Valid HTML 4.0! Valid CSS!
%%% -*-BibTeX-*-
%%% ====================================================================
%%%  BibTeX-file{
%%%     author          = "Nelson H. F. Beebe",
%%%     version         = "1.03",
%%%     date            = "25 April 2024",
%%%     time            = "09:45:48 MST",
%%%     filename        = "lncs2013a.bib",
%%%     address         = "University of Utah
%%%                        Department of Mathematics, 110 LCB
%%%                        155 S 1400 E RM 233
%%%                        Salt Lake City, UT 84112-0090
%%%                        USA",
%%%     telephone       = "+1 801 581 5254",
%%%     FAX             = "+1 801 581 4148",
%%%     URL             = "http://www.math.utah.edu/~beebe",
%%%     checksum        = "17475 1167 4614 54173",
%%%     email           = "beebe at math.utah.edu, beebe at acm.org,
%%%                        beebe at computer.org (Internet)",
%%%     codetable       = "ISO/ASCII",
%%%     keywords        = "BibTeX; bibliography; Lecture Notes in
%%%                        Computer Science",
%%%     license         = "public domain",
%%%     supported       = "yes",
%%%     docstring       = "This is a bibliography of papers published in
%%%                        Lecture Notes in Computer Science
%%%                        (Springer-Verlag) for 2013 for volumes in
%%%                        the range 7126--??.
%%%
%%%                        Bibliography entries below treat the series
%%%                        as a journal, rather than as conference
%%%                        proceedings.  Article entries normally contain
%%%                        DOI and/or URL values that lead to online
%%%                        access to the article text, and book-DOI and/or
%%%                        book-URL values that lead to the conference
%%%                        proceedings volume, or monograph, in which the
%%%                        article appears.
%%%
%%%                        The companion bibliography lncs.bib lists
%%%                        just the individual volumes in the series,
%%%                        and the lncswxyz*.bib files list individual
%%%                        papers for specified volume ranges in year
%%%                        wxyz.  The large number of papers in this
%%%                        collection, and limitations in TeX and
%%%                        BibTeX, and in WWW HTTP transfer speeds,
%%%                        necessitate the splitting of the papers
%%%                        bibliographies into several separate files
%%%                        for each year.
%%%
%%%                        At version 1.03, the year coverage looked
%%%                        like this:
%%%
%%%                             2013 (  41)
%%%
%%%                             Article:         39
%%%                             Proceedings:      2
%%%
%%%                             Total entries:   41
%%%
%%%                        This bibliography has been constructed
%%%                        primarily from the publisher Web site.
%%%
%%%                        Numerous errors in the sources noted above
%%%                        have been corrected.  Spelling has been
%%%                        verified with the UNIX spell and GNU ispell
%%%                        programs using the exception dictionary
%%%                        stored in the companion file with extension
%%%                        .sok.
%%%
%%%                        BibTeX citation tags are uniformly chosen as
%%%                        name:year:abbrev, where name is the family
%%%                        name of the first author or editor, year is a
%%%                        4-digit number, and abbrev is a 3-letter
%%%                        condensation of important title words.
%%%                        Citation labels were automatically generated
%%%                        by software developed for the BibNet Project.
%%%
%%%                        In this bibliography, entries are sorted in
%%%                        publication order, with the help of ``bibsort
%%%                        -bypages''.  The bibsort utility is available
%%%                        at
%%%
%%%                            http://www.math.utah.edu/pub/bibsort
%%%
%%%                        The checksum field above contains a CRC-16
%%%                        checksum as the first value, followed by the
%%%                        equivalent of the standard UNIX wc (word
%%%                        count) utility output of lines, words, and
%%%                        characters.  This is produced by Robert
%%%                        Solovay's checksum utility.",
%%%  }
%%% ====================================================================
@Preamble{
    "\ifx \undefined \bbb \def \bbb #1{\mathbb{#1}} \fi" #
    "\ifx \undefined \circled  \def \circled #1{(#1)}\fi" #
    "\ifx \undefined \k        \let \k = \c \fi" #
    "\ifx \undefined \mathbb   \def \mathbb #1{{\bf #1}}\fi" #
    "\ifx \undefined \mathcal  \def \mathcal #1{{\cal #1}}\fi" #
    "\ifx \undefined \mathrm   \def \mathrm #1{{\rm #1}}\fi" #
    "\ifx \undefined \ocirc    \def \ocirc #1{{\accent'27#1}}\fi" #
    "\ifx \undefined \reg      \def \reg {\circled{R}}\fi" #
    "\ifx \undefined \TM       \def \TM {${}^{\sc TM}$} \fi" #
    "\hyphenation{
        An-iso-tro-pic
        Ay-ka-nat
        Giun-chi-glia
        Lakh-neche
        Mal-er-ba
        Mart-el-li
        Reut-e-nau-er
        Thiel-sch-er
        Zheng-zhou
        }"
}

%%% ====================================================================
%%% Acknowledgement abbreviations:
@String{ack-nhfb = "Nelson H. F. Beebe,
                    University of Utah,
                    Department of Mathematics, 110 LCB,
                    155 S 1400 E RM 233,
                    Salt Lake City, UT 84112-0090, USA,
                    Tel: +1 801 581 5254,
                    FAX: +1 801 581 4148,
                    e-mail: \path|beebe@math.utah.edu|,
                            \path|beebe@acm.org|,
                            \path|beebe@computer.org| (Internet),
                    URL: \path|http://www.math.utah.edu/~beebe/|"}

%%% ====================================================================
%%% Journal abbreviations:
@String{j-LECT-NOTES-COMP-SCI   = "Lecture Notes in Computer Science"}

%%% ====================================================================
%%% Publisher abbreviations:
@String{pub-SV                  = "Springer-Verlag Inc."}
@String{pub-SV:adr              = "New York, NY, USA"}

%%% ====================================================================
%%% Series abbreviations:
@String{ser-LNAI                = "Lecture Notes in Artificial Intelligence"}

@String{ser-LNCS                = "Lecture Notes in Computer Science"}

%%% ====================================================================
%%% Bibliography entries: entries are sorted in publication order with
%%% `bibsort -bypages':
@Article{Dodis:2013:OWE,
  author =       "Yevgeniy Dodis and Yu Yu",
  title =        "Overcoming Weak Expectations",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7785",
  pages =        "1--22",
  year =         "2013",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-36594-2_1",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 21 08:32:49 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_1/;
                 http://link.springer.com/content/pdf/bfm:978-3-642-36594-2/1.pdf",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-36594-2",
  book-URL =     "http://www.springerlink.com/content/978-3-642-36594-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Krenn:2013:CCR,
  author =       "Stephan Krenn and Krzysztof Pietrzak and Akshay
                 Wadia",
  title =        "A Counterexample to the Chain Rule for Conditional
                 {HILL} Entropy",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7785",
  pages =        "23--39",
  year =         "2013",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-36594-2_2",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 21 08:32:49 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_2/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-36594-2",
  book-URL =     "http://www.springerlink.com/content/978-3-642-36594-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Berman:2013:HPR,
  author =       "Itay Berman and Iftach Haitner and Ilan Komargodski
                 and Moni Naor",
  title =        "Hardness Preserving Reductions via Cuckoo Hashing",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7785",
  pages =        "40--59",
  year =         "2013",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-36594-2_3",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 21 08:32:49 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_3/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-36594-2",
  book-URL =     "http://www.springerlink.com/content/978-3-642-36594-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Goyal:2013:CZK,
  author =       "Vipul Goyal and Abhishek Jain and Rafail Ostrovsky and
                 Silas Richelson and Ivan Visconti",
  title =        "Concurrent Zero Knowledge in the Bounded Player
                 Model",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7785",
  pages =        "60--79",
  year =         "2013",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-36594-2_4",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 21 08:32:49 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_4/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-36594-2",
  book-URL =     "http://www.springerlink.com/content/978-3-642-36594-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Canetti:2013:PCC,
  author =       "Ran Canetti and Huijia Lin and Omer Paneth",
  title =        "Public-Coin Concurrent Zero-Knowledge in the Global
                 Hash Model",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7785",
  pages =        "80--99",
  year =         "2013",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-36594-2_5",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 21 08:32:49 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_5/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-36594-2",
  book-URL =     "http://www.springerlink.com/content/978-3-642-36594-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Chase:2013:SMN,
  author =       "Melissa Chase and Markulf Kohlweiss and Anna
                 Lysyanskaya and Sarah Meiklejohn",
  title =        "Succinct Malleable {NIZKs} and an Application to
                 Compact Shuffles",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7785",
  pages =        "100--119",
  year =         "2013",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-36594-2_6",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 21 08:32:49 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_6/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-36594-2",
  book-URL =     "http://www.springerlink.com/content/978-3-642-36594-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Gentry:2013:EMH,
  author =       "Craig Gentry",
  title =        "Encrypted Messages from the Heights of Cryptomania",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7785",
  pages =        "120--121",
  year =         "2013",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-36594-2_7",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 21 08:32:49 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
  URL =          "http://link.springer.com/accesspage/chapter/10.1007/978-3-642-36594-2_7?coverImageUrl=/static/0.8699/sites/link/images/abstract_cover_placeholder.png",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-36594-2",
  book-URL =     "http://www.springerlink.com/content/978-3-642-36594-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Boyen:2013:ABF,
  author =       "Xavier Boyen",
  title =        "Attribute-Based Functional Encryption on Lattices",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7785",
  pages =        "122--142",
  year =         "2013",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-36594-2_8",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 21 08:32:49 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_8/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-36594-2",
  book-URL =     "http://www.springerlink.com/content/978-3-642-36594-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Brakerski:2013:WHB,
  author =       "Zvika Brakerski",
  title =        "When Homomorphism Becomes a Liability",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7785",
  pages =        "143--161",
  year =         "2013",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-36594-2_9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 21 08:32:49 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_9/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-36594-2",
  book-URL =     "http://www.springerlink.com/content/978-3-642-36594-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Applebaum:2013:GXG,
  author =       "Benny Applebaum",
  title =        "Garbling {XOR} Gates ``For Free'' in the Standard
                 Model",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7785",
  pages =        "162--181",
  year =         "2013",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-36594-2_10",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 21 08:32:49 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_10/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-36594-2",
  book-URL =     "http://www.springerlink.com/content/978-3-642-36594-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Bitansky:2013:WFS,
  author =       "Nir Bitansky and Dana Dachman-Soled and Sanjam Garg
                 and Abhishek Jain and Yael Tauman Kalai
                 {\textellipsis}",
  title =        "Why ``{Fiat--Shamir} for Proofs'' Lacks a Proof",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7785",
  pages =        "182--201",
  year =         "2013",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-36594-2_11",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 21 08:32:49 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_11/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-36594-2",
  book-URL =     "http://www.springerlink.com/content/978-3-642-36594-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Ananth:2013:SFP,
  author =       "Prabhanjan Ananth and Raghav Bhaskar and Vipul Goyal
                 and Vanishree Rao",
  title =        "On the (In)security of {Fischlin}'s Paradigm",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7785",
  pages =        "202--221",
  year =         "2013",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-36594-2_12",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 21 08:32:49 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_12/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-36594-2",
  book-URL =     "http://www.springerlink.com/content/978-3-642-36594-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Papamanthou:2013:SCC,
  author =       "Charalampos Papamanthou and Elaine Shi and Roberto
                 Tamassia",
  title =        "Signatures of Correct Computation",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7785",
  pages =        "222--242",
  year =         "2013",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-36594-2_13",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 21 08:32:49 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_13/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-36594-2",
  book-URL =     "http://www.springerlink.com/content/978-3-642-36594-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Asharov:2013:FCF,
  author =       "Gilad Asharov and Yehuda Lindell and Tal Rabin",
  title =        "A Full Characterization of Functions that Imply Fair
                 Coin Tossing and Ramifications to Fairness",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7785",
  pages =        "243--262",
  year =         "2013",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-36594-2_14",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 21 08:32:49 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_14/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-36594-2",
  book-URL =     "http://www.springerlink.com/content/978-3-642-36594-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Jeffs:2013:CCP,
  author =       "R. Amzi Jeffs and Mike Rosulek",
  title =        "Characterizing the Cryptographic Properties of
                 Reactive $2$-Party Functionalities",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7785",
  pages =        "263--280",
  year =         "2013",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-36594-2_15",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 21 08:32:49 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_15/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-36594-2",
  book-URL =     "http://www.springerlink.com/content/978-3-642-36594-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Fehr:2013:FCC,
  author =       "Serge Fehr and Jonathan Katz and Fang Song and
                 Hong-Sheng Zhou and Vassilis Zikas",
  title =        "Feasibility and Completeness of Cryptographic Tasks in
                 the Quantum World",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7785",
  pages =        "281--296",
  year =         "2013",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-36594-2_16",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 21 08:32:49 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_16/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-36594-2",
  book-URL =     "http://www.springerlink.com/content/978-3-642-36594-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Mahmoody:2013:LEZ,
  author =       "Mohammad Mahmoody and David Xiao",
  title =        "Languages with Efficient Zero-Knowledge {PCPs} are in
                 {SZK}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7785",
  pages =        "297--314",
  year =         "2013",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-36594-2_17",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 21 08:32:49 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_17/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-36594-2",
  book-URL =     "http://www.springerlink.com/content/978-3-642-36594-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Bitansky:2013:SNI,
  author =       "Nir Bitansky and Alessandro Chiesa and Yuval Ishai and
                 Omer Paneth and Rafail Ostrovsky",
  title =        "Succinct Non-interactive Arguments via Linear
                 Interactive Proofs",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7785",
  pages =        "315--333",
  year =         "2013",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-36594-2_18",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 21 08:32:49 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_18/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-36594-2",
  book-URL =     "http://www.springerlink.com/content/978-3-642-36594-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Pass:2013:USP,
  author =       "Rafael Pass",
  title =        "Unprovable Security of Perfect {NIZK} and
                 Non-interactive Non-malleable Commitments",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7785",
  pages =        "334--354",
  year =         "2013",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-36594-2_19",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 21 08:32:49 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_19/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-36594-2",
  book-URL =     "http://www.springerlink.com/content/978-3-642-36594-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Malkin:2013:SCB,
  author =       "Tal Malkin",
  title =        "Secure Computation for Big Data",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7785",
  pages =        "355--355",
  year =         "2013",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-36594-2_20",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Thu Aug 21 08:32:49 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
  URL =          "http://link.springer.com/accesspage/chapter/10.1007/978-3-642-36594-2_20?coverImageUrl=/static/0.8699/sites/link/images/abstract_cover_placeholder.png",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-36594-2",
  book-URL =     "http://www.springerlink.com/content/978-3-642-36594-2",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Anonymous:2013:FM,
  author =       "Anonymous",
  title =        "Front Matter",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7932",
  pages =        "??--??",
  year =         "2013",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Mar 21 08:01:29 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs.bib;
                 http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
  URL =          "http://link.springer.com/content/pdf/bfm:978-3-642-38616-9/1.pdf",
  acknowledgement = ack-nhfb,
  book-URL =     "http://www.springerlink.com/content/978-3-642-38616-9",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Baldi:2013:ULC,
  author =       "Marco Baldi and Marco Bianchi and Franco Chiaraluce
                 and Joachim Rosenthal and Davide Schipani",
  title =        "Using {LDGM} Codes and Sparse Syndromes to Achieve
                 Digital Signatures",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7932",
  pages =        "1--15",
  year =         "2013",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-38616-9_1",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Mar 21 08:01:29 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs.bib;
                 http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-38616-9_1/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-38616-9",
  book-URL =     "http://www.springerlink.com/content/978-3-642-38616-9",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Bernstein:2013:QAS,
  author =       "Daniel J. Bernstein and Stacey Jeffery and Tanja Lange
                 and Alexander Meurer",
  title =        "Quantum Algorithms for the Subset-Sum Problem",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7932",
  pages =        "16--33",
  year =         "2013",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-38616-9_2",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Mar 21 08:01:29 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs.bib;
                 http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-38616-9_2/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-38616-9",
  book-URL =     "http://www.springerlink.com/content/978-3-642-38616-9",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Bettaieb:2013:ILB,
  author =       "Slim Bettaieb and Julien Schrek",
  title =        "Improved Lattice-Based Threshold Ring Signature
                 Scheme",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7932",
  pages =        "34--51",
  year =         "2013",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-38616-9_3",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Mar 21 08:01:29 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs.bib;
                 http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-38616-9_3/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-38616-9",
  book-URL =     "http://www.springerlink.com/content/978-3-642-38616-9",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Ding:2013:DRH,
  author =       "Jintai Ding and Bo-Yin Yang",
  title =        "Degree of Regularity for {HFEv} and {HFEv-}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7932",
  pages =        "52--66",
  year =         "2013",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-38616-9_4",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Mar 21 08:01:29 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs.bib;
                 http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-38616-9_4/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-38616-9",
  book-URL =     "http://www.springerlink.com/content/978-3-642-38616-9",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Guneysu:2013:SSR,
  author =       "Tim G{\"u}neysu and Tobias Oder and Thomas
                 P{\"o}ppelmann and Peter Schwabe",
  title =        "Software Speed Records for Lattice-Based Signatures",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7932",
  pages =        "67--82",
  year =         "2013",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-38616-9_5",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Mar 21 08:01:29 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs.bib;
                 http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-38616-9_5/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-38616-9",
  book-URL =     "http://www.springerlink.com/content/978-3-642-38616-9",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Laarhoven:2013:SSV,
  author =       "Thijs Laarhoven and Michele Mosca and Joop van de
                 Pol",
  title =        "Solving the Shortest Vector Problem in Lattices Faster
                 Using Quantum Search",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7932",
  pages =        "83--101",
  year =         "2013",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-38616-9_6",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Mar 21 08:01:29 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs.bib;
                 http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-38616-9_6/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-38616-9",
  book-URL =     "http://www.springerlink.com/content/978-3-642-38616-9",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Landais:2013:EAM,
  author =       "Gr{\'e}gory Landais and Jean-Pierre Tillich",
  title =        "An Efficient Attack of a {McEliece} Cryptosystem
                 Variant Based on Convolutional Codes",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7932",
  pages =        "102--117",
  year =         "2013",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-38616-9_7",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Mar 21 08:01:29 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs.bib;
                 http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-38616-9_7/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-38616-9",
  book-URL =     "http://www.springerlink.com/content/978-3-642-38616-9",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Miura:2013:EAS,
  author =       "Hiroyuki Miura and Yasufumi Hashimoto and Tsuyoshi
                 Takagi",
  title =        "Extended Algorithm for Solving Underdefined
                 Multivariate Quadratic Equations",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7932",
  pages =        "118--135",
  year =         "2013",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-38616-9_8",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Mar 21 08:01:29 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs.bib;
                 http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-38616-9_8/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-38616-9",
  book-URL =     "http://www.springerlink.com/content/978-3-642-38616-9",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Mosca:2013:QKD,
  author =       "Michele Mosca and Douglas Stebila and Berkant
                 Ustao{\u{g}}lu",
  title =        "Quantum Key Distribution in the Classical
                 Authenticated Key Exchange Framework",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7932",
  pages =        "136--154",
  year =         "2013",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-38616-9_9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Mar 21 08:01:29 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs.bib;
                 http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-38616-9_9/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-38616-9",
  book-URL =     "http://www.springerlink.com/content/978-3-642-38616-9",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Nie:2013:CHB,
  author =       "Xuyun Nie and Zhaohu Xu and Johannes Buchmann",
  title =        "Cryptanalysis of Hash-Based Tamed Transformation and
                 Minus Signature Scheme",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7932",
  pages =        "155--164",
  year =         "2013",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-38616-9_10",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Mar 21 08:01:29 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs.bib;
                 http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-38616-9_10/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-38616-9",
  book-URL =     "http://www.springerlink.com/content/978-3-642-38616-9",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Perlner:2013:CDI,
  author =       "Ray Perlner and Daniel Smith-Tone",
  title =        "A Classification of Differential Invariants for
                 Multivariate Post-quantum Cryptosystems",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7932",
  pages =        "165--173",
  year =         "2013",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-38616-9_11",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Mar 21 08:01:29 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs.bib;
                 http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-38616-9_11/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-38616-9",
  book-URL =     "http://www.springerlink.com/content/978-3-642-38616-9",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Persichetti:2013:SAH,
  author =       "Edoardo Persichetti",
  title =        "Secure and Anonymous Hybrid Encryption from Coding
                 Theory",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7932",
  pages =        "174--187",
  year =         "2013",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-38616-9_12",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Mar 21 08:01:29 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs.bib;
                 http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-38616-9_12/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-38616-9",
  book-URL =     "http://www.springerlink.com/content/978-3-642-38616-9",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Petzoldt:2013:FVI,
  author =       "Albrecht Petzoldt and Stanislav Bulygin and Johannes
                 Buchmann",
  title =        "Fast Verification for Improved Versions of the {UOV}
                 and Rainbow Signature Schemes",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7932",
  pages =        "188--202",
  year =         "2013",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-38616-9_13",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Mar 21 08:01:29 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs.bib;
                 http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-38616-9_13/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-38616-9",
  book-URL =     "http://www.springerlink.com/content/978-3-642-38616-9",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Sendrier:2013:HCE,
  author =       "Nicolas Sendrier and Dimitris E. Simos",
  title =        "The Hardness of Code Equivalence over {$ \mathbb {F}_q
                 $} and Its Application to Code-Based Cryptography",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7932",
  pages =        "203--216",
  year =         "2013",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-38616-9_14",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Mar 21 08:01:29 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs.bib;
                 http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-38616-9_14/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-38616-9",
  book-URL =     "http://www.springerlink.com/content/978-3-642-38616-9",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Strenzke:2013:TAA,
  author =       "Falko Strenzke",
  title =        "Timing Attacks against the Syndrome Inversion in
                 Code-Based Cryptosystems",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7932",
  pages =        "217--230",
  year =         "2013",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-38616-9_15",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Mar 21 08:01:29 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs.bib;
                 http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-38616-9_15/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-38616-9",
  book-URL =     "http://www.springerlink.com/content/978-3-642-38616-9",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Tao:2013:SMS,
  author =       "Chengdong Tao and Adama Diene and Shaohua Tang and
                 Jintai Ding",
  title =        "Simple Matrix Scheme for Encryption",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7932",
  pages =        "231--242",
  year =         "2013",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-38616-9_16",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Mar 21 08:01:29 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs.bib;
                 http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-38616-9_16/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-38616-9",
  book-URL =     "http://www.springerlink.com/content/978-3-642-38616-9",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Yasuda:2013:MSS,
  author =       "Takanori Yasuda and Tsuyoshi Takagi and Kouichi
                 Sakurai",
  title =        "Multivariate Signature Scheme Using Quadratic Forms",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7932",
  pages =        "243--258",
  year =         "2013",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/978-3-642-38616-9_17",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Mar 21 08:01:29 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs.bib;
                 http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
  URL =          "http://link.springer.com/chapter/10.1007/978-3-642-38616-9_17/",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-38616-9",
  book-URL =     "http://www.springerlink.com/content/978-3-642-38616-9",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Anonymous:2013:BM,
  author =       "Anonymous",
  title =        "Back Matter",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "7932",
  pages =        "??--??",
  year =         "2013",
  CODEN =        "LNCSD9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Fri Mar 21 08:01:29 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs.bib;
                 http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
  URL =          "http://link.springer.com/content/pdf/bbm:978-3-642-38616-9/1.pdf",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/978-3-642-38616-9",
  book-URL =     "http://www.springerlink.com/content/978-3-642-38616-9",
  fjournal =     "Lecture Notes in Computer Science",
}

%%% ====================================================================
%%% Cross-referenced entries must come last (sorted by year, and then
%%% by citation label, with `bibsort -byyear':
@Proceedings{Carette:2013:ICM,
  editor =       "Jacques Carette and David Aspinall and Christoph Lange
                 and Petr Sojka and Wolfgang Windsteiger",
  booktitle =    "{Intelligent computer mathematics: MKM, Calculemus,
                 DML, and Systems and Projects 2013, held as part of
                 CICM 2013, Bath, UK, July 8--12, 2013. Proceedings}",
  title =        "{Intelligent computer mathematics: MKM, Calculemus,
                 DML, and Systems and Projects 2013, held as part of
                 CICM 2013, Bath, UK, July 8--12, 2013. Proceedings}",
  volume =       "7961",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "xv + 384",
  year =         "2013",
  DOI =          "https://doi.org/10.1007/978-3-642-39320-4",
  ISBN =         "3-642-39319-5 (paperback), 3-642-39320-9 (e-book)",
  ISBN-13 =      "978-3-642-39319-8 (paperback), 978-3-642-39320-4
                 (e-book)",
  LCCN =         "QA76.9.M35 I58 2013",
  bibdate =      "Thu May 22 15:57:56 MDT 2014",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 http://www.math.utah.edu/pub/tex/bib/kepler.bib;
                 http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
  series =       "Lecture notes in computer science",
  acknowledgement = ack-nhfb,
  subject =      "Informatique; Math{\'e}matiques; Congr{\`e}s;
                 Intelligence artificielle; Computer science; Algebra;
                 Data processing; Information storage and retrieval
                 systems; Artificial intelligence; Text processing
                 (Computer science",
  tableofcontents = "Calculemus: The rooster and the butterflies / Assia
                 Mahboubi \\
                 Optimising Problem Formulation for Cylindrical
                 Algebraic Decomposition / Russell Bradford, James H.
                 Davenport, Matthew England, and David Wilson \\
                 The Formalization of Syntax-Based Mathematical
                 Algorithms Using Quotation and Evaluation / William M.
                 Farmer \\
                 Certification of bounds of non-linear functions: the
                 templates mentod / Xavier Allamigeon, St{\'e}phane
                 Gaubert, Victor Magron, and Benjamin Werner \\
                 Verifying a Plaftorm for Digital Imaging: A Multi-tool
                 Strategy / Jonathan Heras, Gadea Mata, Ana Romero,
                 Julio Rubio, and Rub{\'e}n S{\'a}enz \\
                 A Universal Machine for Biform Theory Graphs / Michael
                 Kohlhase, Felix Manse and Florian Rabe \\
                 MKM: Mathematical Practice, Crowdsourcing, and Social
                 Machines / Ursula Martin and Alison Pease \\
                 Automated Reasoning Service for HOL Light / Cezary
                 Kaliszyk and Josef Urban \\
                 Understanding Branch Cuts of Expressions / Matthew
                 England, Russell Bradford, James H. Davenport, and
                 David Wilson \\
                 Formal Mathematics on Display: A Wiki for Flyspeck /
                 Carst Tankink, Cezary Kaliszyk, Josef Urban, and Herman
                 Geuvers \\
                 Determining Points on Handwritten Mathematical Symbols
                 / Rui Hu and Stephen M. Watt \\
                 Capturing Hiproofs in HOL Light / Steven Obua, Mark
                 Adams, and David Aspinall \\
                 A Qualitative Comparison of the Suitability of Four
                 Theorem Provers for Basic Auction Theory / Christoph
                 Lange, Marco B. Caminati, Manfred Kerber, Till
                 Mossakowski, Colin Rowat, Makarius Wenzel, and Wolfgang
                 Windsteiger \\
                 Students' Comparison of Their Trigonometric Answers
                 with the Answers of a Computer Algebra System / Eno
                 Tonisson \\
                 DML: Mathematics and the World Wide Web / Patrick D.F.
                 Ion \\
                 Structural Similarity Search for Mathematics Retrieval
                 / Shahab Kamali and Frank Wm. Tompa \\
                 Towards Machine-Actionable Modules of a Digital
                 Mathematics Library: The Example of DML-CZ / Michal
                 R{\^e}u\?zi\?cka, Petr Sojka, and Vlastimil Krej\?c\c
                 \?r \\
                 A Hybrid Approach for Semantic Enrichment of MathML
                 Mathematical Expressions / Minh-Quoc Nghiem, Giovanni
                 Yoko Kristianto, Goran Topi{\'c}, and Akiko Aizawa \\
                 Three Years of DLMF: Web, Math and Search / Bruce R.
                 Miller \\
                 Escaping the Trap of Too Precise Topic Queries / Paul
                 Libbrecht \\
                 Using MathML to Represent Units of Measurement for
                 Improved Ontology Alignment / Chau Do and Eric J.
                 Pauwels \\
                 Systems and projects: A Web Interface for Isabelle: The
                 Next Generation / Christoph L{\"u}th and Martin Ring
                 \\
                 The ForMaRE Project--Formal Mathematical Reasoning in
                 Economics / Christoph Lange, Colin Rowat, and Manfred
                 Kerber \\
                 LATExml 2012--A Year of LATExml / Deyan Ginev and Bruce
                 R. Miller \\
                 The MMT API: A Generic MKM System / Florian Rabe \\
                 Math-Net.Ru as a Digital Archive of the Russian
                 Mathematical Knowledge from the XIX Century to Today /
                 Dmitry E. Chebukov, Alexander D. Izaak, Olga G.
                 Misyurina, Yuri A. Pupyrev, and Alexey B. Zhizhchenko
                 \\
                 A Dynamic Symbolic Geometry Environment Based on the
                 Gr{\"o}bnerCover Algorithm for the Computation of
                 Geometric Loci and Envelopes / Miguel A. Ab{\'a}nades
                 and Francisco Botana \\
                 ML4PG in computer algebra verification / J{\'o}nathan
                 Heras and Ekaterina Komendantskaya \\
                 Pervasive Parallelism in Highly-Trustable Interactive
                 Theorem Proving Systems / Bruno Barras, Lourdes del
                 Carmen Gonz{\'a}lez Huesca, Hugo Herbelin, Yann
                 R{\'e}gis-Gianas, Enrico Tassi, Makarius Wenzel, and
                 Burkhart Wolff \\
                 The Web geometry laboratory project / Pedro Quaresma,
                 Vanda Santos, and Seifeddine Bouallegue \\
                 swMATH--A New Information Service for Mathematical
                 Software / Sebastian B{\"o}bisch, Michael Brickenstein,
                 Hagen Chrapary, Gert-Martin Greuel, and Wolfram Sperber
                 \\
                 Software for evaluating relevance of steps in algebraic
                 transformations / Rein Prank \\
                 The DeLiverMATH project: text analysis in mathematics /
                 Ulf Sch{\"o}nberg and Wolfram Sperber",
  xxseries =     "Lecture notes in artificial intelligence; LNCS
                 sublibrary. SL 7, Artificial intelligence",
}

@Proceedings{Gaborit:2013:PQC,
  editor =       "Philippe Gaborit",
  booktitle =    "{Post-quantum cryptography: 5th International
                 Workshop, PQCRYPTO 2013, Limoges, France, June 4--7,
                 2013. Proceedings}",
  title =        "{Post-quantum cryptography: 5th International
                 Workshop, PQCRYPTO 2013, Limoges, France, June 4--7,
                 2013. Proceedings}",
  volume =       "7932",
  publisher =    pub-SV,
  address =      pub-SV:adr,
  pages =        "258 (est.)",
  year =         "2013",
  DOI =          "https://doi.org/10.1007/978-3-642-38616-9",
  ISBN =         "3-642-38615-6 (paperback), 3-642-38616-4 (e-book)",
  ISBN-13 =      "978-3-642-38615-2 (paperback), 978-3-642-38616-9
                 (e-book)",
  LCCN =         "????",
  bibdate =      "Fri Mar 21 07:55:51 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs.bib;
                 http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib;
                 z3950.loc.gov:7090/Voyager",
  series =       ser-LNCS,
  URL =          "http://www.springerlink.com/content/978-3-642-38616-9",
  series-URL =   "http://link.springer.com/bookseries/558",
}