scpe.org/index.php/scpe/article/view/1460",
  acknowledgement = ack-nhfb,
  fjournal =     "Scalable Computing: Practice and Experience",
  journal-URL =  "http://www.scpe.org/",
}

@Article{Parrilla:2019:ECC,
  author =       "Luis Parrilla and Jos{\'e} A. {\'A}lvarez-Bermejo and
                 Encarnaci{\'o}n Castillo and Juan A. L{\'o}pez-Ramos
                 and Diego P. Morales-Santos and Antonio Garc{\'{\i}}a",
  title =        "Elliptic Curve Cryptography hardware accelerator for
                 high-performance secure servers",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "75",
  number =       "3",
  pages =        "1107--1122",
  month =        mar,
  year =         "2019",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-018-2317-6",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Thu Oct 10 15:31:18 MDT 2019",
  bibsource =    "http://link.springer.com/journal/11227/75/3;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Article{Patranabis:2019:SCS,
  author =       "S. Patranabis and N. Datta and D. Jap and J. Breier
                 and S. Bhasin and D. Mukhopadhyay",
  title =        "{SCADFA}: Combined {SCA + DFA} Attacks on Block
                 Ciphers with Practical Validations",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "68",
  number =       "10",
  pages =        "1498--1510",
  month =        oct,
  year =         "2019",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2019.2913644",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Thu Sep 12 13:33:25 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
  keywords =     "bit-permutation; Ciphers; combined attacks;
                 Correlation; DFA; DPA; fault attacks; GIFT; Hardware;
                 Internet of Things; Light emitting diodes; optimal
                 diffusion; PRESENT; Resistance; side-channel analysis",
}

@Article{Paul:2019:RCS,
  author =       "J. D. Paul",
  title =        "Re-creating the {Sigsaly} quantizer: This 1943
                 analog-to-digital converter gave the {Allies} an
                 unbreakable scrambler --- [Resources]",
  journal =      j-IEEE-SPECTRUM,
  volume =       "56",
  number =       "2",
  pages =        "16--17",
  month =        feb,
  year =         "2019",
  CODEN =        "IEESAM",
  DOI =          "https://doi.org/10.1109/MSPEC.2019.8635806",
  ISSN =         "0018-9235 (print), 1939-9340 (electronic)",
  ISSN-L =       "0018-9235",
  bibdate =      "Sat Jan 18 07:02:09 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeespectrum2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Spectrum",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6",
  keywords =     "analog-to-digital converter; anode current; audio
                 coding; audio signal processing; audio spectrum;
                 band-scrambled U.S. radiotelephone conferences; Bell
                 Telephone Laboratories; cryptography; digital media
                 technologies; digital technology; digitized voice;
                 electronic tube; five-tap logarithmic resistor divider
                 ladder; German intelligence; history; NSA journals;
                 one-time random digital encryption key; PCM; pulse code
                 modulation; pulse-code modulation; quantisation
                 (signal); radiotelephony; SIGSALY quantizer; speech
                 coding; speech parameters; spread spectrum
                 communication; thyratrons; U.S. National Security
                 Agency; unbreakable speech scrambler; vocoders;
                 VT-109-2051 thyratrons; World War II; WWII SIGSALY
                 technician",
}

@Article{Peng:2019:EDI,
  author =       "Su Peng and Fucai Zhou and Jin Li and Qiang Wang and
                 Zifeng Xu",
  title =        "Efficient, dynamic and identity-based {Remote Data
                 Integrity Checking} for multiple replicas",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "134",
  number =       "??",
  pages =        "72--88",
  day =          "15",
  month =        may,
  year =         "2019",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Mon Oct 14 14:16:32 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804519300657",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Peng:2019:GCS,
  author =       "Liqiang Peng and Atsushi Takayasu",
  title =        "Generalized cryptanalysis of small {CRT}-exponent
                 {RSA}",
  journal =      j-THEOR-COMP-SCI,
  volume =       "795",
  number =       "??",
  pages =        "432--458",
  day =          "26",
  month =        nov,
  year =         "2019",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Wed Oct 16 07:39:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2015.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0304397519304669",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{Pennino:2019:PIS,
  author =       "Diego Pennino and Maurizio Pizzonia and Federico
                 Griscioli",
  title =        "Pipeline-integrity: Scaling the use of authenticated
                 data structures up to the cloud",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "100",
  number =       "??",
  pages =        "618--647",
  month =        nov,
  year =         "2019",
  CODEN =        "FGSEVI",
  DOI =          "https://doi.org/10.1016/j.future.2019.05.018",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Mon Feb 10 12:55:01 MST 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X18328048",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Perez-Resa:2019:SSE,
  author =       "A. P{\'e}rez-Resa and M. Garcia-Bosque and C.
                 S{\'a}nchez-Azqueta and S. Celma",
  title =        "Self-Synchronized Encryption for Physical Layer in
                 {10Gbps} Optical Links",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "68",
  number =       "6",
  pages =        "899--911",
  month =        jun,
  year =         "2019",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2018.2890259",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Thu Jul 11 09:46:20 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
  keywords =     "bit rate 10 Gbit/s; Ciphers; cryptography; Encoding;
                 encrypted optical link; Encryption; Ethernet; feedback;
                 field programmable gate array; field programmable gate
                 arrays; Format Preserving Encryption; FPE block cipher;
                 FPGA; Indistinguishability under Chosen-Plaintext
                 Attack; Optical communications; Optical fiber
                 communication; Physical layer; physical layer; pipeline
                 statistical cipher feedback; security analysis;
                 self-synchronous encryption; Statistical Cipher
                 Feedback; symmetric stream cipher; synchronisation;
                 Synchronization; synchronized Encryption; Throughput",
}

@Article{Perkovic:2019:LVL,
  author =       "Toni Perkovi{\'c} and Mario Cagalj and Tonko
                 Kovacevi{\'c}",
  title =        "{LISA}: Visible light based initialization and {SMS}
                 based authentication of constrained {IoT} devices",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "97",
  number =       "??",
  pages =        "105--118",
  month =        aug,
  year =         "2019",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Mon Oct 14 16:09:57 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X18321083",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Perumal:2019:SDE,
  author =       "Kaliram Perumal and Suganthi Muthusamy and Gowrison
                 Gengavel",
  title =        "Sparse data encoder and decoder to improve security in
                 video steganography",
  journal =      j-CCPE,
  volume =       "31",
  number =       "14",
  pages =        "e4971:1--e4971:??",
  day =          "25",
  month =        jul,
  year =         "2019",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.4971",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Sat Oct 12 11:00:03 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "27 December 2018",
}

@Article{Pham:2019:SSS,
  author =       "Hoang Pham and Jason Woodworth and Mohsen Amini
                 Salehi",
  title =        "Survey on secure search over encrypted data on the
                 cloud",
  journal =      j-CCPE,
  volume =       "31",
  number =       "17",
  pages =        "e5284:1--e5284:??",
  day =          "10",
  month =        sep,
  year =         "2019",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.5284",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Sat Oct 12 11:00:05 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "07 April 2019",
}

@Article{Pisani:2019:ABS,
  author =       "Paulo Henrique Pisani and Abir Mhenni and Romain Giot
                 and Estelle Cherrier and Norman Poh and Andr{\'e}
                 Carlos Ponce de Leon {Ferreira de Carvalho} and
                 Christophe Rosenberger and Najoua Essoukri {Ben
                 Amara}",
  title =        "Adaptive Biometric Systems: Review and Perspectives",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "5",
  pages =        "102:1--102:??",
  month =        oct,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3344255",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Tue Oct 29 09:52:57 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3344255",
  abstract =     "With the widespread of computing and mobile devices,
                 authentication using biometrics has received greater
                 attention. Although biometric systems usually provide
                 good solutions, the recognition performance tends to be
                 affected over time due to changing conditions and aging
                 of biometric data, which results in intra-class
                 variability. Adaptive biometric systems, which adapt
                 the biometric reference over time, have been proposed
                 to deal with such intra-class variability. This article
                 provides the most up-to-date and complete discussion on
                 adaptive biometrics systems we are aware of, including
                 formalization, terminology, sources or variations that
                 motivates the use of adaptation, adaptation strategies,
                 evaluation methodology, and open challenges. This field
                 of research is sometimes referred to as template
                 update.",
  acknowledgement = ack-nhfb,
  articleno =    "102",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Pja:2019:SSG,
  author =       "Alphonse Pja and Venkatramana Reddy Y",
  title =        "Scalable and secure group key agreement for wireless
                 ad-hoc networks by extending {RSA} scheme",
  journal =      j-CCPE,
  volume =       "31",
  number =       "14",
  pages =        "e4969:1--e4969:??",
  day =          "25",
  month =        jul,
  year =         "2019",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.4969",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Sat Oct 12 11:00:03 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "26 November 2018",
}

@Article{Poddar:2019:AED,
  author =       "Rishabh Poddar and Tobias Boelter and Raluca Ada
                 Popa",
  title =        "{Arx}: an encrypted database using semantically secure
                 encryption",
  journal =      j-PROC-VLDB-ENDOWMENT,
  volume =       "12",
  number =       "11",
  pages =        "1664--1678",
  month =        jul,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.14778/3342263.3342641",
  ISSN =         "2150-8097",
  bibdate =      "Wed Oct 2 06:49:02 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/vldbe.bib",
  abstract =     "In recent years, encrypted databases have emerged as a
                 promising direction that provides data confidentiality
                 without sacrificing functionality: queries are executed
                 on encrypted data. However, many practical proposals
                 rely on a set of weak encryption schemes that have been
                 shown to leak sensitive data. In this paper, we propose
                 Arx, a practical and functionally rich database system
                 that encrypts the data only with semantically secure
                 encryption schemes. We show that Arx supports real
                 applications such as ShareLaTeX with a modest
                 performance overhead.",
  acknowledgement = ack-nhfb,
  fjournal =     "Proceedings of the VLDB Endowment",
  journal-URL =  "http://portal.acm.org/citation.cfm?id=J1174",
}

@Article{Puthal:2019:SAL,
  author =       "Deepak Puthal and Rajiv Ranjan and Ashish Nanda and
                 Priyadarsi Nanda and Prem Prakash Jayaraman and Albert
                 Y. Zomaya",
  title =        "Secure authentication and load balancing of
                 distributed edge datacenters",
  journal =      j-J-PAR-DIST-COMP,
  volume =       "124",
  number =       "??",
  pages =        "60--69",
  month =        feb,
  year =         "2019",
  CODEN =        "JPDCER",
  DOI =          "https://doi.org/10.1016/j.jpdc.2018.10.007",
  ISSN =         "0743-7315 (print), 1096-0848 (electronic)",
  ISSN-L =       "0743-7315",
  bibdate =      "Mon Jan 7 07:58:40 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jpardistcomp.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S074373151830741X",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Parallel and Distributed Computing",
  journal-URL =  "http://www.sciencedirect.com/science/journal/07437315",
}

@Article{Puthal:2019:SSE,
  author =       "D. Puthal and X. Wu and N. Surya and R. Ranjan and J.
                 Chen",
  title =        "{SEEN}: A Selective Encryption Method to Ensure
                 Confidentiality for Big Sensing Data Streams",
  journal =      j-IEEE-TRANS-BIG-DATA,
  volume =       "5",
  number =       "3",
  pages =        "379--392",
  month =        sep,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/TBDATA.2017.2702172",
  ISSN =         "2332-7790",
  ISSN-L =       "2332-7790",
  bibdate =      "Tue Oct 29 11:08:44 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetransbigdata.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Big Data",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6687317",
  keywords =     "Big Data; big data; Big data; Big data stream; big
                 sensing data streams; critical applications;
                 cryptography; data confidentiality; data integrity;
                 data security; Data Stream Manager; decision-making;
                 Encryption; high data trustworthiness; multilevel data
                 confidentiality; Real-time systems; resource
                 constrained sensing devices; selective encryption;
                 selective encryption method; self-organizing wireless
                 sensor networks; sensed data types; Sensors; smart
                 health; telecommunication security; wireless sensor
                 networks",
}

@Article{Qiu:2019:CPT,
  author =       "Jian Qiu and Hengjian Li and Chuan Zhao",
  title =        "Cancelable palmprint templates based on random
                 measurement and noise data for security and
                 privacy-preserving authentication",
  journal =      j-COMPUT-SECUR,
  volume =       "82",
  number =       "??",
  pages =        "1--14",
  month =        may,
  year =         "2019",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:59 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404818306618",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Queiroz:2019:WBF,
  author =       "Jordan S. Queiroz and Eduardo L. Feitosa",
  title =        "A {Web} Browser Fingerprinting Method Based on the
                 {Web} Audio {API}",
  journal =      j-COMP-J,
  volume =       "62",
  number =       "8",
  pages =        "1106--1120",
  month =        aug,
  year =         "2019",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxy146",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Aug 19 07:31:49 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://academic.oup.com/comjnl/article/62/8/1106/5298776",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Rahulamathavan:2019:PPI,
  author =       "Y. Rahulamathavan and K. R. Sutharsini and I. G. Ray
                 and R. Lu and M. Rajarajan",
  title =        "Privacy-Preserving {iVector}-Based Speaker
                 Verification",
  journal =      j-IEEE-ACM-TASLP,
  volume =       "27",
  number =       "3",
  pages =        "496--506",
  month =        mar,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/TASLP.2018.2882731",
  ISSN =         "2329-9290",
  bibdate =      "Sat Aug 3 09:10:28 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeeacmtaslp.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE\slash ACM Transactions on Audio, Speech, and
                 Language Processing",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6570655",
  keywords =     "authentication; Bioinformatics; Cryptography; Data
                 privacy; data privacy; Feature extraction; iVector;
                 iVector-based voice verification technique; linear
                 discriminant analysis; linear discriminant analysis
                 techniques; Privacy; privacy-preserving iVector-based
                 speaker verification; privacy-preserving voice
                 verification; random domain; randomized domain;
                 security; Servers; speaker recognition; speech; voice
                 print",
}

@Article{Rao:2019:HPR,
  author =       "Fang-Yu Rao and Jianneng Cao and Elisa Bertino and
                 Murat Kantarcioglu",
  title =        "Hybrid Private Record Linkage: Separating
                 Differentially Private Synopses from Matching Records",
  journal =      j-TOPS,
  volume =       "22",
  number =       "3",
  pages =        "15:1--15:??",
  month =        jul,
  year =         "2019",
  DOI =          "https://doi.org/10.1145/3318462",
  ISSN =         "2471-2566 (print), 2471-2574 (electronic)",
  bibdate =      "Sat Sep 21 08:26:25 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tops.bib",
  URL =          "https://dl.acm.org/citation.cfm?id=3318462",
  abstract =     "Private record linkage protocols allow multiple
                 parties to exchange matching records, which refer to
                 the same entities or have similar values, while keeping
                 the non-matching ones secret. Conventional protocols
                 are based on computationally expensive cryptographic
                 primitives and therefore do not scale. To address these
                 scalability issues, hybrid protocols have been proposed
                 that combine differential privacy techniques with
                 secure multiparty computation techniques. However, a
                 drawback of such protocols is that they disclose to the
                 parties both the matching records and the
                 differentially private synopses of the datasets
                 involved in the linkage. Consequently, differential
                 privacy is no longer always satisfied. To address this
                 issue, we propose a novel framework that separates the
                 private synopses from the matching records. The two
                 parties do not access the synopses directly, but still
                 use them to efficiently link records. We theoretically
                 prove the security of our framework under the
                 state-of-the-art privacy notion of differential privacy
                 for record linkage (DPRL). In addition, we develop a
                 simple but effective strategy for releasing private
                 synopses. Extensive experimental results show that our
                 framework is superior to the existing methods in terms
                 of efficiency.",
  acknowledgement = ack-nhfb,
  articleno =    "15",
  fjournal =     "ACM Transactions on Privacy and Security (TOPS)",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J1547",
}

@Article{Rastegari:2019:ECS,
  author =       "Parvin Rastegari and Willy Susilo and Mohammad
                 Dakhlalian",
  title =        "Efficient Certificateless Signcryption in the Standard
                 Model: Revisiting {Luo} and {Wan}'s Scheme from
                 Wireless Personal Communications (2018)",
  journal =      j-COMP-J,
  volume =       "62",
  number =       "8",
  pages =        "1178--1193",
  month =        aug,
  year =         "2019",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxz041",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Aug 19 07:31:49 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://academic.oup.com/comjnl/article/62/8/1178/5485598",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Raz:2019:FLR,
  author =       "Ran Raz",
  title =        "Fast Learning Requires Good Memory: a Time-Space Lower
                 Bound for Parity Learning",
  journal =      j-J-ACM,
  volume =       "66",
  number =       "1",
  pages =        "3:1--3:??",
  month =        jan,
  year =         "2019",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/3186563",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  bibdate =      "Wed Oct 23 06:51:05 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  abstract =     "We prove that any algorithm for learning parities
                 requires either a memory of quadratic size or an
                 exponential number of samples. This proves a recent
                 conjecture of Steinhardt et al. (2016) and shows that
                 for some learning problems, a large storage space is
                 crucial. More formally, in the problem of parity
                 learning, an unknown string x \in {0,1}$^n$ was chosen
                 uniformly at random. A learner tries to learn x from a
                 stream of samples (a$_1$, b$_1$), (a$_2$, b$_2$)
                 \ldots{}, where each a$_t$ is uniformly distributed
                 over {0,1}$^n$ and b$_t$ is the inner product of a$_t$
                 and x, modulo 2. We show that any algorithm for parity
                 learning that uses less than n$^2$ /25 bits of memory
                 requires an exponential number of samples. Previously,
                 there was no non-trivial lower bound on the number of
                 samples needed for any learning problem, even if the
                 allowed memory size is O (n) (where n is the space
                 needed to store one sample). We also give an
                 application of our result in the field of
                 bounded-storage cryptography. We show an encryption
                 scheme that requires a private key of length n, as well
                 as time complexity of n per encryption/decryption of
                 each bit, and is provably and unconditionally secure as
                 long as the attacker uses less than n$^2$ /25 memory
                 bits and the scheme is used at most an exponential
                 number of times. Previous works on bounded-storage
                 cryptography assumed that the memory size used by the
                 attacker is at most linear in the time needed for
                 encryption/decryption.",
  acknowledgement = ack-nhfb,
  articleno =    "3",
  fjournal =     "Journal of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J401",
}

@Article{Resende:2019:BMI,
  author =       "Jo{\~a}o S. Resende and Patr{\'\i}cia R. Sousa and
                 Rolando Martins and Lu{\'\i}s Antunes",
  title =        "Breaking {MPC} implementations through compression",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "4",
  pages =        "505--518",
  month =        aug,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-018-0424-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Jul 13 14:23:17 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/datacompression.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-018-0424-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
  keywords =     "multiparty computation (MPC) [a sub-field of
                 cryptography with the goal of creating methods for
                 parties to jointly compute a function over their inputs
                 while keeping those inputs private]",
}

@Article{Reyhani-Masoleh:2019:NMI,
  author =       "A. Reyhani-Masoleh and H. El-Razouk and A. Monfared",
  title =        "New Multiplicative Inverse Architectures Using
                 {Gaussian} Normal Basis",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "68",
  number =       "7",
  pages =        "991--1006",
  month =        jul,
  year =         "2019",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2018.2859941",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Thu Jul 11 09:46:20 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/fparith.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
  keywords =     "application specific integrated circuits; arithmetic
                 operations; binary fields; classic inversion scheme;
                 classic-based addition chains; classical-interleaved
                 architecture; classical-interleaved inverter; CMOS
                 integrated circuits; Computer architecture;
                 cryptography; Digit-level multiplier; digital
                 arithmetic; field inversion; field programmable gate
                 arrays; finite field; FSISM; FSISM processor;
                 fully-serial-in square-multiply processor; Galois
                 fields; Gaussian normal basis; Gaussian processes;
                 hybrid-double multiplication; input registers;
                 inversion architecture; inversion architectures;
                 Inverters; invertors; Itoh-Tsujii algorithm; latency;
                 Logic gates; multiplication cycle; multiplicative
                 inverse architectures; multiplying circuits; NIST;
                 Propagation delay; size 65.0 nm; ternary Itoh-Tsujii
                 algorithm",
}

@Article{Rezaeibagha:2019:EMC,
  author =       "Fatemeh Rezaeibagha and Yi Mu",
  title =        "Efficient Micropayment of Cryptocurrency from
                 Blockchains",
  journal =      j-COMP-J,
  volume =       "62",
  number =       "4",
  pages =        "507--517",
  month =        apr,
  year =         "2019",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxy105",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Apr 2 12:10:39 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://academic.oup.com/comjnl/article/62/4/507/5155318",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Rezaeibagha:2019:PSB,
  author =       "Fatemeh Rezaeibagha and Yi Mu and Shiwei Zhang and
                 Xiaofen Wang",
  title =        "Provably Secure (Broadcast) Homomorphic Signcryption",
  journal =      j-INT-J-FOUND-COMP-SCI,
  volume =       "30",
  number =       "4",
  pages =        "511--529",
  month =        jun,
  year =         "2019",
  DOI =          "https://doi.org/10.1142/S0129054119400100",
  ISSN =         "0129-0541",
  ISSN-L =       "0129-0541",
  bibdate =      "Fri Sep 20 10:48:00 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijfcs.bib",
  URL =          "https://www.worldscientific.com/doi/10.1142/S0129054119400100",
  abstract =     "Signcryption has drawn a lot of attention due to its
                 useful applications in many areas, in particular for
                 applications where the computation and communication
                 resources are constrained, for example, for lightweight
                 devices. The traditional signcryption scheme does not
                 support the homomorphic property. Recent work by
                 Rezaeibagha et al. (Provsec 2017) offered a provably
                 secure homomorphic signcryption scheme, in which for
                 the first time, provided a scheme provably secure under
                 some restriction. In this paper, we show that the
                 homomorphic signcryption can be extended to provably
                 secure broadcast signcryption scheme. We allow the
                 broadcasted signcrypted data items to be aggregated
                 without requiring decryption that is a desirable
                 feature in distributed environments.",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Foundations of Computer
                 Science (IJFCS)",
  journal-URL =  "http://www.worldscientific.com/loi/ijfcs",
  remark =       "Special Issue Cryptography and Provable Security",
}

@Article{Riazi:2019:DLP,
  author =       "M. S. Riazi and B. {Darvish Rouani} and F.
                 Koushanfar",
  title =        "Deep Learning on Private Data",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "6",
  pages =        "54--63",
  month =        nov,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2935666",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 21 14:45:55 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
  keywords =     "Computational modeling; cryptographic methodologies;
                 Cryptography; cryptography; Data models; data privacy;
                 deep neural networks; inference; inference mechanisms;
                 learning (artificial intelligence); Logic gates; neural
                 nets; Neural networks; privacy-preserving deep
                 learning; private data; Servers; user logs",
}

@InProceedings{Rohloff:2019:CAR,
  author =       "Kurt Rohloff",
  title =        "Computer Arithmetic Research to Accelerate
                 Privacy-Protecting Encrypted Computing Such as
                 Homomorphic Encryption",
  crossref =     "Takagi:2019:ISC",
  pages =        "197--197",
  month =        jun,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/ARITH.2019.00046",
  bibdate =      "Fri Jan 31 08:18:07 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/fparith.bib",
  abstract =     "One of the first major breakthroughs of computer
                 science in the 21st century has been the discovery and
                 practical demonstration of encrypted computing
                 technologies such as Fully Homomorphic Encryption
                 (FHE). Encrypted computing technologies allow sensitive
                 data to be encrypted such that arbitrary programs can
                 be securely run over the encrypted data where the
                 output, when decrypted, is equivalent to the result of
                 running the original algorithm on the unencrypted data.
                 In this talk we focus on the use of and potential for
                 computer arithmetic research to enable more practical
                 encrypted computing, such as to accelerate advanced
                 encryption implementations on custom hardware. These
                 technologies are ground-breaking in their ability for
                 privacy-preserving data science on sensitive data sets
                 with minimal costs in terms of engineering effort,
                 power, compute resources, etc. \ldots{}. We discuss
                 theory, design, algorithmic, hardware, software
                 engineering and systems research that is enabling
                 applications of encrypted computing in regulated data
                 industries, such as in medical and financial domains.
                 We use our work using accelerating the PALISADE
                 open-source homomorphic encryption software library for
                 practical applications in case studies.",
  acknowledgement = ack-nhfb,
  keywords =     "Acceleration; advanced encryption implementations;
                 ARITH-26; computer arithmetic research; computer
                 science; Computer science; Computers; cryptography;
                 data privacy; Digital arithmetic; encrypted computing
                 technologies; encrypted data; Encryption; fully
                 homomorphic encryption; Hardware; PALISADE open-source
                 homomorphic encryption software library;
                 privacy-preserving data science; privacy-protecting
                 encrypted computing; public domain software; regulated
                 data industries; sensitive data sets; software
                 engineering; software libraries; unencrypted data",
}

@Article{Romashchenko:2019:OCM,
  author =       "Andrei Romashchenko and Marius Zimand",
  title =        "An Operational Characterization of Mutual Information
                 in Algorithmic Information Theory",
  journal =      j-J-ACM,
  volume =       "66",
  number =       "5",
  pages =        "38:1--38:??",
  month =        sep,
  year =         "2019",
  CODEN =        "JACOAH",
  DOI =          "https://doi.org/10.1145/3356867",
  ISSN =         "0004-5411 (print), 1557-735X (electronic)",
  ISSN-L =       "0004-5411",
  bibdate =      "Wed Oct 23 06:51:07 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jacm.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3356867",
  abstract =     "We show that the mutual information, in the sense of
                 Kolmogorov complexity, of any pair of strings x and y
                 is equal, up to logarithmic precision, to the length of
                 the longest shared secret key that two parties-one
                 having x and the complexity profile of the pair and the
                 other one having y and the complexity profile of the
                 pair-can establish via a probabilistic protocol with
                 interaction on a public channel. For l > 2, the longest
                 shared secret that can be established from a tuple of
                 strings (x$_1$, \ldots{}, x$_l$) by l parties-each one
                 having one component of the tuple and the complexity
                 profile of the tuple-is equal, up to logarithmic
                 precision, to the complexity of the tuple minus the
                 minimum communication necessary for distributing the
                 tuple to all parties. We establish the communication
                 complexity of secret key agreement protocols that
                 produce a secret key of maximal length for protocols
                 with public randomness. We also show that if the
                 communication complexity drops below the established
                 threshold, then only very short secret keys can be
                 obtained.",
  acknowledgement = ack-nhfb,
  articleno =    "38",
  fjournal =     "Journal of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J401",
}

@Article{Ruoti:2019:JJT,
  author =       "S. Ruoti and K. Seamons",
  title =        "{Johnny}'s Journey Toward Usable Secure Email",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "6",
  pages =        "72--76",
  month =        nov,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2933683",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 21 14:45:55 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
  keywords =     "Computer security; Electronic mail; electronic mail;
                 Encryption; Servers; Usability; usable key management;
                 usable secure email; usable-security community",
}

@Article{Sadat:2019:SSG,
  author =       "Md Nazmus Sadat and Md Momin {Al Aziz} and Noman
                 Mohammed and Feng Chen and Xiaoqian Jiang and Shuang
                 Wang",
  title =        "{SAFETY: Secure gwAs in Federated Environment through
                 a hYbrid Solution}",
  journal =      j-TCBB,
  volume =       "16",
  number =       "1",
  pages =        "93--102",
  month =        jan,
  year =         "2019",
  CODEN =        "ITCBCY",
  DOI =          "https://doi.org/10.1109/TCBB.2018.2829760",
  ISSN =         "1545-5963 (print), 1557-9964 (electronic)",
  ISSN-L =       "1545-5963",
  bibdate =      "Mon Mar 11 18:45:00 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcbb.bib",
  abstract =     "Recent studies demonstrate that effective healthcare
                 can benefit from using the human genomic information.
                 Consequently, many institutions are using statistical
                 analysis of genomic data, which are mostly based on
                 genome-wide association studies GWAS. GWAS analyze
                 genome sequence variations in order to identify genetic
                 risk factors for diseases. These studies often require
                 pooling data from different sources together in order
                 to unravel statistical patterns, and relationships
                 between genetic variants and diseases. Here, the
                 primary challenge is to fulfill one major objective:
                 accessing multiple genomic data repositories for
                 collaborative research in a privacy-preserving manner.
                 Due to the privacy concerns regarding the genomic data,
                 multi-jurisdictional laws and policies of cross-border
                 genomic data sharing are enforced among different
                 countries. In this article, we present SAFETY, a hybrid
                 framework, which can securely perform GWAS on federated
                 genomic datasets using homomorphic encryption and
                 recently introduced secure hardware component of Intel
                 Software Guard Extensions to ensure high efficiency and
                 privacy at the same time. Different experimental
                 settings show the efficacy and applicability of such
                 hybrid framework in secure conduction of GWAS. To the
                 best of our knowledge, this hybrid use of homomorphic
                 encryption along with Intel SGX is not proposed to this
                 date. SAFETY is up to 4.82 times faster than the best
                 existing secure computation technique.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE/ACM Transactions on Computational Biology and
                 Bioinformatics",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J954",
}

@Article{Sakellariou:2019:HEK,
  author =       "Georgios Sakellariou and Anastasios Gounaris",
  title =        "Homomorphically encrypted $k$-means on cloud-hosted
                 servers with low client-side load",
  journal =      j-COMPUTING,
  volume =       "101",
  number =       "12",
  pages =        "1813--1836",
  month =        dec,
  year =         "2019",
  CODEN =        "CMPTA2",
  DOI =          "https://doi.org/10.1007/s00607-019-00711-w",
  ISSN =         "0010-485X (print), 1436-5057 (electronic)",
  ISSN-L =       "0010-485X",
  bibdate =      "Tue May 12 18:02:14 MDT 2020",
  bibsource =    "http://link.springer.com/journal/607/101/12;
                 https://www.math.utah.edu/pub/tex/bib/computing.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computing",
  journal-URL =  "http://link.springer.com/journal/607",
}

@Article{Sandor:2019:EDM,
  author =       "Voundi Koe Arthur Sandor and Yaping Lin and Xiehua Li
                 and Feng Lin and Shiwen Zhang",
  title =        "Efficient decentralized multi-authority attribute
                 based encryption for mobile cloud data storage",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "129",
  number =       "??",
  pages =        "25--36",
  day =          "1",
  month =        mar,
  year =         "2019",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Mon Oct 14 14:16:30 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804519300037",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Saracevic:2019:NAS,
  author =       "Muzafer Saracevi{\'c} and Sasa Adamovi{\'c} and
                 Vladislav Miskovic and Nemanja Macek and Marko Sarac",
  title =        "A novel approach to steganography based on the
                 properties of {Catalan} numbers and {Dyck} words",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "100",
  number =       "??",
  pages =        "186--197",
  month =        nov,
  year =         "2019",
  CODEN =        "FGSEVI",
  DOI =          "https://doi.org/10.1016/j.future.2019.05.010",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Mon Feb 10 12:55:01 MST 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X19300184",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Sartakhti:2019:CPL,
  author =       "Javad Salimi Sartakhti and Saeed Jalili",
  title =        "On the computational power of the light: a plan for
                 breaking {Data Encryption Standard}",
  journal =      j-THEOR-COMP-SCI,
  volume =       "773",
  number =       "??",
  pages =        "71--78",
  day =          "14",
  month =        jun,
  year =         "2019",
  CODEN =        "TCSCDI",
  DOI =          "https://doi.org/10.1016/j.tcs.2018.08.015",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Sat Jun 15 10:14:21 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2015.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0304397518305310",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{Schneier:2019:CPI,
  author =       "B. Schneier",
  title =        "Cybersecurity for the Public Interest",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "1",
  pages =        "84--83",
  month =        jan # "\slash " # feb,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2018.2889891",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
  keywords =     "Computer security; Cryptography; cybersecurity;
                 Ethics; government policies; Government policies;
                 policy ramifications; public interest; Public policy;
                 security of data; Social factors; Social implications
                 of technology; Technology",
}

@Article{Scholl:2019:SIE,
  author =       "Travis Scholl",
  title =        "Super-Isolated Elliptic Curves and {Abelian} Surfaces
                 in Cryptography",
  journal =      j-EXP-MATH,
  volume =       "28",
  number =       "4",
  pages =        "385--397",
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1080/10586458.2017.1412371",
  ISSN =         "1058-6458 (print), 1944-950X (electronic)",
  ISSN-L =       "1058-6458",
  bibdate =      "Fri Dec 13 06:44:38 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/expmath.bib;
                 http://www.tandfonline.com/toc/uexm20/28/4",
  URL =          "http://www.tandfonline.com/doi/full/10.1080/10586458.2017.1412371",
  acknowledgement = ack-nhfb,
  fjournal =     "Experimental Mathematics",
  journal-URL =  "http://www.tandfonline.com/loi/uexm20",
  onlinedate =   "03 Jan 2018",
}

@Article{Sethumadhavan:2019:SA,
  author =       "S. Sethumadhavan and M. Tiwari",
  title =        "Secure Architectures",
  journal =      j-IEEE-MICRO,
  volume =       "39",
  number =       "4",
  pages =        "6--7",
  month =        jul # "\slash " # aug,
  year =         "2019",
  CODEN =        "IEMIDZ",
  DOI =          "https://doi.org/10.1109/MM.2019.2925152",
  ISSN =         "0272-1732 (print), 1937-4143 (electronic)",
  ISSN-L =       "0272-1732",
  bibdate =      "Thu Jul 25 15:29:43 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeemicro.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Micro",
  journal-URL =  "http://www.computer.org/csdl/mags/mi/index.html",
  keywords =     "Computer architecture; Computer security; Conferences;
                 Cryptography; Hardware; Software",
}

@Article{Sgantzos:2019:AII,
  author =       "Konstantinos Sgantzos and Ian Grigg",
  title =        "Artificial Intelligence Implementations on the
                 Blockchain. {Use} Cases and Future Applications",
  journal =      j-FUTURE-INTERNET,
  volume =       "11",
  number =       "8",
  pages =        "170",
  day =          "02",
  month =        aug,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi11080170",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:51:07 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/11/8/170",
  abstract =     "An exemplary paradigm of how an AI can be a disruptive
                 technological paragon via the utilization of blockchain
                 comes straight from the world of deep learning. Data
                 scientists have long struggled to maintain the quality
                 of a dataset for machine learning by an AI entity.
                 Datasets can be very expensive to purchase, as,
                 depending on both the proper selection of the elements
                 and the homogeneity of the data contained within,
                 constructing and maintaining the integrity of a dataset
                 is difficult. Blockchain as a highly secure storage
                 medium presents a technological quantum leap in
                 maintaining data integrity. Furthermore, blockchain's
                 immutability constructs a fruitful environment for
                 creating high quality, permanent and growing datasets
                 for deep learning. The combination of AI and blockchain
                 could impact fields like Internet of things (IoT),
                 identity, financial markets, civil governance, smart
                 cities, small communities, supply chains, personalized
                 medicine and other fields, and thereby deliver benefits
                 to many people.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Blockchain: Current Challenges and
                 Future Prospects/Applications.",
}

@Article{Sha:2019:CED,
  author =       "Le-Tian Sha and Fu Xiao and Hai-Ping Huang and Yu Chen
                 and Ru-Chuan Wang",
  title =        "Catching Escapers: a Detection Method for Advanced
                 Persistent Escapers in Industry {Internet of Things}
                 Based on Identity-based Broadcast Encryption {(IBBE)}",
  journal =      j-TECS,
  volume =       "18",
  number =       "3",
  pages =        "29:1--29:??",
  month =        jun,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3319615",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Thu Oct 17 18:16:43 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tecs.bib;
                 https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3319615",
  abstract =     "As the Industry 4.0 or Internet of Things (IoT) era
                 begins, security plays a key role in the Industry
                 Internet of Things (IIoT) due to various threats, which
                 include escape or Distributed Denial of Service (DDoS)
                 attackers in the virtualization layer and vulnerability
                 exploiters in the device layer. A successful cross-VM
                 escape attack in the virtualization layer combined with
                 cross-layer penetration in the device layer, which we
                 define as an Advanced Persistent Escaper (APE), poses a
                 great threat. Therefore, the development of detection
                 and rejection methods for APEs across multiple layers
                 in IIoT is an open issue. To the best of our knowledge,
                 less effective methods are established, especially for
                 vulnerability exploitation in the virtualization layer
                 and backdoor leverage in the device layer. On the basis
                 of this, we propose Escaper Cops (EscaperCOP), a
                 detection method for cross-VM escapers in the
                 virtualization layer and cross-layer penetrators in the
                 device layer. In particular, a new detection method for
                 guest-to-host escapers is proposed for the
                 virtualization layer. Finally, a novel encryption
                 method based on Identity-based Broadcast Encryption
                 (IBBE) is proposed to protect the critical components
                 in EscaperCOP, detection library, and control command
                 library. To verify our method, experimental tests are
                 performed for a large number of APEs in an IIoT
                 framework. The test results have demonstrated the
                 proposed method is effective with an acceptable level
                 of detection ratio.",
  acknowledgement = ack-nhfb,
  articleno =    "29",
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J840",
}

@Article{Shah:2019:PCB,
  author =       "Mohsin Shah and Weiming Zhang and Honggang Hu and
                 Nenghai Yu",
  title =        "{Paillier} Cryptosystem based Mean Value Computation
                 for Encrypted Domain Image Processing Operations",
  journal =      j-TOMM,
  volume =       "15",
  number =       "3",
  pages =        "76:1--76:??",
  month =        sep,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3325194",
  ISSN =         "1551-6857 (print), 1551-6865 (electronic)",
  ISSN-L =       "1551-6857",
  bibdate =      "Wed Oct 2 10:12:47 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tomccap.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3325194",
  abstract =     "Due to its large storage facility and high-end
                 computing capability, cloud computing has received
                 great attention as a huge amount of personal multimedia
                 data and computationally expensive tasks can be
                 outsourced to the cloud. However, the cloud being
                 third-party semi-trusted, is prone to information
                 leakage, raising privacy risks. Signal processing in
                 the encrypted domain has emerged as a new research
                 paradigm on privacy-preserving processing over
                 outsourced data by semi-trusted cloud. In this article,
                 we propose a solution for non-integer mean value
                 computation in the homomorphic encrypted domain without
                 any interactive protocol between the client and the
                 service provider. Using the proposed solution, various
                 image processing operations, such as local smoothing
                 filter, un-sharp masking, and histogram equalization,
                 can be performed in the encrypted domain at the cloud
                 server without any privacy concerns. Our experimental
                 results from standard test images reveal that these
                 image processing operations can be performed without
                 pre-processing, without client-server interactive
                 protocol, and without any error between the encrypted
                 domain and the plain domain.",
  acknowledgement = ack-nhfb,
  articleno =    "76",
  fjournal =     "ACM Transactions on Multimedia Computing,
                 Communications, and Applications",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J961",
}

@Article{ShanmugaPriya:2019:PAS,
  author =       "S. ShanmugaPriya and A. Valarmathi and D. Yuvaraj",
  title =        "The personal authentication service and security
                 enhancement for optimal strong password",
  journal =      j-CCPE,
  volume =       "31",
  number =       "14",
  pages =        "e5009:1--e5009:??",
  day =          "25",
  month =        jul,
  year =         "2019",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.5009",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Sat Oct 12 11:00:03 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "29 November 2018",
}

@Article{Sherman:2019:OVB,
  author =       "A. T. Sherman and F. Javani and H. Zhang and E.
                 Golaszewski",
  title =        "On the Origins and Variations of Blockchain
                 Technologies",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "1",
  pages =        "72--77",
  month =        jan # "\slash " # feb,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2893730",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
  keywords =     "Bitcoin; Blockchain; blockchain technologies;
                 blockchain variation; Computer security; cryptography;
                 Fault tolerant systems; financial data processing;
                 Smart contracts",
}

@Article{Sherman:2019:PBL,
  author =       "A. T. Sherman and P. A. H. Peterson and E. Golaszewski
                 and E. LaFemina and E. Goldschen and M. Khan and L.
                 Mundy and M. Rather and B. Solis and W. Tete and E.
                 Valdez and B. Weber and D. Doyle and C. O'Brien and L.
                 Oliva and J. Roundy and J. Suess",
  title =        "Project-Based Learning Inspires Cybersecurity
                 Students: A Scholarship-for-Service Research Study",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "3",
  pages =        "82--88",
  month =        may # "\slash " # jun,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2900595",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
  keywords =     "Computer security; Cryptography; Firewalls
                 (computing); Internet; Servers; Task analysis",
}

@Article{Shi:2019:LWW,
  author =       "Y. Shi and W. Wei and H. Fan and M. H. Au and X. Luo",
  title =        "A Light-Weight White-Box Encryption Scheme for
                 Securing Distributed Embedded Devices",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "68",
  number =       "10",
  pages =        "1411--1427",
  month =        oct,
  year =         "2019",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2019.2907847",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Thu Sep 12 13:33:25 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
  keywords =     "Ciphers; Distributed databases; Distributed embedded
                 devices; Elliptic curve cryptography; Encryption; Fans;
                 light-weight; symmetric encryption algorithms;
                 white-box attack contexts; white-box cryptography",
}

@Article{Shibu:2019:ARR,
  author =       "N. V. Shibu and P. Malathi",
  title =        "Accurate and reliable reversible data hiding using
                 sequential encoding techniques",
  journal =      j-CCPE,
  volume =       "31",
  number =       "14",
  pages =        "e4979:1--e4979:??",
  day =          "25",
  month =        jul,
  year =         "2019",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.4979",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Sat Oct 12 11:00:03 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "29 November 2018",
}

@Article{Shokri:2019:ESS,
  author =       "Madeh Shokri and Meghdad Mirabi",
  title =        "An efficient stream structure for broadcasting the
                 encrypted {XML} data in mobile wireless broadcast
                 channels",
  journal =      j-J-SUPERCOMPUTING,
  volume =       "75",
  number =       "11",
  pages =        "7147--7173",
  month =        nov,
  year =         "2019",
  CODEN =        "JOSUED",
  DOI =          "https://doi.org/10.1007/s11227-019-02920-8",
  ISSN =         "0920-8542 (print), 1573-0484 (electronic)",
  ISSN-L =       "0920-8542",
  bibdate =      "Sat Jul 25 07:17:52 MDT 2020",
  bibsource =    "http://link.springer.com/journal/11227/75/11;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsuper.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "The Journal of Supercomputing",
  journal-URL =  "http://link.springer.com/journal/11227",
}

@Article{shree:2019:ERC,
  author =       "S. Raja shree and A. Chilambu Chelvan and M. Rajesh",
  title =        "An efficient {RSA} cryptosystem by applying cuckoo
                 search optimization algorithm",
  journal =      j-CCPE,
  volume =       "31",
  number =       "12",
  pages =        "e4845:1--e4845:??",
  day =          "25",
  month =        jun,
  year =         "2019",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.4845",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Sat Oct 12 11:00:03 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "25 October 2018",
}

@Article{Shuai:2019:AAS,
  author =       "Mengxia Shuai and Nenghai Yu and Hongxia Wang and Ling
                 Xiong",
  title =        "Anonymous authentication scheme for smart home
                 environment with provable security",
  journal =      j-COMPUT-SECUR,
  volume =       "86",
  number =       "??",
  pages =        "132--146",
  month =        sep,
  year =         "2019",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:47:02 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404818313701",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Siegel:2019:UOC,
  author =       "J. E. Siegel and S. Sarma",
  title =        "Using Open Channels to Trigger the Invited, Unintended
                 Consequences of the {Internet of Things}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "3",
  pages =        "49--55",
  month =        may # "\slash " # jun,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2901430",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
  keywords =     "Air gaps; Biometrics (access control); contextual
                 monitoring; device speakers; Internet of Things;
                 Internet of Things air gap; meta data; mobile
                 computing; Object recognition; open channels; Security;
                 source metadata embedding; speaker recognition;
                 two-factor authentication; voice assistants; Webcams",
}

@Article{Singh:2019:SID,
  author =       "J. Singh and J. Cobbe",
  title =        "The Security Implications of Data Subject Rights",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "6",
  pages =        "21--30",
  month =        nov,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2914614",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 21 14:45:55 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
  keywords =     "Authentication; Data protection; data protection; data
                 protection regulations; data subject rights;
                 fulfillment processes; individuals rights; Law;
                 legislation; organizational processes; Process control;
                 security implications; technical infrastructure",
}

@Article{Smith-Creasey:2019:NWI,
  author =       "Max Smith-Creasey and Muttukrishnan Rajarajan",
  title =        "A novel word-independent gesture-typing continuous
                 authentication scheme for mobile devices",
  journal =      j-COMPUT-SECUR,
  volume =       "83",
  number =       "??",
  pages =        "140--150",
  month =        jun,
  year =         "2019",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:47:00 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404818306552",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{SoltaniPanah:2019:CDG,
  author =       "A. {Soltani Panah} and A. Yavari and R. {van Schyndel}
                 and D. Georgakopoulos and X. Yi",
  title =        "Context-Driven Granular Disclosure Control for
                 {Internet of Things} Applications",
  journal =      j-IEEE-TRANS-BIG-DATA,
  volume =       "5",
  number =       "3",
  pages =        "408--422",
  month =        sep,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/TBDATA.2017.2737463",
  ISSN =         "2332-7790",
  ISSN-L =       "2332-7790",
  bibdate =      "Tue Oct 29 11:08:44 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetransbigdata.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Big Data",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6687317",
  keywords =     "Authorization; context; context-driven disclosure
                 policies; context-driven granular disclosure control;
                 data handling; data lifecycle; Data models; data
                 obfuscation; data privacy; Data privacy; data stream
                 watermarking techniques; data utility; digital
                 watermark; Internet of Things; IoT data collection; IoT
                 environments; multigranular obfuscation; Privacy;
                 privacy enforcement; Privacy preservation; privacy
                 preservation techniques; pseudorandom numbers; security
                 of data; technology revolution; Watermarking",
}

@Article{Staples:2019:SAB,
  author =       "J. Staples and C. Endicott and L. Krause and P. Pal
                 and P. Samouelian and R. Schantz and A. Wellman",
  title =        "A Semi-Autonomic Bytecode Repair Framework",
  journal =      j-IEEE-SOFTWARE,
  volume =       "36",
  number =       "2",
  pages =        "97--102",
  month =        mar # "\slash " # apr,
  year =         "2019",
  CODEN =        "IESOEG",
  DOI =          "https://doi.org/10.1109/MS.2018.2886829",
  ISSN =         "0740-7459 (print), 1937-4194 (electronic)",
  ISSN-L =       "0740-7459",
  bibdate =      "Fri Aug 2 09:25:48 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesoft.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Software",
  journal-URL =  "http://www.computer.org/portal/web/csdl/magazines/software",
  keywords =     "Cryptography; Ecosystems; Java; Java virtual machine
                 languages; Maintenance engineering; SABRE;
                 semiautonomic bytecode repair engine framework;
                 Servers; Software development; Software maintenance",
}

@Article{Stiles:2019:HSB,
  author =       "D. Stiles",
  title =        "The Hardware Security Behind {Azure Sphere}",
  journal =      j-IEEE-MICRO,
  volume =       "39",
  number =       "2",
  pages =        "20--28",
  month =        mar # "\slash " # apr,
  year =         "2019",
  CODEN =        "IEMIDZ",
  DOI =          "https://doi.org/10.1109/MM.2019.2898633",
  ISSN =         "0272-1732 (print), 1937-4143 (electronic)",
  ISSN-L =       "0272-1732",
  bibdate =      "Thu Mar 21 10:04:13 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeemicro.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Micro",
  journal-URL =  "http://www.computer.org/csdl/mags/mi/index.html",
  keywords =     "authentication; computer security; computer viruses;
                 microcontrollers; real-time systems",
}

@Article{Subramanian:2019:SAF,
  author =       "Nalini Subramanian and J. Andrews",
  title =        "Strong authentication framework using statistical
                 approach for cloud environments",
  journal =      j-CCPE,
  volume =       "31",
  number =       "12",
  pages =        "e4870:1--e4870:??",
  day =          "25",
  month =        jun,
  year =         "2019",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.4870",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Sat Oct 12 11:00:03 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "25 October 2018",
}

@Article{Sujitha:2019:HSP,
  author =       "V. Sujitha and D. Chitra",
  title =        "Highly secure palmprint based biometric template using
                 fuzzy vault",
  journal =      j-CCPE,
  volume =       "31",
  number =       "12",
  pages =        "e4513:1--e4513:??",
  day =          "25",
  month =        jun,
  year =         "2019",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.4513",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Sat Oct 12 11:00:03 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "27 May 2018",
}

@Article{Sundararajan:2019:SMC,
  author =       "Aditya Sundararajan and Arif I. Sarwat and Alexander
                 Pons",
  title =        "A Survey on Modality Characteristics, Performance
                 Evaluation Metrics, and Security for Traditional and
                 Wearable Biometric Systems",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "2",
  pages =        "39:1--39:??",
  month =        may,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3309550",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3309550",
  abstract =     "Biometric research is directed increasingly toward
                 Wearable Biometric Systems (WBS) for user
                 authentication and identification. However, prior to
                 engaging in WBS research, how their operational
                 dynamics and design considerations differ from those of
                 Traditional Biometric Systems (TBS) must be understood.
                 While the current literature is cognizant of those
                 differences, there is no effective work that summarizes
                 the factors where TBS and WBS differ, namely, their
                 modality characteristics, performance, security, and
                 privacy. To bridge the gap, this article accordingly
                 reviews and compares the key characteristics of
                 modalities, contrasts the metrics used to evaluate
                 system performance, and highlights the divergence in
                 critical vulnerabilities, attacks, and defenses for TBS
                 and WBS. It further discusses how these factors affect
                 the design considerations for WBS, the open challenges,
                 and future directions of research in these areas. In
                 doing so, the article provides a big-picture overview
                 of the important avenues of challenges and potential
                 solutions that researchers entering the field should be
                 aware of. Hence, this survey aims to be a starting
                 point for researchers in comprehending the fundamental
                 differences between TBS and WBS before understanding
                 the core challenges associated with WBS and its
                 design.",
  acknowledgement = ack-nhfb,
  articleno =    "39",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Syed:2019:TGB,
  author =       "Zahid Syed and Jordan Helmick and Sean Banerjee and
                 Bojan Cukic",
  title =        "Touch gesture-based authentication on mobile devices:
                 the effects of user posture, device size,
                 configuration, and inter-session variability",
  journal =      j-J-SYST-SOFTW,
  volume =       "149",
  number =       "??",
  pages =        "158--173",
  month =        mar,
  year =         "2019",
  CODEN =        "JSSODM",
  DOI =          "https://doi.org/10.1016/j.jss.2018.11.017",
  ISSN =         "0164-1212 (print), 1873-1228 (electronic)",
  ISSN-L =       "0164-1212",
  bibdate =      "Wed Jan 23 16:35:05 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jsystsoftw.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0164121218302516",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Systems and Software",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01641212",
}

@Article{Takayasu:2019:PKE,
  author =       "Atsushi Takayasu and Noboru Kunihiro",
  title =        "Partial key exposure attacks on {RSA}: Achieving the
                 {Boneh--Durfee} bound",
  journal =      j-THEOR-COMP-SCI,
  volume =       "761",
  number =       "??",
  pages =        "51--77",
  day =          "21",
  month =        feb,
  year =         "2019",
  CODEN =        "TCSCDI",
  DOI =          "https://doi.org/10.1016/j.tcs.2018.08.021",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Tue Jan 29 15:19:47 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2015.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0304397518305371",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{Taylor:2019:DST,
  author =       "Adrian Taylor",
  title =        "Decrypting {SSL} traffic: best practices for security,
                 compliance and productivity",
  journal =      j-NETWORK-SECURITY,
  volume =       "2019",
  number =       "8",
  pages =        "17--19",
  month =        aug,
  year =         "2019",
  CODEN =        "NTSCF5",
  DOI =          "https://doi.org/10.1016/S1353-4858(19)30098-4",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Thu Sep 12 12:58:18 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485819300984",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Testa:2019:SFE,
  author =       "Rafael Luiz Testa and Cl{\'e}ber Gimenez Corr{\^e}a
                 and Ariane Machado-Lima and F{\'a}tima L. S. Nunes",
  title =        "Synthesis of Facial Expressions in Photographs:
                 Characteristics, Approaches, and Challenges",
  journal =      j-COMP-SURV,
  volume =       "51",
  number =       "6",
  pages =        "124:1--124:??",
  month =        feb,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3292652",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:36 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3292652",
  abstract =     "The synthesis of facial expressions has applications
                 in areas such as interactive games, biometrics systems,
                 and training of people with disorders, among others.
                 Although this is an area relatively well explored in
                 the literature, there are no recent studies proposing
                 to systematize an overview of research in the area.
                 This systematic review analyzes the approaches to the
                 synthesis of facial expressions in photographs, as well
                 as important aspects of the synthesis process, such as
                 preprocessing techniques, databases, and evaluation
                 metrics. Forty-eight studies from three different
                 scientific databases were analyzed. From these studies,
                 we established an overview of the process, including
                 all the stages used to synthesize expressions in facial
                 images. We also analyze important aspects involved in
                 these stages such as methods and techniques of each
                 stage, databases, and evaluation metrics. We observed
                 that machine learning approaches are the most widely
                 used to synthesize expressions. Landmark
                 identification, deformation, mapping, fusion, and
                 training are common tasks considered in the approaches.
                 We also found that few studies used metrics to evaluate
                 the results, and most studies used public databases.
                 Although the studies analyzed generated consistent and
                 realistic results while preserving the identity of the
                 subject, there are still research themes to be
                 exploited.",
  acknowledgement = ack-nhfb,
  articleno =    "124",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Toth:2019:SSD,
  author =       "K. C. Toth and A. Anderson-Priddy",
  title =        "Self-Sovereign Digital Identity: A Paradigm Shift for
                 Identity",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "3",
  pages =        "17--27",
  month =        may # "\slash " # jun,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2018.2888782",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
  keywords =     "Data models; Data privacy; Digital systems; Password;
                 Privacy; Protocols",
}

@Article{Tseng:2019:AMR,
  author =       "Yi-Fan Tseng and Chun-I Fan and Cheng-Wei Sung",
  title =        "On the Anonymity of Multi-Receiver Identity-Based
                 Encryption Based on {Fujisaki--Okamoto}
                 Transformation",
  journal =      j-INT-J-FOUND-COMP-SCI,
  volume =       "30",
  number =       "4",
  pages =        "493--509",
  month =        jun,
  year =         "2019",
  DOI =          "https://doi.org/10.1142/S0129054119400094",
  ISSN =         "0129-0541",
  ISSN-L =       "0129-0541",
  bibdate =      "Fri Sep 20 10:48:00 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijfcs.bib",
  URL =          "https://www.worldscientific.com/doi/10.1142/S0129054119400094",
  abstract =     "In 2010, Fan et al. first introduced the concept of
                 anonymous multi-receiver identity-based encryption
                 (AMRIBE). They used the concept of Fujisaki Okamoto
                 transformation (F.O. transformation) to support their
                 proof in random oracle models. Recently, many works on
                 this topic have been proposed. Most of them adopted
                 Fujisaki Okamoto transformation to achieve the
                 indistinguishability of encryptions under multi-ID,
                 chosen-ciphertext attacks (IND-MID-CCA) security.
                 However, we find out that these schemes do not gain
                 anonymity against insider attacks. In this manuscript,
                 we use a sequence of games to prove that any AMRIBE
                 scheme will fail to gain anonymity under
                 chosen-ciphertext attacks and chosen-plaintext attacks
                 if the IND-MID-CCA security is proven using Fujisaki
                 Okamoto transformation.",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Foundations of Computer
                 Science (IJFCS)",
  journal-URL =  "http://www.worldscientific.com/loi/ijfcs",
  remark =       "Special Issue Cryptography and Provable Security",
}

@Article{Turan:2019:CFF,
  author =       "Furkan Turan and Ingrid Verbauwhede",
  title =        "Compact and Flexible {FPGA} Implementation of
                 {Ed25519} and {X25519}",
  journal =      j-TECS,
  volume =       "18",
  number =       "3",
  pages =        "24:1--24:??",
  month =        jun,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3312742",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Thu Oct 17 18:16:43 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tecs.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3312742",
  abstract =     "This article describes a field-programmable gate array
                 (FPGA) cryptographic architecture, which combines the
                 elliptic curve--based Ed25519 digital signature
                 algorithm and the X25519 key establishment scheme in a
                 single module. Cryptographically, these are
                 high-security elliptic curve cryptography algorithms
                 with short key sizes and impressive execution times in
                 software. Our goal is to provide a lightweight FPGA
                 module that enables them on resource-constrained
                 devices, specifically for Internet of Things (IoT)
                 applications. In addition, we aim at extensibility with
                 customisable countermeasures against timing and
                 differential power analysis side-channel attacks and
                 fault-injection attacks. For the former, we offer a
                 choice between time-optimised versus constant-time
                 execution, with or without Z -coordinate randomisation
                 and base-point blinding; and for the latter, we offer
                 enabling or disabling default-case statements in the
                 Finite State Machine (FSM) descriptions. To obtain
                 compactness and at the same time fast execution times,
                 we make maximum use of the Digital Signal Processing
                 (DSP) slices on the FPGA. We designed a single
                 arithmetic unit that is flexible to support operations
                 with two moduli and non-modulus arithmetic. In
                 addition, our design benefits in-place memory
                 management and the local storage of inputs into DSP
                 slices' pipeline registers and takes advantage of
                 distributed memory. These eliminate a memory access
                 bottleneck. The flexibility is offered by a micro-code
                 supported instruction-set architecture. Our design
                 targets 7-Series Xilinx FPGAs and is prototyped on a
                 Zynq System-on-Chip (SoC). The base design combining
                 Ed25519 and X25519 in a single module, and its
                 implementation requires only around 11.1K Lookup Tables
                 (LUTs), 2.6K registers, and 16 DSP slices. Also, it
                 achieves performance of 1.6ms for a signature
                 generation and 3.6ms for a signature verification for a
                 1024-bit message with an 82MHz clock. Moreover, the
                 design can be optimised only for X25519, which gives
                 the most compact FPGA implementation compared to
                 previously published X25519 implementations.",
  acknowledgement = ack-nhfb,
  articleno =    "24",
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J840",
}

@Article{Ueno:2019:TBP,
  author =       "R. Ueno and M. Suzuki and N. Homma",
  title =        "Tackling Biased {PUFs} Through Biased Masking: a
                 Debiasing Method for Efficient Fuzzy Extractor",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "68",
  number =       "7",
  pages =        "1091--1104",
  month =        jul,
  year =         "2019",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2019.2897996",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Thu Jul 11 09:46:20 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
  keywords =     "added noise; artificial noise; biased mask; biased
                 masking; biased physically unclonable functions; biased
                 PUFs; bit-parallel; BM-based debiasing; BM-based FE;
                 conventional code-offset FE; conventional
                 debiasing-based FEs; cryptography; Cryptography;
                 debiasing; debiasing method; Decoding; efficiency 20.0
                 percent; efficiency 60.0 percent; efficient fuzzy
                 extractor design; Entropy; entropy; entropy leak; error
                 correction codes; Error correction codes; fuzzy
                 extractor; fuzzy set theory; Generators; Iron;
                 nonnegligible biases; Physically unclonable function
                 (PUF); PUF noise; random number generation; random
                 number generator; Reliability; secure key generation",
}

@Article{Valente:2019:SSA,
  author =       "J. Valente and M. A. Wynn and A. A. Cardenas",
  title =        "Stealing, Spying, and Abusing: Consequences of Attacks
                 on {Internet of Things} Devices",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "5",
  pages =        "10--21",
  month =        sep # "\slash " # oct,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2924167",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Sep 17 17:34:33 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
  keywords =     "Computer architecture; Computer security;
                 Cryptography; Drones; Internet of Things; Privacy; Risk
                 management",
}

@Article{Vazirani:2019:FDI,
  author =       "Umesh Vazirani and Thomas Vidick",
  title =        "Fully device independent quantum key distribution",
  journal =      j-CACM,
  volume =       "62",
  number =       "4",
  pages =        "133--133",
  month =        apr,
  year =         "2019",
  CODEN =        "CACMA2",
  ISSN =         "0001-0782 (print), 1557-7317 (electronic)",
  ISSN-L =       "0001-0782",
  bibdate =      "Sat Mar 30 10:22:08 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cacm2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://cacm.acm.org/magazines/2019/4/235624/fulltext",
  abstract =     "Quantum cryptography promises levels of security that
                 are impossible to attain in a classical world. Can this
                 security be guaranteed to classical users of a quantum
                 protocol, who may not even trust the quantum devices
                 used to implement the protocol? This central question
                 dates back to the early 1990s when the challenge of
                 achieving Device-Independent Quantum Key Distribution
                 (DIQKD) was first formulated. We answer the challenge
                 by rigorously proving the device-independent security
                 of an entanglement-based protocol building on Ekert's
                 original proposal for quantum key distribution. The
                 proof of security builds on techniques from the
                 classical theory of pseudo-randomness to achieve a new
                 quantitative understanding of the non-local nature of
                 quantum correlations.",
  acknowledgement = ack-nhfb,
  fjournal =     "Communications of the ACM",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J79",
}

@Article{Vgena:2019:TAL,
  author =       "Katerina Vgena and Angeliki Kitsiou and Christos
                 Kalloniatis and Dimitris Kavroudakis and Stefanos
                 Gritzalis",
  title =        "Toward Addressing Location Privacy Issues: New
                 Affiliations with Social and Location Attributes",
  journal =      j-FUTURE-INTERNET,
  volume =       "11",
  number =       "11",
  pages =        "234",
  day =          "01",
  month =        nov,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi11110234",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:51:08 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/11/11/234",
  abstract =     "Nowadays, location-sharing applications (LSA) within
                 social media enable users to share their location
                 information at different levels of precision. Users on
                 their side are willing to disclose this kind of
                 information in order to represent themselves in a
                 socially acceptable online way. However, they express
                 privacy concerns regarding potential malware
                 location-sharing applications, since users' geolocation
                 information can provide affiliations with their social
                 identity attributes that enable the specification of
                 their behavioral normativity, leading to sensitive
                 information disclosure and privacy leaks. This paper,
                 after a systematic review on previous social and
                 privacy location research, explores the overlapping of
                 these fields in identifying users' social attributes
                 through examining location attributes while online, and
                 proposes a targeted set of location privacy attributes
                 related to users' socio-spatial characteristics within
                 social media.",
  acknowledgement = ack-nhfb,
  remark =       "Collection Featured Reviews of Future Internet
                 Research.",
}

@Article{Vijayarajan:2019:BKB,
  author =       "R. Vijayarajan and P. Gnanasivam and R. Avudaiammal",
  title =        "Bio-Key Based {AES} for Personalized Image
                 Cryptography",
  journal =      j-COMP-J,
  volume =       "62",
  number =       "11",
  pages =        "1695--1705",
  month =        nov,
  year =         "2019",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxz030",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Sat Nov 30 05:41:04 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://academic.oup.com/comjnl/article/62/11/1695/5436925",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Vo:2019:ISA,
  author =       "Tri Hoang Vo and Woldemar Fuhrmann and Klaus-Peter
                 Fischer-Hellmann and Steven Furnell",
  title =        "Identity-as-a-Service: An Adaptive Security
                 Infrastructure and Privacy-Preserving User Identity for
                 the Cloud Environment",
  journal =      j-FUTURE-INTERNET,
  volume =       "11",
  number =       "5",
  pages =        "116",
  day =          "15",
  month =        may,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi11050116",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:51:06 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/11/5/116",
  abstract =     "In recent years, enterprise applications have begun to
                 migrate from a local hosting to a cloud provider and
                 may have established a business-to-business
                 relationship with each other manually. Adaptation of
                 existing applications requires substantial
                 implementation changes in individual architectural
                 components. On the other hand, users may store their
                 Personal Identifiable Information (PII) in the cloud
                 environment so that cloud services may access and use
                 it on demand. Even if cloud services specify their
                 privacy policies, we cannot guarantee that they follow
                 their policies and will not (accidentally) transfer PII
                 to another party. In this paper, we present
                 Identity-as-a-Service (IDaaS) as a trusted Identity and
                 Access Management with two requirements: Firstly, IDaaS
                 adapts trust between cloud services on demand. We move
                 the trust relationship and identity propagation out of
                 the application implementation and model them as a
                 security topology. When the business comes up with a
                 new e-commerce scenario, IDaaS uses the security
                 topology to adapt a platform-specific security
                 infrastructure for the given business scenario at
                 runtime. Secondly, we protect the confidentiality of
                 PII in federated security domains. We propose our
                 Purpose-based Encryption to protect the disclosure of
                 PII from intermediary entities in a business
                 transaction and from untrusted hosts. Our solution is
                 compliant with the General Data Protection Regulation
                 and involves the least user interaction to prevent
                 identity theft via the human link. The implementation
                 can be easily adapted to existing Identity Management
                 systems, and the performance is fast.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Security and Privacy in Information and
                 Communication Systems.",
}

@Article{Voris:2019:AAU,
  author =       "Jonathan Voris and Yingbo Song and Malek {Ben Salem}
                 and Shlomo Hershkop and Salvatore Stolfo",
  title =        "Active authentication using file system decoys and
                 user behavior modeling: results of a large scale
                 study",
  journal =      j-COMPUT-SECUR,
  volume =       "87",
  number =       "??",
  pages =        "Article 101412",
  month =        nov,
  year =         "2019",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2018.07.021",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Jan 22 15:25:37 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404818311258",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Voulgaris:2019:BTI,
  author =       "Spyros Voulgaris and Nikos Fotiou and Vasilios A.
                 Siris and George C. Polyzos and Mikael Jaatinen and
                 Yannis Oikonomidis",
  title =        "Blockchain Technology for Intelligent Environments",
  journal =      j-FUTURE-INTERNET,
  volume =       "11",
  number =       "10",
  pages =        "213",
  day =          "11",
  month =        oct,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi11100213",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:51:08 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/11/10/213",
  abstract =     "In the last few years, we have been witnessing the
                 convergence of the physical with the digital world. The
                 Internet of Things (IoT) is progressing at a fast pace,
                 and IoT devices are becoming pervasive in our physical
                 environments, bringing the vision of Intelligent
                 Environments closer to reality. At the same time, the
                 newly-introduced blockchain technology is offering for
                 the first time ever cryptographically proven trust
                 based on a set of mutually untrusted nodes. Blockchain
                 technology thus has the potential to become a key
                 component of many IoT systems, offering them an
                 unprecedented level of accountability, transparency,
                 and reliability. This paper first lays out the
                 principles on which blockchain systems are operating,
                 along with descriptions of the most noteworthy
                 blockchain implementations. It then presents a number
                 of systems through which blockchains may interact with
                 external systems and third-party data sources. Finally,
                 it provides a survey of the state-of-the-art
                 blockchain-based systems targeting IoT applications.",
  acknowledgement = ack-nhfb,
  remark =       "Collection Featured Reviews of Future Internet
                 Research.",
}

@Article{Wang:2019:CPB,
  author =       "Licheng Wang and Xiaoying Shen and Jing Li and Jun
                 Shao and Yixian Yang",
  title =        "Cryptographic primitives in blockchains",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "127",
  number =       "??",
  pages =        "43--58",
  day =          "1",
  month =        feb,
  year =         "2019",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Mon Oct 14 14:16:29 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S108480451830362X",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Wang:2019:CSS,
  author =       "Xu An Wang and Fatos Xhafa and Jianfeng Ma and Zhiheng
                 Zheng",
  title =        "Controlled secure social cloud data sharing based on a
                 novel identity based proxy re-encryption plus scheme",
  journal =      j-J-PAR-DIST-COMP,
  volume =       "130",
  number =       "??",
  pages =        "153--165",
  month =        aug,
  year =         "2019",
  CODEN =        "JPDCER",
  DOI =          "https://doi.org/10.1016/j.jpdc.2019.03.018",
  ISSN =         "0743-7315 (print), 1096-0848 (electronic)",
  ISSN-L =       "0743-7315",
  bibdate =      "Mon May 20 18:06:40 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jpardistcomp.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0743731519302345",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Parallel and Distributed Computing",
  journal-URL =  "http://www.sciencedirect.com/science/journal/07437315",
}

@Article{Wang:2019:FTSa,
  author =       "Leimin Wang and Tiandu Dong and Ming-Feng Ge",
  title =        "Finite-time synchronization of memristor chaotic
                 systems and its application in image encryption",
  journal =      j-APPL-MATH-COMP,
  volume =       "347",
  number =       "??",
  pages =        "293--305",
  day =          "15",
  month =        apr,
  year =         "2019",
  CODEN =        "AMHCBQ",
  DOI =          "https://doi.org/10.1016/j.amc.2018.11.017",
  ISSN =         "0096-3003 (print), 1873-5649 (electronic)",
  ISSN-L =       "0096-3003",
  bibdate =      "Fri Dec 21 17:54:09 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/applmathcomput2015.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0096300318309901",
  acknowledgement = ack-nhfb,
  fjournal =     "Applied Mathematics and Computation",
  journal-URL =  "http://www.sciencedirect.com/science/journal/00963003",
}

@Article{Wang:2019:IFT,
  author =       "Gaoli Wang and Zhenfu Cao and Xiaolei Dong",
  title =        "Improved Fault-Tolerant Aggregate Signatures",
  journal =      j-COMP-J,
  volume =       "62",
  number =       "4",
  pages =        "481--489",
  month =        apr,
  year =         "2019",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxy108",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Apr 2 12:10:39 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://academic.oup.com/comjnl/article/62/4/481/5139676",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Wang:2019:MBN,
  author =       "Qian Wang and Chenhui Jin",
  title =        "A Method to Bound the Number of Active {S}-Boxes for a
                 Kind of {AES}-Like Structure",
  journal =      j-COMP-J,
  volume =       "62",
  number =       "8",
  pages =        "1121--1131",
  month =        aug,
  year =         "2019",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxz006",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Aug 19 07:31:49 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://academic.oup.com/comjnl/article/62/8/1121/5319150",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Wang:2019:NTB,
  author =       "Chen Wang and Lu Xiao and Jian Shen and Rui Huang",
  title =        "Neighborhood trustworthiness-based vehicle-to-vehicle
                 authentication scheme for vehicular ad hoc networks",
  journal =      j-CCPE,
  volume =       "31",
  number =       "21",
  pages =        "e4643:1--e4643:??",
  day =          "10",
  month =        nov,
  year =         "2019",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.4643",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Wed Mar 31 07:52:09 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "Concurr. Comput.",
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "25 May 2018",
}

@Article{Wang:2019:RSI,
  author =       "Ping Wang and Xing He and Yushu Zhang and Wenying Wen
                 and Ming Li",
  title =        "A robust and secure image sharing scheme with personal
                 identity information embedded",
  journal =      j-COMPUT-SECUR,
  volume =       "85",
  number =       "??",
  pages =        "107--121",
  month =        aug,
  year =         "2019",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:47:01 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404819300914",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wang:2019:SFE,
  author =       "Xiaofen Wang and Hong-Ning Dai and Ke Zhang",
  title =        "Secure and flexible economic data sharing protocol
                 based on {ID}-based dynamic exclusive broadcast
                 encryption in economic system",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "99",
  number =       "??",
  pages =        "177--185",
  month =        oct,
  year =         "2019",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Mon Oct 14 16:09:56 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X18316145",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Wazid:2019:DSK,
  author =       "Mohammad Wazid and Ashok Kumar Das and Neeraj Kumar
                 and Athanasios V. Vasilakos",
  title =        "Design of secure key management and user
                 authentication scheme for fog computing services",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "91",
  number =       "??",
  pages =        "475--492",
  month =        feb,
  year =         "2019",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Tue Feb 5 08:15:51 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167739X18303959",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Wei:2019:VFA,
  author =       "Shih-En Wei and Jason Saragih and Tomas Simon and Adam
                 W. Harley and Stephen Lombardi and Michal Perdoch and
                 Alexander Hypes and Dawei Wang and Hernan Badino and
                 Yaser Sheikh",
  title =        "{VR} facial animation via multiview image
                 translation",
  journal =      j-TOG,
  volume =       "38",
  number =       "4",
  pages =        "67:1--67:??",
  month =        jul,
  year =         "2019",
  CODEN =        "ATGRDF",
  DOI =          "https://doi.org/10.1145/3306346.3323030",
  ISSN =         "0730-0301 (print), 1557-7368 (electronic)",
  ISSN-L =       "0730-0301",
  bibdate =      "Tue Oct 22 12:28:16 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tog.bib",
  abstract =     "A key promise of Virtual Reality (VR) is the
                 possibility of remote social interaction that is more
                 immersive than any prior telecommunication media.
                 However, existing social VR experiences are mediated by
                 inauthentic digital representations of the user (i.e.,
                 stylized avatars). These stylized representations have
                 limited the adoption of social VR applications in
                 precisely those cases where immersion is most necessary
                 (e.g., professional interactions and intimate
                 conversations). In this work, we present a
                 bidirectional system that can animate avatar heads of
                 both users' full likeness using consumer-friendly
                 headset mounted cameras (HMC). There are two main
                 challenges in doing this: unaccommodating camera views
                 and the image-to-avatar domain gap. We address both
                 challenges by leveraging constraints imposed by
                 multiview geometry to establish precise image-to-avatar
                 correspondence, which are then used to learn an
                 end-to-end model for real-time tracking. We present
                 designs for a training HMC, aimed at data-collection
                 and model building, and a tracking HMC for use during
                 interactions in VR. Correspondence between the avatar
                 and the HMC-acquired images are automatically found
                 through self-supervised multiview image translation,
                 which does not require manual annotation or one-to-one
                 correspondence between domains. We evaluate the system
                 on a variety of users and demonstrate significant
                 improvements over prior work.",
  acknowledgement = ack-nhfb,
  articleno =    "67",
  fjournal =     "ACM Transactions on Graphics",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J778",
}

@Article{Woo:2019:UEM,
  author =       "Simon S. Woo and Ron Artstein and Elsi Kaiser and Xiao
                 Le and Jelena Mirkovic",
  title =        "Using Episodic Memory for User Authentication",
  journal =      j-TOPS,
  volume =       "22",
  number =       "2",
  pages =        "11:1--11:??",
  month =        apr,
  year =         "2019",
  DOI =          "https://doi.org/10.1145/3308992",
  ISSN =         "2471-2566 (print), 2471-2574 (electronic)",
  bibdate =      "Sat Sep 21 08:26:25 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tops.bib",
  URL =          "https://dl.acm.org/citation.cfm?id=3308992",
  abstract =     "Passwords are widely used for user authentication, but
                 they are often difficult for a user to recall, easily
                 cracked by automated programs, and heavily reused.
                 Security questions are also used for secondary
                 authentication. They are more memorable than passwords,
                 because the question serves as a hint to the user, but
                 they are very easily guessed. We propose a new
                 authentication mechanism, called ``life-experience
                 passwords (LEPs).'' Sitting somewhere between passwords
                 and security questions, an LEP consists of several
                 facts about a user-chosen life event-such as a trip, a
                 graduation, a wedding, and so on. At LEP creation, the
                 system extracts these facts from the user's input and
                 transforms them into questions and answers. At
                 authentication, the system prompts the user with
                 questions and matches the answers with the stored ones.
                 We show that question choice and design make LEPs much
                 more secure than security questions and passwords,
                 while the question-answer format promotes low password
                 reuse and high recall. Specifically, we find that: (1)
                 LEPs are 10 9 --10 14 $ \times $ stronger than an
                 ideal, randomized, eight-character password; (2) LEPs
                 are up to 3 $ \times $ more memorable than passwords
                 and on par with security questions; and (3) LEPs are
                 reused half as often as passwords. While both LEPs and
                 security questions use personal experiences for
                 authentication, LEPs use several questions that are
                 closely tailored to each user. This increases LEP
                 security against guessing attacks. In our evaluation,
                 only 0.7\% of LEPs were guessed by casual friends, and
                 9.5\% by family members or close friends-roughly half
                 of the security question guessing rate. On the
                 downside, LEPs take around 5 $ \times $ longer to input
                 than passwords. So, these qualities make LEPs suitable
                 for multi-factor authentication at high-value servers,
                 such as financial or sensitive work servers, where
                 stronger authentication strength is needed.",
  acknowledgement = ack-nhfb,
  articleno =    "11",
  fjournal =     "ACM Transactions on Privacy and Security (TOPS)",
  journal-URL =  "http://dl.acm.org/citation.cfm?id=J1547",
}

@Article{Woodworth:2019:SSS,
  author =       "Jason W. Woodworth and Mohsen Amini Salehi",
  title =        "{S3BD}: Secure semantic search over encrypted big data
                 in the cloud",
  journal =      j-CCPE,
  volume =       "31",
  number =       "11",
  pages =        "e5050:1--e5050:??",
  day =          "10",
  month =        jun,
  year =         "2019",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.5050",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Sat Oct 12 11:00:02 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "11 December 2018",
}

@Article{Wu:2019:PFI,
  author =       "Libing Wu and Yubo Zhang and Kim-Kwang Raymond Choo
                 and Debiao He",
  title =        "Pairing-Free Identity-Based Encryption with Authorized
                 Equality Test in Online Social Networks",
  journal =      j-INT-J-FOUND-COMP-SCI,
  volume =       "30",
  number =       "4",
  pages =        "647--664",
  month =        jun,
  year =         "2019",
  DOI =          "https://doi.org/10.1142/S0129054119400185",
  ISSN =         "0129-0541",
  ISSN-L =       "0129-0541",
  bibdate =      "Fri Sep 20 10:48:00 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijfcs.bib",
  URL =          "https://www.worldscientific.com/doi/10.1142/S0129054119400185",
  abstract =     "Online social networking applications have become more
                 and more popular in the advance of the technological
                 age. Much of our personal information has been
                 disclosed in social networking activities and
                 privacy-preserving still remains a research challenge
                 in social network. Public key encryption scheme with
                 equality test(PKEET), which is an extension of public
                 key encryption with keyword search (PEKS), seems to be
                 a solution. PKEET enables the tester to check whether
                 two given ciphertexts are derived from the same
                 plaintext. Recently, Zhu et al. proposed a pairing-free
                 public key encryption scheme with equality test based
                 on the traditional public key cryptosystem. However, it
                 suffers from certificates management issue. In this
                 paper, we propose a pairing-free identity-based
                 encryption scheme with authorized equality
                 test(PF-IBEAET). The PF-IBEAET scheme also provides
                 fine-grained authorizations. We prove that the scheme
                 is one way secure against chosen identity and chosen
                 ciphertext attack (OW-ID-CCA) and indistinguishable
                 against chosen-identity and chosen-ciphertext attack
                 (IND-ID-CCA) in the random oracle model (ROM).
                 Performance analysis shows that the scheme achieves a
                 better performance than similar schemes.",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Foundations of Computer
                 Science (IJFCS)",
  journal-URL =  "http://www.worldscientific.com/loi/ijfcs",
  remark =       "Special Issue Cryptography and Provable Security",
}

@Article{Wu:2019:VFS,
  author =       "Zhiqiang Wu and Kenli Li",
  title =        "{VBTree}: forward secure conjunctive queries over
                 encrypted data for cloud computing",
  journal =      j-VLDB-J,
  volume =       "28",
  number =       "1",
  pages =        "25--46",
  month =        feb,
  year =         "2019",
  CODEN =        "VLDBFR",
  DOI =          "https://doi.org/10.1007/s00778-018-0517-6",
  ISSN =         "1066-8888 (print), 0949-877X (electronic)",
  ISSN-L =       "1066-8888",
  bibdate =      "Tue Feb 5 08:07:20 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/vldbj.bib",
  abstract =     "This paper concerns the fundamental problem of
                 processing conjunctive keyword queries over an
                 outsourced data table on untrusted public clouds in a
                 privacy-preserving manner. The data table can be
                 properly implemented with tree-based searchable
                 symmetric encryption schemes, such as the known Keyword
                 Red---Black tree and the Indistinguishable Bloom-filter
                 Tree in ICDE'17. However, as for these trees, there
                 still exist many limitations to support sub-linear time
                 updates. One of the reasons is that their tree branches
                 are directly exposed to the cloud. To achieve efficient
                 conjunctive queries while supporting dynamic updates,
                 we introduce a novel tree data structure called virtual
                 binary tree (VBTree). Our key design is to organize
                 indexing elements into the VBTree in a top-down
                 fashion, without storing any tree branches and tree
                 nodes. The tree only exists in a logical view, and all
                 of the elements are actually stored in a hash table. To
                 achieve forward privacy, which is discussed by Bost in
                 CCS'16, we also propose a storage mechanism called
                 version control repository (VCR), to record and control
                 versions of keywords and queries. VCR has a smaller
                 client-side storage compared to other forward-private
                 schemes. With our proposed approach, data elements can
                 be quickly searched while the index can be privately
                 updated. The security of the VBTree is formally proved
                 under the IND-CKA2 model. We test our scheme on a real
                 e-mail dataset and a user location dataset. The testing
                 results demonstrate its high efficiency and scalability
                 in both searching and updating processes.",
  acknowledgement = ack-nhfb,
  fjournal =     "VLDB Journal: Very Large Data Bases",
  journal-URL =  "http://portal.acm.org/toc.cfm?id=J869",
}

@Article{Xiao:2019:NEA,
  author =       "C. Xiao and L. Zhang and W. Liu and L. Cheng and P. Li
                 and Y. Pan and N. Bergmann",
  title =        "{NV-eCryptfs}: Accelerating Enterprise-Level
                 Cryptographic File System with Non-Volatile Memory",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "68",
  number =       "9",
  pages =        "1338--1352",
  month =        sep,
  year =         "2019",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2018.2889691",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Fri Aug 30 05:58:40 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
  keywords =     "Acceleration; asynchronous I/O; Big Data; big data;
                 cloud computing; cryptography; data block resides; data
                 transmitting; eCryptfs; Encryption; enterprise-level
                 cryptographic file system; EXT4; Hardware; hardware
                 acceleration; hardware accelerators; I-O requests;
                 lookup operations; noncrypto file system; nonvolatile
                 memory; Nonvolatile memory; NV-eCryptfs; NVM; NVM
                 management; parallel cryptographic operations;
                 Performance evaluation; QAT; Software; software stack;
                 storage devices; storage management; table lookup;
                 time-consuming encryption operations",
}

@Article{Xiong:2019:PPH,
  author =       "Hu Xiong and Yanan Zhao and Li Peng and Hao Zhang and
                 Kuo-Hui Yeh",
  title =        "Partially policy-hidden attribute-based broadcast
                 encryption with secure delegation in edge computing",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "97",
  number =       "??",
  pages =        "453--461",
  month =        aug,
  year =         "2019",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Mon Oct 14 16:09:57 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X19300172",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Xu:2019:DAB,
  author =       "Qian Xu and Chengxiang Tan and Wenye Zhu and Ya Xiao
                 and Zhijie Fan and Fujia Cheng",
  title =        "Decentralized attribute-based conjunctive keyword
                 search scheme with online\slash offline encryption and
                 outsource decryption for cloud computing",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "97",
  number =       "??",
  pages =        "306--326",
  month =        aug,
  year =         "2019",
  CODEN =        "FGSEVI",
  DOI =          "https://doi.org/10.1016/j.future.2019.02.067",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Mon Oct 14 16:09:57 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X18329613",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Xu:2019:LAM,
  author =       "Zisang Xu and Cheng Xu and Haixian Chen and Fang
                 Yang",
  title =        "A lightweight anonymous mutual authentication and key
                 agreement scheme for {WBAN}",
  journal =      j-CCPE,
  volume =       "31",
  number =       "14",
  pages =        "e5295:1--e5295:??",
  day =          "25",
  month =        jul,
  year =         "2019",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.5295",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Sat Oct 12 11:00:03 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "06 May 2019",
}

@Article{Xu:2019:SIC,
  author =       "Shengmin Xu and Guomin Yang and Yi Mu and Ximeng Liu",
  title =        "A secure {IoT} cloud storage system with fine-grained
                 access control and decryption key exposure resistance",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "97",
  number =       "??",
  pages =        "284--294",
  month =        aug,
  year =         "2019",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Mon Oct 14 16:09:57 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X18320922",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Xu:2019:TPT,
  author =       "Lingling Xu and Jin Li and Xiaofeng Chen and Wanhua Li
                 and Shaohua Tang and Hao-Tian Wu",
  title =        "{Tc-PEDCKS}: Towards time controlled public key
                 encryption with delegatable conjunctive keyword search
                 for {Internet of Things}",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "128",
  number =       "??",
  pages =        "11--20",
  day =          "15",
  month =        feb,
  year =         "2019",
  CODEN =        "JNCAF3",
  DOI =          "https://doi.org/10.1016/j.jnca.2018.12.003",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Mon Oct 14 14:16:29 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804518303850",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Xue:2019:SEA,
  author =       "Kaiping Xue and Peixuan He and Xiang Zhang and Qiudong
                 Xia and David S. L. Wei and Hao Yue and Feng Wu",
  title =        "A Secure, Efficient, and Accountable Edge-Based Access
                 Control Framework for Information Centric Networks",
  journal =      j-IEEE-TRANS-NETWORKING,
  volume =       "27",
  number =       "3",
  pages =        "1220--1233",
  month =        jun,
  year =         "2019",
  CODEN =        "IEANEP",
  DOI =          "https://doi.org/10.1109/TNET.2019.2914189",
  ISSN =         "1063-6692 (print), 1558-2566 (electronic)",
  ISSN-L =       "1063-6692",
  bibdate =      "Wed Oct 2 08:29:26 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
  abstract =     "Information centric networking ICN has been regarded
                 as an ideal architecture for the next-generation
                 network to handle users' increasing demand for content
                 delivery with in-network cache. While making better use
                 of network resources and providing better service
                 delivery, an effective access control mechanism is
                 needed due to the widely disseminated contents.
                 However, in the existing solutions, making
                 cache-enabled routers or content providers authenticate
                 users' requests causes high computation overhead and
                 unnecessary delay. Also, the straightforward
                 utilization of advanced encryption algorithms makes the
                 system vulnerable to DoS attacks. Besides, privacy
                 protection and service accountability are rarely taken
                 into account in this scenario. In this paper, we
                 propose SEAF, a secure, efficient, and accountable
                 edge-based access control framework for ICN, in which
                 authentication is performed at the network edge to
                 block unauthorized requests at the very beginning. We
                 adopt group signature to achieve anonymous
                 authentication and use hash chain technique to reduce
                 greatly the overhead when users make continuous
                 requests for the same file. At the same time, we
                 provide an efficient revocation method to make our
                 framework more robust. Furthermore, the content
                 providers can affirm the service amount received from
                 the network and extract feedback information from the
                 signatures and hash chains. By formal security analysis
                 and the comparison with related works, we show that
                 SEAF achieves the expected security goals and possesses
                 more useful features. The experimental results also
                 demonstrate that our design is efficient for routers
                 and content providers and bring in only slight delay
                 for users' content retrieval.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE\slash ACM Transactions on Networking",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J771",
}

@Article{Yaacoubi:2019:REM,
  author =       "Omar Yaacoubi",
  title =        "The rise of encrypted malware",
  journal =      j-NETWORK-SECURITY,
  volume =       "2019",
  number =       "5",
  pages =        "6--9",
  month =        may,
  year =         "2019",
  CODEN =        "NTSCF5",
  ISSN =         "1353-4858 (print), 1872-9371 (electronic)",
  ISSN-L =       "1353-4858",
  bibdate =      "Thu Sep 12 12:58:13 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/network-security.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1353485819300595",
  acknowledgement = ack-nhfb,
  fjournal =     "Network Security",
  journal-URL =  "https://www.sciencedirect.com/journal/network-security",
}

@Article{Yan:2019:HDS,
  author =       "Z. Yan and L. Zhang and W. DING and Q. Zheng",
  title =        "Heterogeneous Data Storage Management with
                 Deduplication in Cloud Computing",
  journal =      j-IEEE-TRANS-BIG-DATA,
  volume =       "5",
  number =       "3",
  pages =        "393--407",
  month =        sep,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/TBDATA.2017.2701352",
  ISSN =         "2332-7790",
  ISSN-L =       "2332-7790",
  bibdate =      "Tue Oct 29 11:08:44 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetransbigdata.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Big Data",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6687317",
  keywords =     "access control; Access control; access control;
                 authorisation; Big data; cloud computing; Cloud
                 computing; cloud servers; cloud storage; cloud users;
                 cryptography; Data deduplication; data owners; data
                 privacy; data sensitivity; data sharing; deduplication
                 management; encrypted data storage; Encryption;
                 heterogeneous data storage management; Memory; multiple
                 Cloud Service Providers; outsourcing; security
                 analysis; storage management",
}

@Article{Yan:2019:IFF,
  author =       "Hongyang Yan and Yu Wang and Chunfu Jia and Jin Li and
                 Yang Xiang and Witold Pedrycz",
  title =        "{IoT-FBAC}: Function-based access control scheme using
                 identity-based encryption in {IoT}",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "95",
  number =       "??",
  pages =        "344--353",
  month =        jun,
  year =         "2019",
  CODEN =        "FGSEVI",
  DOI =          "https://doi.org/10.1016/j.future.2018.12.061",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Mon Oct 14 16:09:56 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X1830997X",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Yang:2019:ISO,
  author =       "Haining Yang and Jiameng Sun and Jing Qin and Jixin
                 Ma",
  title =        "An improved scheme for outsourced computation with
                 attribute-based encryption",
  journal =      j-CCPE,
  volume =       "31",
  number =       "21",
  pages =        "e4833:1--e4833:??",
  day =          "10",
  month =        nov,
  year =         "2019",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.4833",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Wed Mar 31 07:52:09 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "Concurr. Comput.",
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "15 October 2018",
}

@Article{Yang:2019:NAK,
  author =       "Zheng Yang and Junyu Lai and Yingbing Sun and Jianying
                 Zhou",
  title =        "A Novel Authenticated Key Agreement Protocol With
                 Dynamic Credential for {WSNs}",
  journal =      j-TOSN,
  volume =       "15",
  number =       "2",
  pages =        "22:1--22:??",
  month =        apr,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3303704",
  ISSN =         "1550-4859 (print), 1550-4867 (electronic)",
  ISSN-L =       "1550-4859",
  bibdate =      "Wed Oct 2 09:20:26 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tosn.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3303704",
  abstract =     "Public key cryptographic primitive (e.g., the famous
                 Diffie--Hellman key agreement, or public key
                 encryption) has recently been used as a standard
                 building block in authenticated key agreement (AKA)
                 constructions for wireless sensor networks (WSNs) to
                 provide perfect forward secrecy (PFS), where the
                 expensive cryptographic operation (i.e., exponentiation
                 calculation) is involved. However, realizing such
                 complex computation on resource-constrained wireless
                 sensors is inefficient and even impossible on some
                 devices. In this work, we introduce a new AKA scheme
                 with PFS for WSNs without using any public key
                 cryptographic primitive. To achieve PFS, we rely on a
                 new dynamic one-time authentication credential that is
                 regularly updated in each session. In particular, each
                 value of the authentication credential is wisely
                 associated with at most one session key that enables us
                 to fulfill the security goal of PFS. Furthermore, the
                 proposed scheme enables the principals to identify
                 whether they have been impersonated previously. We
                 highlight that our scheme can be very efficiently
                 implemented on sensors since only hash function and XOR
                 operation are required.",
  acknowledgement = ack-nhfb,
  articleno =    "22",
  fjournal =     "ACM Transactions on Sensor Networks (TOSN)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J981",
}

@Article{Yang:2019:NPP,
  author =       "Xu Yang and Xun Yi and Ibrahim Khalil and Hui Cui and
                 Xuechao Yang and Surya Nepal and Xinyi Huang and Yali
                 Zeng",
  title =        "A new privacy-preserving authentication protocol for
                 anonymous web browsing",
  journal =      j-CCPE,
  volume =       "31",
  number =       "21",
  pages =        "e4706:1--e4706:??",
  day =          "10",
  month =        nov,
  year =         "2019",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.4706",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Wed Mar 31 07:52:09 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "Concurr. Comput.",
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "05 September 2018",
}

@Article{Yang:2019:SCC,
  author =       "Haomiao Yang and Xiaofen Wang and Chun Yang and Xin
                 Cong and You Zhang",
  title =        "Securing content-centric networks with content-based
                 encryption",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "128",
  number =       "??",
  pages =        "21--32",
  day =          "15",
  month =        feb,
  year =         "2019",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Mon Oct 14 14:16:29 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804518303874",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Yao:2019:ACC,
  author =       "Zhongyuan Yao and Yi Mu",
  title =        "{ACE} with Compact Ciphertext Size and Decentralized
                 Sanitizers",
  journal =      j-INT-J-FOUND-COMP-SCI,
  volume =       "30",
  number =       "4",
  pages =        "531--549",
  month =        jun,
  year =         "2019",
  DOI =          "https://doi.org/10.1142/S0129054119400112",
  ISSN =         "0129-0541",
  ISSN-L =       "0129-0541",
  bibdate =      "Fri Sep 20 10:48:00 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijfcs.bib",
  URL =          "https://www.worldscientific.com/doi/10.1142/S0129054119400112",
  abstract =     "We present an access control encryption (ACE) scheme
                 which enjoys advantages over previous works in several
                 aspects. Our scheme ensures not only compact ciphertext
                 size but also small size of keys installed in each user
                 in the ACE system. Besides, to the best of our
                 knowledge, our scheme is the first implementation of
                 ACE with decentralized sanitizers. Comparing to ACE
                 constructions with only one sanitizer, our scheme is
                 more secure and reliable since it does not suffer from
                 the single point failure. Considering the security of
                 our scheme, we present two models catering to the
                 no-read rule and no-write rule security requirements
                 respectively. Additionally, our extended no-write rule
                 model allows the corruption of some sanitizers in the
                 ACE system and thus is stronger than the one for
                 schemes with only one sanitizer. We prove the security
                 of our scheme under the two models.",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Foundations of Computer
                 Science (IJFCS)",
  journal-URL =  "http://www.worldscientific.com/loi/ijfcs",
  remark =       "Special Issue Cryptography and Provable Security",
}

@Article{Yao:2019:CTC,
  author =       "Fan Yao and Milo{\v{s}} Doroslova{\v{c}}ki and Guru
                 Venkataramani",
  title =        "Covert Timing Channels Exploiting Cache Coherence
                 Hardware: Characterization and Defense",
  journal =      j-INT-J-PARALLEL-PROG,
  volume =       "47",
  number =       "4",
  pages =        "595--620",
  month =        aug,
  year =         "2019",
  CODEN =        "IJPPE5",
  DOI =          "https://doi.org/10.1007/s10766-018-0608-4",
  ISSN =         "0885-7458 (print), 1573-7640 (electronic)",
  ISSN-L =       "0885-7458",
  bibdate =      "Fri Oct 11 08:37:52 MDT 2019",
  bibsource =    "http://link.springer.com/journal/10766/47/4;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjparallelprogram.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Parallel Programming",
  journal-URL =  "http://link.springer.com/journal/10766",
}

@Article{Yao:2019:RSA,
  author =       "Jiaying Yao and Zhigeng Han and Muhammad Sohail and
                 Liangmin Wang",
  title =        "A Robust Security Architecture for {SDN}-Based {5G}
                 Networks",
  journal =      j-FUTURE-INTERNET,
  volume =       "11",
  number =       "4",
  pages =        "85",
  day =          "28",
  month =        mar,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.3390/fi11040085",
  ISSN =         "1999-5903",
  bibdate =      "Thu Nov 21 16:51:05 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/future-internet.bib",
  URL =          "https://www.mdpi.com/1999-5903/11/4/85",
  abstract =     "5G is the latest generation of cellular mobile
                 communications. Due to its significant advantage in
                 high data rate, reduced latency and massive device
                 connectivity, the 5G network plays a vital role in
                 today's commercial telecommunications networks.
                 However, the 5G network also faces some challenges when
                 used in practice. This is because it consists of
                 various diverse ingredients, termed heterogeneity. The
                 heterogeneity of the 5G network has two consequences:
                 first, it prevents us to use this technology in a
                 uniform way, preventing the wide use of 5G technology;
                 second, it complicates the structure of the 5G network,
                 making it hard to monitor what is going on in a 5G
                 network. To break through this limitation, researchers
                 have worked in this field and design their own
                 protocol, in which software-defined networking (SDN) is
                 one key design concept. By separating control and data
                 plane, SDN can make the 5G network functional and
                 programmable, such that we can handle the heterogeneity
                 in traditional 5G networks. In light of this, we say
                 that SDN-5G network is attractive, but its advantages
                 are not free. The intelligence centralization used in
                 SDN has its own drawbacks when it comes to security. To
                 break through this limitation, we propose a robust
                 security architecture for SDN-based 5G Networks. To
                 find the illegal request from malicious attackers, we
                 add extra cryptographic authentication, termed
                 synchronize secret. The basic idea of our scheme is
                 leveraging preload secrets to differ attacks from
                 regular network communications. The simulation results
                 indicate that our work can completely handle the
                 security problem from SDN with a low disconnect rate of
                 0.01\%, which is much better than that from state of
                 the art.",
  acknowledgement = ack-nhfb,
  remark =       "Special Issue Software Defined Networking (SDN) and
                 Network Function Virtualization (NFV).",
}

@Article{Ye:2019:NCA,
  author =       "T. Ye and Y. Wei and W. Meier",
  title =        "A New Cube Attack on {MORUS} by Using Division
                 Property",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "68",
  number =       "12",
  pages =        "1731--1740",
  month =        dec,
  year =         "2019",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2019.2929137",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Thu Nov 7 11:20:24 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
  keywords =     "Authenticated encryption algorithm; Boolean functions;
                 cube attack; division property; Encryption; mixed
                 integer linear programming; MORUS; Software algorithms;
                 Time complexity; time complexity",
}

@Article{Yin:2019:SCM,
  author =       "Hui Yin and Zheng Qin and Jixin Zhang and Lu Ou and
                 Fangmin Li and Keqin Li",
  title =        "Secure conjunctive multi-keyword ranked search over
                 encrypted cloud data for multiple data owners",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "100",
  number =       "??",
  pages =        "689--700",
  month =        nov,
  year =         "2019",
  CODEN =        "FGSEVI",
  DOI =          "https://doi.org/10.1016/j.future.2019.05.001",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Mon Feb 10 12:55:01 MST 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X17321192",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Ying:2019:LRU,
  author =       "Bidi Ying and Amiya Nayak",
  title =        "Lightweight remote user authentication protocol for
                 multi-server {$5$G} networks using self-certified
                 public key cryptography",
  journal =      j-J-NETW-COMPUT-APPL,
  volume =       "131",
  number =       "??",
  pages =        "66--74",
  day =          "1",
  month =        apr,
  year =         "2019",
  CODEN =        "JNCAF3",
  ISSN =         "1084-8045 (print), 1095-8592 (electronic)",
  ISSN-L =       "1084-8045",
  bibdate =      "Mon Oct 14 14:16:30 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/jnetwcomputappl.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S1084804519300256",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Network and Computer Applications",
  journal-URL =  "http://www.sciencedirect.com/science/journal/10848045",
}

@Article{Yu:2019:PSI,
  author =       "Yong Yu and Guomin Yang and Huaxiong Wang",
  title =        "Preface: Special Issue Cryptography and Provable
                 Security",
  journal =      j-INT-J-FOUND-COMP-SCI,
  volume =       "30",
  number =       "4",
  pages =        "489--492",
  month =        jun,
  year =         "2019",
  CODEN =        "IFCSEN",
  DOI =          "https://doi.org/10.1142/S0129054119020027",
  ISSN =         "0129-0541",
  ISSN-L =       "0129-0541",
  bibdate =      "Fri Sep 20 10:48:00 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijfcs.bib",
  URL =          "https://www.worldscientific.com/doi/10.1142/S0129054119020027",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Foundations of Computer
                 Science (IJFCS)",
  journal-URL =  "http://www.worldscientific.com/loi/ijfcs",
  remark =       "Special Issue Cryptography and Provable Security",
}

@Article{Zajac:2019:HEM,
  author =       "Pavol Zajac",
  title =        "Hybrid Encryption from {McEliece} Cryptosystem with
                 Pseudo-random Error Vector",
  journal =      j-FUND-INFO,
  volume =       "169",
  number =       "4",
  pages =        "345--360",
  month =        "????",
  year =         "2019",
  CODEN =        "FUMAAJ",
  DOI =          "https://doi.org/10.3233/FI-2019-1851",
  ISSN =         "0169-2968 (print), 1875-8681 (electronic)",
  ISSN-L =       "0169-2968",
  bibdate =      "Wed Mar 24 12:51:47 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/fundinfo2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Fundamenta Informaticae",
  journal-URL =  "http://content.iospress.com/journals/fundamenta-informaticae",
}

@Article{Zanon:2019:FKC,
  author =       "G. H. M. Zanon and M. A. Simplicio and G. C. C. F.
                 Pereira and J. Doliskani and P. S. L. M. Barreto",
  title =        "Faster Key Compression for Isogeny-Based
                 Cryptosystems",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "68",
  number =       "5",
  pages =        "688--701",
  month =        may,
  year =         "2019",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2018.2878829",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Thu Jul 11 09:46:20 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
  keywords =     "decompression; Diffie-Hellman key exchange; Elliptic
                 curve cryptography; elliptic curve cryptography;
                 Elliptic curves; Generators; isogeny-based
                 cryptosystems; key compression; Libraries;
                 Pohlig-Hellman algorithm; Post-quantum cryptography;
                 post-quantum proposals; public-key compression; quantum
                 cryptography; Runtime; supersingular elliptic curves;
                 supersingular isogeny-based cryptography",
}

@Article{Zeng:2019:PKE,
  author =       "Ming Zeng and Jie Chen and Kai Zhang and Haifeng
                 Qian",
  title =        "Public key encryption with equality test via hash
                 proof system",
  journal =      j-THEOR-COMP-SCI,
  volume =       "795",
  number =       "??",
  pages =        "20--35",
  day =          "26",
  month =        nov,
  year =         "2019",
  CODEN =        "TCSCDI",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Wed Oct 16 07:39:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2015.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0304397519303822",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{Zeng:2019:SAE,
  author =       "Ming Zeng and Kai Zhang and Haifeng Qian and Xiaofeng
                 Chen and Jie Chen",
  title =        "A Searchable Asymmetric Encryption Scheme with Support
                 for {Boolean} Queries for Cloud Applications",
  journal =      j-COMP-J,
  volume =       "62",
  number =       "4",
  pages =        "563--578",
  month =        apr,
  year =         "2019",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxy134",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Apr 2 12:10:39 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://academic.oup.com/comjnl/article/62/4/563/5253754",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Zhang:2019:CCF,
  author =       "X. Zhang and Y. Lao",
  title =        "On the Construction of Composite Finite Fields for
                 Hardware Obfuscation",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "68",
  number =       "9",
  pages =        "1353--1364",
  month =        sep,
  year =         "2019",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2019.2901483",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Fri Aug 30 05:58:40 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/datacompression.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
  keywords =     "algorithmic modifications; architectural level;
                 circuit-level techniques; composite finite fields;
                 Composite finite fields; Computer architecture;
                 cryptography; Cryptography; cryptography algorithms;
                 data paths; Decoding; error correction codes;
                 error-correcting codes; error-correcting coding; Finite
                 element analysis; finite field arithmetic; finite field
                 constructions; Hardware; hardware obfuscation; hardware
                 obfuscation scheme; independent obfuscation key; Logic
                 gates; primitive element representations; Reed-Solomon
                 codes; Signal processing algorithms",
}

@Article{Zhang:2019:EPK,
  author =       "Kai Zhang and Jie Chen and Hyung Tae Lee and Haifeng
                 Qian and Huaxiong Wang",
  title =        "Efficient public key encryption with equality test in
                 the standard model",
  journal =      j-THEOR-COMP-SCI,
  volume =       "755",
  number =       "??",
  pages =        "65--80",
  day =          "10",
  month =        jan,
  year =         "2019",
  CODEN =        "TCSCDI",
  DOI =          "https://doi.org/10.1016/j.tcs.2018.06.048",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Wed Dec 26 06:11:40 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2015.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S030439751830464X",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{Zhang:2019:LAS,
  author =       "Liping Zhang and Lanchao Zhao and Shuijun Yin and
                 Chi-Hung Chi and Ran Liu and Yixin Zhang",
  title =        "A lightweight authentication scheme with privacy
                 protection for smart grid communications",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "100",
  number =       "??",
  pages =        "770--778",
  month =        nov,
  year =         "2019",
  CODEN =        "FGSEVI",
  DOI =          "https://doi.org/10.1016/j.future.2019.05.069",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Mon Feb 10 12:55:01 MST 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X19310398",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Zhang:2019:LRH,
  author =       "Yinghui Zhang and Menglei Yang and Dong Zheng and
                 Tiantian Zhang and Rui Guo and Fang Ren",
  title =        "Leakage-Resilient Hierarchical Identity-Based
                 Encryption with Recipient Anonymity",
  journal =      j-INT-J-FOUND-COMP-SCI,
  volume =       "30",
  number =       "5",
  pages =        "665--681",
  month =        aug,
  year =         "2019",
  CODEN =        "IFCSEN",
  DOI =          "https://doi.org/10.1142/S0129054119400197",
  ISSN =         "0129-0541",
  ISSN-L =       "0129-0541",
  bibdate =      "Fri Sep 20 10:48:00 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ijfcs.bib;
                 http://www.worldscientific.com/loi/ijfcs",
  URL =          "https://www.worldscientific.com/doi/10.1142/S0129054119400197",
  abstract =     "As a promising public key cryptographic primitive,
                 hierarchical identity-based encryption (HIBE)
                 introduces key delegation mechanisms into
                 identity-based encryption. However, key leakage and
                 recipient anonymity issues have not been adequately
                 addressed in HIBE. Hence, direct applications of
                 traditional HIBE schemes will violate data security and
                 abuse users privacy in practice. In this paper, we
                 propose an anonymous unbounded hierarchical
                 identity-based encryption scheme, which achieves
                 bounded leakage resilience and the hierarchy depth is
                 not limited. Our security proofs based on the dual
                 system encryption technique show that the proposed
                 scheme is capable of resisting key leakage and it
                 realizes recipient anonymity in the standard model. In
                 addition, leakage resilience analysis indicates that
                 our scheme allows the leakage rate of approximate 1/3
                 no matter the hierarchy depth of identities. Finally,
                 performance comparisons show the practicability of our
                 scheme. In particular, the secret key of our
                 construction is of a fixed-length.",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Foundations of Computer
                 Science (IJFCS)",
  journal-URL =  "http://www.worldscientific.com/loi/ijfcs",
}

@Article{Zhang:2019:MAA,
  author =       "Xiao Zhang and Faguo Wu and Wang Yao and Zhao Wang and
                 Wenhua Wang",
  title =        "Multi-authority attribute-based encryption scheme with
                 constant-size ciphertexts and user revocation",
  journal =      j-CCPE,
  volume =       "31",
  number =       "21",
  pages =        "e4678:1--e4678:??",
  day =          "10",
  month =        nov,
  year =         "2019",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.4678",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Wed Mar 31 07:52:09 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "Concurr. Comput.",
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "05 September 2018",
}

@Article{Zhang:2019:REU,
  author =       "Jun Zhang and Rui Hou and Wei Song and Sally A. Mckee
                 and Zhen Jia and Chen Zheng and Mingyu Chen and Lixin
                 Zhang and Dan Meng",
  title =        "{RAGuard}: an Efficient and User-Transparent Hardware
                 Mechanism against {ROP} Attacks",
  journal =      j-TACO,
  volume =       "15",
  number =       "4",
  pages =        "50:1--50:??",
  month =        jan,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3280852",
  ISSN =         "1544-3566 (print), 1544-3973 (electronic)",
  ISSN-L =       "1544-3566",
  bibdate =      "Tue Jan 8 17:20:00 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/taco.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3280852",
  abstract =     "Control-flow integrity (CFI) is a general method for
                 preventing code-reuse attacks, which utilize benign
                 code sequences to achieve arbitrary code execution. CFI
                 ensures that the execution of a program follows the
                 edges of its predefined static Control-Flow Graph: any
                 deviation that constitutes a CFI violation terminates
                 the application. Despite decades of research effort,
                 there are still several implementation challenges in
                 efficiently protecting the control flow of function
                 returns (Return-Oriented Programming attacks). The set
                 of valid return addresses of frequently called
                 functions can be large and thus an attacker could bend
                 the backward-edge CFI by modifying an indirect branch
                 target to another within the valid return set. This
                 article proposes RAGuard, an efficient and
                 user-transparent hardware-based approach to prevent
                 Return-Oriented Programming attacks. RAGuard binds a
                 message authentication code (MAC) to each return
                 address to protect its integrity. To guarantee the
                 security of the MAC and reduce runtime overhead:
                 RAGuard (1) computes the MAC by encrypting the
                 signature of a return address with AES-128, (2)
                 develops a key management module based on a Physical
                 Unclonable Function (PUF) and a True Random Number
                 Generator (TRNG), and (3) uses a dedicated register to
                 reduce MACs' load and store operations of leaf
                 functions. We have evaluated our mechanism based on the
                 open-source LEON3 processor and the results show that
                 RAGuard incurs acceptable performance overhead and
                 occupies reasonable area.",
  acknowledgement = ack-nhfb,
  articleno =    "50",
  fjournal =     "ACM Transactions on Architecture and Code Optimization
                 (TACO)",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J924",
}

@Article{Zhang:2019:SPB,
  author =       "Rui Zhang and Rui Xue and Ling Liu",
  title =        "Security and Privacy on Blockchain",
  journal =      j-COMP-SURV,
  volume =       "52",
  number =       "3",
  pages =        "51:1--51:??",
  month =        jul,
  year =         "2019",
  CODEN =        "CMSVAN",
  DOI =          "https://doi.org/10.1145/3316481",
  ISSN =         "0360-0300 (print), 1557-7341 (electronic)",
  ISSN-L =       "0360-0300",
  bibdate =      "Sat Aug 31 09:04:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/compsurv.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3316481",
  abstract =     "Blockchain offers an innovative approach to storing
                 information, executing transactions, performing
                 functions, and establishing trust in an open
                 environment. Many consider blockchain as a technology
                 breakthrough for cryptography and cybersecurity, with
                 use cases ranging from globally deployed cryptocurrency
                 systems like Bitcoin, to smart contracts, smart grids
                 over the Internet of Things, and so forth. Although
                 blockchain has received growing interests in both
                 academia and industry in the recent years, the security
                 and privacy of blockchains continue to be at the center
                 of the debate when deploying blockchain in different
                 applications. This article presents a comprehensive
                 overview of the security and privacy of blockchain. To
                 facilitate the discussion, we first introduce the
                 notion of blockchains and its utility in the context of
                 Bitcoin-like online transactions. Then, we describe the
                 basic security properties that are supported as the
                 essential requirements and building blocks for
                 Bitcoin-like cryptocurrency systems, followed by
                 presenting the additional security and privacy
                 properties that are desired in many blockchain
                 applications. Finally, we review the security and
                 privacy techniques for achieving these security
                 properties in blockchain-based systems, including
                 representative consensus algorithms, hash chained
                 storage, mixing protocols, anonymous signatures,
                 non-interactive zero-knowledge proof, and so forth. We
                 conjecture that this survey can help readers to gain an
                 in-depth understanding of the security and privacy of
                 blockchain with respect to concept, attributes,
                 techniques, and systems.",
  acknowledgement = ack-nhfb,
  articleno =    "51",
  fjournal =     "ACM Computing Surveys",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J204",
}

@Article{Zhao:2019:LRC,
  author =       "Yi Zhao and Yong Yu and Bo Yang",
  title =        "Leakage Resilient {CCA} Security in Stronger Model:
                 Branch Hidden {ABO-LTFs} and Their Applications",
  journal =      j-COMP-J,
  volume =       "62",
  number =       "4",
  pages =        "631--640",
  month =        apr,
  year =         "2019",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxy138",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Apr 2 12:10:39 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://academic.oup.com/comjnl/article/62/4/631/5272751",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Zhou:2019:CLR,
  author =       "Yanwei Zhou and Bo Yang and Hongxia Hou and Lina Zhang
                 and Tao Wang and Mingxiao Hu",
  title =        "Continuous Leakage-Resilient Identity-Based Encryption
                 with Tight Security",
  journal =      j-COMP-J,
  volume =       "62",
  number =       "8",
  pages =        "1092--1105",
  month =        aug,
  year =         "2019",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/bxy144",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Mon Aug 19 07:31:49 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/compj2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://academic.oup.com/comjnl/article/62/8/1092/5288324",
  acknowledgement = ack-nhfb,
  fjournal =     "Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
}

@Article{Zhou:2019:GCC,
  author =       "Yanwei Zhou and Bo Yang and Yi Mu",
  title =        "The generic construction of continuous
                 leakage-resilient identity-based cryptosystems",
  journal =      j-THEOR-COMP-SCI,
  volume =       "772",
  number =       "??",
  pages =        "1--45",
  day =          "7",
  month =        jun,
  year =         "2019",
  CODEN =        "TCSCDI",
  DOI =          "https://doi.org/10.1016/j.tcs.2018.11.019",
  ISSN =         "0304-3975 (print), 1879-2294 (electronic)",
  ISSN-L =       "0304-3975",
  bibdate =      "Sat Jun 15 10:14:20 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tcs2015.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0304397518307096",
  acknowledgement = ack-nhfb,
  fjournal =     "Theoretical Computer Science",
  journal-URL =  "http://www.sciencedirect.com/science/journal/03043975",
}

@Article{Zhou:2019:LCP,
  author =       "Lu Zhou and Chunhua Su and Kuo-Hui Yeh",
  title =        "A Lightweight Cryptographic Protocol with
                 Certificateless Signature for the {Internet of
                 Things}",
  journal =      j-TECS,
  volume =       "18",
  number =       "3",
  pages =        "28:1--28:??",
  month =        jun,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3301306",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Thu Oct 17 18:16:43 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tecs.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3301306",
  abstract =     "The universality of smart-devices has brought rapid
                 development and the significant advancement of
                 ubiquitous applications for the Internet of Things
                 (IoT). Designing new types of IoT-compatible
                 cryptographic protocols has become a more popular way
                 to secure IoT-based applications. Significant attention
                 has been dedicated to the challenge of implementing a
                 lightweight and secure cryptographic protocol for IoT
                 devices. In this study, we propose a lightweight
                 cryptographic protocol integrating certificateless
                 signature and bilinear pairing crypto-primitives. In
                 the proposed protocol, we elegantly refine the
                 processes to account for computation-limited IoT
                 devices during security operations. Rigorous security
                 analyses are conducted to guarantee the robustness of
                 the proposed cryptographic protocol. In addition, we
                 demonstrate a thorough performance evaluation, where an
                 IoT-based test-bed, i.e., the Raspberry PI, is
                 simulated as the underlying platform of the
                 implementation of our proposed cryptographic protocol.
                 The results show the practicability of the proposed
                 protocol.",
  acknowledgement = ack-nhfb,
  articleno =    "28",
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J840",
}

@Article{Zhou:2019:LIB,
  author =       "Lu Zhou and Xiong Li and Kuo-Hui Yeh and Chunhua Su
                 and Wayne Chiu",
  title =        "Lightweight {IoT}-based authentication scheme in cloud
                 computing circumstance",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "91",
  number =       "??",
  pages =        "244--251",
  month =        feb,
  year =         "2019",
  CODEN =        "FGSEVI",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Tue Feb 5 08:15:51 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167739X18307878",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Zhou:2019:LIN,
  author =       "Lu Zhou and Chunhua Su and Zhi Hu and Sokjoon Lee and
                 Hwajeong Seo",
  title =        "Lightweight Implementations of {NIST} P-256 and {SM2
                 ECC} on $8$-bit Resource-Constraint Embedded Device",
  journal =      j-TECS,
  volume =       "18",
  number =       "3",
  pages =        "23:1--23:??",
  month =        jun,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3236010",
  ISSN =         "1539-9087 (print), 1558-3465 (electronic)",
  ISSN-L =       "1539-9087",
  bibdate =      "Thu Oct 17 18:16:43 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tecs.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3236010",
  abstract =     "Elliptic Curve Cryptography (ECC) now is one of the
                 most important approach to instantiate asymmetric
                 encryption and signature schemes, which has been
                 extensively exploited to protect the security of
                 cyber-physical systems. With the advent of the Internet
                 of Things (IoT), a great deal of constrained devices
                 may require software implementations of ECC operations.
                 Under this circumstances, the SM2, a set of public key
                 cryptographic algorithms based on elliptic curves
                 published by Chinese Commercial Cryptography
                 Administration Office, was standardized at ISO in 2017
                 to enhance the cyber-security. However, few research
                 works on the implementation of SM2 for constrained
                 devices have been conducted. In this work, we fill this
                 gap and propose our efficient, secure, and compact
                 implementation of scalar multiplication on a 256-bit
                 elliptic curve recommended by the SM2, as well as a
                 comparison implementation of scalar multiplication on
                 the same bit-length elliptic curve recommended by NIST.
                 We re-design some existent techniques to fit the
                 low-end IoT platform, namely 8-bit AVR processors, and
                 our implementations evaluated on the desired platform
                 show that the SM2 algorithms have competitive
                 efficiency and security with NIST, which would work
                 well to secure the IoT world.",
  acknowledgement = ack-nhfb,
  articleno =    "23",
  fjournal =     "ACM Transactions on Embedded Computing Systems",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J840",
}

@Article{Zhou:2019:SAN,
  author =       "Lu Zhou and Jiageng Chen and Yidan Zhang and Chunhua
                 Su and Marino Anthony James",
  title =        "Security analysis and new models on the intelligent
                 symmetric key encryption",
  journal =      j-COMPUT-SECUR,
  volume =       "80",
  number =       "??",
  pages =        "14--24",
  month =        jan,
  year =         "2019",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:58 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404818309647",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zhu:2019:ICR,
  author =       "Youwen Zhu and Yue Zhang and Xingxin Li and Hongyang
                 Yan and Jing Li",
  title =        "Improved collusion-resisting secure nearest neighbor
                 query over encrypted data in cloud",
  journal =      j-CCPE,
  volume =       "31",
  number =       "21",
  pages =        "e4681:1--e4681:??",
  day =          "10",
  month =        nov,
  year =         "2019",
  CODEN =        "CCPEBO",
  DOI =          "https://doi.org/10.1002/cpe.4681",
  ISSN =         "1532-0626 (print), 1532-0634 (electronic)",
  ISSN-L =       "1532-0626",
  bibdate =      "Wed Mar 31 07:52:09 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ccpe.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
  ajournal =     "Concurr. Comput.",
  fjournal =     "Concurrency and Computation: Practice and Experience",
  journal-URL =  "http://www.interscience.wiley.com/jpages/1532-0626",
  onlinedate =   "25 May 2018",
}

@Article{Zidaric:2019:HOA,
  author =       "Nusa Zidaric and Mark Aagaard and Guang Gong",
  title =        "Hardware Optimizations and Analysis for the {WG-16}
                 Cipher with Tower Field Arithmetic",
  journal =      j-IEEE-TRANS-COMPUT,
  volume =       "68",
  number =       "1",
  pages =        "67--82",
  month =        "????",
  year =         "2019",
  CODEN =        "ITCOB4",
  DOI =          "https://doi.org/10.1109/TC.2018.2854757",
  ISSN =         "0018-9340 (print), 1557-9956 (electronic)",
  ISSN-L =       "0018-9340",
  bibdate =      "Wed Dec 26 06:35:11 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeetranscomput2010.bib",
  URL =          "https://ieeexplore.ieee.org/document/8409309/",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Transactions on Computers",
  journal-URL =  "http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=12",
}

@Article{Zuo:2019:WDH,
  author =       "P. Zuo and Y. Hua and M. Zhao and W. Zhou and Y. Guo",
  title =        "Write Deduplication and Hash Mode Encryption for
                 Secure Nonvolatile Main Memory",
  journal =      j-IEEE-MICRO,
  volume =       "39",
  number =       "1",
  pages =        "44--51",
  month =        jan # "\slash " # feb,
  year =         "2019",
  CODEN =        "IEMIDZ",
  DOI =          "https://doi.org/10.1109/MM.2018.2886176",
  ISSN =         "0272-1732 (print), 1937-4143 (electronic)",
  ISSN-L =       "0272-1732",
  bibdate =      "Thu Mar 21 10:04:13 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeemicro.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Micro",
  journal-URL =  "http://www.computer.org/csdl/mags/mi/index.html",
  keywords =     "encryption; metadata; nonvolatile memory; parallel
                 processing; system performance",
}

@Article{Au:2020:SIC,
  author =       "Man Ho Au and Jinguang Han and Qianhong Wu and Colin
                 Boyd",
  title =        "Special Issue on Cryptographic Currency and Blockchain
                 Technology",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "107",
  number =       "??",
  pages =        "758--759",
  month =        jun,
  year =         "2020",
  CODEN =        "FGSEVI",
  DOI =          "https://doi.org/10.1016/j.future.2019.06.001",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Fri Jun 19 07:44:14 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X19314840",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Bana:2020:VMC,
  author =       "Gergei Bana and Rohit Chadha and Ajay Kumar Eeralla
                 and Mitsuhiro Okada",
  title =        "Verification Methods for the Computationally Complete
                 Symbolic Attacker Based on Indistinguishability",
  journal =      j-TOCL,
  volume =       "21",
  number =       "1",
  pages =        "2:1--2:44",
  month =        jan,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3343508",
  ISSN =         "1529-3785 (print), 1557-945X (electronic)",
  ISSN-L =       "1529-3785",
  bibdate =      "Wed Oct 23 06:27:14 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tocl.bib",
  abstract =     "In recent years, a new approach has been developed for
                 verifying security protocols with the aim of combining
                 the benefits of symbolic attackers and the benefits of
                 unconditional soundness: the technique of the
                 computationally complete symbolic attacker of Bana and
                 Comon (BC) [8]. In this article, we argue that the real
                 breakthrough of this technique is the recent
                 introduction of its version for indistinguishability
                 [9], because, with the extensions we introduce here,
                 for the first time, there is a computationally sound
                 symbolic technique that is syntactically strikingly
                 simple, to which translating standard computational
                 security notions is a straightforward matter, and that
                 can be effectively used for verification of not only
                 equivalence properties but trace properties of
                 protocols as well. We first fully develop the core
                 elements of this newer version by introducing several
                 new axioms. We illustrate the power and the diverse use
                 of the introduced axioms on simple examples first. We
                 introduce an axiom expressing the Decisional
                 Diffie--Hellman property. We analyze the
                 Diffie--Hellman key exchange, both in its simplest form
                 and an authenticated version as well. We provide
                 computationally sound verification of real-or-random
                 secrecy of the Diffie--Hellman key exchange protocol
                 for multiple sessions, without any restrictions on the
                 computational implementation other than the DDH
                 assumption. We also show authentication for a
                 simplified version of the station-to-station protocol
                 using UF-CMA assumption for digital signatures.
                 Finally, we axiomatize IND-CPA, IND-CCA1, and IND-CCA2
                 security properties and illustrate their usage. We have
                 formalized the axiomatic system in an interactive
                 theorem prover, Coq, and have machine-checked the
                 proofs of various auxiliary theorems and security
                 properties of Diffie--Hellman and station-to-station
                 protocol.",
  acknowledgement = ack-nhfb,
  articleno =    "2",
  fjournal =     "ACM Transactions on Computational Logic",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J773",
}

@Article{Behrad:2020:NSA,
  author =       "Shanay Behrad and Emmanuel Bertin and St{\'e}phane
                 Tuffin and Noel Crespi",
  title =        "A new scalable authentication and access control
                 mechanism for 5G-based {IoT}",
  journal =      j-FUT-GEN-COMP-SYS,
  volume =       "108",
  number =       "??",
  pages =        "46--61",
  month =        jul,
  year =         "2020",
  CODEN =        "FGSEVI",
  DOI =          "https://doi.org/10.1016/j.future.2020.02.014",
  ISSN =         "0167-739X (print), 1872-7115 (electronic)",
  ISSN-L =       "0167-739X",
  bibdate =      "Fri Jun 19 07:44:16 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib;
                 https://www.math.utah.edu/pub/tex/bib/futgencompsys.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167739X19310143",
  acknowledgement = ack-nhfb,
  fjournal =     "Future Generation Computer Systems",
  journal-URL =  "http://www.sciencedirect.com/science/journal/0167739X",
}

@Article{Chretien:2020:TMF,
  author =       "R{\'e}my Chr{\'e}tien and V{\'e}ronique Cortier and
                 Antoine Dallon and St{\'e}phanie Delaune",
  title =        "Typing Messages for Free in Security Protocols",
  journal =      j-TOCL,
  volume =       "21",
  number =       "1",
  pages =        "1:1--1:52",
  month =        jan,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1145/3343507",
  ISSN =         "1529-3785 (print), 1557-945X (electronic)",
  ISSN-L =       "1529-3785",
  bibdate =      "Wed Oct 23 06:27:14 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/tocl.bib",
  URL =          "https://dl.acm.org/ft_gateway.cfm?id=3343507",
  abstract =     "Security properties of cryptographic protocols are
                 typically expressed as reachability or equivalence
                 properties. Secrecy and authentication are examples of
                 reachability properties, while privacy properties such
                 as untraceability, vote secrecy, or anonymity are
                 generally expressed as behavioral equivalence in a
                 process algebra that models security protocols. Our
                 main contribution is to reduce the search space for
                 attacks for reachability as well as equivalence
                 properties. Specifically, we show that if there is an
                 attack then there is one that is well-typed. Our result
                 holds for a large class of typing systems, a family of
                 equational theories that encompasses all standard
                 primitives, and protocols without else branches. For
                 many standard protocols, we deduce that it is
                 sufficient to look for attacks that follow the format
                 of the messages expected in an honest execution,
                 therefore considerably reducing the search space.",
  acknowledgement = ack-nhfb,
  articleno =    "1",
  fjournal =     "ACM Transactions on Computational Logic",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J773",
}

%%% ====================================================================
%%% Cross-referenced entries must come last:
@Book{Copeland:2006:CSB,
  editor =       "B. Jack Copeland",
  booktitle =    "{Colossus}: the secrets of {Bletchley Park}'s
                 codebreaking computers",
  title =        "{Colossus}: the secrets of {Bletchley Park}'s
                 codebreaking computers",
  publisher =    pub-OXFORD,
  address =      pub-OXFORD:adr,
  pages =        "xvi + 462 + 16",
  year =         "2006",
  ISBN =         "0-19-284055-X (hardcover), 0-19-957814-1 (paperback)",
  ISBN-13 =      "978-0-19-284055-4 (hardcover), 978-0-19-957814-6
                 (paperback)",
  LCCN =         "D810.C88 C66 2006",
  bibdate =      "Tue Jun 26 07:56:07 2012",
  bibsource =    "https://www.math.utah.edu/pub/bibnet/authors/t/turing-alan-mathison.bib;
                 https://www.math.utah.edu/pub/tex/bib/annhistcomput.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 library.ox.ac.uk:210/ADVANCE",
  URL =          "http://www.colossus-computer.com/",
  acknowledgement = ack-nhfb,
  subject =      "Lorenz cipher system; World War, 1939--1945;
                 Cryptography; Electronic intelligence; Great Britain;
                 History; Germany; Computers",
  tableofcontents = "A brief history of cryptography from Caesar to
                 Bletchley Park / Simon Singh \\
                 How it began: Bletchley Park goes to war / Michael
                 Smith \\
                 The German Tunny machine / Jack Copeland \\
                 Colossus, codebreaking, and the digital age / Stephen
                 Budiansky \\
                 Machine against machine / Jack Copeland \\
                 D-Day at Bletchley Park / Thomas H. Flowers \\
                 Intercept! / Jack Copeland \\
                 Colossus / Thomas H. Flowers \\
                 Colossus and the rise of the modern computer / Jack
                 Copeland \\
                 The PC user's guide to Colossus / Benjamin Wells \\
                 Of men and machines / Brian Randell \\
                 The Colossus rebuild / Tony Sale \\
                 Mr. Newman's section / Jack Copeland, with Catherine
                 Caughey \ldots{} [et al.] \\
                 Max Newman: mathematician, codebreaker, and computer
                 pioneer / William Newman \\
                 Living with Fish: breaking Tunny in the Newmanry and
                 the Testery / Peter Hilton \\
                 From Hut 8 to the Newmanry / Irving John ``Jack'' Good
                 \\
                 Codebreaking and Colossus / Donald Michie \\
                 Major Tester's section / Jerry Roberts \\
                 Setter and breaker / Roy Jenkins \\
                 An ATS girl in the Testery / Helen Currie \\
                 The Testery and the breaking of Fish / Peter Edgerley
                 \\
                 Dollis Hill at war / Jack Copeland, with David Bolam
                 \ldots{} [et al.] \\
                 The British Tunny machine / Gil Hayward \\
                 How Colossus was built and operated: one of its
                 engineers reveals its secrets / Harry Fensom \\
                 Bletchley Park's Sturgeon: the Fish that laid no eggs /
                 Frode Weierud \\
                 German teleprinter traffic and Swedish wartime
                 intelligence / Craig McKay",
}

@Proceedings{Abdalla:2010:PCL,
  editor =       "Michel Abdalla and Paulo S. L. M. Barreto",
  booktitle =    "{Progress in cryptology --- Latincrypt 2010: first
                 international conference on cryptology and information
                 security in Latin America, Puebla, Mexico, August
                 8--11, 2010, proceedings}",
  title =        "{Progress in cryptology --- Latincrypt 2010: first
                 international conference on cryptology and information
                 security in Latin America, Puebla, Mexico, August
                 8--11, 2010, proceedings}",
  volume =       "6212",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "????",
  year =         "2010",
  ISBN =         "3-642-14711-9 (softcover)",
  ISBN-13 =      "978-3-642-14711-1 (softcover)",
  LCCN =         "????",
  bibdate =      "Mon Jan 10 18:27:32 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Lecture notes in computer science",
  acknowledgement = ack-nhfb,
}

@Proceedings{Abe:2010:ACA,
  editor =       "Masayuki Abe",
  booktitle =    "{Advances in cryptology --- Asiacrypt 2010: 16th
                 international conference on the theory and application
                 of cryptology and information security, Singapore,
                 December 5--9, 2010. Proceedings}",
  title =        "{Advances in cryptology --- Asiacrypt 2010: 16th
                 international conference on the theory and application
                 of cryptology and information security, Singapore,
                 December 5--9, 2010. Proceedings}",
  volume =       "6477",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "????",
  year =         "2010",
  ISBN =         "3-642-17372-1 (softcover)",
  ISBN-13 =      "978-3-642-17372-1 (softcover)",
  LCCN =         "????",
  bibdate =      "Mon Jan 10 18:24:44 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Lecture notes in computer science",
  acknowledgement = ack-nhfb,
}

@Proceedings{ACM:2010:PAI,
  editor =       "{ACM}",
  booktitle =    "{Proceedings of the 2010 ACM International Symposium
                 on Theory of Computing: June 5--8, 2010, Cambridge, MA,
                 USA}",
  title =        "{Proceedings of the 2010 ACM International Symposium
                 on Theory of Computing: June 5--8, 2010, Cambridge, MA,
                 USA}",
  publisher =    pub-ACM,
  address =      pub-ACM:adr,
  pages =        "xiv + 797",
  year =         "2010",
  ISBN =         "1-60558-817-2",
  ISBN-13 =      "978-1-60558-817-9",
  LCCN =         "QA 76.6 .A152 2010",
  bibdate =      "Wed Sep 1 10:37:53 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 z3950.gbv.de:20011/gvk",
  URL =          "http://www.gbv.de/dms/tib-ub-hannover/63314455x.",
  acknowledgement = ack-nhfb,
  remark =       "42nd annual STOC meeting.",
}

@Proceedings{Anonymous:2010:NDS,
  editor =       "Anonymous",
  booktitle =    "{17th Annual Network and Distributed System Symposium,
                 NDSS '10, The Dana on Misson Bay, San Diego,
                 California. February 28--March 3, 2010}",
  title =        "{17th Annual Network and Distributed System Symposium,
                 NDSS '10, The Dana on Misson Bay, San Diego,
                 California. February 28--March 3, 2010}",
  publisher =    "Internet Society",
  address =      "Reston, VA, USA",
  pages =        "????",
  year =         "2010",
  ISBN =         "1-891562-29-0, 1-891562-30-4",
  ISBN-13 =      "978-1-891562-29-7, 978-1-891562-30-3",
  LCCN =         "????",
  bibdate =      "Fri Mar 13 09:39:28 MDT 2015",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  URL =          "http://www.isoc.org/isoc/conferences/ndss/10/proceedings.shtml",
  acknowledgement = ack-nhfb,
}

@Book{Atallah:2010:ATC,
  editor =       "Mikhail J. Atallah and Marina Blanton",
  booktitle =    "Algorithms and theory of computation handbook. Special
                 topics and techniques",
  title =        "Algorithms and theory of computation handbook. Special
                 topics and techniques",
  volume =       "2",
  publisher =    pub-CHAPMAN-HALL-CRC,
  address =      pub-CHAPMAN-HALL-CRC:adr,
  edition =      "Second",
  pages =        "????",
  year =         "2010",
  ISBN =         "1-58488-820-2",
  ISBN-13 =      "978-1-58488-820-8",
  LCCN =         "QA76.9.A43 A433 2010",
  bibdate =      "Sat May 14 09:19:32 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Chapman and Hall/CRC applied algorithms and data
                 structures series",
  URL =          "http://www.crcnetbase.com/isbn/9781584888208",
  acknowledgement = ack-nhfb,
  subject =      "computer algorithms; computer science; computational
                 complexity",
  tableofcontents = "I. Front Matter Chapter 1. Computational Geometry I
                 / D. T. Lee \\
                 Chapter 2. Computational Geometry II / D. T. Lee \\
                 Chapter 3. Computational Topology / Afra Zomorodian \\
                 Chapter 4. Robot Algorithms / Konstantinos Tsianos, Dan
                 Halperin, Lydia Kavraki, Jean-Claude Latombe \\
                 Chapter 5. Vision and Image Processing Algorithms /
                 Concettina Guerra \\
                 Chapter 6. Graph Drawing Algorithms / Peter Eades,
                 Carsten Gutwenger, Seok-Hee Hong, Petra Mutzel \\
                 Chapter 7. Algorithmics in Intensity-Modulated
                 Radiation Therapy / Danny Z. Chen, Chao Wang \\
                 Chapter 8. VLSI Layout Algorithms / Andrea S. LaPaugh
                 \\
                 Chapter 9. Cryptographic Foundations / Yvo Desmedt \\
                 Chapter 10. Encryption Schemes / Yvo Desmedt \\
                 Chapter 11. Cryptanalysis / Samuel S. Wagstaff, Jr. \\
                 Chapter 12. Crypto Topics and Applications I / Jennifer
                 Seberry, Chris Charnes, Josef Pieprzyk, Rei
                 Safavi-Naini \\
                 Chapter 13. Crypto Topics and Applications II /
                 Jennifer Seberry, Chris Charnes, Josef Pieprzyk, Rei
                 Safavi-Naini \\
                 Chapter 14. Secure Multiparty Computation / Keith B.
                 Frikken \\
                 Chapter 15. Voting Schemes / Berry Schoenmakers \\
                 Chapter 16. Auction Protocols / Vincent Conitzer \\
                 Chapter 17. Pseudorandom Sequences and Stream Ciphers /
                 Andrew Klapper \\
                 Chapter 18. Theory of Privacy and Anonymity / Valentina
                 Ciriani, Sabrina De Capitani di Vimercati, Sara
                 Foresti, Pierangela Samarati \\
                 Chapter 19. Database Theory / Nicole Schweikardt,
                 Thomas Schwentick, Luc Segoufin \\
                 Chapter 20. Scheduling Algorithms / David Karger, Cliff
                 Stein, Joel Wein \\
                 Chapter 21. Computational Game Theory / Paul G.
                 Spirakis, Panagiota N. Panagopoulou \\
                 Chapter 22. Arti cial Intelligence Search Algorithms /
                 Richard E. Korf \\
                 Chapter 23. Algorithmic Aspects of Natural Language
                 Processing / Mark-Jan Nederhof, Giorgio Satta \\
                 Chapter 24. Algorithmic Techniques for Regular Networks
                 of Processors / Russ Miller, Quentin F. Stout \\
                 Chapter 25. Parallel Algorithms / Guy E. Blelloch,
                 Bruce M. Maggs \\
                 Chapter 26. Self-Stabilizing Algorithms / S{\'e}bastien
                 Tixeuil \\
                 Chapter 27. Theory of Communication Networks / Gopal
                 Pandurangan, Maleq Khan \\
                 Chapter 28. Network Algorithmics / George Varghese \\
                 Chapter 29. Algorithmic Issues in Grid Computing / Yves
                 Robert, Fr{\'e}d{\'e}ric Vivien \\
                 Chapter 30. Uncheatable Grid Computing / Wenliang Du,
                 Mummoorthy Murugesan, Jing Jia \\
                 Chapter 31. DNA Computing / Lila Kari, Kalpana
                 Mahalingam \\
                 Chapter 32. Computational Systems Biology / T. M.
                 Murali, Srinivas Aluru \\
                 Chapter 33. Pricing Algorithms for Financial
                 Derivatives / Ruppa K. Thulasiram, Parimala
                 Thulasiraman",
}

@Proceedings{Bao:2010:ISC,
  editor =       "Feng Bao and Moti Yung and Dongdai Lin",
  booktitle =    "{Information security and cryptology: 5th
                 international conference, INSCRYPT 2009, Beijing,
                 China, December 12--15, 2009. revised selected
                 papers}",
  title =        "{Information security and cryptology: 5th
                 international conference, INSCRYPT 2009, Beijing,
                 China, December 12--15, 2009. revised selected
                 papers}",
  volume =       "6151",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "????",
  year =         "2010",
  ISBN =         "3-642-16341-6 (softcover)",
  ISBN-13 =      "978-3-642-16341-8 (softcover)",
  LCCN =         "????",
  bibdate =      "Mon Jan 10 18:26:08 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Lecture notes in computer science",
  acknowledgement = ack-nhfb,
}

@Proceedings{Bernstein:2010:PCA,
  editor =       "Daniel J. Bernstein and Tanja Lange",
  booktitle =    "{Progress in cryptology --- Africacrypt 2010: third
                 international conference on cryptology in Africa,
                 Stellenbosch, South Africa, May 3--6, 2010.
                 proceedings}",
  title =        "{Progress in cryptology --- Africacrypt 2010: third
                 international conference on cryptology in Africa,
                 Stellenbosch, South Africa, May 3--6, 2010.
                 proceedings}",
  volume =       "6055",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "????",
  year =         "2010",
  ISBN =         "3-642-12677-4 (softcover)",
  ISBN-13 =      "978-3-642-12677-2 (softcover)",
  LCCN =         "????",
  bibdate =      "Mon Jan 10 18:26:50 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Lecture notes in computer science",
  acknowledgement = ack-nhfb,
}

@Proceedings{Chaudhuri:2010:PIC,
  editor =       "Pranay Chaudhuri and Sukumar Ghosh and Raj Kumar Buyya
                 and Jian-Nong Cao and Oeepak Oahiya",
  booktitle =    "{Proceedings of the 2010 1st International Conference
                 on Parallel Distributed and Grid Computing (PDGC),
                 Jaypee University of Information Technology Waknaghat,
                 Solan, HP, India, 28--30 October, 2010}",
  title =        "{Proceedings of the 2010 1st International Conference
                 on Parallel Distributed and Grid Computing (PDGC),
                 Jaypee University of Information Technology Waknaghat,
                 Solan, HP, India, 28--30 October, 2010}",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  bookpages =    "xiii + 382",
  pages =        "xiii + 382",
  year =         "2010",
  ISBN =         "1-4244-7675-5",
  ISBN-13 =      "978-1-4244-7675-6",
  LCCN =         "????",
  bibdate =      "Thu Apr 21 10:51:00 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
}

@Book{Copeland:2010:CSB,
  editor =       "B. Jack Copeland",
  booktitle =    "{Colossus}: the secrets of {Bletchley Park}'s
                 codebreaking computers",
  title =        "{Colossus}: the secrets of {Bletchley Park}'s
                 codebreaking computers",
  publisher =    pub-OXFORD,
  address =      pub-OXFORD:adr,
  pages =        "xvi + 462 + 16",
  year =         "2010",
  ISBN =         "0-19-284055-X (hardcover), 0-19-957814-1 (paperback)",
  ISBN-13 =      "978-0-19-284055-4 (hardcover), 978-0-19-957814-6
                 (paperback)",
  LCCN =         "D810.C88 C66 2010",
  bibdate =      "Mon Mar 12 13:35:02 MDT 2012",
  bibsource =    "https://www.math.utah.edu/pub/bibnet/authors/t/turing-alan-mathison.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 library.ox.ac.uk:210/ADVANCE",
  URL =          "http://www.colossus-computer.com/",
  acknowledgement = ack-nhfb,
  remark =       "Originally published: 2006.",
  subject =      "Lorenz cipher system; World War, 1939--1945;
                 Cryptography; Electronic intelligence; Great Britain;
                 History; Germany; Computers",
  tableofcontents = "A brief history of cryptography from Caesar to
                 Bletchley Park / Simon Singh \\
                 How it began: Bletchley Park goes to war / Michael
                 Smith \\
                 The German Tunny machine / Jack Copeland \\
                 Colossus, codebreaking, and the digital age / Stephen
                 Budiansky \\
                 Machine against machine / Jack Copeland \\
                 D-Day at Bletchley Park / Thomas H. Flowers \\
                 Intercept! / Jack Copeland \\
                 Colossus / Thomas H. Flowers \\
                 Colossus and the rise of the modern computer / Jack
                 Copeland \\
                 The PC user's guide to Colossus / Benjamin Wells \\
                 Of men and machines / Brian Randell \\
                 The Colossus rebuild / Tony Sale \\
                 Mr. Newman's section / Jack Copeland, with Catherine
                 Caughey \ldots{} [et al.] \\
                 Max Newman: mathematician, codebreaker, and computer
                 pioneer / William Newman \\
                 Living with Fish: breaking Tunny in the Newmanry and
                 the Testery / Peter Hilton \\
                 From Hut 8 to the Newmanry / Irving John ``Jack'' Good
                 \\
                 Codebreaking and Colossus / Donald Michie \\
                 Major Tester's section / Jerry Roberts \\
                 Setter and breaker / Roy Jenkins \\
                 An ATS girl in the Testery / Helen Currie \\
                 The Testery and the breaking of Fish / Peter Edgerley
                 \\
                 Dollis Hill at war / Jack Copeland, with David Bolam
                 \ldots{} [et al.] \\
                 The British Tunny machine / Gil Hayward \\
                 How Colossus was built and operated: one of its
                 engineers reveals its secrets / Harry Fensom \\
                 Bletchley Park's Sturgeon: the Fish that laid no eggs /
                 Frode Weierud \\
                 German teleprinter traffic and Swedish wartime
                 intelligence / Craig McKay",
}

@Book{Dent:2010:PS,
  editor =       "Alexander W. Dent and Yuliang Zheng and Moti Yung",
  booktitle =    "Practical Signcryption",
  title =        "Practical Signcryption",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xviii + 274",
  year =         "2010",
  DOI =          "https://doi.org/10.1007/978-3-540-89411-7",
  ISBN =         "1-282-98107-2, 3-540-89411-X (e-book), 3-540-89409-8
                 (e-book)",
  ISBN-13 =      "978-1-282-98107-2, 978-3-540-89411-7 (e-book),
                 978-3-540-89409-4 (e-book)",
  ISSN =         "1619-7100 (print), 2197-845X (electronic)",
  ISSN-L =       "1619-7100",
  LCCN =         "QA76.9.A25 P735 2010",
  bibdate =      "Sat Jun 10 08:34:52 MDT 2017",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Information Security and Cryptography",
  URL =          "http://www.springerlink.com/content/978-3-540-89411-7",
  acknowledgement = ack-nhfb,
  remark =       "Versement en lot. In Springer Link (Monographies
                 {\'e}lectroniques).",
  subject =      "Data encryption (Computer science); Cryptography;
                 Computer science; Chiffrement (Informatique);
                 Cryptographie; Cryptography; Data encryption (Computer
                 science); Cryptage; Cryptographie (Informatique);
                 S{\'e}curit{\'e} des donn{\'e}es; Signature
                 num{\'e}rique.",
  tableofcontents = "1 Introduction / Yuliang Zheng / / 1 \\
                 1.1 Historical Development of Signcryption / 1 \\
                 1.1.1 Coded Modulation / 1 \\
                 1.1.2 Musings on Blending / 2 \\
                 1.1.3 Signcryption / 5 \\
                 1.1.4 Provably Secure Signcryption / 7 \\
                 1.2 Extensions, Standardization, and Future Research
                 Directions / 8 \\
                 1.3 Notation and Security Notions / 9 \\
                 1.3.1 Algorithms and Assignment / 10 \\
                 1.3.2 Signature Schemes / 11 \\
                 1.3.3 Public Key Encryption / 14 \\
                 1.3.4 Symmetric Encryption / 16 \\
                 1.3.5 Message Authentication Codes / 18 \\
                 Part I Security Models for Signcryption \\
                 2 Security for Signcryption: The Two-User Model / Jee
                 Hea An and Tal Rabin / / 21 \\
                 2.1 Introduction / 21 \\
                 2.2 Definition of Signcryption in the Two-User Setting
                 / 23 \\
                 2.2.1 Two Security Notions in the Two-User Setting / 23
                 \\
                 2.2.2 Discussions on the Security Notions / 28 \\
                 2.3 Generic Compositions of Signature and Encryption /
                 30 \\
                 2.3.1 Construction / 30 \\
                 2.3.2 Security of the Parallel Composition Method / 31
                 \\
                 2.3.3 Security of the Sequential Composition Methods /
                 32 \\
                 2.4 Multi-user Setting / 39 \\
                 2.4.1 Syntax / 39 \\
                 2.4.2 Security / 40 \\
                 2.4.3 Extending Signcryption / 40 \\
                 3 Security for Signcryption: The Multi-User Model /
                 Joonsang Baek and Ron Steinfeld / / 43 \\
                 3.1 Introduction / 43 \\
                 3.2 The BSZ Model / 44 \\
                 3.2.1 Confidentiality of Signcryption in the Multi-User
                 BSZ Model / 44 \\
                 3.2.2 Unforgeability of Signcryption in the Multi-User
                 BSZ Model / 47 \\
                 3.2.3 Further Discussions on the Multi-User BSZ Model /
                 50 \\
                 3.3 Example: The Security of Zheng's Signcryption
                 Scheme in the BSZ Model / 51 \\
                 Part II Signcryption Schemes \\
                 4 Signcryption Schemes Based on the Diffie-Hellnian
                 Problem / Paulo S. L. M. Barreto, Beno{\^\i}t Libert,
                 Noel McCullagh, and Jean-Jacques Quisquater / / 57 \\
                 4.1 Introduction / 57 \\
                 4.2 Diffie-Hellman Problems / 58 \\
                 4.3 Zheng's Construction and Its Variants / 59 \\
                 4.3.1 Zheng's Original Scheme / 59 \\
                 4.3.2 The Bao-Deng Modification / 62 \\
                 4.3.3 A Modification with Public Verifiability / 62 \\
                 4.4 An Encrypt-then-Sign Composition / 63 \\
                 4.5 A Scheme with Unforgeability Based on Factoring /
                 64 \\
                 4.6 Schemes with Non-repudiation / 66 \\
                 4.6.1 A DSA-Based Construction / 66 \\
                 4.6.2 A Scheme Built on Schnorr's Signature Scheme / 67
                 \\
                 4.7 The CM Scheme / 68 \\
                 5 Signcryption Schemes Based on Bilinear Maps / Paulo
                 S.L.M. Barreto, Beno{\^\i}t Libert, Noel McCullagh, and
                 Jean-Jacques Quisquater / / 71 \\
                 5.1 Introduction / 71 \\
                 5.2 Bilinear Map Groups / 72 \\
                 5.3 Assumptions / 73 \\
                 5.4 Signcryption for Anonymous Communications / 74 \\
                 5.4.1 Message Privacy / 75 \\
                 5.4.2 Ciphertext Unforgeability and Signature
                 Unforgeability / 76 \\
                 5.4.3 Anonymity / 77 \\
                 5.5 A Tightly Secure Scheme / 78 \\
                 5.5.1 The Scheme / 78 \\
                 5.5.2 Efficiency / 79 \\
                 5.5.3 Security / 80 \\
                 5.6 A Scheme with Short Detachable Signatures / 86 \\
                 5.6.1 Efficiency / 88 \\
                 5.6.2 Anonymous Communications / 88 \\
                 5.6.3 Security / 89 \\
                 6. Signcryption Schemes Based on the RSA Problem /
                 Alexander W. Dent and John Malone-Lee / / 99 \\
                 6.1 Introduction / 99 \\
                 6.2 The RSA Transform / 100 \\
                 6.3 Dedicated RSA-Based Signcryption Schemes / 101 \\
                 6.4 Signcryption from Padding Schemes / 102 \\
                 6.4.1 Trapdoor Permutations / 102 \\
                 6.4.2 Extractable Commitments / 102 \\
                 6.4.3 Padding-Based Signcryption Schemes / 104 \\
                 6.4.4 Proof Intuition / 109 \\
                 6.5 Signcryption Based on RSA-TBOS / 110 \\
                 6.5.1 The TBOS Construction / 110 \\
                 6.5.2 Security Proof for the TBOS Signcryption Scheme /
                 112 \\
                 Part III Construction Techniques \\
                 7 Hybrid Signcryption / Tor E. Bj{\o}rstad / / 121 \\
                 7.1 Background / 121 \\
                 7.1.1 A Brief Word on Notation / 123 \\
                 7.2 Preliminaries / 123 \\
                 7.2.1 The Hybrid Framework / 123 \\
                 7.2.2 Security Criteria for Data Encapsulation
                 Mechanisms / 125 \\
                 7.3 Hybrid Signcryption with Outsider Security / 126
                 \\
                 7.3.1 An Outsider-Secure Signcryption KEM / 126 \\
                 7.3.2 Security Criteria for Outsider-Secure
                 Signcryption KEMs / 127 \\
                 7.3.3 Security of the SKEM + DEM Construction / 130 \\
                 7.3.4 Outsider-Secure Hybrid Signcryption in Practice /
                 133 \\
                 7.4 Hybrid Signcryption with Insider Security / 136 \\
                 7.4.1 From Outsider to Insider Security / 136 \\
                 7.4.2 Signcryption Tag-KEMs / 138 \\
                 7.4.3 Security Criteria for Signcryption Tag-KEMs / 140
                 \\
                 7.4.4 Security of the SCTK+DEM Construction / 143 \\
                 7.4.5 Insider-Secure Hybrid Signcryption in Practice /
                 146 \\
                 8 Concealment and Its Applications to Authenticated
                 Encryption / Yevgeniy Dodis / / 149 \\
                 8.1 Introduction / 149 \\
                 8.1.1 Domain Extension of Authenticated Encryption /
                 150 \\
                 8.1.2 Remotely Keyed Authenticated Encryption / 152 \\
                 8.2 Definition of Concealment / 155 \\
                 8.2.1 Syntax / 155 \\
                 8.2.2 Security of Concealment / 156 \\
                 8.2.3 Relaxed Concealments / 157 \\
                 8.2.4 Super-Relaxed Concealments / 157 \\
                 8.2.5 Comparison to Commitment / 157 \\
                 8.3 Constructing Concealment Schemes / 158 \\
                 8.3.1 Achieving Hiding / 158 \\
                 8.3.2 Achieving Binding / 159 \\
                 8.3.3 Necessity of Assumptions / 162 \\
                 8.4 Applications to Authenticated Encryption / 163 \\
                 8.4.1 Definition of Authenticated Encryption / 164 \\
                 8.4.2 Authenticated Encryption of Long Messages / 166
                 \\
                 8.4.3 Remotely Keyed Authenticated Encryption / 169 \\
                 9 Parallel Signcryption / Josef Pieprzyk and David
                 Pointcheval / / 175 \\
                 9.1 Introduction / 175 \\
                 9.2 Concept of Parallel Signcryption / 175 \\
                 9.3 Overview of Constructions / 176 \\
                 9.4 Generic Parallel Signcryption / 178 \\
                 9.4.1 Description of the Scheme / 178 \\
                 9.4.2 Security Analysis / 180 \\
                 9.5 Optimal Parallel Signcryption / 185 \\
                 9.5.1 Description of the Scheme / 185 \\
                 9.5.2 Security Analysis / 187 \\
                 Part IV Extensions of Signcryption \\
                 10 Identity-Based Signcryption / Xavier Boyen / / 195
                 \\
                 10.1 Introduction / 195 \\
                 10.1.1 Identity-Based Cryptography / 195 \\
                 10.1.2 Advantages and Disadvantages / 197 \\
                 10.2.3 From IBE to Signcryption / 199 \\
                 10.1.4 Specifying an IBSC System / 200 \\
                 10.1.5 Concrete IBSC from Pairings / 201 \\
                 10.2 The Identity-Based Signcryption Primitive / 202
                 \\
                 10.3 Security Definitions / 203 \\
                 10.3.1 Message Confidentiality / 206 \\
                 10.3.2 Signature Non-repudiation / 207 \\
                 10.3.3 Ciphertext Unlinkability / 208 \\
                 10.3.4 Ciphertext Authentication / 209 \\
                 10.3.5 Ciphertext Anonymity / 210 \\
                 10.4 A Concrete IBSC Scheme / 211 \\
                 10.4.1 The Boneh-Franklin Framework / 211 \\
                 10.4.2 Fully Secure IBSC Construction / 212 \\
                 10.4.3 A Performance/Security Trade-Off / 215 \\
                 10.4.4 Signcrypting for Multiple Recipients / 215 \\
                 11 Key Establishment Using Signcryption Techniques /
                 Alexander W. Dent / / 217 \\
                 11.1 Introduction / 217 \\
                 11.2 Formal Security Models for Key Establishment / 219
                 \\
                 11.2.1 Motivation / 219 \\
                 11.2.2 Sessions / 220 \\
                 11.2.3 The Formal Security Model / 221 \\
                 11.2.4 Entity Authentication / 223 \\
                 11.2.5 Forward Secrecy / 224 \\
                 11.2.6 Key Compromise Impersonation Attacks / 224 \\
                 11.2.7 Notation / 224 \\
                 11.3 Key Transport / 225 \\
                 11.4 Key Establishment Based on Zheng's Signcryption
                 Scheme / 226 \\
                 11.5 Key Agreement Based on Signcryption KEMs / 227 \\
                 11.5.1 Key Agreement Based on Signcryption KEMs / 229
                 \\
                 11.5.2 Key Agreement Based on Signcryption Tag-KEMs /
                 230 \\
                 11.5.3 Security Proof for the Bj{\o}rstad--Dent
                 Protocol / 232 \\
                 11.6 Key Establishment Based on Timestamps / 239 \\
                 12 Applications of Signcryption / Yang Cui and Goichiro
                 Hanaoka / / 241 \\
                 12.1 Application Fields of Signcryption / 241 \\
                 12.2 Example Applications of Signcryption / 242 \\
                 12.2.1 Secure Multicasting Over the Internet / 243 \\
                 12.2.2 Authenticated Key Recovery / 246 \\
                 12.2.3 Secure ATM Networks / 248 \\
                 12.2.4 Secure Routing for Mobile Ad Hoc Networks / 249
                 \\
                 12.2.5 Encrypted and Authenticated E-mail by Firewalls
                 / 251 \\
                 12.2.6 Signcryption in Secure VoIP / 252 \\
                 12.2.7 Applications to Electronic Payment / 253 \\
                 References / 257 \\
                 Index / 269",
  xxpages =      "xviii + 278",
}

@Proceedings{Gilbert:2010:ACE,
  editor =       "Henri Gilbert",
  booktitle =    "{Advances in cryptology --- Eurocrypt 2010: 29th
                 annual international conference on the theory and
                 applications of cryptographic techniques, Monaco, May
                 30--June 3, 2010. Proceedings}",
  title =        "{Advances in cryptology --- Eurocrypt 2010: 29th
                 annual international conference on the theory and
                 applications of cryptographic techniques, Monaco, May
                 30--June 3, 2010. Proceedings}",
  volume =       "6110",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "????",
  year =         "2010",
  ISBN =         "3-642-13189-1 (softcover)",
  ISBN-13 =      "978-3-642-13189-9 (softcover)",
  LCCN =         "????",
  bibdate =      "Mon Jan 10 18:25:26 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Lecture notes in computer science",
  acknowledgement = ack-nhfb,
}

@Proceedings{Gollmann:2010:SCR,
  editor =       "Dieter Gollmann and Jean-Louis Lanet and Julien
                 Iguchi-Cartigny",
  booktitle =    "{Smart card research and advanced application: 9th
                 IFIP WG 8.8/11.2 International Conference, CARDIS 2010,
                 Passau, Germany, April 14--16, 2010: proceedings}",
  title =        "{Smart card research and advanced application: 9th
                 IFIP WG 8.8/11.2 International Conference, CARDIS 2010,
                 Passau, Germany, April 14--16, 2010: proceedings}",
  volume =       "6035",
  publisher =    "Springer",
  address =      "Berlin, Germany",
  pages =        "x + 237",
  year =         "2010",
  ISBN =         "3-642-12509-3 (paperback)",
  ISBN-13 =      "978-3-642-12509-6 (paperback)",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  LCCN =         "TK7895.S62 C36 2010",
  bibdate =      "Thu Feb 10 12:50:59 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       ser-LNCS,
  acknowledgement = ack-nhfb,
  meetingname =  "CARDIS (Conference) (9th: 2010: Passau, Germany)",
  subject =      "Smart cards; Congresses",
}

@Proceedings{Gong:2010:PCI,
  editor =       "Guang Gong and Kishan Chand Gupta",
  booktitle =    "{Progress in cryptology --- Indocrypt 2010: 11th
                 international conference on cryptology in India,
                 Hyderabad, India, December 12--15, 2010. Proceedings}",
  title =        "{Progress in cryptology --- Indocrypt 2010: 11th
                 international conference on cryptology in India,
                 Hyderabad, India, December 12--15, 2010. Proceedings}",
  volume =       "6498",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "????",
  year =         "2010",
  ISBN =         "3-642-17400-0 (softcover)",
  ISBN-13 =      "978-3-642-17400-1 (softcover)",
  LCCN =         "????",
  bibdate =      "Mon Jan 10 18:27:11 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Lecture notes in computer science",
  acknowledgement = ack-nhfb,
}

@Proceedings{Heng:2010:CNS,
  editor =       "Swee-Huay Heng and Rebecca N. Wright and Bok-Min Goi",
  booktitle =    "{Cryptology and network security: 9th international
                 conference, CANS 2010, Kuala Lumpur, Malaysia, December
                 12--14, 2010. Proceedings}",
  title =        "{Cryptology and network security: 9th international
                 conference, CANS 2010, Kuala Lumpur, Malaysia, December
                 12--14, 2010. Proceedings}",
  volume =       "6467",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "????",
  year =         "2010",
  ISBN =         "3-642-17618-6 (softcover)",
  ISBN-13 =      "978-3-642-17618-0 (softcover)",
  LCCN =         "????",
  bibdate =      "Mon Jan 10 18:25:47 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Lecture notes in computer science",
  acknowledgement = ack-nhfb,
}

@Proceedings{IEEE:2010:PIA,
  editor =       "{IEEE}",
  booktitle =    "{Proceedings: 2010 IEEE 51st Annual Symposium on
                 Foundations of Computer Science: 23--26 October 2010,
                 Las Vegas, Nevada, USA}",
  title =        "{Proceedings: 2010 IEEE 51st Annual Symposium on
                 Foundations of Computer Science: 23--26 October 2010,
                 Las Vegas, Nevada, USA}",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "xvi + 826",
  year =         "2010",
  ISBN =         "1-4244-8525-8",
  ISBN-13 =      "978-1-4244-8525-3",
  LCCN =         "????",
  bibdate =      "Thu Apr 12 09:08:49 MDT 2012",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/focs2010.bib",
  note =         "IEEE Computer Society Order Number P4244.",
  URL =          "http://ieeexplore.ieee.org/servlet/opac?punumber=5669376",
  acknowledgement = ack-nhfb,
  meetingname =  "Symposium on Foundations of Computer Science (51st:
                 2010: Las Vegas, Nev.)",
  subject =      "Electronic data processing; Congresses; Machine
                 theory",
}

@Book{Kollmitzer:2010:AQC,
  editor =       "Christian Kollmitzer and M. (Mario) Pivk",
  booktitle =    "Applied Quantum Cryptography",
  title =        "Applied Quantum Cryptography",
  volume =       "797",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xii + 214",
  year =         "2010",
  DOI =          "https://doi.org/10.1007/978-3-642-04831-9",
  ISBN =         "3-642-04829-3 (hardcover), 3-642-04831-5 (e-book)",
  ISBN-13 =      "978-3-642-04829-6 (hardcover), 978-3-642-04831-9
                 (e-book)",
  LCCN =         "TK5102.94 .A68 2010",
  bibdate =      "Wed Jun 3 09:04:53 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Lecture notes in physics",
  acknowledgement = ack-nhfb,
  subject =      "Data encryption (Computer science); Cryptography;
                 Quantenkryptologie.",
  tableofcontents = "Introduction / C. Kollmitzer \\
                 Preliminaries / M. Pivk \\
                 Quantum key distribution / M. Pivk \\
                 Adaptive cascade / S. Rass, C. Kollmitzer \\
                 Attack strategies on QKD protocols / S. Schauer \\
                 QKD systems / M. Suda \\
                 Statistical analysis of QKD networks in real-life
                 environment / K. Lessiak, J. Pilz \\
                 QKD networks based on Q3P / O. Maurhart \\
                 Quantum-cryptographic networks from a prototype to the
                 citizen / P. Schartner, C. Kollmitzer \\
                 The ring of trust model / C. Kollmitzer, C.
                 Moesslacher",
}

@Proceedings{Lee:2010:ISC,
  editor =       "Donghoon Lee and Seokhie Hong",
  booktitle =    "{Information, security and cryptology -- ICISC 2009:
                 12th international conference, Seoul, Korea, December
                 2--4, 2009, revised selected papers}",
  title =        "{Information, security and cryptology -- ICISC 2009:
                 12th international conference, Seoul, Korea, December
                 2--4, 2009, revised selected papers}",
  volume =       "5984",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "????",
  year =         "2010",
  ISBN =         "3-642-14422-5 (softcover)",
  ISBN-13 =      "978-3-642-14422-6 (softcover)",
  LCCN =         "????",
  bibdate =      "Mon Jan 10 18:26:29 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Lecture notes in computer science",
  acknowledgement = ack-nhfb,
}

@Proceedings{Nguyen:2010:LAS,
  editor =       "Phong Quang Nguyen and Brigitte Vall{\'e}e",
  booktitle =    "The {LLL} Algorithm: Survey and Applications",
  title =        "The {LLL} Algorithm: Survey and Applications",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xiv + 496",
  year =         "2010",
  DOI =          "https://doi.org/10.1007/978-3-642-02295-1",
  ISBN =         "3-642-02294-4 (hardcover), 3-642-02295-2 (e-book)",
  ISBN-13 =      "978-3-642-02294-4 (hardcover), 978-3-642-02295-1
                 (e-book)",
  ISSN =         "1619-7100 (print), 2197-845X (electronic)",
  ISSN-L =       "1619-7100",
  LCCN =         "QA9.58 .L55 2010; QA76",
  MRclass =      "*11-06, 11T71, 11Y16, 11Y50, 94A60",
  bibdate =      "Sat Jun 10 08:34:55 MDT 2017",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 z3950.gbv.de:20011/gvk",
  note =         "Conference in honour of the 25th birthday of the
                 Lenstra--Lenstra--Lovasz Lattice Reduction Algorithm,
                 LLL, Caen, France.",
  series =       "Information Security and Cryptography",
  abstract =     "The LLL algorithm is a polynomial-time lattice
                 reduction algorithm, named after its inventors, Arjen
                 Lenstra, Hendrik Lenstra and L{\'a}szl{\'o} Lov{\'a}sz.
                 The algorithm has revolutionized computational aspects
                 of the geometry of numbers since its introduction in
                 1982, leading to breakthroughs in fields as diverse as
                 computer algebra, cryptology and algorithmic number
                 theory. This book consists of 15 survey chapters on
                 computational aspects of Euclidean lattices and their
                 main applications. Topics covered include polynomial
                 factorization, lattice reduction algorithms,
                 applications in number theory, integer programming,
                 provable security, lattice-based cryptography and
                 complexity. The authors include many detailed
                 motivations, explanations and examples, and the
                 contributions are largely self-contained. The book will
                 be of value to a wide range of researchers and graduate
                 students working in related fields of theoretical
                 computer science and mathematics.",
  acknowledgement = ack-nhfb,
  subject =      "Computer science; Data structures (Computer science);
                 Computer software; Computational complexity;
                 Algorithms; Number theory; Mathematical optimization;
                 Data Structures, Cryptology and Information Theory;
                 Algorithm Analysis and Problem Complexity; Discrete
                 Mathematics in Computer Science; Optimization;
                 Algorithms; Computational complexity; Computer science;
                 Computer software; Data structures (Computer science);
                 Mathematical optimization; Number theory.",
  tableofcontents = "The history of the LLL algorithm / Ionica Smeets
                 \\
                 Hermite's constant and lattice algorithms / Phong Q.
                 Nguyen \\
                 Probabilistic analyses of lattice reduction algorithms
                 / Brigitte Vall{\'e}e and Antonio Vera \\
                 Progress on LLL and lattice reduction / Claus Peter
                 Schnorr \\
                 Floating-point LLL: theoretical and practical aspects /
                 Damien Stehl{\'e} \\
                 LLL: a tool for effective diophantine approximation /
                 Guillaume Hanrot \\
                 Selected applications of LLL in number theory / Denis
                 Simon \\
                 The van Hoeij algorithm for factoring polynomials /
                 J{\"u}rgen Kl{\"u}ners \\
                 The LLL algorithm and integer programming / Karen
                 Aardal and Friedrich Eisenbrand \\
                 Using LLL-reduction for solving RSA and factorization
                 problems / Alexander May \\
                 Practical lattice-based cryptography: NTRUEncrypt and
                 NTRUSign / Jeff Hoffstein, Nick Howgrave-Graham, Jill
                 Pipher, and William Whyte \\
                 The geometry of provable security: some proofs of
                 security in which lattices make a surprise appearance /
                 Craig Gentry \\
                 Cryptographic functions from worst-case complexity
                 assumptions / Daniele Micciancio \\
                 Inapproximability results for computational problems on
                 lattices / Subhash Khot \\
                 On the complexity of lattice problems with polynomial
                 approximation factors / Oded Regev",
}

@Proceedings{Pieprzyk:2010:TCC,
  editor =       "Josef Pieprzyk",
  booktitle =    "{Topics in cryptology --- CT-RSA 2010: the 10th
                 cryptographers' track at the RSA conference 2010, San
                 Francisco, CA, USA, March 1--5, 2010. Proceedings}",
  title =        "{Topics in cryptology --- CT-RSA 2010: the 10th
                 cryptographers' track at the RSA conference 2010, San
                 Francisco, CA, USA, March 1--5, 2010. Proceedings}",
  volume =       "5985",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "????",
  year =         "2010",
  ISBN =         "3-642-11924-7 (softcover)",
  ISBN-13 =      "978-3-642-11924-8 (softcover)",
  LCCN =         "????",
  bibdate =      "Mon Jan 10 18:27:53 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Lecture notes in computer science",
  acknowledgement = ack-nhfb,
}

@Proceedings{Rabin:2010:ACC,
  editor =       "Tal Rabin",
  booktitle =    "{Advances in cryptology --- Crypto 2010: 30th annual
                 cryptology conference, Santa Barbara, CA, USA, August
                 15--19, 2010. Proceedings}",
  title =        "{Advances in cryptology --- Crypto 2010: 30th annual
                 cryptology conference, Santa Barbara, CA, USA, August
                 15--19, 2010. Proceedings}",
  volume =       "6223",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "????",
  year =         "2010",
  ISBN =         "3-642-14622-8 (softcover)",
  ISBN-13 =      "978-3-642-14622-0 (softcover)",
  LCCN =         "????",
  bibdate =      "Mon Jan 10 18:25:05 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Lecture notes in computer science",
  acknowledgement = ack-nhfb,
}

@Proceedings{Sendrier:2010:PQC,
  editor =       "Nicolas Sendrier",
  booktitle =    "{Post-Quantum Cryptography: Third International
                 Workshop, PQCrypto 2010, Darmstadt, Germany, May
                 25--28, 2010. Proceedings}",
  title =        "{Post-Quantum Cryptography: Third International
                 Workshop, PQCrypto 2010, Darmstadt, Germany, May
                 25--28, 2010. Proceedings}",
  volume =       "6061",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "x + 240",
  year =         "2010",
  DOI =          "https://doi.org/10.1007/978-3-642-12929-2",
  ISBN =         "3-642-12928-5",
  ISBN-13 =      "978-3-642-12928-5",
  LCCN =         "QA76.9.A25 2010",
  bibdate =      "Thu Apr 21 17:24:28 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 z3950.bibsys.no:2100/BIBSYS",
  series =       ser-LNCS,
  acknowledgement = ack-nhfb,
  subject =      "Data protection; Computer science; Computer software;
                 Information Systems; Operating systems (Computers);
                 Computer Communication Networks; Data encryption
                 (Computer science)",
}

@Proceedings{Watt:2010:IPI,
  editor =       "Stephen M. Watt",
  booktitle =    "{ISSAC 2010: Proceedings of the 2010 International
                 Symposium on Symbolic and Algebraic Computation, July
                 25--28, 2010, Munich, Germany}",
  title =        "{ISSAC 2010: Proceedings of the 2010 International
                 Symposium on Symbolic and Algebraic Computation, July
                 25--28, 2010, Munich, Germany}",
  publisher =    pub-ACM,
  address =      pub-ACM:adr,
  pages =        "xiv + 363",
  year =         "2010",
  ISBN =         "1-4503-0150-9",
  ISBN-13 =      "978-1-4503-0150-3",
  LCCN =         "QA76.95 .I59 2010",
  bibdate =      "Fri Jun 17 08:11:01 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  acknowledgement = ack-nhfb,
}

@Proceedings{Yang:2010:PII,
  editor =       "Yixian Yang",
  booktitle =    "{Proceedings 2010 IEEE International Conference on
                 Information Theory and Information Security: December
                 17--19, 2010, Beijing, China}",
  title =        "{Proceedings 2010 IEEE International Conference on
                 Information Theory and Information Security: December
                 17--19, 2010, Beijing, China}",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "various",
  year =         "2010",
  ISBN =         "1-4244-6942-2",
  ISBN-13 =      "978-1-4244-6942-0",
  LCCN =         "QA76.9.A25",
  bibdate =      "Fri Mar 13 10:55:54 MDT 2015",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/datacompression.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib",
  URL =          "http://ieeexplore.ieee.org/servlet/opac?punumber=5680738",
  acknowledgement = ack-nhfb,
  meetingname =  "International Conference on Information Theory and
                 Information Security (2010: Beijing, China)",
  subject =      "Data protection; Congresses; Information retrieval;
                 Information theory; Data protection; Information
                 retrieval; Information theory",
}

@Proceedings{ACM:2011:PAI,
  editor =       "{ACM}",
  booktitle =    "{Proceedings of the 2011 ACM International Symposium
                 on Theory of Computing: June 6--8, 2011, San Jose, CA,
                 USA}",
  title =        "{Proceedings of the 2011 ACM International Symposium
                 on Theory of Computing: June 6--8, 2011, San Jose, CA,
                 USA}",
  publisher =    pub-ACM,
  address =      pub-ACM:adr,
  pages =        "xxx + 822 (est.)",
  year =         "2011",
  ISBN =         "????",
  ISBN-13 =      "????",
  LCCN =         "????",
  bibdate =      "Wed Sep 1 10:37:53 MDT 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 z3950.gbv.de:20011/gvk",
  URL =          "http://www.gbv.de/dms/tib-ub-hannover/63314455x.",
  acknowledgement = ack-nhfb,
  remark =       "43rd annual STOC meeting.",
}

@Proceedings{Anonymous:2011:AIS,
  editor =       "Anonymous",
  booktitle =    "{ACIS international symposium on cryptography, and
                 network security, data mining and knowledge discovery,
                 e-commerce and its applications, and embedded
                 systems}",
  title =        "{ACIS international symposium on cryptography, and
                 network security, data mining and knowledge discovery,
                 e-commerce and its applications, and embedded
                 systems}",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "????",
  year =         "2011",
  ISBN =         "0-7695-4332-4",
  ISBN-13 =      "978-0-7695-4332-1",
  LCCN =         "????",
  bibdate =      "Mon Jan 10 18:22:05 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
}

@Proceedings{Bernstein:2011:PCI,
  editor =       "Daniel J. Bernstein and Sanjit Chatterjee",
  booktitle =    "{Progress in Cryptology --- INDOCRYPT 2011: 12th
                 International Conference on Cryptology in India,
                 Chennai, India, December 11--14. Proceedings}",
  title =        "{Progress in Cryptology --- INDOCRYPT 2011: 12th
                 International Conference on Cryptology in India,
                 Chennai, India, December 11--14. Proceedings}",
  volume =       "7107",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "????",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-25577-9",
  ISBN =         "3-642-25577-9",
  ISBN-13 =      "978-3-642-25577-9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri May 25 08:11:05 MDT 2012",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2011.bib",
  series =       ser-LNCS,
  URL =          "http://www.springerlink.com/content/978-3-642-25577-9",
  acknowledgement = ack-nhfb,
}

@Proceedings{Chen:2011:CCI,
  editor =       "Liqun Chen",
  booktitle =    "{Cryptography and Coding: 13th IMA International
                 Conference, IMACC 2011, Oxford, UK, December 12--15.
                 Proceedings}",
  title =        "{Cryptography and Coding: 13th IMA International
                 Conference, IMACC 2011, Oxford, UK, December 12--15.
                 Proceedings}",
  volume =       "7089",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "????",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-25515-1",
  ISBN =         "3-642-25515-9",
  ISBN-13 =      "978-3-642-25515-1",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri May 25 08:11:05 MDT 2012",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2011.bib",
  series =       ser-LNCS,
  URL =          "http://www.springerlink.com/content/978-3-642-25515-1",
  acknowledgement = ack-nhfb,
}

@Proceedings{IEEE:2011:ICI,
  editor =       "{IEEE}",
  booktitle =    "{International Conference on Intelligent Computation
                 Technology and Automation (ICICTA), 2011: 28--29 March
                 2011, Shenzhen, Guangdong, China; proceedings}",
  title =        "{International Conference on Intelligent Computation
                 Technology and Automation (ICICTA), 2011: 28--29 March
                 2011, Shenzhen, Guangdong, China; proceedings}",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "????",
  year =         "2011",
  ISBN =         "0-7695-4353-7, 1-61284-289-5",
  ISBN-13 =      "978-0-7695-4353-6, 978-1-61284-289-9",
  LCCN =         "????",
  bibdate =      "Fri Mar 13 08:02:36 MDT 2015",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://ieeexplore.ieee.org/servlet/opac?punumber=5750113",
  acknowledgement = ack-nhfb,
}

@Proceedings{IEEE:2011:PIA,
  editor =       "{IEEE}",
  booktitle =    "{Proceedings: 2011 IEEE 52nd Annual IEEE Symposium on
                 Foundations of Computer Science: 22--25 October 2011,
                 Palm Springs, California, USA}",
  title =        "{Proceedings: 2011 IEEE 52nd Annual IEEE Symposium on
                 Foundations of Computer Science: 22--25 October 2011,
                 Palm Springs, California, USA}",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "????",
  year =         "2011",
  DOI =          "https://doi.org/10.1109/FOCS.2011.100",
  ISBN =         "1-4577-1843-X",
  ISBN-13 =      "978-1-4577-1843-4",
  LCCN =         "????",
  bibdate =      "Thu Apr 12 09:11:22 MDT 2012",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/focs2010.bib",
  acknowledgement = ack-nhfb,
}

@Proceedings{Kiayias:2011:TCC,
  editor =       "Aggelos Kiayias",
  booktitle =    "{Topics in cryptology --- CT-RSA 2011: the
                 cryptographers' track at the RSA conference 2011, San
                 Francisco, CA, USA, February 14--18, 2011.
                 proceedings}",
  title =        "{Topics in cryptology --- CT-RSA 2011: the
                 cryptographers' track at the RSA conference 2011, San
                 Francisco, CA, USA, February 14--18, 2011.
                 proceedings}",
  volume =       "6558",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "????",
  year =         "2011",
  ISBN =         "3-642-19073-1",
  ISBN-13 =      "978-3-642-19073-5",
  LCCN =         "????",
  bibdate =      "Mon Jan 10 18:16:07 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Lecture notes in computer science",
  acknowledgement = ack-nhfb,
}

@Proceedings{Lathrop:2011:SPI,
  editor =       "Scott Lathrop and Jim Costa and William Kramer",
  booktitle =    "{SC'11: Proceedings of 2011 International Conference
                 for High Performance Computing, Networking, Storage and
                 Analysis, Seattle, WA, November 12--18 2011}",
  title =        "{SC'11: Proceedings of 2011 International Conference
                 for High Performance Computing, Networking, Storage and
                 Analysis, Seattle, WA, November 12--18 2011}",
  publisher =    pub-ACM # " and " # pub-IEEE,
  address =      pub-ACM:adr # " and " # pub-IEEE:adr,
  pages =        "866",
  year =         "2011",
  ISBN =         "1-4503-0771-X",
  ISBN-13 =      "978-1-4503-0771-0",
  LCCN =         "????",
  bibdate =      "Fri Dec 16 11:11:35 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/supercomputing2011.bib",
  acknowledgement = ack-nhfb,
  xxeditor =     "{ACM}",
}

@Proceedings{Lee:2011:ACA,
  editor =       "Dong Hoon Lee and Xiaoyun Wang",
  booktitle =    "{Advances in Cryptology --- ASIACRYPT 2011: 17th
                 International Conference on the Theory and Application
                 of Cryptology and Information Security, Seoul, South
                 Korea, December 4--8. Proceedings}",
  title =        "{Advances in Cryptology --- ASIACRYPT 2011: 17th
                 International Conference on the Theory and Application
                 of Cryptology and Information Security, Seoul, South
                 Korea, December 4--8. Proceedings}",
  volume =       "7073",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "????",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-25384-3",
  ISBN =         "3-642-25384-9",
  ISBN-13 =      "978-3-642-25384-3",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri May 25 08:11:05 MDT 2012",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2011.bib",
  series =       ser-LNCS,
  URL =          "http://www.springerlink.com/content/978-3-642-25384-3",
  acknowledgement = ack-nhfb,
}

@Proceedings{Lin:2011:CNS,
  editor =       "Dongdai Lin and Gene Tsudik and Xiaoyun Wang",
  booktitle =    "{Cryptology and Network Security: 10th International
                 Conference, CANS 2011, Sanya, China, December 10--12.
                 Proceedings}",
  title =        "{Cryptology and Network Security: 10th International
                 Conference, CANS 2011, Sanya, China, December 10--12.
                 Proceedings}",
  volume =       "7092",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "????",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-25512-0",
  ISBN =         "3-642-25512-4",
  ISBN-13 =      "978-3-642-25512-0",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri May 25 08:11:05 MDT 2012",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2011.bib",
  series =       ser-LNCS,
  URL =          "http://www.springerlink.com/content/978-3-642-25512-0",
  acknowledgement = ack-nhfb,
}

@Proceedings{vanDam:2011:TQC,
  editor =       "Wim van Dam and Vivian M. Kendon and Simone Severini",
  booktitle =    "{Theory of quantum computation, communication, and
                 cryptography: 5th conference, TQC 2010, Leeds, UK,
                 April 13--15, 2010, revised selected papers}",
  title =        "{Theory of quantum computation, communication, and
                 cryptography: 5th conference, TQC 2010, Leeds, UK,
                 April 13--15, 2010, revised selected papers}",
  volume =       "6519",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "????",
  year =         "2011",
  ISBN =         "3-642-18072-8 (softcover)",
  ISBN-13 =      "978-3-642-18072-9 (softcover)",
  LCCN =         "????",
  bibdate =      "Mon Jan 10 18:22:26 MST 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "Lecture notes in computer science",
  acknowledgement = ack-nhfb,
}

@Book{vanTilborg:2011:ECS,
  editor =       "Henk C. A. van Tilborg and Sushil Jajodia",
  booktitle =    "Encyclopedia of Cryptography and Security",
  title =        "Encyclopedia of Cryptography and Security",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  edition =      "Second",
  pages =        "xl + 1416",
  year =         "2011",
  DOI =          "https://doi.org/10.1007/978-1-4419-5906-5",
  ISBN =         "1-4419-5905-X (print), 1-4419-5906-8 (e-book)",
  ISBN-13 =      "978-1-4419-5905-8 (print), 978-1-4419-5906-5
                 (e-book)",
  LCCN =         "????",
  bibdate =      "Wed Dec 21 07:37:32 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  acknowledgement = ack-nhfb,
}

@Proceedings{Yang:2011:PQC,
  editor =       "Bo-Yin Yang",
  booktitle =    "{Post-Quantum Cryptography: 4th International
                 Workshop, PQCrypto 2011, Taipei, Taiwan, November 29
                 --- December 2, 2011. Proceedings}",
  title =        "{Post-Quantum Cryptography: 4th International
                 Workshop, PQCrypto 2011, Taipei, Taiwan, November 29
                 --- December 2, 2011. Proceedings}",
  volume =       "7071",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "????",
  year =         "2011",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-25404-8",
  ISBN =         "3-642-25404-7",
  ISBN-13 =      "978-3-642-25404-8",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri May 25 08:11:05 MDT 2012",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2011.bib",
  series =       ser-LNCS,
  URL =          "http://www.springerlink.com/content/978-3-642-25404-8",
  acknowledgement = ack-nhfb,
}

@Proceedings{Cramer:2012:TCT,
  editor =       "Ronald Cramer",
  booktitle =    "{Theory of Cryptography: 9th Theory of Cryptography
                 Conference, TCC 2012, Taormina, Sicily, Italy, March
                 19--21. Proceedings}",
  title =        "{Theory of Cryptography: 9th Theory of Cryptography
                 Conference, TCC 2012, Taormina, Sicily, Italy, March
                 19--21. Proceedings}",
  volume =       "7194",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "????",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-28913-2",
  ISBN =         "3-642-28913-4",
  ISBN-13 =      "978-3-642-28913-2",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri May 25 08:11:01 MDT 2012",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012.bib",
  series =       ser-LNCS,
  URL =          "http://www.springerlink.com/content/978-3-642-28913-2",
  acknowledgement = ack-nhfb,
}

@Proceedings{Danezis:2012:FCDa,
  editor =       "George Danezis and Sven Dietrich and Kazue Sako",
  booktitle =    "{Financial Cryptography and Data Security: FC 2011
                 Workshops, RLCPS and WECSR 2011, Rodney Bay, St. Lucia,
                 February 28 --- March 4, 2011, Revised Selected
                 Papers}",
  title =        "{Financial Cryptography and Data Security: FC 2011
                 Workshops, RLCPS and WECSR 2011, Rodney Bay, St. Lucia,
                 February 28 --- March 4, 2011, Revised Selected
                 Papers}",
  volume =       "7126",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "????",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-29888-2",
  ISBN =         "3-642-29888-5",
  ISBN-13 =      "978-3-642-29888-2",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri May 25 08:10:59 MDT 2012",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012.bib",
  series =       ser-LNCS,
  URL =          "http://www.springerlink.com/content/978-3-642-29888-2",
  acknowledgement = ack-nhfb,
}

@Proceedings{Danezis:2012:FCDb,
  editor =       "George Danezis",
  booktitle =    "{Financial Cryptography and Data Security: 15th
                 International Conference, FC 2011, Gros Islet, St.
                 Lucia, February 28 --- March 4, 2011, Revised Selected
                 Papers}",
  title =        "{Financial Cryptography and Data Security: 15th
                 International Conference, FC 2011, Gros Islet, St.
                 Lucia, February 28 --- March 4, 2011, Revised Selected
                 Papers}",
  volume =       "7035",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "????",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-27575-3",
  ISBN =         "3-642-27575-3",
  ISBN-13 =      "978-3-642-27575-3",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri May 25 08:11:03 MDT 2012",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012.bib",
  series =       ser-LNCS,
  URL =          "http://www.springerlink.com/content/978-3-642-27575-3",
  acknowledgement = ack-nhfb,
}

@Proceedings{Dunkelman:2012:TCC,
  editor =       "Orr Dunkelman",
  booktitle =    "{Topics in Cryptology --- CT-RSA 2012: The
                 Cryptographers' Track at the RSA Conference 2012, San
                 Francisco, CA, USA, February 27 --- March 2, 2012.
                 Proceedings}",
  title =        "{Topics in Cryptology --- CT-RSA 2012: The
                 Cryptographers' Track at the RSA Conference 2012, San
                 Francisco, CA, USA, February 27 --- March 2, 2012.
                 Proceedings}",
  volume =       "7178",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "????",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-27953-9",
  ISBN =         "3-642-27953-8",
  ISBN-13 =      "978-3-642-27953-9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri May 25 08:11:02 MDT 2012",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012.bib",
  series =       ser-LNCS,
  URL =          "http://www.springerlink.com/content/978-3-642-27953-9",
  acknowledgement = ack-nhfb,
}

@Proceedings{Fischlin:2012:PKC,
  editor =       "Marc Fischlin and Johannes Buchmann and Mark Manulis",
  booktitle =    "{Public Key Cryptography --- PKC 2012: 15th
                 International Conference on Practice and Theory in
                 Public Key Cryptography, Darmstadt, Germany, May
                 21--23. Proceedings}",
  title =        "{Public Key Cryptography --- PKC 2012: 15th
                 International Conference on Practice and Theory in
                 Public Key Cryptography, Darmstadt, Germany, May
                 21--23. Proceedings}",
  volume =       "7293",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "????",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-30056-1",
  ISBN =         "3-642-30056-1",
  ISBN-13 =      "978-3-642-30056-1",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri May 25 08:10:59 MDT 2012",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012.bib",
  series =       ser-LNCS,
  URL =          "http://www.springerlink.com/content/978-3-642-30056-1",
  acknowledgement = ack-nhfb,
}

@Book{Good:2012:BTC,
  editor =       "Irving John Good and Donald Michie and G. (Geoffrey)
                 Timms and James A. Reeds and Whitfield Diffie and
                 Judith Veronica Field",
  booktitle =    "Breaking teleprinter ciphers at {Bletchley Park}:
                 general report on {Tunny} with emphasis on statistical
                 methods (1945)",
  title =        "Breaking teleprinter ciphers at {Bletchley Park}:
                 general report on {Tunny} with emphasis on statistical
                 methods (1945)",
  publisher =    pub-WILEY,
  address =      pub-WILEY:adr,
  pages =        "cxi + 673",
  year =         "2012",
  DOI =          "https://doi.org/10.1002/9781119061601",
  ISBN =         "0-470-46589-1 (hardcover)",
  ISBN-13 =      "978-0-470-46589-9 (hardcover)",
  LCCN =         "D810.C88 G66 2015",
  bibdate =      "Sat Aug 15 15:59:55 MDT 2020",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/bibnet/authors/t/turing-alan-mathison.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "This detailed technical account of breaking Tunny is
                 an edition of a report written in 1945, with extensive
                 modern commentary Breaking Teleprinter Ciphers at
                 Bletchley Park gives the full text of the General
                 Report on Tunny (GRT) of 1945, making clear how the
                 ideas, notation and the specially designed machines
                 that were used differ from what was generally accepted
                 in 1945, and, where a modern reader might be misled,
                 from what is understood now. The editors of this book
                 clarify the sometimes slightly strange language of the
                 GRT and explain the text within a variety of contexts
                 in several separate historical story lines, some only
                 implicit in the GRT itself. The first story, told by
                 the authors of the GRT, describes how, using specially
                 designed machines, including from 1944 the
                 ``Colossus'', the British broke the enciphered
                 teleprinter messages sent by the highest command levels
                 of the Germany Army. The cipher machines the Germans
                 used were the Lorenz SZ 40 series, called ``Tunny'' by
                 the British. The second story shows how the use of
                 then-unfashionable Bayesian methods in statistics
                 proved to be essential to the British success. The
                 third story describes a significant stage in the
                 invention of the modern digital computer. This story is
                 connected with Alan Turing's 1936 paper on the theory
                 of computability, which is nowadays seen as a starting
                 point for the development of the modern digital
                 computer. This book includes: Over 200 pages of
                 commentary, biographies, glossaries, and essays related
                 to the text of the General Report on Tunny. The
                 complete text of the original GRT, covering the general
                 theory of Tunny breaking and of numerous refinements
                 appropriate to special-case situations. All the
                 examples of original worksheets and printouts, showing
                 the Tunny-breaking process in action, that appear in
                 the GRT The main purpose of this book is to present the
                 actual words of the GRT for use by readers with a
                 serious interest in the history of cryptography,
                 computing, or mathematics.",
  acknowledgement = ack-nhfb,
  subject =      "Cryptography; Great Britain; History; 20th century;
                 World War, 1939-1945; Electronic intelligence;
                 Cryptography.; Electronic intelligence.; Bletchley Park
                 (Milton Keynes, England); England; Milton Keynes;
                 Bletchley Park",
  tableofcontents = "Preface / xiii \\
                 Editorial Notes / xiv \\
                 Notes on Vocabulary / xiv \\
                 List of Abbreviations / xv \\
                 Cryptanalytic Significance of the Analysis of Tunny, by
                 Whitfield Diffie / xvii \\
                 Editors' Introduction, by Whitfield Diffie and J. V.
                 Field / xxv \\
                 Statistics at Bletchley Park, by S. L. Zabell / lxxv
                 \\
                 Biographies of Authors / ciii \\
                 Notes on the Editors of the Present Volume / cvii \\
                 List of Figures / cix \\
                 General Report on Tunny, with emphasis on statistical
                 methods / 1 \\
                 Part 0: Preface \\
                 01: Preface / 3 \\
                 Part 1: Introduction \\
                 11: German Tunny / 6 \\
                 12: Cryptographic Aspects / 22 \\
                 13: Machines / 32 \\
                 14: Organisation / 35 \\
                 15: Some Historical Notes / 39 \\
                 Part 2: Methods of Solution \\
                 21: Some Probability Techniques / 43 \\
                 22: Statistical Foundations / 50 \\
                 23: Machine Setting / 80 \\
                 24: Rectangling / 110 \\
                 25: Chi-Breaking from Cipher / 139 \\
                 26: Wheel-Breaking from Key / 185 \\
                 27: Cribs / 219 \\
                 28: Language Methods / 237 \\
                 Part 3: Organisation \\
                 31: Mr Newman's Section / 262 \\
                 32: Organisation of the Testery / 267 \\
                 33: Knockholt / 268 \\
                 34: Registration and Circulation / 269 \\
                 35: Tapemaking and Checking / 271 \\
                 36: Chi-Breaking from Cipher / 275 \\
                 37: Machine Setting Organisation / 277 \\
                 38: Wheel-Breaking from Key, Organisation / 280 \\
                 39: Language Methods / 282 \\
                 Part 4: Early Methods and History \\
                 41: The First Break / 284 \\
                 42: Early Hand Methods / 290 \\
                 43: Testery Methods 1942--1944 / 298 \\
                 44: Hand Statistical Methods / 305 \\
                 Part 5: Machines \\
                 51: Introductory / 309 \\
                 52: Development of Robinson and Colossus / 312 \\
                 53: Colossus / 316 \\
                 54: Robinson / 336 \\
                 55: Specialized Counting Machines / 346 \\
                 56: Copying Machines / 350 \\
                 57: Simple machines / 361 \\
                 58: Photographs / 362 \\
                 Part 6: Raw Materials \\
                 61: Raw Materials \\
                 Production, with Plans of Tunny Links / 381 \\
                 Part 7: References \\
                 71: Glossary and Index / 387 \\
                 72: Notation / 435 \\
                 73: Bibliography / 441 \\
                 74: Chronology / 444 \\
                 Part 8: Conclusions \\
                 81: Conclusions / 452 \\
                 Part 9: Appendices \\
                 91: The 5202 Machine / 456 \\
                 92: Recovery of Motor Patterns from De-chi / 471 \\
                 93: Thrasher / 482 \\
                 94: Research into the QEP System / 484 \\
                 95: Mechanical Flags / 488 \\
                 Appendix A: Transmission of Teleprinter Signals, by J.
                 A. Reeds / 495 \\
                 Appendix B: Activities at Knockholt, by J. A. Reeds /
                 503 \\
                 Appendix C: The 5202 Machine, by J. A. Reeds / 530 \\
                 Appendix D: Initial Conception of Colossus, by J. A.
                 Reeds / 535 \\
                 Appendix E: List of Scanned Exhibits / 540 \\
                 Supplementary Glossary / 542 \\
                 Biographical Notes / 547 \\
                 Notes / 561 \\
                 Bibliography / 624 \\
                 Index / 645",
}

@Book{Joye:2012:FAC,
  editor =       "Marc Joye and Michael Tunstall",
  booktitle =    "Fault Analysis in Cryptography",
  title =        "Fault Analysis in Cryptography",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xvi + 354 + 98",
  year =         "2012",
  DOI =          "https://doi.org/10.1007/978-3-642-29656-7",
  ISBN =         "3-642-29655-6, 3-642-29656-4 (e-book)",
  ISBN-13 =      "978-3-642-29655-0, 978-3-642-29656-7 (e-book)",
  ISSN =         "1619-7100 (print), 2197-845X (electronic)",
  ISSN-L =       "1619-7100",
  LCCN =         "QA76.9.A25 F38 2012; QA76.9.D35",
  bibdate =      "Sat Jun 10 08:35:17 MDT 2017",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  series =       "Information Security and Cryptography",
  URL =          "http://www.springerlink.com/content/978-3-642-29656-7",
  abstract =     "In the 1970s researchers noticed that radioactive
                 particles produced by elements naturally present in
                 packaging material could cause bits to flip in
                 sensitive areas of electronic chips. Research into the
                 effect of cosmic rays on semiconductors, an area of
                 particular interest in the aerospace industry, led to
                 methods of hardening electronic devices designed for
                 harsh environments. Ultimately various mechanisms for
                 fault creation and propagation were discovered, and in
                 particular it was noted that many cryptographic
                 algorithms succumb to so-called fault attacks.
                 Preventing fault attacks without sacrificing
                 performance is nontrivial and this is the subject of
                 this book. Part I deals with side-channel analysis and
                 its relevance to fault attacks. The chapters in Part II
                 cover fault analysis in secret key cryptography, with
                 chapters on block ciphers, fault analysis of DES and
                 AES, countermeasures for symmetric-key ciphers, and
                 countermeasures against attacks on AES. Part III deals
                 with fault analysis in public key cryptography, with
                 chapters dedicated to classical RSA and RSA-CRT
                 implementations, elliptic curve cryptosystems and
                 countermeasures using fault detection, devices
                 resilient to fault injection attacks, lattice-based
                 fault attacks on signatures, and fault attacks on
                 pairing-based cryptography. Part IV examines fault
                 attacks on stream ciphers and how faults interact with
                 countermeasures used to prevent power analysis attacks.
                 Finally, Part V contains chapters that explain how
                 fault attacks are implemented, with chapters on fault
                 injection technologies for microprocessors, and fault
                 injection and key retrieval experiments on a widely
                 used evaluation board. This is the first book on this
                 topic and will be of interest to researchers and
                 practitioners engaged with cryptographic engineering.",
  acknowledgement = ack-nhfb,
  subject =      "Computer science; Computer hardware; Data structures
                 (Computer science); Computer engineering; Data
                 Structures, Cryptology and Information Theory;
                 Electrical Engineering; Fehleranalyse; Advanced
                 Encryption Standard; Data Encryption Standard;
                 Public-Key-Kryptosystem; Kryptoanalyse; Hardware;
                 Datenstruktur; Computer engineering; Computer
                 input-output equipment; Computer science; Data
                 structures (Computer science)",
  tableofcontents = "Part 1: Introductory Material \\
                 Side-Channel Analysis and Its Relevance to Fault
                 Attacks / Elisabeth Oswald and Fran{\c{c}}ois-Xavier
                 Standaert \\
                 Part 2: Fault Analysis in Secret Key Cryptography \\
                 Attacking Block Ciphers / Christophe Clavier \\
                 Differential Fault Analysis of DES / Matthieu Rivain
                 \\
                 Differential Fault Analysis of the Advanced Encryption
                 Standard / Christophe Giraud \\
                 Countermeasures for Symmetric Key Ciphers /
                 J{\"o}rn-Marc Schmidt and Marcel Medwed \\
                 On Countermeasures Against Fault Attacks on the
                 Advanced Encryption Standard / Kaouthar Bousselam,
                 Giorgio Di Natale, Marie-Lise Flottes and Bruno
                 Rouzeyre \\
                 Part 3: Fault Analysis in Public Key Cryptography \\
                 A Survey of Differential Fault Analysis Against
                 Classical RSA Implementations / Alexandre Berzati,
                 C{\'e}cile Canovas-Dumas and Louis Goubin \\
                 Fault Attacks Against RSA-CRT Implementation / Chong
                 Hee Kim and Jean-Jacques Quisquater \\
                 Fault Attacks on Elliptic Curve Cryptosystems /
                 Abdulaziz Alkhoraidly, Agust{\'i}n Dom{\'i}nguez-Oviedo
                 and M. Anwar Hasan \\
                 On Countermeasures Against Fault Attacks on Elliptic
                 Curve Cryptography Using Fault Detection / Arash Hariri
                 and Arash Reyhani-Masoleh \\
                 Design of Cryptographic Devices Resilient to Fault
                 Injection Attacks Using Nonlinear Robust Codes /
                 Kahraman D. Akdemir, Zhen Wang, Mark Karpovsky and Berk
                 Sunar \\
                 Lattice-Based Fault Attacks on Signatures / Phong Q.
                 Nguyen and Mehdi Tibouchi \\
                 Fault Attacks on Pairing-Based Cryptography / Nadia El
                 Mrabet, Dan Page and Frederik Vercauteren \\
                 Part 4: Miscellaneous \\
                 Fault Attacks on Stream Ciphers / Alessandro Barenghi
                 and Elena Trichina \\
                 Interaction Between Fault Attack Countermeasures and
                 the Resistance Against Power Analysis Attacks /
                 Francesco Regazzoni, Luca Breveglieri, Paolo Ienne and
                 Israel Koren \\
                 Part 5: Implementing Fault Attacks \\
                 Injection Technologies for Fault Attacks on
                 Microprocessors / Alessandro Barenghi, Guido M.
                 Bertoni, Luca Breveglieri, Mauro Pelliccioli and
                 Gerardo Pelosi \\
                 Global Faults on Cryptographic Circuits / Sylvain
                 Guilley and Jean-Luc Danger \\
                 Fault Injection and Key Retrieval Experiments on an
                 Evaluation Board / Junko Takahashi, Toshinori Fukunaga,
                 Shigeto Gomisawa, Yang Li and Kazuo Sakiyama, et al",
}

@Book{Ludge:2012:NLD,
  editor =       "Kathy L{\"u}dge",
  booktitle =    "Nonlinear laser dynamics: from quantum dots to
                 cryptography",
  title =        "Nonlinear laser dynamics: from quantum dots to
                 cryptography",
  publisher =    "Wiley-VCH",
  address =      "Weinheim",
  pages =        "xx + 387",
  year =         "2012",
  ISBN =         "3-527-41100-3 (hardcover), 3-527-63984-5 (ePDF),
                 3-527-63982-9 (oBook), 3-527-63983-7 (ePub),
                 3-527-63985-3 (Mobi)",
  ISBN-13 =      "978-3-527-41100-9 (hardcover), 978-3-527-63984-7
                 (ePDF), 978-3-527-63982-3 (oBook), 978-3-527-63983-0
                 (ePub), 978-3-527-63985-4 (Mobi)",
  LCCN =         "QC688 .N66 2012; QC689.55.S45 N665 2012",
  bibdate =      "Thu Mar 13 14:48:15 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       "References in nonlinear dynamics and complexity",
  URL =          "http://www.loc.gov/catdir/enhancements/fy1403/2012360633-b.html;
                 http://www.loc.gov/catdir/enhancements/fy1403/2012360633-d.html;
                 http://www.loc.gov/catdir/enhancements/fy1403/2012360633-t.html",
  acknowledgement = ack-nhfb,
  subject =      "Lasers; Nonlinear optics; Semiconductor lasers",
  tableofcontents = "Prefix \\
                 List of Contributors \\
                 Part I: Nanostructured Devices \\
                 Modeling quantum-dot-based devices / Kathy Ludge \\
                 Exploiting noise and polarization bistability in
                 vertical-cavity surface emitting lasers for fast pulse
                 generation and logic operations / Jordi Zamora-Munt and
                 Cristina Masoller \\
                 Mode competition driving laser nonlinear dynamics /
                 Marc Sciamanna \\
                 Quantum cascade laser: an emerging technology / Andreas
                 Wacker \\
                 Controlling charge domain dynamics in superlattices \\
                 Mark T. Greenaway, Alexander G. Balanov, and T. Mark
                 Fromhold \\
                 Part II: Coupled Laser Device \\
                 Quantum dot laser tolerance to optical feedback /
                 Christian Otto, Kathy L{\"u}dge, Evgeniy Viktorov, and
                 Thomas Erneux \\
                 Bifurcation study of a semiconductor laser with
                 saturable absorber and delayed optical feedback / Bernd
                 Krauskopf and Jamie J. Walker \\
                 Modeling of passively mode-locked semiconductor lasers
                 / Andrei G. Vladimirov, Dmitrii Rachinskii and Matthias
                 Wolfrum \\
                 Dynamical and synchronization properties of
                 delay-coupled lasers / Cristina M. Gonzalez, Miguel C.
                 Soriano, M. Carme Torrent, Jordi Garcia-Ojalvo, and
                 Ingo Fischer \\
                 Complex networks based on coupled two-mode lasers /
                 Andreas Amann \\
                 Part III: Synchronization and Cryptography \\
                 Noise synchronization and stochastic bifurcations in
                 lasers / Sebastian M. Wieczorek \\
                 Emergence of one-and two-cluster states in populations
                 of globally pulse-coupled oscillators / Leonhard Lucken
                 and Serhiy Yanchuk \\
                 Broadband chaos / Kristine E. Callan, Lucas Illing, and
                 Daniel J. Gauthier \\
                 Synchronization of chaotic networks and secure
                 communication / Ido Kanter and Wolfgang Kinzel \\
                 Desultory dynamics in diode-lasers: drift, diffusion,
                 and delay / K. Alan Shore \\
                 Index",
}

@Proceedings{Miri:2012:SAC,
  editor =       "Ali Miri and Serge Vaudenay",
  booktitle =    "{Selected Areas in Cryptography: 18th International
                 Workshop, SAC 2011, Toronto, ON, Canada, August 11--12,
                 Revised Selected Papers}",
  title =        "{Selected Areas in Cryptography: 18th International
                 Workshop, SAC 2011, Toronto, ON, Canada, August 11--12,
                 Revised Selected Papers}",
  volume =       "7118",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "????",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-28495-3",
  ISBN =         "3-642-28495-7",
  ISBN-13 =      "978-3-642-28495-3",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri May 25 08:11:02 MDT 2012",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012.bib",
  series =       ser-LNCS,
  URL =          "http://www.springerlink.com/content/978-3-642-28495-3",
  acknowledgement = ack-nhfb,
}

@Book{Naccache:2012:CST,
  editor =       "David Naccache",
  booktitle =    "{Cryptography and Security: From Theory to
                 Applications: Essays Dedicated to Jean-Jacques
                 Quisquater on the Occasion of His 65th Birthday}",
  title =        "{Cryptography and Security: From Theory to
                 Applications: Essays Dedicated to Jean-Jacques
                 Quisquater on the Occasion of His 65th Birthday}",
  volume =       "6805",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "????",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-28367-3",
  ISBN =         "3-642-28367-5",
  ISBN-13 =      "978-3-642-28367-3",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri May 25 08:11:02 MDT 2012",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012.bib",
  series =       ser-LNCS,
  URL =          "http://www.springerlink.com/content/978-3-642-28367-3",
  acknowledgement = ack-nhfb,
}

@Proceedings{Pointcheval:2012:ACE,
  editor =       "David Pointcheval and Thomas Johansson",
  booktitle =    "{Advances in Cryptology --- EUROCRYPT 2012: 31st
                 Annual International Conference on the Theory and
                 Applications of Cryptographic Techniques, Cambridge,
                 UK, April 15--19. Proceedings}",
  title =        "{Advances in Cryptology --- EUROCRYPT 2012: 31st
                 Annual International Conference on the Theory and
                 Applications of Cryptographic Techniques, Cambridge,
                 UK, April 15--19. Proceedings}",
  volume =       "7237",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "????",
  year =         "2012",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-29010-7",
  ISBN =         "3-642-29010-8",
  ISBN-13 =      "978-3-642-29010-7",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri May 25 08:11:00 MDT 2012",
  bibsource =    "http://link.springer-ny.com/link/service/series/0558/;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2012.bib",
  series =       ser-LNCS,
  URL =          "http://www.springerlink.com/content/978-3-642-29010-7",
  acknowledgement = ack-nhfb,
}

@Proceedings{IEEE:2013:PIS,
  editor =       "{IEEE}",
  booktitle =    "{Proceedings of the 21st IEEE Symposium on Computer
                 Arithmetic, Austin, Texas, USA, 8--10 April 2013}",
  title =        "{Proceedings of the 21st IEEE Symposium on Computer
                 Arithmetic, Austin, Texas, USA, 8--10 April 2013}",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "xvi + 229",
  year =         "2013",
  ISBN =         "0-7695-4957-8",
  ISBN-13 =      "978-0-7695-4957-6",
  ISSN =         "1063-6889",
  LCCN =         "QA76.9.C62 S95 2013",
  bibdate =      "Sat Aug 01 08:03:11 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/elefunt.bib;
                 https://www.math.utah.edu/pub/tex/bib/fparith.bib",
  acknowledgement = ack-nhfb,
  keywords =     "computer arithmetic units; correctness proofs;
                 cryptography; domain specific designs; error analysis;
                 exascale computing; floating point arithmetic;
                 floating-point error analysis; formal verification;
                 function approximation; modular arithmetic; theorem
                 proving; verification",
}

@Proceedings{Sahai:2013:TCT,
  editor =       "Amit Sahai",
  booktitle =    "{Theory of cryptography: 10th Theory of Cryptography
                 Conference, TCC 2013, Tokyo, Japan, March 3--6, 2013:
                 proceedings}",
  title =        "{Theory of cryptography: 10th Theory of Cryptography
                 Conference, TCC 2013, Tokyo, Japan, March 3--6, 2013:
                 proceedings}",
  volume =       "7785",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xi + 724",
  year =         "2013",
  DOI =          "https://doi.org/10.1007/978-3-642-36594-2",
  ISBN =         "3-642-36594-9 (paperback), 3-642-36593-0 (e-book)",
  ISBN-13 =      "978-3-642-36594-2 (paperback), 978-3-642-36593-5
                 (e-book)",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  LCCN =         "QA76.9.A25 T473 2013",
  bibdate =      "Thu Aug 21 08:27:18 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2013a.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       ser-LNCS,
  URL =          "http://www.loc.gov/catdir/enhancements/fy1310/2013931230-d.html;
                 http://www.loc.gov/catdir/enhancements/fy1310/2013931230-t.html;
                 http://www.springerlink.com/content/978-3-642-36594-2",
  acknowledgement = ack-nhfb,
  meetingname =  "Theory of Cryptography Conference (10th: 2013: Tokyo,
                 Japan)",
  remark =       "International conference proceedings.",
  series-URL =   "http://link.springer.com/bookseries/558",
  subject =      "Data encryption (Computer science); Congresses",
}

@Book{Sencar:2013:DIF,
  editor =       "Husrev T. Sencar and Nasir D. Memon",
  booktitle =    "Digital image forensics: there is more to a picture
                 than meets the eye",
  title =        "Digital image forensics: there is more to a picture
                 than meets the eye",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "viii + 370",
  year =         "2013",
  DOI =          "https://doi.org/10.1007/978-1-4614-0757-7",
  ISBN =         "1-4614-0757-5 (ebook)",
  ISBN-13 =      "978-1-4614-0757-7 (ebook), 978-1-4614-0756-0",
  LCCN =         "TA1637 .D54 2013",
  bibdate =      "Fri Aug 15 13:56:00 MDT 2014",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "http://site.ebrary.com/id/10589376",
  abstract =     "Photographic imagery has come a long way from the
                 pinhole cameras of the nineteenth century. Digital
                 imagery, and its applications, develops in tandem with
                 contemporary society's sophisticated literacy of this
                 subtle medium. This book examines the ways in which
                 digital images have become ever more ubiquitous as
                 legal and medical evidence, just as they have become
                 our primary source of news and have replaced
                 paper-based financial documentation.Crucially, the
                 contributions also analyze the very profound problems
                 which have arisen alongside the digital image, issues
                 of veracity and progeny that demand systematic and
                 detailed response: It looks real, but is it? What
                 camera captured it? Has it been doctored or subtly
                 altered? Attempting to provide answers to these
                 slippery issues, the book covers how digital images are
                 created, processed and stored before moving on to set
                 out the latest techniques for forensically examining
                 images, and finally addressing practical issues such as
                 courtroom admissibility. In an environment where even
                 novice users can alter digital media, this
                 authoritative publication will do much so stabilize
                 public trust in these real, yet vastly flexible, images
                 of the world around us.",
  acknowledgement = ack-nhfb,
  subject =      "Image processing; Digital techniques; Computer crimes;
                 Investigation; COMPUTERS / Image Processing; COMPUTERS
                 / Digital Media / Graphics Applications; PHOTOGRAPHY /
                 Techniques / Digital; TECHNOLOGY and ENGINEERING /
                 Imaging Systems; Investigation;! Digital techniques.",
  tableofcontents = "Part 1: Background on Digital Images \\
                 Digital Camera Image Formation: Introduction and
                 Hardware / James E. Adams Jr. and Bruce Pillman \\
                 Digital Camera Image Formation: Processing and Storage
                 / Aaron Deever, Mrityunjay Kumar and Bruce Pillman \\
                 Digital Image Formats / Khalid Sayood \\
                 Searching and Extracting Digital Image Evidence /
                 Qiming Li \\
                 Part 2: Techniques Attributing an Image to Its Source
                 \\
                 Image and Video Source Class Identification / Alex C.
                 Kot and Hong Cao \\
                 Sensor Defects in Digital Image Forensic / Jessica
                 Fridrich \\
                 Source Attribution Based on Physical Defects in Light
                 Path / Ahmet Emir Dirik \\
                 Part 3: Techniques Verifying the Integrity and
                 Authenticity of Image Evidence \\
                 Natural Image Statistics in Digital Image Forensics /
                 Siwei Lyu \\
                 Detecting Doctored Images / Micah K. Johnson \\
                 Discrimination of Computer Synthesized or Recaptured
                 Images from Real Images / Tian-Tsong Ng and Shih-Fu
                 Chang \\
                 Part 4: Digital Image Forensics in Practice \\
                 Courtroom Considerations in Digital Image Forensics /
                 Rebecca Mercuri \\
                 Counter-Forensics: Attacking Image Forensics / Rainer
                 B{\"o}hme and Matthias Kirchner",
}

@Proceedings{Joux:2014:SAC,
  editor =       "Antoine Joux and Amr Youssef",
  booktitle =    "{Selected areas in cryptography --- SAC 2014: 21st
                 International Conference, Montr{\'e}al, QC, Canada,
                 August 14--15, 2014: revised selected papers}",
  title =        "{Selected areas in cryptography --- SAC 2014: 21st
                 International Conference, Montr{\'e}al, QC, Canada,
                 August 14--15, 2014: revised selected papers}",
  volume =       "8781",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "x + 379",
  year =         "2014",
  ISBN =         "3-319-13050-1 (print), 3-319-13051-X (e-book)",
  ISBN-13 =      "978-3-319-13050-7 (print), 978-3-319-13051-4
                 (e-book)",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  LCCN =         "QA76.9.A25",
  bibdate =      "Fri Mar 13 08:23:12 MDT 2015",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs.bib",
  series =       "Lecture notes in computer science: LNCS sublibrary. SL
                 4, Security and cryptology",
  abstract =     "This book constitutes the proceedings of the 21st
                 International Conference on Selected Areas in
                 Cryptography, SAC 2014, held in Montreal, QC, Canada,
                 in August 2014. The 22 papers presented in this volume
                 were carefully reviewed and selected from 103
                 submissions. There are four areas covered at each SAC
                 conference. The three permanent areas are: design and
                 analysis of symmetric key primitives and cryptosystems,
                 including block and stream ciphers, hash function, MAC
                 algorithms, cryptographic permutations, and
                 authenticated encryption schemes; efficient
                 implementations of symmetric and public key algorithms;
                 mathematical and algorithmic aspects of applied
                 cryptology. This year, the fourth area for SAC 2014 is:
                 algorithms for cryptography, cryptanalysis and their
                 complexity analysis.",
  acknowledgement = ack-nhfb,
  meetingname =  "SAC 2014 (2014 : Montreal, Qu{\'e}bec)",
  subject =      "Computer science; Data protection; Data encryption
                 (Computer science); Coding theory; Computer software",
}

@Book{Lane:2014:PBD,
  editor =       "Julia I. Lane and Victoria Stodden and Stefan Bender
                 and Helen Nissenbaum",
  booktitle =    "Privacy, big data, and the public good: frameworks for
                 engagement",
  title =        "Privacy, big data, and the public good: frameworks for
                 engagement",
  publisher =    pub-CAMBRIDGE,
  address =      pub-CAMBRIDGE:adr,
  pages =        "xix + 322",
  year =         "2014",
  ISBN =         "1-107-06735-9 (hardcover), 1-107-63768-6 (paperback)",
  ISBN-13 =      "978-1-107-06735-6 (hardcover), 978-1-107-63768-9
                 (paperback)",
  LCCN =         "JC596 .P747 2015",
  bibdate =      "Sat Jun 28 10:20:29 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/internet2010.bib;
                 z3950.loc.gov:7090/Voyager",
  abstract =     "Massive amounts of data on human beings can now be
                 analyzed. Pragmatic purposes abound, including selling
                 goods and services, winning political campaigns, and
                 identifying possible terrorists. Yet 'big data' can
                 also be harnessed to serve the public good: scientists
                 can use big data to do research that improves the lives
                 of human beings, improves government services, and
                 reduces taxpayer costs. In order to achieve this goal,
                 researchers must have access to this data - raising
                 important privacy questions. What are the ethical and
                 legal requirements? What are the rules of engagement?
                 What are the best ways to provide access while also
                 protecting confidentiality? Are there reasonable
                 mechanisms to compensate citizens for privacy loss? The
                 goal of this book is to answer some of these questions.
                 The book's authors paint an intellectual landscape that
                 includes legal, economic, and statistical frameworks.
                 The authors also identify new practical approaches that
                 simultaneously maximize the utility of data access
                 while minimizing information risk.",
  acknowledgement = ack-nhfb,
  subject =      "privacy, right of; research; moral and ethical
                 aspects; big data; social aspects; common good",
  tableofcontents = "Part I. Conceptual Framework: Editors' introduction
                 / Julia Lane, Victoria Stodden, Stefan Bender and Helen
                 Nissenbaum \\
                 1. Monitoring, datafication, and consent: legal
                 approaches to privacy in the big data context /
                 Katherine J. Strandburg \\
                 2. Big data's end run around anonymity and consent /
                 Solon Barocas and Helen Nissenbaum \\
                 3. The economics and behavioral economics of privacy /
                 Alessandro Acquisti \\
                 4. The legal and regulatory framework: what do the
                 rules say about data analysis? / Paul Ohm \\
                 5. Enabling reproducibility in big data research:
                 balancing confidentiality and scientific transparency /
                 Victoria Stodden \\
                 Part II. Practical Framework: Editors' introduction /
                 Julia Lane, Victoria Stodden, Stefan Bender and Helen
                 Nissenbaum \\
                 6. The value of big data for urban science / Steven E.
                 Koonin and Michael J. Holland \\
                 7. The new role of cities in creating value / Robert
                 Goerge \\
                 8. A European perspective / Peter Elias \\
                 9. Institutional controls: the new deal on data /
                 Daniel Greenwood, Arkadiusz Stopczynski, Brian Sweatt,
                 Thomas Hardjono and Alex Pentland \\
                 10. The operational framework: engineered controls /
                 Carl Landwehr \\
                 11. Portable approaches to informed consent and open
                 data / John Wilbanks \\
                 Part III. Statistical Framework: Editors' introduction
                 / Julia Lane, Victoria Stodden, Stefan Bender and Helen
                 Nissenbaum \\
                 12. Extracting information from big data / Frauke
                 Kreuter and Roger Peng \\
                 13. Using statistics to protect privacy / Alan F. Karr
                 and Jerome P. Reiter \\
                 14. Differential privacy: a cryptographic approach to
                 private data analysis / Cynthia Dwork",
}

@Proceedings{Lindell:2014:TCT,
  editor =       "Yehuda Lindell",
  booktitle =    "{Theory of cryptography: 11th Theory of Cryptography
                 Conference, TCC 2014, San Diego, CA, USA, February
                 24--26, 2014 proceedings}",
  title =        "{Theory of cryptography: 11th Theory of Cryptography
                 Conference, TCC 2014, San Diego, CA, USA, February
                 24--26, 2014 proceedings}",
  volume =       "8349",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "738",
  year =         "2014",
  DOI =          "https://doi.org/10.1007/978-3-642-54242-8",
  ISBN =         "3-642-54241-7 (paperback), 3-642-54242-5 (ebk.)",
  ISBN-13 =      "978-3-642-54241-1 (paperback), 978-3-642-54242-8
                 (ebk.)",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  LCCN =         "QA76.9.A25 T473 2014",
  bibdate =      "Thu Aug 21 08:27:20 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/lncs2013a.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       ser-LNCS,
  URL =          "http://www.springerlink.com/content/978-3-642-54242-8",
  abstract =     "This book constitutes the refereed proceedings of the
                 11th Theory of Cryptography Conference, TCC 2014, held
                 in San Diego, CA, USA, in February 2014. The 30 revised
                 full papers presented were carefully reviewed and
                 selected from 90 submissions. The papers are organized
                 in topical sections on obfuscation, applications of
                 obfuscation, zero knowledge, black-box separations,
                 secure computation, coding and cryptographic
                 applications, leakage, encryption, hardware-aided
                 secure protocols, and encryption and signatures.",
  acknowledgement = ack-nhfb,
  meetingname =  "Theory of Cryptography Conference (11th: 2014: San
                 Diego, Calif.)",
  remark =       "International conference proceedings.",
  series-URL =   "http://link.springer.com/bookseries/558",
  subject =      "Data encryption (Computer science); Congresses",
}

@Proceedings{IEEE:2015:ISS,
  editor =       "{IEEE}",
  booktitle =    "{2015 IEEE Symposium on Security and Privacy (SP 2015)
                 San Jose, California, USA, 18--20 May 2015}",
  title =        "{2015 IEEE Symposium on Security and Privacy (SP 2015)
                 San Jose, California, USA, 18--20 May 2015}",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "xix + 952",
  year =         "2015",
  ISBN =         "1-4673-6949-7 (print), 1-4673-6950-0 (e-book)",
  ISBN-13 =      "978-1-4673-6949-7, 978-1-4673-6950-3 (e-book)",
  ISSN =         "1081-6011 (print), 2375-1207 (electronic)",
  ISSN-L =       "1081-6011",
  LCCN =         "QA76.9.A25",
  bibdate =      "Mon Feb 10 08:59:08 MST 2020",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/fparith.bib",
  URL =          "http://www.gbv.de/dms/tib-ub-hannover/836112652.pdf",
  acknowledgement = ack-nhfb,
}

@Proceedings{Montuschi:2016:ISC,
  editor =       "Paolo Montuschi and Michael Schulte and Javier Hormigo
                 and Stuart Oberman and Nathalie Revol",
  booktitle =    "{2016 IEEE 23nd Symposium on Computer Arithmetic
                 (ARITH 2016), Santa Clara, California, USA, 10--13 July
                 2016}",
  title =        "{2016 IEEE 23nd Symposium on Computer Arithmetic
                 (ARITH 2016), Santa Clara, California, USA, 10--13 July
                 2016}",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "xxi + 182",
  year =         "2016",
  ISBN =         "1-5090-1615-5",
  ISBN-13 =      "978-1-5090-1615-0",
  ISSN =         "1063-6889",
  LCCN =         "QA76.9.C62 S95 2016",
  bibdate =      "Fri Dec 16 15:16:45 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/elefunt.bib;
                 https://www.math.utah.edu/pub/tex/bib/fparith.bib;
                 https://www.math.utah.edu/pub/tex/bib/mathcw.bib",
  URL =          "http://ieeexplore.ieee.org/servlet/opac?punumber=7562813",
  acknowledgement = ack-nhfb,
  keywords =     "computer arithmetic units; correctness proofs;
                 cryptography; domain specific designs; error analysis;
                 exascale computing; floating point arithmetic;
                 floating-point error analysis; formal verification;
                 function approximation; modular arithmetic; theorem
                 proving; verification",
}

@Book{Ryan:2016:NCE,
  editor =       "Peter Y. A. Ryan and David Naccache and Jean-Jacques
                 Quisquater",
  booktitle =    "The New Codebreakers: essays dedicated to {David Kahn}
                 on the occasion of his 85th birthday",
  title =        "The New Codebreakers: essays dedicated to {David Kahn}
                 on the occasion of his 85th birthday",
  volume =       "9100",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xiv + 551",
  year =         "2016",
  DOI =          "https://doi.org/10.1007/978-3-662-49301-4",
  ISBN =         "3-662-49300-4 (paperback); 3-662-49301-2 (e-book)",
  ISBN-13 =      "978-3-662-49300-7 (paperback); 978-3-662-49301-4
                 (e-book)",
  LCCN =         "QA76.9.A25",
  bibdate =      "Fri Jul 29 08:49:32 MDT 2022",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  series =       ser-LNCS,
  URL =          "http://link.springer.com/book/10.1007/978-3-662-49301-4",
  acknowledgement = ack-nhfb,
  subject =      "Criptografia; Reculls d'escrits; Seguretat
                 inform{\'y}atica; Criptografia.; Seguretat
                 inform{\'y}atica.; Reculls d'escrits.",
  tableofcontents = "Front Matter / i--xiv \\
                 History \\
                 Front Matter / 1--1 \\
                 Mary of Guise's Enciphered Letters / Val{\'e}rie
                 Nachef, Jacques Patarin, Armel Dubois-Nayt / 3--24 \\
                 About Professionalisation in the Intelligence
                 Community: The French Cryptologists (ca 1870 ca 1945) /
                 S{\'e}bastien-Yves Laurent / 25--33 \\
                 Myths and Legends of the History of Cryptology / Sophie
                 de Lastours / 34--39 \\
                 Vernam, Mauborgne, and Friedman: The One-Time Pad and
                 the Index of Coincidence / Steven M. Bellovin / 40--66
                 \\
                 Technology --- Past, Present, Future \\
                 Front Matter / 67--67 \\
                 The Fall of a Tiny Star / Flavio D. Garcia, Bart Jacobs
                 / 69--87 \\
                 Post-Quantum Cryptography: State of the Art / Johannes
                 A. Buchmann, Denis Butin, Florian G{\"o}pfert, Albrecht
                 Petzoldt / 88--108 \\
                 What is the Future of Cryptography? / Yvo Desmedt /
                 109--122 \\
                 Efficient Cryptographic Implementations / Front Matter
                 / 123--123 \\
                 Bitsliced High-Performance AES-ECB on GPUs / Rone Kwei
                 Lim, Linda Ruth Petzold, {\c{C}}etin Kaya Ko{\c{c}} /
                 125--133 \\
                 Buying AES Design Resistance with Speed and Energy /
                 Rodrigo Portella do Canto, Roman Korkikian, David
                 Naccache / 134--147 \\
                 Double-Speed Barrett Moduli / R{\'e}mi G{\'e}raud,
                 Diana Maimu , David Naccache / 148--158 \\
                 Treachery and Perfidy \\
                 Front Matter / 159--159 \\
                 Failure is Also an Option / Antoine Amarilli, Marc
                 Beunardeau, R{\'e}mi G{\'e}raud, David Naccache /
                 161--165 \\
                 How to (Carefully) Breach a Service Contract? /
                 C{\'e}line Chevalier, Damien Gaumont, David Naccache,
                 Rodrigo Portella Do Canto / 166--173 \\
                 Information Security \\
                 Front Matter / 175--175 \\
                 SpoofKiller: You Can Teach People How to Pay, but Not
                 How to Pay Attention \\
                 Markus Jakobsson, Hossein Siadati / 177--194 \\
                 Cyber-Physical Systems Security \\
                 Dieter Gollmann, Marina Krotofil / 195--204 \\
                 Information Security \\
                 Practical Techniques Building on Encryption for
                 Protecting and Managing Data in the Cloud \\
                 Sabrina De Capitani di Vimercati, Sara Foresti,
                 Giovanni Livraga, Pierangela Samarati / 205--239 \\
                 Cryptanalysis \\
                 Front Matter / 241--241 \\
                 Cryptography as an Attack Technology: Proving the
                 RSA\slash Factoring Kleptographic Attack / Adam Young,
                 Moti Yung / 243--255 \\
                 Dual EC: A Standardized Back Door / Daniel J.
                 Bernstein, Tanja Lange, Ruben Niederhagen / 256--281
                 \\
                 An Improved Differential Attack on Full GOST / Nicolas
                 T. Courtois / 282--303 \\
                 Cryptographic Hash Functions and Expander Graphs: The
                 End of the Story? / Christophe Petit, Jean-Jacques
                 Quisquater / 304--311 \\
                 Side-Channel Attacks \\
                 Front Matter / 313--313 \\
                 Polynomial Evaluation and Side Channel Analysis /
                 Claude Carlet, Emmanuel Prouff / 315--341 \\
                 Photonic Power Firewalls / Jean-Max Dutertre,
                 Amir-Pasha Mirbaha, David Naccache, Assia Tria /
                 342--354 \\
                 A Heuristic Approach to Assist Side Channel Analysis of
                 the Data Encryption Standard / Christophe Clavier,
                 Djamal Rebaine / 355--373 \\
                 Improving the Big Mac Attack on Elliptic Curve
                 Cryptography / Jean-Luc Danger, Sylvain Guilley,
                 Philippe Hoogvorst, C{\'e}dric Murdica, David Naccache
                 / 374--386 \\
                 Randomness \\
                 Front Matter / 387--387 \\
                 Randomness Testing: Result Interpretation and Speed /
                 Marek S{\'y}s, Vashek Maty{\'a} / 389--395 \\
                 A Fully-Digital Chaos-Based Random Bit Generator /
                 Marco Bucci, Raimondo Luzzi / 396--414 \\
                 Embedded System Security \\
                 Front Matter / 415--415 \\
                 Secure Application Execution in Mobile Devices / Mehari
                 G. Msgna, Houda Ferradi, Raja Naeem Akram, Konstantinos
                 Markantonakis / 417--438 \\
                 Hardware-Enforced Protection Against Buffer Overflow
                 Using Masked Program Counter / Jean-Luc Danger, Sylvain
                 Guilley, Thibault Porteboeuf, Florian Praden,
                 Micha{\"e}l Timbert / 439--454 \\
                 Public-Key Cryptography \\
                 Front Matter / 455--455 \\
                 Hierarchical Identities from Group Signatures and
                 Pseudonymous Signatures / Julien Bringer, Herv{\'e}
                 Chabanne, Roch Lescuyer, Alain Patey / 457--469 \\
                 Secure ElGamal-Type Cryptosystems Without Message
                 Encoding / Marc Joye / 470--478 \\
                 Public-Key Cryptography \\
                 Safe-Errors on SPA Protected Implementations with the
                 Atomicity Technique / Pierre-Alain Fouque, Sylvain
                 Guilley, C{\'e}dric Murdica, David Naccache / 479--493
                 \\
                 Models and Protocols \\
                 Front Matter / 495--495 \\
                 Clever Arbiters Versus Malicious Adversaries / Serge
                 Vaudenay / 497--517 \\
                 Security Analysis of the Modular Enhanced Symmetric
                 Role Authentication (mERA) Protocol /
                 Jean-S{\'e}bastien Coron / 518--542 \\
                 Crypto Santa / Peter Y. A. Ryan / 543--549 \\
                 Back Matter / 551--551",
}

@Book{Lindell:2017:TFC,
  editor =       "Yehuda Lindell",
  booktitle =    "Tutorials on the Foundations of Cryptography:
                 Dedicated to {Oded Goldreich}",
  title =        "Tutorials on the Foundations of Cryptography:
                 Dedicated to {Oded Goldreich}",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xv + 450",
  year =         "2017",
  DOI =          "https://doi.org/10.1007/978-3-319-57048-8",
  ISBN =         "3-319-57047-1, 3-319-57048-X (e-book)",
  ISBN-13 =      "978-3-319-57047-1, 978-3-319-57048-8 (e-book)",
  ISSN =         "1619-7100 (print), 2197-845X (electronic)",
  ISSN-L =       "1619-7100",
  LCCN =         "QA76.9.A25 T84 2017",
  bibdate =      "Sat Jun 10 08:34:38 MDT 2017",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  series =       "Information Security and Cryptography",
  URL =          "http://www.springerlink.com/content/978-3-319-57048-8",
  abstract =     "This is a graduate textbook of advanced tutorials on
                 the theory of cryptography and computational
                 complexity. In particular, the chapters explain aspects
                 of garbled circuits, public-key cryptography,
                 pseudorandom functions, one-way functions, homomorphic
                 encryption, the simulation proof technique, and the
                 complexity of differential privacy. Most chapters
                 progress methodically through motivations, foundations,
                 definitions, major results, issues surrounding
                 feasibility, surveys of recent developments, and
                 suggestions for further study. This book honors
                 Professor Oded Goldreich, a pioneering scientist,
                 educator, and mentor. Oded was instrumental in laying
                 down the foundations of cryptography, and he inspired
                 the contributing authors, Benny Applebaum, Boaz Barak,
                 Andrej Bogdanov, Iftach Haitner, Shai Halevi, Yehuda
                 Lindell, Alon Rosen, and Salil Vadhan, themselves
                 leading researchers on the theory of cryptography and
                 computational complexity. The book is appropriate for
                 graduate tutorials and seminars, and for self-study by
                 experienced researchers, assuming prior knowledge of
                 the theory of cryptography.",
  acknowledgement = ack-nhfb,
  subject =      "Data encryption (Computer science); Data encryption
                 (Computer science); Computer Science; Data Structures,
                 Cryptology and Information Theory; Theory of
                 Computation",
  tableofcontents = "Front Matter / i--xv \\
                 Garbled Circuits as Randomized Encodings of Functions:
                 a Primer / Benny Applebaum / 1--44 \\
                 The Complexity of Public-Key Cryptography / Boaz Barak
                 / 45--77 \\
                 Pseudorandom Functions: Three Decades Later / Andrej
                 Bogdanov, Alon Rosen / 79--158 \\
                 The Many Entropies in One-Way Functions / Iftach
                 Haitner, Salil Vadhan / 159--217 \\
                 Homomorphic Encryption / Shai Halevi / 219--276 \\
                 How to Simulate It A Tutorial on the Simulation Proof
                 Technique / Yehuda Lindell / 277--346 \\
                 The Complexity of Differential Privacy / Salil Vadhan /
                 347--450",
}

@Proceedings{Tenca:2018:PIS,
  editor =       "Alexandre Tenca and Naofumi Takagi",
  booktitle =    "Proceedings of the {25th International Symposium on
                 Computer Arithmetic, 25--27 June 2018 Amherst, MA,
                 USA}",
  title =        "Proceedings of the {25th International Symposium on
                 Computer Arithmetic, 25--27 June 2018 Amherst, MA,
                 USA}",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "17 + 152",
  month =        jun,
  year =         "2018",
  DOI =          "https://doi.org/10.1109/ARITH.2018.8464697",
  ISBN =         "1-5386-2612-8 (USB), 1-5386-2665-9",
  ISBN-13 =      "978-1-5386-2612-2 (USB), 978-1-5386-2613-9,
                 978-1-5386-2665-8",
  ISSN =         "2576-2265",
  LCCN =         "QA76.9.C62",
  bibdate =      "Fri Jan 31 08:05:31 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/elefunt.bib;
                 https://www.math.utah.edu/pub/tex/bib/fparith.bib",
  note =         "IEEE catalog number CFP18121-USB.",
  abstract =     "Presents the title page of the proceedings record.",
  acknowledgement = ack-nhfb,
  subject =      "ARITH-25; Computer arithmetic; Congresses; Computer
                 programming; Floating-point arithmetic; Computer
                 arithmetic and logic units",
}

@Book{Goldreich:2019:PSF,
  editor =       "Oded Goldreich",
  booktitle =    "Providing Sound Foundations for Cryptography: On the
                 Work of {Shafi Goldwasser} and {Silvio Micali}",
  title =        "Providing Sound Foundations for Cryptography: On the
                 Work of {Shafi Goldwasser} and {Silvio Micali}",
  publisher =    pub-ACM,
  address =      pub-ACM:adr,
  pages =        "xxxv + 800",
  month =        oct,
  year =         "2019",
  DOI =          "https://doi.org/10.1145/3335741",
  ISBN =         "1-4503-7266-X (hardcover), 1-4503-7266-X (paperback),
                 1-4503-7267-8 (e-pub)",
  ISBN-13 =      "978-1-4503-7266-4 (hardcover), 978-1-4503-7266-4
                 (paperback), 978-1-4503-7267-1 (e-pub)",
  ISSN =         "2374-6777",
  LCCN =         "TK5102.94 .P767 2019",
  bibdate =      "Wed Apr 28 13:29:16 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/acm-turing-awards.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  abstract =     "Cryptography is concerned with the construction of
                 schemes that withstand any abuse. A cryptographic
                 scheme is constructed so as to maintain a desired
                 functionality, even under malicious attempts aimed at
                 making it deviate from its prescribed behavior. The
                 design of cryptographic systems must be based on firm
                 foundations, whereas ad hoc approaches and heuristics
                 are a very dangerous way to go. These foundations were
                 developed mostly in the 1980s, in works that are all
                 co-authored by Shafi Goldwasser and/or Silvio Micali.
                 These works have transformed cryptography from an
                 engineering discipline, lacking sound theoretical
                 foundations, into a scientific field possessing a
                 well-founded theory, which influences practice as well
                 as contributes to other areas of theoretical computer
                 science. This book celebrates these works, which were
                 the basis for bestowing the 2012 A. M. Turing Award
                 upon Shafi Goldwasser and Silvio Micali. A significant
                 portion of this book reproduces some of these works,
                 and another portion consists of scientific perspectives
                 by some of their former students. The highlight of the
                 book is provided by a few chapters that allow the
                 readers to meet Shafi and Silvio in person. These
                 include interviews with them, their biographies and
                 their Turing Award lectures.",
  acknowledgement = ack-nhfb,
  subject =      "Computer scientists; United States; Biography; Israel;
                 Italy; Cryptography; Data processing; Electronic data
                 processing; Distributed processing; Computer
                 algorithms; Computer algorithms.; Computer scientists.;
                 Cryptography.; Data processing.; Distributed
                 processing.",
  tableofcontents = "part I. Biographies, interviews, and award
                 lectures. 1. A story behind every problem: a brief
                 biography of Shafi Goldwasser \\
                 2. One obsession at a time: a brief biography of Silvio
                 Micali \\
                 3. An interview with Shafi Goldwasser \\
                 4. An interview with Silvio Micali \\
                 5. The cryptographic lens: Shafi Goldwasser's Turing
                 Lecture \\
                 6. Proofs, according to Silvio: Silvio Micali's Turing
                 Lecture \\
                 Part II. Original papers \\
                 7. Probabilistic encryption and how to play mental
                 poker keeping secret all partial information / Shafi
                 Goldwasser, Silvio Micali \\
                 8. The knowledge complexity of interactive
                 proof-systems (extended abstract) / Shafi Goldwasser,
                 Silvio Micali, Chales Rackoff \\
                 9. How to generate cryptographically strong sequences
                 of pseudo random bits / Manuel Blum, Silvio Micali \\
                 10. How to construct random functions (extended
                 abstract) / Oded Goldreich, Shafi Goldwasser, Silvio
                 Micali \\
                 11. A ``paradoxical'' solution to the signature problem
                 / Shafi Goldwasser, Silvio Micali, Ronald L. Rivest \\
                 12. Proofs that yield nothing but their validity and a
                 methodology of cryptographic protocol design (extended
                 abstract) / Oded Goldreich, Silvio Micali, Avi
                 Wigderson \\
                 13. How to play any mental game, or a completeness
                 theorem for protocols with honest majority (extended
                 abstract) / Oded Goldreich, Silvio Micali, Avi
                 Wigderson \\
                 14. Non-interactive zero-knowledge and its applications
                 (extended abstract) / Manuel Blum, Paul Feldman, Silvio
                 Micali \\
                 15. Completeness theorems for non-cryptographic
                 fault-tolerant distributed computation (extended
                 abstract) / Michael Ben-Or, Shafi Goldwasser, Avi
                 Wigderson \\
                 16. Multi-prover interactive proofs: how to remove
                 intractability assumptions / Michael Ben-Or, Shafi
                 Goldwasser, Joe Kilian, Avi Wigderson \\
                 part III. Perspectives \\
                 17. On the foundations of cryptography / Oded Goldreich
                 \\
                 18. On the impact of cryptography on complexity theory
                 / Oded Goldreich \\
                 19. On some noncryptographic works of Goldwasser and
                 Micali / Oded Goldreich \\
                 20. Fundamentals of fully homomorphic encryption /
                 Zvika Brakerski \\
                 21. Interactive proofs for lattice problems / Daniele
                 Micciancio \\
                 22. Following a tangent of proofs / Johan H{\^e}astad
                 \\
                 23. A tutorial on concurrent zero-knowledge / Rafael
                 Pass \\
                 24. Doubly efficient interactive proofs / Guy Rothblem
                 \\
                 25. Computational entropy / Salil Vadhan \\
                 26. A survey of leakage-resilient cryptography / Yael
                 Tauman Kalai and Leonid Reyzin",
}

@Proceedings{Takagi:2019:ISC,
  editor =       "Naofumi Takagi and Sylvie Boldo and Martin
                 Langhammer",
  booktitle =    "{2019 IEEE 26th Symposium on Computer Arithmetic
                 ARITH-26 (2019), Kyoto, Japan, 10--12 June 2019}",
  title =        "{2019 IEEE 26th Symposium on Computer Arithmetic
                 ARITH-26 (2019), Kyoto, Japan, 10--12 June 2019}",
  publisher =    pub-IEEE,
  address =      pub-IEEE:adr,
  pages =        "15 + 220",
  month =        jun,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/ARITH.2019.00001",
  ISBN =         "1-72813-366-1",
  ISBN-13 =      "978-1-72813-366-9",
  ISSN =         "1063-6889",
  ISSN-L =       "1063-6889",
  bibdate =      "Fri Jan 31 08:18:07 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/elefunt.bib;
                 https://www.math.utah.edu/pub/tex/bib/fparith.bib",
  abstract =     "Presents the title page of the proceedings record.",
  acknowledgement = ack-nhfb,
  keywords =     "ARITH-26",
}