@Preamble{
"\ifx \undefined \bbb \def \bbb #1{\mathbb{#1}} \fi" #
"\ifx \undefined \circled \def \circled #1{(#1)}\fi" #
"\ifx \undefined \k \let \k = \c \fi" #
"\ifx \undefined \mathbb \def \mathbb #1{{\bf #1}}\fi" #
"\ifx \undefined \mathcal \def \mathcal #1{{\cal #1}}\fi" #
"\ifx \undefined \mathrm \def \mathrm #1{{\rm #1}}\fi" #
"\ifx \undefined \ocirc \def \ocirc #1{{\accent'27#1}}\fi" #
"\ifx \undefined \reg \def \reg {\circled{R}}\fi" #
"\ifx \undefined \TM \def \TM {${}^{\sc TM}$} \fi" #
"\hyphenation{
An-iso-tro-pic
Ay-ka-nat
Giun-chi-glia
Lakh-neche
Mal-er-ba
Mart-el-li
Reut-e-nau-er
Thiel-sch-er
Zheng-zhou
}"
}
@String{ack-nhfb = "Nelson H. F. Beebe,
University of Utah,
Department of Mathematics, 110 LCB,
155 S 1400 E RM 233,
Salt Lake City, UT 84112-0090, USA,
Tel: +1 801 581 5254,
FAX: +1 801 581 4148,
e-mail: \path|beebe@math.utah.edu|,
\path|beebe@acm.org|,
\path|beebe@computer.org| (Internet),
URL: \path|http://www.math.utah.edu/~beebe/|"}
@String{j-LECT-NOTES-COMP-SCI = "Lecture Notes in Computer Science"}
@String{pub-SV = "Springer-Verlag Inc."}
@String{pub-SV:adr = "New York, NY, USA"}
@String{ser-LNAI = "Lecture Notes in Artificial Intelligence"}
@String{ser-LNCS = "Lecture Notes in Computer Science"}
@Article{Dodis:2013:OWE,
author = "Yevgeniy Dodis and Yu Yu",
title = "Overcoming Weak Expectations",
journal = j-LECT-NOTES-COMP-SCI,
volume = "7785",
pages = "1--22",
year = "2013",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-36594-2_1",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Thu Aug 21 08:32:49 MDT 2014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
URL = "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_1/;
http://link.springer.com/content/pdf/bfm:978-3-642-36594-2/1.pdf",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-36594-2",
book-URL = "http://www.springerlink.com/content/978-3-642-36594-2",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Krenn:2013:CCR,
author = "Stephan Krenn and Krzysztof Pietrzak and Akshay
Wadia",
title = "A Counterexample to the Chain Rule for Conditional
{HILL} Entropy",
journal = j-LECT-NOTES-COMP-SCI,
volume = "7785",
pages = "23--39",
year = "2013",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-36594-2_2",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Thu Aug 21 08:32:49 MDT 2014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
URL = "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_2/",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-36594-2",
book-URL = "http://www.springerlink.com/content/978-3-642-36594-2",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Berman:2013:HPR,
author = "Itay Berman and Iftach Haitner and Ilan Komargodski
and Moni Naor",
title = "Hardness Preserving Reductions via Cuckoo Hashing",
journal = j-LECT-NOTES-COMP-SCI,
volume = "7785",
pages = "40--59",
year = "2013",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-36594-2_3",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Thu Aug 21 08:32:49 MDT 2014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
URL = "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_3/",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-36594-2",
book-URL = "http://www.springerlink.com/content/978-3-642-36594-2",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Goyal:2013:CZK,
author = "Vipul Goyal and Abhishek Jain and Rafail Ostrovsky and
Silas Richelson and Ivan Visconti",
title = "Concurrent Zero Knowledge in the Bounded Player
Model",
journal = j-LECT-NOTES-COMP-SCI,
volume = "7785",
pages = "60--79",
year = "2013",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-36594-2_4",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Thu Aug 21 08:32:49 MDT 2014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
URL = "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_4/",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-36594-2",
book-URL = "http://www.springerlink.com/content/978-3-642-36594-2",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Canetti:2013:PCC,
author = "Ran Canetti and Huijia Lin and Omer Paneth",
title = "Public-Coin Concurrent Zero-Knowledge in the Global
Hash Model",
journal = j-LECT-NOTES-COMP-SCI,
volume = "7785",
pages = "80--99",
year = "2013",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-36594-2_5",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Thu Aug 21 08:32:49 MDT 2014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
URL = "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_5/",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-36594-2",
book-URL = "http://www.springerlink.com/content/978-3-642-36594-2",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Chase:2013:SMN,
author = "Melissa Chase and Markulf Kohlweiss and Anna
Lysyanskaya and Sarah Meiklejohn",
title = "Succinct Malleable {NIZKs} and an Application to
Compact Shuffles",
journal = j-LECT-NOTES-COMP-SCI,
volume = "7785",
pages = "100--119",
year = "2013",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-36594-2_6",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Thu Aug 21 08:32:49 MDT 2014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
URL = "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_6/",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-36594-2",
book-URL = "http://www.springerlink.com/content/978-3-642-36594-2",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Gentry:2013:EMH,
author = "Craig Gentry",
title = "Encrypted Messages from the Heights of Cryptomania",
journal = j-LECT-NOTES-COMP-SCI,
volume = "7785",
pages = "120--121",
year = "2013",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-36594-2_7",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Thu Aug 21 08:32:49 MDT 2014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
URL = "http://link.springer.com/accesspage/chapter/10.1007/978-3-642-36594-2_7?coverImageUrl=/static/0.8699/sites/link/images/abstract_cover_placeholder.png",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-36594-2",
book-URL = "http://www.springerlink.com/content/978-3-642-36594-2",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Boyen:2013:ABF,
author = "Xavier Boyen",
title = "Attribute-Based Functional Encryption on Lattices",
journal = j-LECT-NOTES-COMP-SCI,
volume = "7785",
pages = "122--142",
year = "2013",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-36594-2_8",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Thu Aug 21 08:32:49 MDT 2014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
URL = "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_8/",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-36594-2",
book-URL = "http://www.springerlink.com/content/978-3-642-36594-2",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Brakerski:2013:WHB,
author = "Zvika Brakerski",
title = "When Homomorphism Becomes a Liability",
journal = j-LECT-NOTES-COMP-SCI,
volume = "7785",
pages = "143--161",
year = "2013",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-36594-2_9",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Thu Aug 21 08:32:49 MDT 2014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
URL = "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_9/",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-36594-2",
book-URL = "http://www.springerlink.com/content/978-3-642-36594-2",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Applebaum:2013:GXG,
author = "Benny Applebaum",
title = "Garbling {XOR} Gates ``For Free'' in the Standard
Model",
journal = j-LECT-NOTES-COMP-SCI,
volume = "7785",
pages = "162--181",
year = "2013",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-36594-2_10",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Thu Aug 21 08:32:49 MDT 2014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
URL = "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_10/",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-36594-2",
book-URL = "http://www.springerlink.com/content/978-3-642-36594-2",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Bitansky:2013:WFS,
author = "Nir Bitansky and Dana Dachman-Soled and Sanjam Garg
and Abhishek Jain and Yael Tauman Kalai
{\textellipsis}",
title = "Why ``{Fiat--Shamir} for Proofs'' Lacks a Proof",
journal = j-LECT-NOTES-COMP-SCI,
volume = "7785",
pages = "182--201",
year = "2013",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-36594-2_11",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Thu Aug 21 08:32:49 MDT 2014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
URL = "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_11/",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-36594-2",
book-URL = "http://www.springerlink.com/content/978-3-642-36594-2",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Ananth:2013:SFP,
author = "Prabhanjan Ananth and Raghav Bhaskar and Vipul Goyal
and Vanishree Rao",
title = "On the (In)security of {Fischlin}'s Paradigm",
journal = j-LECT-NOTES-COMP-SCI,
volume = "7785",
pages = "202--221",
year = "2013",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-36594-2_12",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Thu Aug 21 08:32:49 MDT 2014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
URL = "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_12/",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-36594-2",
book-URL = "http://www.springerlink.com/content/978-3-642-36594-2",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Papamanthou:2013:SCC,
author = "Charalampos Papamanthou and Elaine Shi and Roberto
Tamassia",
title = "Signatures of Correct Computation",
journal = j-LECT-NOTES-COMP-SCI,
volume = "7785",
pages = "222--242",
year = "2013",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-36594-2_13",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Thu Aug 21 08:32:49 MDT 2014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
URL = "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_13/",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-36594-2",
book-URL = "http://www.springerlink.com/content/978-3-642-36594-2",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Asharov:2013:FCF,
author = "Gilad Asharov and Yehuda Lindell and Tal Rabin",
title = "A Full Characterization of Functions that Imply Fair
Coin Tossing and Ramifications to Fairness",
journal = j-LECT-NOTES-COMP-SCI,
volume = "7785",
pages = "243--262",
year = "2013",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-36594-2_14",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Thu Aug 21 08:32:49 MDT 2014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
URL = "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_14/",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-36594-2",
book-URL = "http://www.springerlink.com/content/978-3-642-36594-2",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Jeffs:2013:CCP,
author = "R. Amzi Jeffs and Mike Rosulek",
title = "Characterizing the Cryptographic Properties of
Reactive $2$-Party Functionalities",
journal = j-LECT-NOTES-COMP-SCI,
volume = "7785",
pages = "263--280",
year = "2013",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-36594-2_15",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Thu Aug 21 08:32:49 MDT 2014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
URL = "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_15/",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-36594-2",
book-URL = "http://www.springerlink.com/content/978-3-642-36594-2",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Fehr:2013:FCC,
author = "Serge Fehr and Jonathan Katz and Fang Song and
Hong-Sheng Zhou and Vassilis Zikas",
title = "Feasibility and Completeness of Cryptographic Tasks in
the Quantum World",
journal = j-LECT-NOTES-COMP-SCI,
volume = "7785",
pages = "281--296",
year = "2013",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-36594-2_16",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Thu Aug 21 08:32:49 MDT 2014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
URL = "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_16/",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-36594-2",
book-URL = "http://www.springerlink.com/content/978-3-642-36594-2",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Mahmoody:2013:LEZ,
author = "Mohammad Mahmoody and David Xiao",
title = "Languages with Efficient Zero-Knowledge {PCPs} are in
{SZK}",
journal = j-LECT-NOTES-COMP-SCI,
volume = "7785",
pages = "297--314",
year = "2013",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-36594-2_17",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Thu Aug 21 08:32:49 MDT 2014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
URL = "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_17/",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-36594-2",
book-URL = "http://www.springerlink.com/content/978-3-642-36594-2",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Bitansky:2013:SNI,
author = "Nir Bitansky and Alessandro Chiesa and Yuval Ishai and
Omer Paneth and Rafail Ostrovsky",
title = "Succinct Non-interactive Arguments via Linear
Interactive Proofs",
journal = j-LECT-NOTES-COMP-SCI,
volume = "7785",
pages = "315--333",
year = "2013",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-36594-2_18",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Thu Aug 21 08:32:49 MDT 2014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
URL = "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_18/",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-36594-2",
book-URL = "http://www.springerlink.com/content/978-3-642-36594-2",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Pass:2013:USP,
author = "Rafael Pass",
title = "Unprovable Security of Perfect {NIZK} and
Non-interactive Non-malleable Commitments",
journal = j-LECT-NOTES-COMP-SCI,
volume = "7785",
pages = "334--354",
year = "2013",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-36594-2_19",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Thu Aug 21 08:32:49 MDT 2014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
URL = "http://link.springer.com/chapter/10.1007/978-3-642-36594-2_19/",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-36594-2",
book-URL = "http://www.springerlink.com/content/978-3-642-36594-2",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Malkin:2013:SCB,
author = "Tal Malkin",
title = "Secure Computation for Big Data",
journal = j-LECT-NOTES-COMP-SCI,
volume = "7785",
pages = "355--355",
year = "2013",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-36594-2_20",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Thu Aug 21 08:32:49 MDT 2014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
URL = "http://link.springer.com/accesspage/chapter/10.1007/978-3-642-36594-2_20?coverImageUrl=/static/0.8699/sites/link/images/abstract_cover_placeholder.png",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-36594-2",
book-URL = "http://www.springerlink.com/content/978-3-642-36594-2",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Anonymous:2013:FM,
author = "Anonymous",
title = "Front Matter",
journal = j-LECT-NOTES-COMP-SCI,
volume = "7932",
pages = "??--??",
year = "2013",
CODEN = "LNCSD9",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Fri Mar 21 08:01:29 MDT 2014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs.bib;
http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
URL = "http://link.springer.com/content/pdf/bfm:978-3-642-38616-9/1.pdf",
acknowledgement = ack-nhfb,
book-URL = "http://www.springerlink.com/content/978-3-642-38616-9",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Baldi:2013:ULC,
author = "Marco Baldi and Marco Bianchi and Franco Chiaraluce
and Joachim Rosenthal and Davide Schipani",
title = "Using {LDGM} Codes and Sparse Syndromes to Achieve
Digital Signatures",
journal = j-LECT-NOTES-COMP-SCI,
volume = "7932",
pages = "1--15",
year = "2013",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-38616-9_1",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Fri Mar 21 08:01:29 MDT 2014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs.bib;
http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
URL = "http://link.springer.com/chapter/10.1007/978-3-642-38616-9_1/",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-38616-9",
book-URL = "http://www.springerlink.com/content/978-3-642-38616-9",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Bernstein:2013:QAS,
author = "Daniel J. Bernstein and Stacey Jeffery and Tanja Lange
and Alexander Meurer",
title = "Quantum Algorithms for the Subset-Sum Problem",
journal = j-LECT-NOTES-COMP-SCI,
volume = "7932",
pages = "16--33",
year = "2013",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-38616-9_2",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Fri Mar 21 08:01:29 MDT 2014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs.bib;
http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
URL = "http://link.springer.com/chapter/10.1007/978-3-642-38616-9_2/",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-38616-9",
book-URL = "http://www.springerlink.com/content/978-3-642-38616-9",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Bettaieb:2013:ILB,
author = "Slim Bettaieb and Julien Schrek",
title = "Improved Lattice-Based Threshold Ring Signature
Scheme",
journal = j-LECT-NOTES-COMP-SCI,
volume = "7932",
pages = "34--51",
year = "2013",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-38616-9_3",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Fri Mar 21 08:01:29 MDT 2014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs.bib;
http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
URL = "http://link.springer.com/chapter/10.1007/978-3-642-38616-9_3/",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-38616-9",
book-URL = "http://www.springerlink.com/content/978-3-642-38616-9",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Ding:2013:DRH,
author = "Jintai Ding and Bo-Yin Yang",
title = "Degree of Regularity for {HFEv} and {HFEv-}",
journal = j-LECT-NOTES-COMP-SCI,
volume = "7932",
pages = "52--66",
year = "2013",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-38616-9_4",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Fri Mar 21 08:01:29 MDT 2014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs.bib;
http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
URL = "http://link.springer.com/chapter/10.1007/978-3-642-38616-9_4/",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-38616-9",
book-URL = "http://www.springerlink.com/content/978-3-642-38616-9",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Guneysu:2013:SSR,
author = "Tim G{\"u}neysu and Tobias Oder and Thomas
P{\"o}ppelmann and Peter Schwabe",
title = "Software Speed Records for Lattice-Based Signatures",
journal = j-LECT-NOTES-COMP-SCI,
volume = "7932",
pages = "67--82",
year = "2013",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-38616-9_5",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Fri Mar 21 08:01:29 MDT 2014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs.bib;
http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
URL = "http://link.springer.com/chapter/10.1007/978-3-642-38616-9_5/",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-38616-9",
book-URL = "http://www.springerlink.com/content/978-3-642-38616-9",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Laarhoven:2013:SSV,
author = "Thijs Laarhoven and Michele Mosca and Joop van de
Pol",
title = "Solving the Shortest Vector Problem in Lattices Faster
Using Quantum Search",
journal = j-LECT-NOTES-COMP-SCI,
volume = "7932",
pages = "83--101",
year = "2013",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-38616-9_6",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Fri Mar 21 08:01:29 MDT 2014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs.bib;
http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
URL = "http://link.springer.com/chapter/10.1007/978-3-642-38616-9_6/",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-38616-9",
book-URL = "http://www.springerlink.com/content/978-3-642-38616-9",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Landais:2013:EAM,
author = "Gr{\'e}gory Landais and Jean-Pierre Tillich",
title = "An Efficient Attack of a {McEliece} Cryptosystem
Variant Based on Convolutional Codes",
journal = j-LECT-NOTES-COMP-SCI,
volume = "7932",
pages = "102--117",
year = "2013",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-38616-9_7",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Fri Mar 21 08:01:29 MDT 2014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs.bib;
http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
URL = "http://link.springer.com/chapter/10.1007/978-3-642-38616-9_7/",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-38616-9",
book-URL = "http://www.springerlink.com/content/978-3-642-38616-9",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Miura:2013:EAS,
author = "Hiroyuki Miura and Yasufumi Hashimoto and Tsuyoshi
Takagi",
title = "Extended Algorithm for Solving Underdefined
Multivariate Quadratic Equations",
journal = j-LECT-NOTES-COMP-SCI,
volume = "7932",
pages = "118--135",
year = "2013",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-38616-9_8",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Fri Mar 21 08:01:29 MDT 2014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs.bib;
http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
URL = "http://link.springer.com/chapter/10.1007/978-3-642-38616-9_8/",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-38616-9",
book-URL = "http://www.springerlink.com/content/978-3-642-38616-9",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Mosca:2013:QKD,
author = "Michele Mosca and Douglas Stebila and Berkant
Ustao{\u{g}}lu",
title = "Quantum Key Distribution in the Classical
Authenticated Key Exchange Framework",
journal = j-LECT-NOTES-COMP-SCI,
volume = "7932",
pages = "136--154",
year = "2013",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-38616-9_9",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Fri Mar 21 08:01:29 MDT 2014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs.bib;
http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
URL = "http://link.springer.com/chapter/10.1007/978-3-642-38616-9_9/",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-38616-9",
book-URL = "http://www.springerlink.com/content/978-3-642-38616-9",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Nie:2013:CHB,
author = "Xuyun Nie and Zhaohu Xu and Johannes Buchmann",
title = "Cryptanalysis of Hash-Based Tamed Transformation and
Minus Signature Scheme",
journal = j-LECT-NOTES-COMP-SCI,
volume = "7932",
pages = "155--164",
year = "2013",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-38616-9_10",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Fri Mar 21 08:01:29 MDT 2014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs.bib;
http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
URL = "http://link.springer.com/chapter/10.1007/978-3-642-38616-9_10/",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-38616-9",
book-URL = "http://www.springerlink.com/content/978-3-642-38616-9",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Perlner:2013:CDI,
author = "Ray Perlner and Daniel Smith-Tone",
title = "A Classification of Differential Invariants for
Multivariate Post-quantum Cryptosystems",
journal = j-LECT-NOTES-COMP-SCI,
volume = "7932",
pages = "165--173",
year = "2013",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-38616-9_11",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Fri Mar 21 08:01:29 MDT 2014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs.bib;
http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
URL = "http://link.springer.com/chapter/10.1007/978-3-642-38616-9_11/",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-38616-9",
book-URL = "http://www.springerlink.com/content/978-3-642-38616-9",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Persichetti:2013:SAH,
author = "Edoardo Persichetti",
title = "Secure and Anonymous Hybrid Encryption from Coding
Theory",
journal = j-LECT-NOTES-COMP-SCI,
volume = "7932",
pages = "174--187",
year = "2013",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-38616-9_12",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Fri Mar 21 08:01:29 MDT 2014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs.bib;
http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
URL = "http://link.springer.com/chapter/10.1007/978-3-642-38616-9_12/",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-38616-9",
book-URL = "http://www.springerlink.com/content/978-3-642-38616-9",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Petzoldt:2013:FVI,
author = "Albrecht Petzoldt and Stanislav Bulygin and Johannes
Buchmann",
title = "Fast Verification for Improved Versions of the {UOV}
and Rainbow Signature Schemes",
journal = j-LECT-NOTES-COMP-SCI,
volume = "7932",
pages = "188--202",
year = "2013",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-38616-9_13",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Fri Mar 21 08:01:29 MDT 2014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs.bib;
http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
URL = "http://link.springer.com/chapter/10.1007/978-3-642-38616-9_13/",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-38616-9",
book-URL = "http://www.springerlink.com/content/978-3-642-38616-9",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Sendrier:2013:HCE,
author = "Nicolas Sendrier and Dimitris E. Simos",
title = "The Hardness of Code Equivalence over {$ \mathbb {F}_q
$} and Its Application to Code-Based Cryptography",
journal = j-LECT-NOTES-COMP-SCI,
volume = "7932",
pages = "203--216",
year = "2013",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-38616-9_14",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Fri Mar 21 08:01:29 MDT 2014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs.bib;
http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
URL = "http://link.springer.com/chapter/10.1007/978-3-642-38616-9_14/",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-38616-9",
book-URL = "http://www.springerlink.com/content/978-3-642-38616-9",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Strenzke:2013:TAA,
author = "Falko Strenzke",
title = "Timing Attacks against the Syndrome Inversion in
Code-Based Cryptosystems",
journal = j-LECT-NOTES-COMP-SCI,
volume = "7932",
pages = "217--230",
year = "2013",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-38616-9_15",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Fri Mar 21 08:01:29 MDT 2014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs.bib;
http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
URL = "http://link.springer.com/chapter/10.1007/978-3-642-38616-9_15/",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-38616-9",
book-URL = "http://www.springerlink.com/content/978-3-642-38616-9",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Tao:2013:SMS,
author = "Chengdong Tao and Adama Diene and Shaohua Tang and
Jintai Ding",
title = "Simple Matrix Scheme for Encryption",
journal = j-LECT-NOTES-COMP-SCI,
volume = "7932",
pages = "231--242",
year = "2013",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-38616-9_16",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Fri Mar 21 08:01:29 MDT 2014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs.bib;
http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
URL = "http://link.springer.com/chapter/10.1007/978-3-642-38616-9_16/",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-38616-9",
book-URL = "http://www.springerlink.com/content/978-3-642-38616-9",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Yasuda:2013:MSS,
author = "Takanori Yasuda and Tsuyoshi Takagi and Kouichi
Sakurai",
title = "Multivariate Signature Scheme Using Quadratic Forms",
journal = j-LECT-NOTES-COMP-SCI,
volume = "7932",
pages = "243--258",
year = "2013",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-38616-9_17",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Fri Mar 21 08:01:29 MDT 2014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs.bib;
http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
URL = "http://link.springer.com/chapter/10.1007/978-3-642-38616-9_17/",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-38616-9",
book-URL = "http://www.springerlink.com/content/978-3-642-38616-9",
fjournal = "Lecture Notes in Computer Science",
}
@Article{Anonymous:2013:BM,
author = "Anonymous",
title = "Back Matter",
journal = j-LECT-NOTES-COMP-SCI,
volume = "7932",
pages = "??--??",
year = "2013",
CODEN = "LNCSD9",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Fri Mar 21 08:01:29 MDT 2014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs.bib;
http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
URL = "http://link.springer.com/content/pdf/bbm:978-3-642-38616-9/1.pdf",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-38616-9",
book-URL = "http://www.springerlink.com/content/978-3-642-38616-9",
fjournal = "Lecture Notes in Computer Science",
}
@Proceedings{Carette:2013:ICM,
editor = "Jacques Carette and David Aspinall and Christoph Lange
and Petr Sojka and Wolfgang Windsteiger",
booktitle = "{Intelligent computer mathematics: MKM, Calculemus,
DML, and Systems and Projects 2013, held as part of
CICM 2013, Bath, UK, July 8--12, 2013. Proceedings}",
title = "{Intelligent computer mathematics: MKM, Calculemus,
DML, and Systems and Projects 2013, held as part of
CICM 2013, Bath, UK, July 8--12, 2013. Proceedings}",
volume = "7961",
publisher = pub-SV,
address = pub-SV:adr,
pages = "xv + 384",
year = "2013",
DOI = "https://doi.org/10.1007/978-3-642-39320-4",
ISBN = "3-642-39319-5 (paperback), 3-642-39320-9 (e-book)",
ISBN-13 = "978-3-642-39319-8 (paperback), 978-3-642-39320-4
(e-book)",
LCCN = "QA76.9.M35 I58 2013",
bibdate = "Thu May 22 15:57:56 MDT 2014",
bibsource = "fsz3950.oclc.org:210/WorldCat;
http://www.math.utah.edu/pub/tex/bib/kepler.bib;
http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib",
series = "Lecture notes in computer science",
acknowledgement = ack-nhfb,
subject = "Informatique; Math{\'e}matiques; Congr{\`e}s;
Intelligence artificielle; Computer science; Algebra;
Data processing; Information storage and retrieval
systems; Artificial intelligence; Text processing
(Computer science",
tableofcontents = "Calculemus: The rooster and the butterflies / Assia
Mahboubi \\
Optimising Problem Formulation for Cylindrical
Algebraic Decomposition / Russell Bradford, James H.
Davenport, Matthew England, and David Wilson \\
The Formalization of Syntax-Based Mathematical
Algorithms Using Quotation and Evaluation / William M.
Farmer \\
Certification of bounds of non-linear functions: the
templates mentod / Xavier Allamigeon, St{\'e}phane
Gaubert, Victor Magron, and Benjamin Werner \\
Verifying a Plaftorm for Digital Imaging: A Multi-tool
Strategy / Jonathan Heras, Gadea Mata, Ana Romero,
Julio Rubio, and Rub{\'e}n S{\'a}enz \\
A Universal Machine for Biform Theory Graphs / Michael
Kohlhase, Felix Manse and Florian Rabe \\
MKM: Mathematical Practice, Crowdsourcing, and Social
Machines / Ursula Martin and Alison Pease \\
Automated Reasoning Service for HOL Light / Cezary
Kaliszyk and Josef Urban \\
Understanding Branch Cuts of Expressions / Matthew
England, Russell Bradford, James H. Davenport, and
David Wilson \\
Formal Mathematics on Display: A Wiki for Flyspeck /
Carst Tankink, Cezary Kaliszyk, Josef Urban, and Herman
Geuvers \\
Determining Points on Handwritten Mathematical Symbols
/ Rui Hu and Stephen M. Watt \\
Capturing Hiproofs in HOL Light / Steven Obua, Mark
Adams, and David Aspinall \\
A Qualitative Comparison of the Suitability of Four
Theorem Provers for Basic Auction Theory / Christoph
Lange, Marco B. Caminati, Manfred Kerber, Till
Mossakowski, Colin Rowat, Makarius Wenzel, and Wolfgang
Windsteiger \\
Students' Comparison of Their Trigonometric Answers
with the Answers of a Computer Algebra System / Eno
Tonisson \\
DML: Mathematics and the World Wide Web / Patrick D.F.
Ion \\
Structural Similarity Search for Mathematics Retrieval
/ Shahab Kamali and Frank Wm. Tompa \\
Towards Machine-Actionable Modules of a Digital
Mathematics Library: The Example of DML-CZ / Michal
R{\^e}u\?zi\?cka, Petr Sojka, and Vlastimil Krej\?c\c
\?r \\
A Hybrid Approach for Semantic Enrichment of MathML
Mathematical Expressions / Minh-Quoc Nghiem, Giovanni
Yoko Kristianto, Goran Topi{\'c}, and Akiko Aizawa \\
Three Years of DLMF: Web, Math and Search / Bruce R.
Miller \\
Escaping the Trap of Too Precise Topic Queries / Paul
Libbrecht \\
Using MathML to Represent Units of Measurement for
Improved Ontology Alignment / Chau Do and Eric J.
Pauwels \\
Systems and projects: A Web Interface for Isabelle: The
Next Generation / Christoph L{\"u}th and Martin Ring
\\
The ForMaRE Project--Formal Mathematical Reasoning in
Economics / Christoph Lange, Colin Rowat, and Manfred
Kerber \\
LATExml 2012--A Year of LATExml / Deyan Ginev and Bruce
R. Miller \\
The MMT API: A Generic MKM System / Florian Rabe \\
Math-Net.Ru as a Digital Archive of the Russian
Mathematical Knowledge from the XIX Century to Today /
Dmitry E. Chebukov, Alexander D. Izaak, Olga G.
Misyurina, Yuri A. Pupyrev, and Alexey B. Zhizhchenko
\\
A Dynamic Symbolic Geometry Environment Based on the
Gr{\"o}bnerCover Algorithm for the Computation of
Geometric Loci and Envelopes / Miguel A. Ab{\'a}nades
and Francisco Botana \\
ML4PG in computer algebra verification / J{\'o}nathan
Heras and Ekaterina Komendantskaya \\
Pervasive Parallelism in Highly-Trustable Interactive
Theorem Proving Systems / Bruno Barras, Lourdes del
Carmen Gonz{\'a}lez Huesca, Hugo Herbelin, Yann
R{\'e}gis-Gianas, Enrico Tassi, Makarius Wenzel, and
Burkhart Wolff \\
The Web geometry laboratory project / Pedro Quaresma,
Vanda Santos, and Seifeddine Bouallegue \\
swMATH--A New Information Service for Mathematical
Software / Sebastian B{\"o}bisch, Michael Brickenstein,
Hagen Chrapary, Gert-Martin Greuel, and Wolfram Sperber
\\
Software for evaluating relevance of steps in algebraic
transformations / Rein Prank \\
The DeLiverMATH project: text analysis in mathematics /
Ulf Sch{\"o}nberg and Wolfram Sperber",
xxseries = "Lecture notes in artificial intelligence; LNCS
sublibrary. SL 7, Artificial intelligence",
}
@Proceedings{Gaborit:2013:PQC,
editor = "Philippe Gaborit",
booktitle = "{Post-quantum cryptography: 5th International
Workshop, PQCRYPTO 2013, Limoges, France, June 4--7,
2013. Proceedings}",
title = "{Post-quantum cryptography: 5th International
Workshop, PQCRYPTO 2013, Limoges, France, June 4--7,
2013. Proceedings}",
volume = "7932",
publisher = pub-SV,
address = pub-SV:adr,
pages = "258 (est.)",
year = "2013",
DOI = "https://doi.org/10.1007/978-3-642-38616-9",
ISBN = "3-642-38615-6 (paperback), 3-642-38616-4 (e-book)",
ISBN-13 = "978-3-642-38615-2 (paperback), 978-3-642-38616-9
(e-book)",
LCCN = "????",
bibdate = "Fri Mar 21 07:55:51 MDT 2014",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs.bib;
http://www.math.utah.edu/pub/tex/bib/lncs2013a.bib;
z3950.loc.gov:7090/Voyager",
series = ser-LNCS,
URL = "http://www.springerlink.com/content/978-3-642-38616-9",
series-URL = "http://link.springer.com/bookseries/558",
}