

@inproceedings{DBLP:conf/eurocrypt/AbdallaABN02,
  author    = {Michel Abdalla and
               Jee Hea An and
               Mihir Bellare and
               Chanathip Namprempre},
  title     = {From Identification to Signatures via the Fiat-Shamir Transform: Minimizing
               Assumptions for Security and Forward-Security},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2002, International Conference
               on the Theory and Applications of Cryptographic Techniques, Amsterdam,
               The Netherlands, April 28 - May 2, 2002, Proceedings},
  year      = {2002},
  pages     = {418--433},
  crossref  = {DBLP:conf/eurocrypt/2002},
  url       = {http://dx.doi.org/10.1007/3-540-46035-7_28},
  doi       = {10.1007/3-540-46035-7_28},
  timestamp = {Tue, 11 Nov 2014 20:01:34 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/eurocrypt/AbdallaABN02},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2002,
  editor    = {Lars R. Knudsen},
  title     = {Advances in Cryptology - {EUROCRYPT} 2002, International Conference
               on the Theory and Applications of Cryptographic Techniques, Amsterdam,
               The Netherlands, April 28 - May 2, 2002, Proceedings},
  series    = {Lecture Notes in Computer Science},
  year      = {2002},
  volume    = {2332},
  publisher = {Springer},
  isbn      = {3-540-43553-0},
  timestamp = {Tue, 11 Nov 2014 20:01:34 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/eurocrypt/2002},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}


@book{
AB09,
  author    = {Sanjeev Arora and
               Boaz Barak},
  title     = {Computational Complexity - A Modern Approach},
  publisher = {Cambridge University Press},
  year      = {2009},
  isbn      = {978-0-521-42426-4},
}


@article{DBLP:journals/iacr/AnanthBGSZ13,
  author    = {Prabhanjan Ananth and
               Dan Boneh and
               Sanjam Garg and
               Amit Sahai and
               Mark Zhandry},
  title     = {Differing-Inputs Obfuscation and Applications},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {689},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/689},
  timestamp = {Wed, 01 Jan 2014 19:22:47 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/AnanthBGSZ13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}


@article{DBLP:journals/iacr/ApplebaumB15,
  author    = {Benny Applebaum and
               Zvika Brakerski},
  title     = {Obfuscating Circuits via Composite-Order Graded Encoding},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {25},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/025},
  timestamp = {Mon, 19 Jan 2015 11:16:12 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/ApplebaumB15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}




@article{
ABH11,
  author    = {Jacob Abernethy and
               Peter L. Bartlett and
               Elad Hazan},
  title     = {Blackwell Approachability and No-Regret Learning are Equivalent},
  journal   = {Journal of Machine Learning Research - Proceedings Track},
  volume    = {19},
  year      = {2011},
  pages     = {27-46},
}

@inproceedings{
Adleman78,
  author    = {Leonard M. Adleman},
  title     = {Two Theorems on Random Polynomial Time},
  booktitle = {FOCS},
  year      = {1978},
  pages     = {75-83},
}

@inproceedings{
DBLP:conf/stoc/Ajtai96,
  author    = {Mikl{\'o}s Ajtai},
  title     = {Generating Hard Instances of Lattice Problems (Extended Abstract)},
  booktitle = {STOC},
  year      = {1996},
  pages     = {99-108},
}


@inproceedings{
DBLP:conf/stoc/Ajtai98,
  author    = {Mikl{\'o}s Ajtai},
  title     = {The Shortest Vector Problem in {\it L$_{\mbox{2}}$} is {\it NP}-hard
               for Randomized Reductions (Extended Abstract)},
  booktitle = {STOC},
  year      = {1998},
  pages     = {10-19},
  ee        = {http://doi.acm.org/10.1145/276698.276705},
  crossref  = {DBLP:conf/stoc/1998},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{DBLP:conf/stoc/1998,
  editor    = {Jeffrey Scott Vitter},
  title     = {Proceedings of the Thirtieth Annual ACM Symposium on the
               Theory of Computing, Dallas, Texas, USA, May 23-26, 1998},
  booktitle = {STOC},
  publisher = {ACM},
  year      = {1998},
  isbn      = {0-89791-962-9},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}





@inproceedings{
ajtai2001sieve,
  title={A sieve algorithm for the shortest lattice vector problem},
  author={Ajtai, Mikl{\'o}s and Kumar, Ravi and Sivakumar, Dandapani},
  booktitle={Proceedings of the thirty-third annual ACM symposium on Theory of computing},
  pages={601--610},
  year={2001},
  organization={ACM}
}

@inproceedings{
ALMSS92,
  author    = {Sanjeev Arora and
               Carsten Lund and
               Rajeev Motwani and
               Madhu Sudan and
               Mario Szegedy},
  title     = {Proof Verification and Hardness of Approximation Problems},
  booktitle = {FOCS},
  year      = {1992},
  pages     = {14-23},
}

@inproceedings{
AR04,
  author    = {Dorit Aharonov and
               Oded Regev},
  title     = {Lattice Problems in NP cap coNP},
  booktitle = {FOCS},
  year      = {2004},
  pages     = {362-371},
}

@inproceedings{
AS92,
  author    = {Sanjeev Arora and
               Shmuel Safra},
  title     = {Probabilistic Checking of Proofs; A New Characterization
               of NP},
  booktitle = {FOCS},
  year      = {1992},
  pages     = {2-13},
}

@article{
AW09,
  author    = {Scott Aaronson and
               Avi Wigderson},
  title     = {Algebrization: A New Barrier in Complexity Theory},
  journal   = {TOCT},
  volume    = {1},
  number    = {1},
  year      = {2009},
}

@inproceedings{
Babai85,
  author    = {L{\'a}szl{\'o} Babai},
  title     = {Trading Group Theory for Randomness},
  booktitle = {STOC},
  year      = {1985},
  pages     = {421-429},
}


@article{
DBLP:journals/combinatorica/Babai86,
  author    = {L{\'a}szl{\'o} Babai},
  title     = {On Lov{\'a}sz' lattice reduction and the nearest lattice
               point problem},
  journal   = {Combinatorica},
  volume    = {6},
  number    = {1},
  year      = {1986},
  pages     = {1-13},
  ee        = {http://dx.doi.org/10.1007/BF02579403},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}


@phdthesis{
Barak_thesis,
  author    = {Boaz Barak},
  title     = {Non-Black-Box Techniques in Cryptography},
  school 	= {Department of Computer Science and Applied Mathematics, Weizmann Institute of Science, Rehovot, Israel},
  year      = {2004},
}


@inproceedings{
DBLP:conf/focs/Barak01,
  author    = {Boaz Barak},
  title     = {How to Go Beyond the Black-Box Simulation Barrier},
  booktitle = {FOCS},
  year      = {2001},
  pages     = {106-115},
  ee        = {http://doi.ieeecomputersociety.org/10.1109/SFCS.2001.959885},
  crossref  = {DBLP:conf/focs/2001},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{DBLP:conf/focs/2001,
  title     = {42nd Annual Symposium on Foundations of Computer Science,
               FOCS 2001, 14-17 October 2001, Las Vegas, Nevada, USA},
  booktitle = {FOCS},
  publisher = {IEEE Computer Society},
  year      = {2001},
  isbn      = {0-7695-1390-5},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}


@inproceedings{
DBLP:conf/tcc/BarakBCKPS14,
  author    = {Boaz Barak and
               Nir Bitansky and
               Ran Canetti and
               Yael Tauman Kalai and
               Omer Paneth and
               Amit Sahai},
  title     = {Obfuscation for Evasive Functions},
  booktitle = {TCC},
  year      = {2014},
  pages     = {26-51},
  ee        = {http://dx.doi.org/10.1007/978-3-642-54242-8_2},
  crossref  = {DBLP:conf/tcc/2014},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{DBLP:conf/tcc/2014,
  editor    = {Yehuda Lindell},
  title     = {Theory of Cryptography - 11th Theory of Cryptography Conference,
               TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings},
  booktitle = {TCC},
  publisher = {Springer},
  series    = {Lecture Notes in Computer Science},
  volume    = {8349},
  year      = {2014},
  isbn      = {978-3-642-54241-1},
  ee        = {http://dx.doi.org/10.1007/978-3-642-54242-8},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}



@inproceedings{DBLP:conf/crypto/BitanskyC10,
  author    = {Nir Bitansky and
               Ran Canetti},
  title     = {On Strong Simulation and Composable Point Obfuscation},
  booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  pages     = {520--537},
  year      = {2010},
  crossref  = {DBLP:conf/crypto/2010},
  url       = {http://dx.doi.org/10.1007/978-3-642-14623-7_28},
  doi       = {10.1007/978-3-642-14623-7_28},
  timestamp = {Tue, 17 Aug 2010 15:09:53 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/BitanskyC10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/2010,
  editor    = {Tal Rabin},
  title     = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6223},
  publisher = {Springer},
  year      = {2010},
  url       = {http://dx.doi.org/10.1007/978-3-642-14623-7},
  doi       = {10.1007/978-3-642-14623-7},
  isbn      = {978-3-642-14622-0},
  timestamp = {Tue, 17 Aug 2010 15:08:02 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/2010},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}



@inproceedings{
DBLP:conf/eurocrypt/BarakGKPS14,
  author    = {Boaz Barak and
               Sanjam Garg and
               Yael Tauman Kalai and
               Omer Paneth and
               Amit Sahai},
  title     = {Protecting Obfuscation against Algebraic Attacks},
  booktitle = {EUROCRYPT},
  year      = {2014},
  pages     = {221-238},
  ee        = {http://dx.doi.org/10.1007/978-3-642-55220-5_13},
  crossref  = {DBLP:conf/eurocrypt/2014},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{DBLP:conf/eurocrypt/2014,
  editor    = {Phong Q. Nguyen and
               Elisabeth Oswald},
  title     = {Advances in Cryptology - EUROCRYPT 2014 - 33rd Annual International
               Conference on the Theory and Applications of Cryptographic
               Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings},
  booktitle = {EUROCRYPT},
  publisher = {Springer},
  series    = {Lecture Notes in Computer Science},
  volume    = {8441},
  year      = {2014},
  isbn      = {978-3-642-55219-9},
  ee        = {http://dx.doi.org/10.1007/978-3-642-55220-5},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}



@inproceedings{
DBLP:conf/crypto/BarakGIRSVY01,
  author    = {Boaz Barak and
               Oded Goldreich and
               Russell Impagliazzo and
               Steven Rudich and
               Amit Sahai and
               Salil P. Vadhan and
               Ke Yang},
  title     = {On the (Im)possibility of Obfuscating Programs},
  booktitle = {CRYPTO},
  year      = {2001},
  pages     = {1-18},
  ee        = {http://dx.doi.org/10.1007/3-540-44647-8_1},
  crossref  = {DBLP:conf/crypto/2001},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{DBLP:conf/crypto/2001,
  editor    = {Joe Kilian},
  title     = {Advances in Cryptology - CRYPTO 2001, 21st Annual International
               Cryptology Conference, Santa Barbara, California, USA, August
               19-23, 2001, Proceedings},
  booktitle = {CRYPTO},
  publisher = {Springer},
  series    = {Lecture Notes in Computer Science},
  volume    = {2139},
  year      = {2001},
  isbn      = {3-540-42456-3},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}


@article{
DBLP:journals/jacm/BarakGIRSVY12,
  author    = {Boaz Barak and
               Oded Goldreich and
               Russell Impagliazzo and
               Steven Rudich and
               Amit Sahai and
               Salil P. Vadhan and
               Ke Yang},
  title     = {On the (im)possibility of obfuscating programs},
  journal   = {J. ACM},
  volume    = {59},
  number    = {2},
  year      = {2012},
  pages     = {6},
  ee        = {http://doi.acm.org/10.1145/2160158.2160159},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}



@inproceedings{
DBLP:conf/focs/BarakLV03,
  author    = {Boaz Barak and
               Yehuda Lindell and
               Salil P. Vadhan},
  title     = {Lower Bounds for Non-Black-Box Zero Knowledge},
  booktitle = {FOCS},
  year      = {2003},
  pages     = {384-393},
  ee        = {http://doi.ieeecomputersociety.org/10.1109/SFCS.2003.1238212},
  crossref  = {DBLP:conf/focs/2003},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{DBLP:conf/focs/2003,
  title     = {44th Symposium on Foundations of Computer Science (FOCS
               2003), 11-14 October 2003, Cambridge, MA, USA, Proceedings},
  booktitle = {FOCS},
  publisher = {IEEE Computer Society},
  year      = {2003},
  isbn      = {0-7695-2040-5},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}



@inproceedings{
DBLP:conf/stoc/Barrington86,
  author    = {David A. Mix Barrington},
  title     = {Bounded-Width Polynomial-Size Branching Programs Recognize
               Exactly Those Languages in NC$^1$},
  booktitle = {STOC},
  year      = {1986},
  pages     = {1-5},
  ee        = {http://doi.acm.org/10.1145/12130.12131},
  crossref  = {DBLP:conf/stoc/STOC18},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{DBLP:conf/stoc/STOC18,
  editor    = {Juris Hartmanis},
  title     = {Proceedings of the 18th Annual ACM Symposium on Theory of
               Computing, May 28-30, 1986, Berkeley, California, USA},
  booktitle = {STOC},
  publisher = {ACM},
  year      = {1986},
  isbn      = {0-89791-193-8},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}



@inproceedings{
BBS82,
  author    = {Lenore Blum and
               Manuel Blum and
               Mike Shub},
  title     = {Comparison of Two Pseudo-Random Number Generators},
  booktitle = {CRYPTO},
  year      = {1982},
  pages     = {61-78},
}


@article{DBLP:journals/joc/BitanskyC14,
  author    = {Nir Bitansky and
               Ran Canetti},
  title     = {On Strong Simulation and Composable Point Obfuscation},
  journal   = {J. Cryptology},
  volume    = {27},
  number    = {2},
  pages     = {317--357},
  year      = {2014},
  url       = {http://dx.doi.org/10.1007/s00145-013-9146-9},
  doi       = {10.1007/s00145-013-9146-9},
  timestamp = {Wed, 19 Mar 2014 20:34:53 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/joc/BitanskyC14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}


@inproceedings{
DBLP:conf/crypto/BitanskyCCGKPR14,
  author    = {Nir Bitansky and
               Ran Canetti and
               Henry Cohn and
               Shafi Goldwasser and
               Yael Tauman Kalai and
               Omer Paneth and
               Alon Rosen},
  title     = {The Impossibility of Obfuscation with Auxiliary Input or
               a Universal Simulator},
  booktitle = {CRYPTO (2)},
  year      = {2014},
  pages     = {71-89},
  ee        = {http://dx.doi.org/10.1007/978-3-662-44381-1_5},
  crossref  = {DBLP:conf/crypto/2014-2},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{DBLP:conf/crypto/2014-2,
  editor    = {Juan A. Garay and
               Rosario Gennaro},
  title     = {Advances in Cryptology - CRYPTO 2014 - 34th Annual Cryptology
               Conference, Santa Barbara, CA, USA, August 17-21, 2014,
               Proceedings, Part II},
  booktitle = {CRYPTO (2)},
  publisher = {Springer},
  series    = {Lecture Notes in Computer Science},
  volume    = {8617},
  year      = {2014},
  isbn      = {978-3-662-44380-4},
  ee        = {http://dx.doi.org/10.1007/978-3-662-44381-1},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}



@inproceedings{
DBLP:conf/crypto/BitanskyCKP14,
  author    = {Nir Bitansky and
               Ran Canetti and
               Yael Tauman Kalai and
               Omer Paneth},
  title     = {On Virtual Grey Box Obfuscation for General Circuits},
  booktitle = {CRYPTO (2)},
  year      = {2014},
  pages     = {108-125},
  ee        = {http://dx.doi.org/10.1007/978-3-662-44381-1_7},
  crossref  = {DBLP:conf/crypto/2014-2},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{DBLP:conf/crypto/2014-2,
  editor    = {Juan A. Garay and
               Rosario Gennaro},
  title     = {Advances in Cryptology - CRYPTO 2014 - 34th Annual Cryptology
               Conference, Santa Barbara, CA, USA, August 17-21, 2014,
               Proceedings, Part II},
  booktitle = {CRYPTO (2)},
  publisher = {Springer},
  series    = {Lecture Notes in Computer Science},
  volume    = {8617},
  year      = {2014},
  isbn      = {978-3-662-44380-4},
  ee        = {http://dx.doi.org/10.1007/978-3-662-44381-1},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}



@inproceedings{
DBLP:conf/tcc/BoyleCP14,
  author    = {Elette Boyle and
               Kai-Min Chung and
               Rafael Pass},
  title     = {On Extractability Obfuscation},
  booktitle = {TCC},
  year      = {2014},
  pages     = {52-73},
  ee        = {http://dx.doi.org/10.1007/978-3-642-54242-8_3},
  crossref  = {DBLP:conf/tcc/2014},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{DBLP:conf/tcc/2014,
  editor    = {Yehuda Lindell},
  title     = {Theory of Cryptography - 11th Theory of Cryptography Conference,
               TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings},
  booktitle = {TCC},
  publisher = {Springer},
  series    = {Lecture Notes in Computer Science},
  volume    = {8349},
  year      = {2014},
  isbn      = {978-3-642-54241-1},
  ee        = {http://dx.doi.org/10.1007/978-3-642-54242-8},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}


@misc{
cryptoeprint:2013:701,
    author = {Nir Bitansky and Ran Canetti and Omer Paneth and Alon Rosen},
    title = {More on the Impossibility of Virtual-Black-Box Obfuscation with Auxiliary Input},
    howpublished = {Cryptology ePrint Archive, Report 2013/701},
    year = {2013},
    note = {\url{http://eprint.iacr.org/}},
}


@inproceedings{DBLP:conf/stoc/BitanskyCPR14,
  author    = {Nir Bitansky and
               Ran Canetti and
               Omer Paneth and
               Alon Rosen},
  title     = {On the existence of extractable one-way functions},
  booktitle = {Symposium on Theory of Computing, {STOC} 2014, New York, NY, USA,
               May 31 - June 03, 2014},
  pages     = {505--514},
  year      = {2014},
  crossref  = {DBLP:conf/stoc/2014},
  url       = {http://doi.acm.org/10.1145/2591796.2591859},
  doi       = {10.1145/2591796.2591859},
  timestamp = {Wed, 18 Jun 2014 08:38:28 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/stoc/BitanskyCPR14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/stoc/2014,
  editor    = {David B. Shmoys},
  title     = {Symposium on Theory of Computing, {STOC} 2014, New York, NY, USA,
               May 31 - June 03, 2014},
  publisher = {{ACM}},
  year      = {2014},
  url       = {http://dl.acm.org/citation.cfm?id=2591796},
  isbn      = {978-1-4503-2710-7},
  timestamp = {Wed, 18 Jun 2014 08:38:28 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/stoc/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}




@inproceedings{
DBLP:conf/tcc/BitanskyDG0KLW13,
  author    = {Nir Bitansky and
               Dana Dachman-Soled and
               Sanjam Garg and
               Abhishek Jain and
               Yael Tauman Kalai and
               Adriana L{\'o}pez-Alt and
               Daniel Wichs},
  title     = {Why "Fiat-Shamir for Proofs" Lacks a Proof},
  booktitle = {TCC},
  year      = {2013},
  pages     = {182-201},
  ee        = {http://dx.doi.org/10.1007/978-3-642-36594-2_11},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}



@inproceedings{
BFL90,
  author    = {L{\'a}szl{\'o} Babai and
               Lance Fortnow and
               Carsten Lund},
  title     = {Non-Deterministic Exponential Time Has Two-Prover Interactive
               Protocols},
  booktitle = {FOCS},
  year      = {1990},
  pages     = {16-25},
}

@inproceedings{
BFLS91,
  author    = {L{\'a}szl{\'o} Babai and
               Lance Fortnow and
               Leonid A. Levin and
               Mario Szegedy},
  title     = {Checking Computations in Polylogarithmic Time},
  booktitle = {STOC},
  year      = {1991},
  pages     = {21-31},
}


@inproceedings{DBLP:conf/asiacrypt/BoldyrevaCFW09,
  author    = {Alexandra Boldyreva and
               David Cash and
               Marc Fischlin and
               Bogdan Warinschi},
  title     = {Foundations of Non-malleable Hash and One-Way Functions},
  booktitle = {ASIACRYPT},
  year      = {2009},
  pages     = {524-541},
  ee        = {http://dx.doi.org/10.1007/978-3-642-10366-7_31},
  crossref  = {DBLP:conf/asiacrypt/2009},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{DBLP:conf/asiacrypt/2009,
  editor    = {Mitsuru Matsui},
  title     = {Advances in Cryptology - ASIACRYPT 2009, 15th International
               Conference on the Theory and Application of Cryptology and
               Information Security, Tokyo, Japan, December 6-10, 2009.
               Proceedings},
  booktitle = {ASIACRYPT},
  publisher = {Springer},
  series    = {Lecture Notes in Computer Science},
  volume    = {5912},
  year      = {2009},
  isbn      = {978-3-642-10365-0},
  ee        = {http://dx.doi.org/10.1007/978-3-642-10366-7},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}



@inproceedings{
BFM88,
  author    = {Manuel Blum and
               Paul Feldman and
               Silvio Micali},
  title     = {Proving Security Against Chosen Cyphertext Attacks},
  booktitle = {CRYPTO},
  year      = {1988},
  pages     = {256-268},
}


@inproceedings{
BG84,
  author    = {Manuel Blum and
               Shafi Goldwasser},
  title     = {An Efficient Probabilistic Public-Key Encryption Scheme
               Which Hides All Partial Information},
  booktitle = {CRYPTO},
  year      = {1984},
  pages     = {289-302},
}



@inproceedings{
DBLP:conf/pkc/BoyleGI14,
  author    = {Elette Boyle and
               Shafi Goldwasser and
               Ioana Ivan},
  title     = {Functional Signatures and Pseudorandom Functions},
  booktitle = {Public Key Cryptography},
  year      = {2014},
  pages     = {501-519},
  ee        = {http://dx.doi.org/10.1007/978-3-642-54631-0_29},
  crossref  = {DBLP:conf/pkc/2014},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{DBLP:conf/pkc/2014,
  editor    = {Hugo Krawczyk},
  title     = {Public-Key Cryptography - PKC 2014 - 17th International
               Conference on Practice and Theory in Public-Key Cryptography,
               Buenos Aires, Argentina, March 26-28, 2014. Proceedings},
  booktitle = {Public Key Cryptography},
  publisher = {Springer},
  series    = {Lecture Notes in Computer Science},
  volume    = {8383},
  year      = {2014},
  isbn      = {978-3-642-54630-3},
  ee        = {http://dx.doi.org/10.1007/978-3-642-54631-0},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}



@inproceedings{
BGKW88,
  author    = {Michael Ben-Or and
               Shafi Goldwasser and
               Joe Kilian and
               Avi Wigderson},
  title     = {Multi-Prover Interactive Proofs: How to Remove Intractability
               Assumptions},
  booktitle = {STOC},
  year      = {1988},
  pages     = {113-131},
}

@article{
BGS75,
  author    = {Theodore P. Baker and
               John Gill and
               Robert Solovay},
  title     = {Relativizatons of the P =? NP Question},
  journal   = {SIAM J. Comput.},
  volume    = {4},
  number    = {4},
  year      = {1975},
  pages     = {431-442},
}

@inproceedings{
BHK09,
  author    = {Boaz Barak and
               Moritz Hardt and
               Satyen Kale},
  title     = {The uniform hardcore lemma via approximate Bregman projections},
  booktitle = {SODA},
  year      = {2009},
  pages     = {1193-1200},
}


@inproceedings{
DBLP:conf/crypto/BellareHK13,
  author    = {Mihir Bellare and
               Viet Tung Hoang and
               Sriram Keelveedhi},
  title     = {Instantiating Random Oracles via UCEs},
  booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}},
  year      = {2013},
  pages     = {398--415},
  crossref  = {DBLP:conf/crypto/2013-2},
  url       = {http://dx.doi.org/10.1007/978-3-642-40084-1_23},
  doi       = {10.1007/978-3-642-40084-1_23},
  timestamp = {Sun, 05 Oct 2014 22:05:36 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/BellareHK13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/2013-2,
  editor    = {Ran Canetti and
               Juan A. Garay},
  title     = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  year      = {2013},
  volume    = {8043},
  publisher = {Springer},
  url       = {http://dx.doi.org/10.1007/978-3-642-40084-1},
  doi       = {10.1007/978-3-642-40084-1},
  isbn      = {978-3-642-40083-4},
  timestamp = {Sun, 05 Oct 2014 22:05:36 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/2013-2},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}



@article{
BHZ87,
  author    = {Ravi B. Boppana and
               Johan H{\aa}stad and
               Stathis Zachos},
  title     = {Does co-NP Have Short Interactive Proofs?},
  journal   = {Inf. Process. Lett.},
  volume    = {25},
  number    = {2},
  year      = {1987},
  pages     = {127-132},
}

@Misc{
Blum1986,
	title = "How to Prove a Theorem So No One Else Can Claim It",
	author = "Manuel Blum",
	year = "1986",
	month = "August",
	note = "Invited 45 minute address to the International Congress of Mathematicians, 1986. To appear in the Proceedings of ICM 86.",
	day = "11",
}

@inproceedings{
BM82,
  author    = {Manuel Blum and
               Silvio Micali},
  title     = {How to Generate Cryptographically Strong Sequences of Pseudo Random
               Bits},
  booktitle = {23rd Annual Symposium on Foundations of Computer Science, Chicago,
               Illinois, USA, 3-5 November 1982},
  year      = {1982},
  pages     = {112--117},
  crossref  = {DBLP:conf/focs/FOCS23},
  url       = {http://doi.ieeecomputersociety.org/10.1109/SFCS.1982.72},
  doi       = {10.1109/SFCS.1982.72},
  timestamp = {Thu, 06 Nov 2014 17:44:37 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/focs/BlumM82},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/focs/FOCS23,
  title     = {23rd Annual Symposium on Foundations of Computer Science, Chicago,
               Illinois, USA, 3-5 November 1982},
  year      = {1982},
  publisher = {{IEEE} Computer Society},
  timestamp = {Thu, 06 Nov 2014 17:44:37 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/focs/FOCS23},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}

@article{
BM84,
  author    = {Manuel Blum and
               Silvio Micali},
  title     = {How to Generate Cryptographically Strong Sequences of Pseudo-Random
               Bits},
  journal   = {SIAM J. Comput.},
  volume    = {13},
  number    = {4},
  year      = {1984},
  pages     = {850-864},
}



@article{
DBLP:journals/iacr/BrzuskaM14,
  author    = {Christina Brzuska and
               Arno Mittelbach},
  title     = {Using Indistinguishability Obfuscation via UCEs},
  journal   = {IACR Cryptology ePrint Archive},
  volume    = {2014},
  year      = {2014},
  pages     = {381},
  ee        = {http://eprint.iacr.org/2014/381},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}


@inproceedings{DBLP:conf/asiacrypt/BrzuskaM14,
  author    = {Christina Brzuska and
               Arno Mittelbach},
  title     = {Using Indistinguishability Obfuscation via UCEs},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part
               {II}},
  year      = {2014},
  pages     = {122--141},
  crossref  = {DBLP:conf/asiacrypt/2014},
  url       = {http://dx.doi.org/10.1007/978-3-662-45608-8_7},
  doi       = {10.1007/978-3-662-45608-8_7},
  timestamp = {Wed, 12 Nov 2014 03:18:20 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/asiacrypt/BrzuskaM14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2014,
  editor    = {Palash Sarkar and
               Tetsu Iwata},
  title     = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part
               {II}},
  series    = {Lecture Notes in Computer Science},
  year      = {2014},
  volume    = {8874},
  publisher = {Springer},
  url       = {http://dx.doi.org/10.1007/978-3-662-45608-8},
  doi       = {10.1007/978-3-662-45608-8},
  isbn      = {978-3-662-45607-1},
  timestamp = {Wed, 12 Nov 2014 03:18:20 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/asiacrypt/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}



@inproceedings{
DBLP:conf/ccs/BonehMR10,
  author    = {Dan Boneh and
               Hart William Montgomery and
               Ananth Raghunathan},
  title     = {Algebraic pseudorandom functions with improved efficiency
               from the augmented cascade},
  booktitle = {ACM Conference on Computer and Communications Security},
  year      = {2010},
  pages     = {131-140},
  ee        = {http://doi.acm.org/10.1145/1866307.1866323},
  crossref  = {DBLP:conf/ccs/2010},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{DBLP:conf/ccs/2010,
  editor    = {Ehab Al-Shaer and
               Angelos D. Keromytis and
               Vitaly Shmatikov},
  title     = {Proceedings of the 17th ACM Conference on Computer and Communications
               Security, CCS 2010, Chicago, Illinois, USA, October 4-8,
               2010},
  booktitle = {ACM Conference on Computer and Communications Security},
  publisher = {ACM},
  year      = {2010},
  isbn      = {978-1-4503-0245-6},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}



@inproceedings{DBLP:conf/asiacrypt/BendlinNNO11,
  author    = {Rikke Bendlin and
               Jesper Buus Nielsen and
               Peter Sebastian Nordholt and
               Claudio Orlandi},
  title     = {Lower and Upper Bounds for Deniable Public-Key Encryption},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Seoul, South Korea, December 4-8, 2011. Proceedings},
  pages     = {125--142},
  year      = {2011},
  crossref  = {DBLP:conf/asiacrypt/2011},
  url       = {http://dx.doi.org/10.1007/978-3-642-25385-0_7},
  doi       = {10.1007/978-3-642-25385-0_7},
  timestamp = {Thu, 01 Dec 2011 19:18:19 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/asiacrypt/BendlinNNO11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2011,
  editor    = {Dong Hoon Lee and
               Xiaoyun Wang},
  title     = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Seoul, South Korea, December 4-8, 2011. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7073},
  publisher = {Springer},
  year      = {2011},
  url       = {http://dx.doi.org/10.1007/978-3-642-25385-0},
  doi       = {10.1007/978-3-642-25385-0},
  isbn      = {978-3-642-25384-3},
  timestamp = {Thu, 01 Dec 2011 19:11:55 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/asiacrypt/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}


@inproceedings{
DBLP:conf/tcc/BitanskyP12,
  author    = {Nir Bitansky and
               Omer Paneth},
  title     = {Point Obfuscation and 3-Round Zero-Knowledge},
  booktitle = {TCC},
  year      = {2012},
  pages     = {190-208},
}



@article{DBLP:journals/iacr/BoyleP13,
  author    = {Elette Boyle and
               Rafael Pass},
  title     = {Limits of Extractability Assumptions with Distributional Auxiliary
               Input},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {703},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/703},
  timestamp = {Wed, 01 Jan 2014 19:22:47 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/BoyleP13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}


@inproceedings{
DBLP:conf/eurocrypt/BanerjeePR12,
  author    = {Abhishek Banerjee and
               Chris Peikert and
               Alon Rosen},
  title     = {Pseudorandom Functions and Lattices},
  booktitle = {EUROCRYPT},
  year      = {2012},
  pages     = {719-737},
  ee        = {http://dx.doi.org/10.1007/978-3-642-29011-4_42},
  crossref  = {DBLP:conf/eurocrypt/2012},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{DBLP:conf/eurocrypt/2012,
  editor    = {David Pointcheval and
               Thomas Johansson},
  title     = {Advances in Cryptology - EUROCRYPT 2012 - 31st Annual International
               Conference on the Theory and Applications of Cryptographic
               Techniques, Cambridge, UK, April 15-19, 2012. Proceedings},
  booktitle = {EUROCRYPT},
  publisher = {Springer},
  series    = {Lecture Notes in Computer Science},
  volume    = {7237},
  year      = {2012},
  isbn      = {978-3-642-29010-7},
  ee        = {http://dx.doi.org/10.1007/978-3-642-29011-4},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}




@inproceedings{
DBLP:conf/ccs/BellareR93,
  author    = {Mihir Bellare and
               Phillip Rogaway},
  title     = {Random Oracles are Practical: A Paradigm for Designing Efficient
               Protocols},
  booktitle = {ACM Conference on Computer and Communications Security},
  year      = {1993},
  pages     = {62-73},
}


@inproceedings{DBLP:conf/tcc/BrakerskiR14,
  author    = {Zvika Brakerski and
               Guy N. Rothblum},
  title     = {Virtual Black-Box Obfuscation for All Circuits via Generic Graded
               Encoding},
  booktitle = {Theory of Cryptography - 11th Theory of Cryptography Conference, {TCC}
               2014, San Diego, CA, USA, February 24-26, 2014. Proceedings},
  pages     = {1--25},
  year      = {2014},
  crossref  = {DBLP:conf/tcc/2014},
  url       = {http://dx.doi.org/10.1007/978-3-642-54242-8_1},
  doi       = {10.1007/978-3-642-54242-8_1},
  timestamp = {Mon, 03 Feb 2014 13:53:08 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/tcc/BrakerskiR14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/tcc/2014,
  editor    = {Yehuda Lindell},
  title     = {Theory of Cryptography - 11th Theory of Cryptography Conference, {TCC}
               2014, San Diego, CA, USA, February 24-26, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8349},
  publisher = {Springer},
  year      = {2014},
  url       = {http://dx.doi.org/10.1007/978-3-642-54242-8},
  doi       = {10.1007/978-3-642-54242-8},
  isbn      = {978-3-642-54241-1},
  timestamp = {Mon, 03 Feb 2014 13:51:28 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/tcc/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}



@article{
boneh2003applications,
  title={Applications of multilinear forms to cryptography},
  author={Boneh, Dan and Silverberg, Alice},
  journal={Contemporary Mathematics},
  volume={324},
  number={1},
  pages={71--90},
  year={2003},
  publisher={Providence, RI: American Mathematical Society}
}


@misc{cryptoeprint:2013:873,
    author = {Mihir Bellare and Igors Stepanovs and Stefano Tessaro},
    title = {Poly-Many Hardcore Bits for Any One-Way Function},
    howpublished = {Cryptology ePrint Archive, Report 2013/873},
    year = {2013},
}


@inproceedings{DBLP:conf/asiacrypt/BellareST14,
  author    = {Mihir Bellare and
               Igors Stepanovs and
               Stefano Tessaro},
  title     = {Poly-Many Hardcore Bits for Any One-Way Function and a Framework for
               Differing-Inputs Obfuscation},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part
               {II}},
  year      = {2014},
  pages     = {102--121},
  crossref  = {DBLP:conf/asiacrypt/2014},
  url       = {http://dx.doi.org/10.1007/978-3-662-45608-8_6},
  doi       = {10.1007/978-3-662-45608-8_6},
  timestamp = {Wed, 12 Nov 2014 03:19:20 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/asiacrypt/BellareST14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2014,
  editor    = {Palash Sarkar and
               Tetsu Iwata},
  title     = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part
               {II}},
  series    = {Lecture Notes in Computer Science},
  year      = {2014},
  volume    = {8874},
  publisher = {Springer},
  url       = {http://dx.doi.org/10.1007/978-3-662-45608-8},
  doi       = {10.1007/978-3-662-45608-8},
  isbn      = {978-3-662-45607-1},
  timestamp = {Wed, 12 Nov 2014 03:19:20 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/asiacrypt/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}


@TECHREPORT{
Brands93anefficient,
    author = {Stefan Brands},
    title = {An Efficient Off-line Electronic Cash System Based On The Representation Problem},
    institution = {},
    year = {1993}
}



@inproceedings{DBLP:conf/focs/BrakerskiV11,
  author    = {Zvika Brakerski and
               Vinod Vaikuntanathan},
  title     = {Efficient Fully Homomorphic Encryption from (Standard) {LWE}},
  booktitle = {{IEEE} 52nd Annual Symposium on Foundations of Computer Science, {FOCS}
               2011, Palm Springs, CA, USA, October 22-25, 2011},
  year      = {2011},
  pages     = {97--106},
  crossref  = {DBLP:conf/focs/2011},
  url       = {http://dx.doi.org/10.1109/FOCS.2011.12},
  doi       = {10.1109/FOCS.2011.12},
  timestamp = {Sun, 21 Sep 2014 01:13:47 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/focs/BrakerskiV11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/focs/2011,
  editor    = {Rafail Ostrovsky},
  title     = {{IEEE} 52nd Annual Symposium on Foundations of Computer Science, {FOCS}
               2011, Palm Springs, CA, USA, October 22-25, 2011},
  year      = {2011},
  publisher = {{IEEE}},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6108120},
  isbn      = {978-1-4577-1843-4},
  timestamp = {Sun, 21 Sep 2014 01:13:47 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/focs/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}


@article{DBLP:journals/iacr/BarakW08,
  author    = {Boaz Barak and
               Avi Wigderson},
  title     = {Public Key Cryptography from Different Assumptions},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2008},
  pages     = {335},
  year      = {2008},
  url       = {http://eprint.iacr.org/2008/335},
  timestamp = {Mon, 05 Dec 2011 18:05:46 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/BarakW08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}



@inproceedings{
DBLP:conf/asiacrypt/BonehW13,
  author    = {Dan Boneh and
               Brent Waters},
  title     = {Constrained Pseudorandom Functions and Their Applications},
  booktitle = {ASIACRYPT (2)},
  year      = {2013},
  pages     = {280-300},
  ee        = {http://dx.doi.org/10.1007/978-3-642-42045-0_15},
  crossref  = {DBLP:conf/asiacrypt/2013-2},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{DBLP:conf/asiacrypt/2013-2,
  editor    = {Kazue Sako and
               Palash Sarkar},
  title     = {Advances in Cryptology - ASIACRYPT 2013 - 19th International
               Conference on the Theory and Application of Cryptology and
               Information Security, Bengaluru, India, December 1-5, 2013,
               Proceedings, Part II},
  booktitle = {ASIACRYPT (2)},
  publisher = {Springer},
  series    = {Lecture Notes in Computer Science},
  volume    = {8270},
  year      = {2013},
  isbn      = {978-3-642-42044-3},
  ee        = {http://dx.doi.org/10.1007/978-3-642-42045-0},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}




@inproceedings{
DBLP:conf/crypto/BonehZ14,
  author    = {Dan Boneh and
               Mark Zhandry},
  title     = {Multiparty Key Exchange, Efficient Traitor Tracing, and
               More from Indistinguishability Obfuscation},
  booktitle = {CRYPTO (1)},
  year      = {2014},
  pages     = {480-499},
  ee        = {http://dx.doi.org/10.1007/978-3-662-44371-2_27},
  crossref  = {DBLP:conf/crypto/2014-1},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{DBLP:conf/crypto/2014-1,
  editor    = {Juan A. Garay and
               Rosario Gennaro},
  title     = {Advances in Cryptology - CRYPTO 2014 - 34th Annual Cryptology
               Conference, Santa Barbara, CA, USA, August 17-21, 2014,
               Proceedings, Part I},
  booktitle = {CRYPTO (1)},
  publisher = {Springer},
  series    = {Lecture Notes in Computer Science},
  volume    = {8616},
  year      = {2014},
  isbn      = {978-3-662-44370-5},
  ee        = {http://dx.doi.org/10.1007/978-3-662-44371-2},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}


@inproceedings{DBLP:conf/crypto/Canetti97,
  author    = {Ran Canetti},
  title     = {Towards Realizing Random Oracles: Hash Functions That Hide All Partial
               Information},
  booktitle = {Advances in Cryptology - {CRYPTO} '97, 17th Annual International Cryptology
               Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings},
  pages     = {455--469},
  year      = {1997},
  crossref  = {DBLP:conf/crypto/1997},
  url       = {http://dx.doi.org/10.1007/BFb0052255},
  doi       = {10.1007/BFb0052255},
  timestamp = {Fri, 18 Sep 2009 11:29:41 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/Canetti97},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/1997,
  editor    = {Burton S. Kaliski Jr.},
  title     = {Advances in Cryptology - {CRYPTO} '97, 17th Annual International Cryptology
               Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1294},
  publisher = {Springer},
  year      = {1997},
  isbn      = {3-540-63384-7},
  timestamp = {Thu, 03 Jan 2002 11:55:47 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/1997},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}

@inproceedings{
DBLP:conf/crypto/CanettiDNO97,
  author    = {Ran Canetti and
               Cynthia Dwork and
               Moni Naor and
               Rafail Ostrovsky},
  title     = {Deniable Encryption},
  booktitle = {CRYPTO},
  year      = {1997},
  pages     = {90-104},
}



@inproceedings{
DBLP:conf/stoc/CanettiGH98,
  author    = {Ran Canetti and
               Oded Goldreich and
               Shai Halevi},
  title     = {The Random Oracle Methodology, Revisited (Preliminary Version)},
  booktitle = {STOC},
  year      = {1998},
  pages     = {209-218},
  ee        = {http://doi.acm.org/10.1145/276698.276741},
  crossref  = {DBLP:conf/stoc/1998},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{DBLP:conf/stoc/1998,
  editor    = {Jeffrey Scott Vitter},
  title     = {Proceedings of the Thirtieth Annual ACM Symposium on the
               Theory of Computing, Dallas, Texas, USA, May 23-26, 1998},
  booktitle = {STOC},
  publisher = {ACM},
  year      = {1998},
  isbn      = {0-89791-962-9},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}



@article{
Church36,
  author    = {Alonzo Church},
  title     = {A. Church. An Unsolvable Problem of Elementary Number Theory},
  journal   = {American Journal of Mathematics},
  volume    = {58},
  number    = {2},
  year      = {1936},
  pages     = {345-363},
}

@article{DBLP:journals/corr/CohnGK14,
  author    = {Henry Cohn and
               Shafi Goldwasser and
               Yael Tauman Kalai},
  title     = {The impossibility of obfuscation with a universal simulator},
  journal   = {CoRR},
  volume    = {abs/1401.0348},
  year      = {2014},
  ee        = {http://arxiv.org/abs/1401.0348},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}



@inproceedings{DBLP:conf/crypto/CoronLT13,
  author    = {Jean-S{\'e}bastien Coron and
               Tancr{\`e}de Lepoint and
               Mehdi Tibouchi},
  title     = {Practical Multilinear Maps over the Integers},
  booktitle = {CRYPTO (1)},
  year      = {2013},
  pages     = {476-493},
  ee        = {http://dx.doi.org/10.1007/978-3-642-40041-4_26},
  crossref  = {DBLP:conf/crypto/2013-1},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{DBLP:conf/crypto/2013-1,
  editor    = {Ran Canetti and
               Juan A. Garay},
  title     = {Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology
               Conference, Santa Barbara, CA, USA, August 18-22, 2013.
               Proceedings, Part I},
  booktitle = {CRYPTO (1)},
  publisher = {Springer},
  series    = {Lecture Notes in Computer Science},
  volume    = {8042},
  year      = {2013},
  isbn      = {978-3-642-40040-7},
  ee        = {http://dx.doi.org/10.1007/978-3-642-40041-4},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}


@inproceedings{
CPS08,
  author    = {Jean-S{\'e}bastien Coron and
               Jacques Patarin and
               Yannick Seurin},
  title     = {The Random Oracle Model and the Ideal Cipher Model Are Equivalent},
  booktitle = {CRYPTO},
  year      = {2008},
  pages     = {1-20},
}


@inproceedings{DBLP:conf/tcc/CanettiRV10,
  author    = {Ran Canetti and
               Guy N. Rothblum and
               Mayank Varia},
  title     = {Obfuscation of Hyperplane Membership},
  booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
               2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  pages     = {72--89},
  year      = {2010},
  crossref  = {DBLP:conf/tcc/2010},
  url       = {http://dx.doi.org/10.1007/978-3-642-11799-2_5},
  doi       = {10.1007/978-3-642-11799-2_5},
  timestamp = {Mon, 08 Feb 2010 21:27:09 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/tcc/CanettiRV10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/tcc/2010,
  editor    = {Daniele Micciancio},
  title     = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
               2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5978},
  publisher = {Springer},
  year      = {2010},
  url       = {http://dx.doi.org/10.1007/978-3-642-11799-2},
  doi       = {10.1007/978-3-642-11799-2},
  isbn      = {978-3-642-11798-5},
  timestamp = {Mon, 08 Feb 2010 21:26:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/tcc/2010},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}



@inproceedings{
DBLP:conf/crypto/Damgard91,
  author    = {Ivan Damg{\aa}rd},
  title     = {Towards Practical Public Key Systems Secure Against Chosen
               Ciphertext Attacks},
  booktitle = {CRYPTO},
  year      = {1991},
  pages     = {445-456},
}


@article{diaconism89,
  author = {Diaconis, Persi and Mosteller, Frederick},
  journal = {Journal of the American Statistical Association},
  pages = {853-861},
  title = {Methods for studying coincidences},
  volume = 84,
  year = 1989
}


@inproceedings{
DBLP:conf/eurocrypt/DijkGHV10,
  author    = {Marten van Dijk and
               Craig Gentry and
               Shai Halevi and
               Vinod Vaikuntanathan},
  title     = {Fully Homomorphic Encryption over the Integers},
  booktitle = {EUROCRYPT},
  year      = {2010},
  pages     = {24-43},
  ee        = {http://dx.doi.org/10.1007/978-3-642-13190-5_2},
  crossref  = {DBLP:conf/eurocrypt/2010},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{DBLP:conf/eurocrypt/2010,
  editor    = {Henri Gilbert},
  title     = {Advances in Cryptology - EUROCRYPT 2010, 29th Annual International
               Conference on the Theory and Applications of Cryptographic
               Techniques, French Riviera, May 30 - June 3, 2010. Proceedings},
  booktitle = {EUROCRYPT},
  publisher = {Springer},
  series    = {Lecture Notes in Computer Science},
  volume    = {6110},
  year      = {2010},
  isbn      = {978-3-642-13189-9},
  ee        = {http://dx.doi.org/10.1007/978-3-642-13190-5},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}



@inproceedings{DBLP:conf/focs/DworkNRS99,
  author    = {Cynthia Dwork and
               Moni Naor and
               Omer Reingold and
               Larry J. Stockmeyer},
  title     = {Magic Functions},
  booktitle = {FOCS},
  year      = {1999},
  pages     = {523-534},
  ee        = {http://doi.ieeecomputersociety.org/10.1109/SFFCS.1999.814626},
  crossref  = {DBLP:conf/focs/1999},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{DBLP:conf/focs/1999,
  title     = {40th Annual Symposium on Foundations of Computer Science,
               FOCS '99, 17-18 October, 1999, New York, NY, USA},
  booktitle = {FOCS},
  publisher = {IEEE Computer Society},
  year      = {1999},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}


@article{
DNS04,
  author    = {Cynthia Dwork and
               Moni Naor and
               Amit Sahai},
  title     = {Concurrent zero-knowledge},
  journal   = {J. ACM},
  volume    = {51},
  number    = {6},
  year      = {2004},
  pages     = {851-898},
}


@inproceedings{DBLP:conf/crypto/DodisOP05,
  author    = {Yevgeniy Dodis and
               Roberto Oliveira and
               Krzysztof Pietrzak},
  title     = {On the Generic Insecurity of the Full Domain Hash},
  booktitle = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 14-18,
               2005, Proceedings},
  pages     = {449--466},
  year      = {2005},
  crossref  = {DBLP:conf/crypto/2005},
  url       = {http://dx.doi.org/10.1007/11535218_27},
  doi       = {10.1007/11535218_27},
  timestamp = {Fri, 04 Nov 2005 09:54:52 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/DodisOP05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/2005,
  editor    = {Victor Shoup},
  title     = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 14-18,
               2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3621},
  publisher = {Springer},
  year      = {2005},
  isbn      = {3-540-28114-2},
  timestamp = {Fri, 04 Nov 2005 09:54:52 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/2005},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}


@inproceedings{DBLP:conf/tcc/DodisRV12,
  author    = {Yevgeniy Dodis and
               Thomas Ristenpart and
               Salil P. Vadhan},
  title     = {Randomness Condensers for Efficiently Samplable, Seed-Dependent
               Sources},
  booktitle = {TCC},
  year      = {2012},
  pages     = {618-635},
}


@inproceedings{
EY80,
  author    = {Shimon Even and
               Yacov Yacobi},
  title     = {Cryptocomplexity and NP-Completeness},
  booktitle = {ICALP},
  year      = {1980},
  pages     = {195-207},
}


@inproceedings{
FGLSS91,
  author    = {Uriel Feige and
               Shafi Goldwasser and
               L{\'a}szl{\'o} Lov{\'a}sz and
               Shmuel Safra and
               Mario Szegedy},
  title     = {Approximating Clique is Almost NP-Complete (Preliminary
               Version)},
  booktitle = {FOCS},
  year      = {1991},
  pages     = {2-12},
}


@inproceedings{DBLP:conf/pkc/FreireHKP13,
  author    = {Eduarda S. V. Freire and
               Dennis Hofheinz and
               Eike Kiltz and
               Kenneth G. Paterson},
  title     = {Non-Interactive Key Exchange},
  booktitle = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference
               on Practice and Theory in Public-Key Cryptography, Nara, Japan, February
               26 - March 1, 2013. Proceedings},
  year      = {2013},
  pages     = {254-271},
  crossref  = {DBLP:conf/pkc/2013},
  url       = {http://dx.doi.org/10.1007/978-3-642-36362-7_17},
  doi       = {10.1007/978-3-642-36362-7_17},
  timestamp = {Thu, 04 Sep 2014 23:48:45 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/pkc/FreireHKP13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/pkc/2013,
  editor    = {Kaoru Kurosawa and
               Goichiro Hanaoka},
  title     = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference
               on Practice and Theory in Public-Key Cryptography, Nara, Japan, February
               26 - March 1, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  year      = {2013},
  volume    = {7778},
  publisher = {Springer},
  url       = {http://dx.doi.org/10.1007/978-3-642-36362-7},
  doi       = {10.1007/978-3-642-36362-7},
  isbn      = {978-3-642-36361-0},
  timestamp = {Thu, 04 Sep 2014 23:48:45 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/pkc/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}



@inproceedings{
FK97,
  author    = {Uriel Feige and
               Joe Kilian},
  title     = {Making Games Short (Extended Abstract)},
  booktitle = {STOC},
  year      = {1997},
  pages     = {506-516},
}

@inproceedings{
FKS95,
  author    = {Joan Feigenbaum and
               Daphne Koller and
               Peter W. Shor},
  title     = {A Game-Theoretic Classification of Interactive Complexity
               Classes},
  booktitle = {Structure in Complexity Theory Conference},
  year      = {1995},
  pages     = {227-237},
}

@article{
FLS99,
  author    = {Uriel Feige and
               Dror Lapidot and
               Adi Shamir},
  title     = {Multiple Noninteractive Zero Knowledge Proofs Under General Assumptions},
  journal   = {SIAM J. Comput., 29},
  year      = {1999},
}

@article{
FRS88,
  author    = {Lance Fortnow and
               John Rompel and
               Michael Sipser},
  title     = {On the Power of Multi-Prover Interactive Protocols},
  journal   = {3rd IEEE Symp. on Structure in Complexity Theory},
  year      = {1988},
  pages     = {156-161},
}

@inproceedings{
FS86,
  author    = {Amos Fiat and
               Adi Shamir},
  title     = {How to Prove Yourself: Practical Solutions to Identification
               and Signature Problems},
  booktitle = {CRYPTO},
  year      = {1986},
  pages     = {186-194},
}


@inproceedings{DBLP:conf/ctrsa/Fischlin08,
  author    = {Marc Fischlin},
  title     = {Security of NMACand HMACBased on Non-malleability},
  booktitle = {CT-RSA},
  year      = {2008},
  pages     = {138-154},
  ee        = {http://dx.doi.org/10.1007/978-3-540-79263-5_9},
  crossref  = {DBLP:conf/ctrsa/2008},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{DBLP:conf/ctrsa/2008,
  editor    = {Tal Malkin},
  title     = {Topics in Cryptology - CT-RSA 2008, The Cryptographers'
               Track at the RSA Conference 2008, San Francisco, CA, USA,
               April 8-11, 2008. Proceedings},
  booktitle = {CT-RSA},
  publisher = {Springer},
  series    = {Lecture Notes in Computer Science},
  volume    = {4964},
  year      = {2008},
  isbn      = {978-3-540-79262-8},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}



@article{
FS88,
  author    = {Lance Fortnow and
               Michael Sipser},
  title     = {Are There Interactive Protocols for CO-NP Languages?},
  journal   = {Inf. Process. Lett.},
  volume    = {28},
  number    = {5},
  year      = {1988},
  pages     = {249-251},
}

@article{
FS99,
  author    = {Yoav Freund and Robert E. Schapire},
  title     = {Adaptive Game Playing Using Multiplicative Weights},
  journal   = {Games and Economic Behavior},
  volume    = {29},
  number    = {1},
  year      = {1999},
  pages     = {79-103},
}

@inproceedings{
FSUV12,
  author    = {Bill Fefferman and
               Ronen Shaltiel and
               Christopher Umans and
               Emanuele Viola},
  title     = {On beating the hybrid argument},
  booktitle = {ITCS},
  year      = {2012},
  pages     = {468-483},
}


@inproceedings{DBLP:conf/eurocrypt/GargGH13,
  author    = {Sanjam Garg and
               Craig Gentry and
               Shai Halevi},
  title     = {Candidate Multilinear Maps from Ideal Lattices},
  booktitle = {EUROCRYPT},
  year      = {2013},
  pages     = {1-17},
  ee        = {http://dx.doi.org/10.1007/978-3-642-38348-9_1},
  crossref  = {DBLP:conf/eurocrypt/2013},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{DBLP:conf/eurocrypt/2013,
  editor    = {Thomas Johansson and
               Phong Q. Nguyen},
  title     = {Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International
               Conference on the Theory and Applications of Cryptographic
               Techniques, Athens, Greece, May 26-30, 2013. Proceedings},
  booktitle = {EUROCRYPT},
  publisher = {Springer},
  series    = {Lecture Notes in Computer Science},
  volume    = {7881},
  year      = {2013},
  isbn      = {978-3-642-38347-2, 978-3-642-38348-9},
  ee        = {http://dx.doi.org/10.1007/978-3-642-38348-9},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}



@inproceedings{DBLP:conf/stoc/GargGSW13,
  author    = {Sanjam Garg and
               Craig Gentry and
               Amit Sahai and
               Brent Waters},
  title     = {Witness encryption and its applications},
  booktitle = {STOC},
  year      = {2013},
  pages     = {467-476},
  ee        = {http://doi.acm.org/10.1145/2488608.2488667},
  crossref  = {DBLP:conf/stoc/2013},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{DBLP:conf/stoc/2013,
  editor    = {Dan Boneh and
               Tim Roughgarden and
               Joan Feigenbaum},
  title     = {Symposium on Theory of Computing Conference, STOC'13, Palo
               Alto, CA, USA, June 1-4, 2013},
  booktitle = {STOC},
  publisher = {ACM},
  year      = {2013},
  isbn      = {978-1-4503-2029-0},
  ee        = {http://dl.acm.org/citation.cfm?id=2488608},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}


@inproceedings{
DBLP:conf/focs/GargGH0SW13,
  author    = {Sanjam Garg and
               Craig Gentry and
               Shai Halevi and
               Mariana Raykova and
               Amit Sahai and
               Brent Waters},
  title     = {Candidate Indistinguishability Obfuscation and Functional
               Encryption for all Circuits},
  booktitle = {FOCS},
  year      = {2013},
  pages     = {40-49},
  ee        = {http://doi.ieeecomputersociety.org/10.1109/FOCS.2013.13},
  crossref  = {DBLP:conf/focs/2013},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{DBLP:conf/focs/2013,
  title     = {54th Annual IEEE Symposium on Foundations of Computer Science,
               FOCS 2013, 26-29 October, 2013, Berkeley, CA, USA},
  booktitle = {FOCS},
  publisher = {IEEE Computer Society},
  year      = {2013},
  ee        = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6685222},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}



@inproceedings{DBLP:conf/crypto/GargGHW14,
  author    = {Sanjam Garg and
               Craig Gentry and
               Shai Halevi and
               Daniel Wichs},
  title     = {On the Implausibility of Differing-Inputs Obfuscation and
               Extractable Witness Encryption with Auxiliary Input},
  booktitle = {CRYPTO (1)},
  year      = {2014},
  pages     = {518-535},
  ee        = {http://dx.doi.org/10.1007/978-3-662-44371-2_29},
  crossref  = {DBLP:conf/crypto/2014-1},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{DBLP:conf/crypto/2014-1,
  editor    = {Juan A. Garay and
               Rosario Gennaro},
  title     = {Advances in Cryptology - CRYPTO 2014 - 34th Annual Cryptology
               Conference, Santa Barbara, CA, USA, August 17-21, 2014,
               Proceedings, Part I},
  booktitle = {CRYPTO (1)},
  publisher = {Springer},
  series    = {Lecture Notes in Computer Science},
  volume    = {8616},
  year      = {2014},
  isbn      = {978-3-662-44370-5},
  ee        = {http://dx.doi.org/10.1007/978-3-662-44371-2},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}


@inproceedings{DBLP:conf/stoc/Gentry09,
  author    = {Craig Gentry},
  title     = {Fully homomorphic encryption using ideal lattices},
  booktitle = {STOC},
  year      = {2009},
  pages     = {169-178},
  ee        = {http://doi.acm.org/10.1145/1536414.1536440},
  crossref  = {DBLP:conf/stoc/2009},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{DBLP:conf/stoc/2009,
  editor    = {Michael Mitzenmacher},
  title     = {Proceedings of the 41st Annual ACM Symposium on Theory of
               Computing, STOC 2009, Bethesda, MD, USA, May 31 - June 2,
               2009},
  booktitle = {STOC},
  publisher = {ACM},
  year      = {2009},
  isbn      = {978-1-60558-506-2},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}


@misc{cryptoeprint:2014:309,
    author = {Craig Gentry and Allison Lewko and Amit Sahai and Brent Waters},
    title = {Indistinguishability Obfuscation from the Multilinear Subgroup Elimination Assumption},
    howpublished = {Cryptology ePrint Archive, Report 2014/309},
    year = {2014},
    note = {\url{http://eprint.iacr.org/}},
}

@misc{cryptoeprint:2014:273,
    author = {Craig Gentry and Allison Bishop Lewko and Brent Waters},
    title = {Witness Encryption from Instance Independent Assumptions},
    howpublished = {Cryptology ePrint Archive, Report 2014/273},
    year = {2014},
    note = {\url{http://eprint.iacr.org/}},
}

@inproceedings{DBLP:conf/stoc/GentryPV08,
  author    = {Craig Gentry and
               Chris Peikert and
               Vinod Vaikuntanathan},
  title     = {Trapdoors for hard lattices and new cryptographic constructions},
  booktitle = {STOC},
  year      = {2008},
  pages     = {197-206},
}



@inproceedings{GMW86,
  author    = {Oded Goldreich and
               Silvio Micali and
               Avi Wigderson},
  title     = {Proofs that Yield Nothing But their Validity and a Methodology
               of Cryptographic Protocol Design (Extended Abstract)},
  booktitle = {FOCS},
  year      = {1986},
  pages     = {174-187},
}

@book{
Goldreich01,
  author    = {Oded Goldreich},
  title     = {The Foundations of Cryptography - Volume 1, Basic Techniques},
  publisher = {Cambridge University Press},
  year      = {2001},
  isbn      = {0-521-79172-3},
}


@article{
DBLP:journals/iacr/Goldreich02,
  author    = {Oded Goldreich},
  title     = {The GGM Construction does NOT yield Correlation Intractable
               Function Ensembles},
  journal   = {IACR Cryptology ePrint Archive},
  volume    = {2002},
  year      = {2002},
  pages     = {110},
  ee        = {http://eprint.iacr.org/2002/110},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@book{
Goldreich04,
  author    = {Oded Goldreich},
  title     = {The Foundations of Cryptography - Volume 2, Basic Applications},
  publisher = {Cambridge University Press},
  year      = {2004},
  isbn      = {0-521-83084-2},
}

@article{
Goldreich08,
  author    = {Oded Goldreich},
  title     = {Probabilistic Proof Systems: A Primer},
  journal   = {Foundations and Trends in Theoretical Computer Science},
  volume    = {3},
  number    = {1},
  year      = {2008},
  pages     = {1-91},
}



@incollection{
DBLP:books/sp/goldreich2011/Goldreich11d,
  author    = {Oded Goldreich},
  title     = {The GGM Construction Does NOT Yield Correlation Intractable
               Function Ensembles},
  booktitle = {Studies in Complexity and Cryptography},
  year      = {2011},
  pages     = {98-108},
  ee        = {http://dx.doi.org/10.1007/978-3-642-22670-0_12},
  crossref  = {DBLP:books/sp/goldreich11},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@book{DBLP:books/sp/goldreich11,
  editor    = {Oded Goldreich},
  title     = {Studies in Complexity and Cryptography. Miscellanea on the
               Interplay between Randomness and Computation - In Collaboration
               with Lidor Avigad, Mihir Bellare, Zvika Brakerski, Shafi
               Goldwasser, Shai Halevi, Tali Kaufman, Leonid Levin, Noam
               Nisan, Dana Ron, Madhu Sudan, Luca Trevisan, Salil Vadhan,
               Avi Wigderson, David Zuckerman},
  booktitle = {Studies in Complexity and Cryptography},
  publisher = {Springer},
  series    = {Lecture Notes in Computer Science},
  volume    = {6650},
  year      = {2011},
  isbn      = {978-3-642-22669-4},
  ee        = {http://dx.doi.org/10.1007/978-3-642-22670-0},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}




@article{
GG00,
  author    = {Oded Goldreich and
               Shafi Goldwasser},
  title     = {On the Limits of Nonapproximability of Lattice Problems},
  journal   = {J. Comput. Syst. Sci.},
  volume    = {60},
  number    = {3},
  year      = {2000},
  pages     = {540-563},
}



@article{Goldreich-Goldwasser-Halevi96,
  author    = {Oded Goldreich and
               Shafi Goldwasser and
               Shai Halevi},
  title     = {Collision-Free Hashing from Lattice Problems},
  journal   = {Electronic Colloquium on Computational Complexity (ECCC)},
  volume    = {3},
  number    = {42},
  year      = {1996},
}


@inproceedings{DBLP:conf/focs/GoldreichGM84,
  author    = {Oded Goldreich and
               Shafi Goldwasser and
               Silvio Micali},
  title     = {How to Construct Random Functions (Extended Abstract)},
  booktitle = {FOCS},
  year      = {1984},
  pages     = {464-479},
  ee        = {http://doi.ieeecomputersociety.org/10.1109/SFCS.1984.715949},
  crossref  = {DBLP:conf/focs/FOCS25},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{DBLP:conf/focs/FOCS25,
  title     = {25th Annual Symposium on Foundations of Computer Science,
               West Palm Beach, Florida, USA, 24-26 October 1984},
  booktitle = {FOCS},
  publisher = {IEEE Computer Society},
  year      = {1984},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}


@article{DBLP:journals/jacm/GoldreichGM86,
  author    = {Oded Goldreich and
               Shafi Goldwasser and
               Silvio Micali},
  title     = {How to construct random functions},
  journal   = {J. ACM},
  volume    = {33},
  number    = {4},
  year      = {1986},
  pages     = {792-807},
}



@inproceedings{
DBLP:conf/focs/GoldwasserK03,
  author    = {Shafi Goldwasser and
               Yael Tauman Kalai},
  title     = {On the (In)security of the Fiat-Shamir Paradigm},
  booktitle = {FOCS},
  year      = {2003},
  pages     = {102-113},
  ee        = {http://doi.ieeecomputersociety.org/10.1109/SFCS.2003.1238185},
  crossref  = {DBLP:conf/focs/2003},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{DBLP:conf/focs/2003,
  title     = {44th Symposium on Foundations of Computer Science (FOCS
               2003), 11-14 October 2003, Cambridge, MA, USA, Proceedings},
  booktitle = {FOCS},
  publisher = {IEEE Computer Society},
  year      = {2003},
  isbn      = {0-7695-2040-5},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}



@inproceedings{
DBLP:conf/focs/GoldwasserK05,
  author    = {Shafi Goldwasser and
               Yael Tauman Kalai},
  title     = {On the Impossibility of Obfuscation with Auxiliary Input},
  booktitle = {FOCS},
  year      = {2005},
  pages     = {553-562},
  ee        = {http://doi.ieeecomputersociety.org/10.1109/SFCS.2005.60},
  crossref  = {DBLP:conf/focs/2005},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{DBLP:conf/focs/2005,
  title     = {46th Annual IEEE Symposium on Foundations of Computer Science
               (FOCS 2005), 23-25 October 2005, Pittsburgh, PA, USA, Proceedings},
  booktitle = {FOCS},
  publisher = {IEEE Computer Society},
  year      = {2005},
  isbn      = {0-7695-2468-0},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}



@article{DBLP:journals/siamcomp/GoldreichK96,
  author    = {Oded Goldreich and
               Hugo Krawczyk},
  title     = {On the Composition of Zero-Knowledge Proof Systems},
  journal   = {SIAM J. Comput.},
  volume    = {25},
  number    = {1},
  year      = {1996},
  pages     = {169-192},
}


@article{
DBLP:journals/jcss/GoldwasserM84,
  author    = {Shafi Goldwasser and
               Silvio Micali},
  title     = {Probabilistic Encryption},
  journal   = {J. Comput. Syst. Sci.},
  volume    = {28},
  number    = {2},
  year      = {1984},
  pages     = {270-299},
}



@inproceedings{
GMR85,
  author    = {Shafi Goldwasser and
               Silvio Micali and
               Charles Rackoff},
  title     = {The Knowledge Complexity of Interactive Proof-Systems (Extended
               Abstract)},
  booktitle = {STOC},
  year      = {1985},
  pages     = {291-304},
}

@article{
GMR88,
  author    = {Shafi Goldwasser and
               Silvio Micali and
               Ronald L. Rivest},
  title     = {A Digital Signature Scheme Secure Against Adaptive Chosen-Message
               Attacks},
  journal   = {SIAM J. Comput.},
  volume    = {17},
  number    = {2},
  year      = {1988},
  pages     = {281-308},
}


@article{DBLP:journals/eccc/ECCC-TR99-002,
  author    = {Oded Goldreich and
               Daniele Micciancio and
               Shmuel Safra and
               Jean-Pierre Seifert},
  title     = {Approximating Shortest Lattice Vectors is Not Harder Than
               Approximating Closest Lattice Vectors},
  journal   = {Electronic Colloquium on Computational Complexity (ECCC)},
  volume    = {6},
  number    = {2},
  year      = {1999},
  ee        = {http://eccc.hpi-web.de/eccc-reports/1999/TR99-002/index.html},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}



@inproceedings{DBLP:conf/tcc/GoldwasserR07,
  author    = {Shafi Goldwasser and
               Guy N. Rothblum},
  title     = {On Best-Possible Obfuscation},
  booktitle = {TCC},
  year      = {2007},
  pages     = {194-213},
}


@inproceedings{
GS86,
  author    = {Shafi Goldwasser and
               Michael Sipser},
  title     = {Private Coins versus Public Coins in Interactive Proof Systems},
  booktitle = {STOC},
  year      = {1986},
  pages     = {59-68},
}


%indexH


@inproceedings{DBLP:conf/tcc/HaitnerH09,
  author    = {Iftach Haitner and
               Thomas Holenstein},
  title     = {On the (Im)Possibility of Key Dependent Encryption},
  booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC}
               2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
  pages     = {202--219},
  year      = {2009},
  crossref  = {DBLP:conf/tcc/2009},
  url       = {http://dx.doi.org/10.1007/978-3-642-00457-5_13},
  doi       = {10.1007/978-3-642-00457-5_13},
  timestamp = {Mon, 23 Feb 2009 12:30:17 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/tcc/HaitnerH09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/tcc/2009,
  editor    = {Omer Reingold},
  title     = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC}
               2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5444},
  publisher = {Springer},
  year      = {2009},
  url       = {http://dx.doi.org/10.1007/978-3-642-00457-5},
  doi       = {10.1007/978-3-642-00457-5},
  isbn      = {978-3-642-00456-8},
  timestamp = {Mon, 23 Feb 2009 12:28:21 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/tcc/2009},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}



@article{
HILL99,
  author    = {Johan H{\aa}stad and
               Russell Impagliazzo and
               Leonid A. Levin and
               Michael Luby},
  title     = {A Pseudorandom Generator from any One-way Function},
  journal   = {SIAM J. Comput.},
  volume    = {28},
  number    = {4},
  year      = {1999},
  pages     = {1364-1396},
}


@misc{cryptoeprint:2014:507,
    author = {Dennis Hofheinz and Tibor Jager and Dakshita Khurana and Amit Sahai and Brent Waters and Mark Zhandry},
    title = {How to Generate and use Universal Parameters},
    howpublished = {Cryptology ePrint Archive, Report 2014/507},
    year = {2014},
    note = {\url{http://eprint.iacr.org/}},
}



@inproceedings{
Holenstein05,
  author    = {Thomas Holenstein},
  title     = {Key agreement from weak bit agreement},
  booktitle = {STOC},
  year      = {2005},
  pages     = {664-673},
}


@inproceedings{
DBLP:conf/asiacrypt/Hada00,
  author    = {Satoshi Hada},
  title     = {Zero-Knowledge and Code Obfuscation},
  booktitle = {ASIACRYPT},
  year      = {2000},
  pages     = {443-457},
  ee        = {http://dx.doi.org/10.1007/3-540-44448-3_34},
  crossref  = {DBLP:conf/asiacrypt/2000},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{DBLP:conf/asiacrypt/2000,
  editor    = {Tatsuaki Okamoto},
  title     = {Advances in Cryptology - ASIACRYPT 2000, 6th International
               Conference on the Theory and Application of Cryptology and
               Information Security, Kyoto, Japan, December 3-7, 2000,
               Proceedings},
  booktitle = {ASIACRYPT},
  publisher = {Springer},
  series    = {Lecture Notes in Computer Science},
  volume    = {1976},
  year      = {2000},
  isbn      = {3-540-41404-5},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}



@misc{cryptoeprint:2014:521,
    author = {Susan Hohenberger and Venkata Koppula and Brent Waters},
    title = {Adaptively Secure Puncturable Pseudorandom Functions in the Standard Model},
    howpublished = {Cryptology ePrint Archive, Report 2014/521},
    year = {2014},
%    note = {\url{http://eprint.iacr.org/}},
}


@inproceedings{
DBLP:conf/crypto/HohenbergerSW13,
  author    = {Susan Hohenberger and
               Amit Sahai and
               Brent Waters},
  title     = {Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based
               Aggregate Signatures},
  booktitle = {CRYPTO (1)},
  year      = {2013},
  pages     = {494-512},
  ee        = {http://dx.doi.org/10.1007/978-3-642-40041-4_27},
  crossref  = {DBLP:conf/crypto/2013-1},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{DBLP:conf/crypto/2013-1,
  editor    = {Ran Canetti and
               Juan A. Garay},
  title     = {Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology
               Conference, Santa Barbara, CA, USA, August 18-22, 2013.
               Proceedings, Part I},
  booktitle = {CRYPTO (1)},
  publisher = {Springer},
  series    = {Lecture Notes in Computer Science},
  volume    = {8042},
  year      = {2013},
  isbn      = {978-3-642-40040-7},
  ee        = {http://dx.doi.org/10.1007/978-3-642-40041-4},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}


@inproceedings{
DBLP:conf/eurocrypt/HohenbergerSW14,
  author    = {Susan Hohenberger and
               Amit Sahai and
               Brent Waters},
  title     = {Replacing a Random Oracle: Full Domain Hash from Indistinguishability
               Obfuscation},
  booktitle = {EUROCRYPT},
  year      = {2014},
  pages     = {201-220},
  ee        = {http://dx.doi.org/10.1007/978-3-642-55220-5_12},
  crossref  = {DBLP:conf/eurocrypt/2014},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{DBLP:conf/eurocrypt/2014,
  editor    = {Phong Q. Nguyen and
               Elisabeth Oswald},
  title     = {Advances in Cryptology - EUROCRYPT 2014 - 33rd Annual International
               Conference on the Theory and Applications of Cryptographic
               Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings},
  booktitle = {EUROCRYPT},
  publisher = {Springer},
  series    = {Lecture Notes in Computer Science},
  volume    = {8441},
  year      = {2014},
  isbn      = {978-3-642-55219-9},
  ee        = {http://dx.doi.org/10.1007/978-3-642-55220-5},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}



@inproceedings{DBLP:conf/pkc/HadaT99,
  author    = {Satoshi Hada and
               Toshiaki Tanaka},
  title     = {A Relationship between One-Wayness and Correlation Intractability},
  booktitle = {Public Key Cryptography},
  year      = {1999},
  pages     = {82-96},
  ee        = {http://dx.doi.org/10.1007/3-540-49162-7_7},
  crossref  = {DBLP:conf/pkc/1999},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{DBLP:conf/pkc/1999,
  editor    = {Hideki Imai and
               Yuliang Zheng},
  title     = {Public Key Cryptography, Second International Workshop on
               Practice and Theory in Public Key Cryptography, PKC '99,
               Kamakura, Japan, March 1-3, 1999, Proceedings},
  booktitle = {Public Key Cryptography},
  publisher = {Springer},
  series    = {Lecture Notes in Computer Science},
  volume    = {1560},
  year      = {1999},
  isbn      = {3-540-65644-8},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}



@article{DBLP:journals/ieicet/HadaT06,
  author    = {Satoshi Hada and
               Toshiaki Tanaka},
  title     = {Zero-Knowledge and Correlation Intractability},
  journal   = {IEICE Transactions},
  volume    = {89-A},
  number    = {10},
  year      = {2006},
  pages     = {2894-2905},
  ee        = {http://dx.doi.org/10.1093/ietfec/e89-a.10.2894},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}


@inproceedings{
DBLP:conf/tcc/HaleviMR08,
  author    = {Shai Halevi and
               Steven Myers and
               Charles Rackoff},
  title     = {On Seed-Incompressible Functions},
  booktitle = {TCC},
  year      = {2008},
  pages     = {19-36},
  ee        = {http://dx.doi.org/10.1007/978-3-540-78524-8_2},
  crossref  = {DBLP:conf/tcc/2008},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{DBLP:conf/tcc/2008,
  editor    = {Ran Canetti},
  title     = {Theory of Cryptography, Fifth Theory of Cryptography Conference,
               TCC 2008, New York, USA, March 19-21, 2008},
  booktitle = {TCC},
  publisher = {Springer},
  series    = {Lecture Notes in Computer Science},
  volume    = {4948},
  year      = {2008},
  isbn      = {978-3-540-78523-1},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}


@article{
HW01,
  author    = {Mark Herbster and
               Manfred K. Warmuth},
  title     = {Tracking the Best Linear Predictor},
  journal   = {Journal of Machine Learning Research},
  volume    = {1},
  year      = {2001},
  pages     = {281-309},
}

@inproceedings{
DBLP:conf/coco/Impagliazzo95,
  author    = {Russell Impagliazzo},
  title     = {A Personal View of Average-Case Complexity},
  booktitle = {Structure in Complexity Theory Conference},
  year      = {1995},
  pages     = {134-147},
}

@inproceedings{
Impagliazzo95,
  author    = {Russell Impagliazzo},
  title     = {Hard-Core Distributions for Somewhat Hard Problems},
  booktitle = {FOCS},
  year      = {1995},
  pages     = {538-545},
}

@inproceedings{DBLP:conf/tcc/IshaiKO05,
  author    = {Yuval Ishai and
               Eyal Kushilevitz and
               Rafail Ostrovsky},
  title     = {Sufficient Conditions for Collision-Resistant Hashing},
  booktitle = {TCC},
  year      = {2005},
  pages     = {445-456},
}

%indexj

@article{
Jobs05,
  author    = {Steve Jobs},
  title     = {Stay hungry, stay foolish},
  journal   = {Stanford Commencement Speech},
  year      = {2005},
}


@inproceedings{DBLP:conf/ants/Joux00,
  author    = {Antoine Joux},
  title     = {A One Round Protocol for Tripartite Diffie-Hellman},
  booktitle = {Algorithmic Number Theory, 4th International Symposium, ANTS-IV, Leiden,
               The Netherlands, July 2-7, 2000, Proceedings},
  year      = {2000},
  pages     = {385--394},
  crossref  = {DBLP:conf/ants/2000},
  url       = {http://dx.doi.org/10.1007/10722028_23},
  doi       = {10.1007/10722028_23},
  timestamp = {Thu, 04 Sep 2014 23:41:52 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ants/Joux00},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}


@inproceedings{DBLP:conf/crypto/Joux04,
  author    = {Antoine Joux},
  title     = {Multicollisions in Iterated Hash Functions. Application
               to Cascaded Constructions},
  booktitle = {CRYPTO},
  year      = {2004},
  pages     = {306-316},
  ee        = {http://dx.doi.org/10.1007/978-3-540-28628-8_19},
  crossref  = {DBLP:conf/crypto/2004},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{DBLP:conf/crypto/2004,
  editor    = {Matthew K. Franklin},
  title     = {Advances in Cryptology - CRYPTO 2004, 24th Annual International
               CryptologyConference, Santa Barbara, California, USA, August
               15-19, 2004, Proceedings},
  booktitle = {CRYPTO},
  publisher = {Springer},
  series    = {Lecture Notes in Computer Science},
  volume    = {3152},
  year      = {2004},
  isbn      = {3-540-22668-0},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}


@inproceedings{
DBLP:conf/stoc/Khot02a,
  author    = {Subhash Khot},
  title     = {On the power of unique 2-prover 1-round games},
  booktitle = {STOC},
  year      = {2002},
  pages     = {767-775},
  ee        = {http://doi.acm.org/10.1145/509907.510017},
  crossref  = {DBLP:conf/stoc/2002},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{DBLP:conf/stoc/2002,
  editor    = {John H. Reif},
  title     = {Proceedings on 34th Annual ACM Symposium on Theory of Computing,
               May 19-21, 2002, Montr{\'e}al, Qu{\'e}bec, Canada},
  booktitle = {STOC},
  publisher = {ACM},
  year      = {2002},
  isbn      = {1-58113-495-9},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}


@book{
JKYL,
  author    = {Jonathan Katz and
               Yehuda Lindell},
  title     = {Introduction to Modern Cryptography},
  publisher = {Chapman and Hall/CRC Press},
  year      = {2007},
  isbn      = {978-1-58488-551-1},
}


@misc{cryptoeprint:2014:347,
    author = {Ilan Komargodski and Tal Moran and Moni Naor and Rafael Pass and Alon Rosen and Eylon Yogev},
    title = {One-Way Functions and (Im)perfect Obfuscation},
    howpublished = {Cryptology ePrint Archive, Report 2014/347},
    year = {2014},
    note = {\url{http://eprint.iacr.org/}},
}



@inproceedings{
DBLP:conf/ccs/KiayiasPTZ13,
  author    = {Aggelos Kiayias and
               Stavros Papadopoulos and
               Nikos Triandopoulos and
               Thomas Zacharias},
  title     = {Delegatable pseudorandom functions and applications},
  booktitle = {ACM Conference on Computer and Communications Security},
  year      = {2013},
  pages     = {669-684},
  ee        = {http://doi.acm.org/10.1145/2508859.2516668},
  crossref  = {DBLP:conf/ccs/2013},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{DBLP:conf/ccs/2013,
  editor    = {Ahmad-Reza Sadeghi and
               Virgil D. Gligor and
               Moti Yung},
  title     = {2013 ACM SIGSAC Conference on Computer and Communications
               Security, CCS'13, Berlin, Germany, November 4-8, 2013},
  booktitle = {ACM Conference on Computer and Communications Security},
  publisher = {ACM},
  year      = {2013},
  isbn      = {978-1-4503-2477-9},
  ee        = {http://dl.acm.org/citation.cfm?id=2508859, http://dl.acm.org/citation.cfm?id=2541806},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}



@inproceedings{DBLP:conf/stoc/KalaiRR14,
  author    = {Yael Tauman Kalai and
               Ran Raz and
               Ron D. Rothblum},
  title     = {How to delegate computations: the power of no-signaling proofs},
  booktitle = {Symposium on Theory of Computing, {STOC} 2014, New York, NY, USA,
               May 31 - June 03, 2014},
  pages     = {485--494},
  year      = {2014},
  crossref  = {DBLP:conf/stoc/2014},
  url       = {http://doi.acm.org/10.1145/2591796.2591809},
  doi       = {10.1145/2591796.2591809},
  timestamp = {Wed, 18 Jun 2014 08:38:28 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/stoc/KalaiRR14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/stoc/2014,
  editor    = {David B. Shmoys},
  title     = {Symposium on Theory of Computing, {STOC} 2014, New York, NY, USA,
               May 31 - June 03, 2014},
  publisher = {{ACM}},
  year      = {2014},
  url       = {http://dl.acm.org/citation.cfm?id=2591796},
  isbn      = {978-1-4503-2710-7},
  timestamp = {Wed, 18 Jun 2014 08:38:28 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/stoc/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}



@article{kannan1987minkowski,
  title={Minkowski's convex body theorem and integer programming},
  author={Kannan, Ravi},
  journal={Mathematics of operations research},
  volume={12},
  number={3},
  pages={415--440},
  year={1987},
  publisher={INFORMS}
}



@article{
Kale07,
  author    = {Satyen Kale},
  title     = {Boosting and hard-core set constructions: a simplified approach},
  journal   = {Electronic Colloquium on Computational Complexity (ECCC)},
  volume    = {14},
  number    = {131},
  year      = {2007},
}


@inproceedings{
DBLP:conf/stoc/KearnsV89,
  author    = {Michael J. Kearns and
               Leslie G. Valiant},
  title     = {Cryptographic Limitations on Learning Boolean Formulae and
               Finite Automata},
  booktitle = {STOC},
  year      = {1989},
  pages     = {433-444},
  ee        = {http://doi.acm.org/10.1145/73007.73049},
  crossref  = {DBLP:conf/stoc/STOC21},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{DBLP:conf/stoc/STOC21,
  editor    = {David S. Johnson},
  title     = {Proceedings of the 21st Annual ACM Symposium on Theory of
               Computing, May 14-17, 1989, Seattle, Washigton, USA},
  booktitle = {STOC},
  publisher = {ACM},
  year      = {1989},
  isbn      = {0-89791-307-8},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}



@inproceedings{
DBLP:conf/asiacrypt/KateZG10,
  author    = {Aniket Kate and
               Gregory M. Zaverucha and
               Ian Goldberg},
  title     = {Constant-Size Commitments to Polynomials and Their Applications},
  booktitle = {ASIACRYPT},
  year      = {2010},
  pages     = {177-194},
}

@inproceedings{
KL80,
  author    = {Richard M. Karp and
               Richard J. Lipton},
  title     = {Some Connections between Nonuniform and Uniform Complexity
               Classes},
  booktitle = {STOC},
  year      = {1980},
  pages     = {302-309},
}


@inproceedings{DBLP:conf/stoc/Kilian88,
  author    = {Joe Kilian},
  title     = {Founding Cryptography on Oblivious Transfer},
  booktitle = {STOC},
  year      = {1988},
  pages     = {20-31},
  ee        = {http://doi.acm.org/10.1145/62212.62215},
  crossref  = {DBLP:conf/stoc/STOC20},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{DBLP:conf/stoc/STOC20,
  editor    = {Janos Simon},
  title     = {Proceedings of the 20th Annual ACM Symposium on Theory of
               Computing, May 2-4, 1988, Chicago, Illinois, USA},
  booktitle = {STOC},
  publisher = {ACM},
  year      = {1988},
  isbn      = {0-89791-264-0},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}


@inproceedings{DBLP:conf/stoc/Kilian92,
  author    = {Joe Kilian},
  title     = {A Note on Efficient Zero-Knowledge Proofs and Arguments
               (Extended Abstract)},
  booktitle = {STOC},
  year      = {1992},
  pages     = {723-732},
  ee        = {http://doi.acm.org/10.1145/129712.129782},
  crossref  = {DBLP:conf/stoc/STOC24},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{DBLP:conf/stoc/STOC24,
  editor    = {S. Rao Kosaraju and
               Mike Fellows and
               Avi Wigderson and
               John A. Ellis},
  title     = {Proceedings of the 24th Annual ACM Symposium on Theory of
               Computing, May 4-6, 1992, Victoria, British Columbia, Canada},
  booktitle = {STOC},
  publisher = {ACM},
  year      = {1992},
  isbn      = {0-89791-511-9},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@inproceedings{
KR00,
  author    = {Hugo Krawczyk and Tal Rabin},
  title     = {Chameleon Signatures},
  booktitle = {Symposium on Network and Distributed Systems Security (NDSS)},
  year      = {2000},
  pages     = {143-154},
}

@article{
KS03,
  author    = {Adam R. Klivans and
               Rocco A. Servedio},
  title     = {Boosting and Hard-Core Set Construction},
  journal   = {Machine Learning},
  volume    = {51},
  number    = {3},
  year      = {2003},
  pages     = {217-238},
}

@inproceedings{
LFKN90,
  author    = {Carsten Lund and
               Lance Fortnow and
               Howard J. Karloff and
               Noam Nisan},
  title     = {Algebraic Methods for Interactive Proof Systems},
  booktitle = {FOCS},
  year      = {1990},
  pages     = {2-10},
}


@article{lenstra1982factoring,
  title={Factoring polynomials with rational coefficients},
  author={Lenstra, Arjen Klaas and Lenstra, Hendrik Willem and Lov{\'a}sz, L{\'a}szl{\'o}},
  journal={Mathematische Annalen},
  volume={261},
  number={4},
  pages={515--534},
  year={1982},
  publisher={Springer}
}


@inproceedings{DBLP:conf/eurocrypt/Myers04,
  author    = {Steven Myers},
  title     = {Black-Box Composition Does Not Imply Adaptive Security},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2004, International Conference
               on the Theory and Applications of Cryptographic Techniques, Interlaken,
               Switzerland, May 2-6, 2004, Proceedings},
  year      = {2004},
  pages     = {189--206},
  crossref  = {DBLP:conf/eurocrypt/2004},
  url       = {http://dx.doi.org/10.1007/978-3-540-24676-3_12},
  doi       = {10.1007/978-3-540-24676-3_12},
  timestamp = {Tue, 21 Oct 2014 18:47:08 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/eurocrypt/Myers04},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2004,
  editor    = {Christian Cachin and
               Jan Camenisch},
  title     = {Advances in Cryptology - {EUROCRYPT} 2004, International Conference
               on the Theory and Applications of Cryptographic Techniques, Interlaken,
               Switzerland, May 2-6, 2004, Proceedings},
  series    = {Lecture Notes in Computer Science},
  year      = {2004},
  volume    = {3027},
  publisher = {Springer},
  isbn      = {3-540-21935-8},
  timestamp = {Tue, 21 Oct 2014 18:47:08 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/eurocrypt/2004},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}


@inproceedings{
Merkle89,
  author    = {Ralph C. Merkle},
  title     = {A Certified Digital Signature},
  booktitle = {CRYPTO},
  year      = {1989},
  pages     = {218-238},
}

@inproceedings{
Micali94,
  author    = {Silvio Micali},
  title     = {CS Proofs (Extended Abstracts)},
  booktitle = {FOCS},
  year      = {1994},
  pages     = {436-453},
}



@incollection{
DBLP:series/isc/Micciancio10,
  author    = {Daniele Micciancio},
  title     = {Cryptographic Functions from Worst-Case Complexity Assumptions},
  booktitle = {The LLL Algorithm},
  year      = {2010},
  pages     = {427-452},
  ee        = {http://dx.doi.org/10.1007/978-3-642-02295-1_13},
  crossref  = {DBLP:series/isc/364202294},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@book{DBLP:series/isc/364202294,
  editor    = {Phong Q. Nguyen and
               Brigitte Vall{\'e}e},
  title     = {The LLL Algorithm - Survey and Applications},
  publisher = {Springer},
  series    = {Information Security and Cryptography},
  year      = {2010},
  isbn      = {978-3-642-02294-4},
  ee        = {http://dx.doi.org/10.1007/978-3-642-02295-1},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}


@inproceedings{micciancio2010faster,
  title={Faster exponential time algorithms for the shortest vector problem},
  author={Micciancio, Daniele and Voulgaris, Panagiotis},
  booktitle={Proceedings of the Twenty-First Annual ACM-SIAM Symposium on Discrete Algorithms},
  pages={1468--1480},
  year={2010},
  organization={Society for Industrial and Applied Mathematics}
}



@Article{
MicciancioRegev07,
  author  = {Micciancio, Daniele and Regev, Oded},
  title   = {Worst-case to average-case reductions based on
      {Gaussian} measure},
  journal = {SIAM Journal on Computing},
  volume        = {37},
  number        = {1},
  pages         = {267--302},
  year    = 2007,
}



@inproceedings{DBLP:conf/tcc/MandalPS12,
  author    = {Avradip Mandal and
               Jacques Patarin and
               Yannick Seurin},
  title     = {On the Public Indifferentiability and Correlation Intractability of
               the 6-Round Feistel Construction},
  booktitle = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC}
               2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings},
  pages     = {285--302},
  year      = {2012},
  crossref  = {DBLP:conf/tcc/2012},
  url       = {http://dx.doi.org/10.1007/978-3-642-28914-9_16},
  doi       = {10.1007/978-3-642-28914-9_16},
  timestamp = {Mon, 05 Mar 2012 21:00:17 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/tcc/MandalPS12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/tcc/2012,
  editor    = {Ronald Cramer},
  title     = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC}
               2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7194},
  publisher = {Springer},
  year      = {2012},
  url       = {http://dx.doi.org/10.1007/978-3-642-28914-9},
  doi       = {10.1007/978-3-642-28914-9},
  isbn      = {978-3-642-28913-2},
  timestamp = {Mon, 05 Mar 2012 20:56:48 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/tcc/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}




@inproceedings{
DBLP:conf/focs/NaorR97,
  author    = {Moni Naor and
               Omer Reingold},
  title     = {Number-theoretic Constructions of Efficient Pseudo-random
               Functions},
  booktitle = {FOCS},
  year      = {1997},
  pages     = {458-467},
  ee        = {http://doi.ieeecomputersociety.org/10.1109/SFCS.1997.646134},
  crossref  = {DBLP:conf/focs/1997},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{DBLP:conf/focs/1997,
  title     = {38th Annual Symposium on Foundations of Computer Science,
               FOCS '97, Miami Beach, Florida, USA, October 19-22, 1997},
  booktitle = {FOCS},
  publisher = {IEEE Computer Society},
  year      = {1997},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}



@inproceedings{DBLP:conf/stoc/NaorRR00,
  author    = {Moni Naor and
               Omer Reingold and
               Alon Rosen},
  title     = {Pseudo-random functions and factoring (extended abstract)},
  booktitle = {STOC},
  year      = {2000},
  pages     = {11-20},
  ee        = {http://doi.acm.org/10.1145/335305.335307},
  crossref  = {DBLP:conf/stoc/2000},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{DBLP:conf/stoc/2000,
  editor    = {F. Frances Yao and
               Eugene M. Luks},
  title     = {Proceedings of the Thirty-Second Annual ACM Symposium on
               Theory of Computing, May 21-23, 2000, Portland, OR, USA},
  booktitle = {STOC},
  publisher = {ACM},
  year      = {2000},
  isbn      = {1-58113-184-4},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}



@inproceedings{
DBLP:conf/stoc/NaorY90,
  author    = {Moni Naor and
               Moti Yung},
  title     = {Public-key Cryptosystems Provably Secure against Chosen
               Ciphertext Attacks},
  booktitle = {STOC},
  year      = {1990},
  pages     = {427-437},
}


@article{
Nic10,
  author    = {Basarab Nicolescu},
  title     = {Methodology of Transdisciplinarity - Levels of Reality, Logic of the Included Middle and Complexity},
  journal   = {Transdisciplinary Journal of Engineering and Science},
  year      = {2010},
  pages     = {31},
}


@inproceedings{
DBLP:conf/crypto/Nielsen02,
  author    = {Jesper Buus Nielsen},
  title     = {Separating Random Oracle Proofs from Complexity Theoretic Proofs:
               The Non-committing Encryption Case},
  booktitle = {Advances in Cryptology - {CRYPTO} 2002, 22nd Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 18-22,
               2002, Proceedings},
  pages     = {111--126},
  year      = {2002},
  crossref  = {DBLP:conf/crypto/2002},
  url       = {http://dx.doi.org/10.1007/3-540-45708-9_8},
  doi       = {10.1007/3-540-45708-9_8},
  timestamp = {Fri, 18 Sep 2009 12:40:55 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/Nielsen02},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/2002,
  editor    = {Moti Yung},
  title     = {Advances in Cryptology - {CRYPTO} 2002, 22nd Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 18-22,
               2002, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2442},
  publisher = {Springer},
  year      = {2002},
  isbn      = {3-540-44050-X},
  timestamp = {Tue, 22 Oct 2002 14:17:53 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/2002},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}



@inproceedings{
DBLP:conf/eurocrypt/PointchevalS96,
  author    = {David Pointcheval and
               Jacques Stern},
  title     = {Security Proofs for Signature Schemes},
  booktitle = {Advances in Cryptology - {EUROCRYPT} '96, International Conference
               on the Theory and Application of Cryptographic Techniques, Saragossa,
               Spain, May 12-16, 1996, Proceeding},
  year      = {1996},
  pages     = {387--398},
  crossref  = {DBLP:conf/eurocrypt/96},
  url       = {http://dx.doi.org/10.1007/3-540-68339-9_33},
  doi       = {10.1007/3-540-68339-9_33},
  timestamp = {Wed, 12 Nov 2014 00:40:52 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/eurocrypt/PointchevalS96},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/96,
  editor    = {Ueli M. Maurer},
  title     = {Advances in Cryptology - {EUROCRYPT} '96, International Conference
               on the Theory and Application of Cryptographic Techniques, Saragossa,
               Spain, May 12-16, 1996, Proceeding},
  series    = {Lecture Notes in Computer Science},
  year      = {1996},
  volume    = {1070},
  publisher = {Springer},
  isbn      = {3-540-61186-X},
  timestamp = {Wed, 12 Nov 2014 00:40:52 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/eurocrypt/96},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}


@inproceedings{
DBLP:conf/crypto/PassST14,
  author    = {Rafael Pass and
               Karn Seth and
               Sidharth Telang},
  title     = {Indistinguishability Obfuscation from Semantically-Secure
               Multilinear Encodings},
  booktitle = {CRYPTO (1)},
  year      = {2014},
  pages     = {500-517},
  ee        = {http://dx.doi.org/10.1007/978-3-662-44371-2_28},
  crossref  = {DBLP:conf/crypto/2014-1},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{DBLP:conf/crypto/2014-1,
  editor    = {Juan A. Garay and
               Rosario Gennaro},
  title     = {Advances in Cryptology - CRYPTO 2014 - 34th Annual Cryptology
               Conference, Santa Barbara, CA, USA, August 17-21, 2014,
               Proceedings, Part I},
  booktitle = {CRYPTO (1)},
  publisher = {Springer},
  series    = {Lecture Notes in Computer Science},
  volume    = {8616},
  year      = {2014},
  isbn      = {978-3-662-44370-5},
  ee        = {http://dx.doi.org/10.1007/978-3-662-44371-2},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}


@article{
PW11,
  author    = {Chris Peikert and
               Brent Waters},
  title     = {Lossy Trapdoor Functions and Their Applications},
  journal   = {SIAM J. Comput.},
  volume    = {40},
  number    = {6},
  year      = {2011},
  pages     = {1803-1844},
}


@inproceedings{DBLP:conf/stoc/Regev05,
  author    = {Oded Regev},
  title     = {On lattices, learning with errors, random linear codes, and cryptography},
  booktitle = {Proceedings of the 37th Annual {ACM} Symposium on Theory of Computing,
               Baltimore, MD, USA, May 22-24, 2005},
  year      = {2005},
  pages     = {84--93},
  crossref  = {DBLP:conf/stoc/2005},
  url       = {http://doi.acm.org/10.1145/1060590.1060603},
  doi       = {10.1145/1060590.1060603},
  timestamp = {Mon, 27 Oct 2014 03:04:14 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/stoc/Regev05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/stoc/2005,
  editor    = {Harold N. Gabow and
               Ronald Fagin},
  title     = {Proceedings of the 37th Annual {ACM} Symposium on Theory of Computing,
               Baltimore, MD, USA, May 22-24, 2005},
  year      = {2005},
  publisher = {{ACM}},
  isbn      = {1-58113-960-8},
  timestamp = {Mon, 27 Oct 2014 03:04:14 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/stoc/2005},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}


@inproceedings{
DBLP:conf/coco/Regev10,
  author    = {Oded Regev},
  title     = {The Learning with Errors Problem (Invited Survey)},
  booktitle = {IEEE Conference on Computational Complexity},
  year      = {2010},
  pages     = {191-204},
}



@inproceedings{DBLP:conf/vietcrypt/Rogaway06,
  author    = {Phillip Rogaway},
  title     = {Formalizing Human Ignorance},
  booktitle = {Progressin Cryptology - {VIETCRYPT} 2006, First International Conferenceon
               Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised
               Selected Papers},
  pages     = {211--228},
  year      = {2006},
  crossref  = {DBLP:conf/vietcrypt/2006},
  url       = {http://dx.doi.org/10.1007/11958239_14},
  doi       = {10.1007/11958239_14},
  timestamp = {Tue, 20 Feb 2007 13:27:14 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/vietcrypt/Rogaway06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/vietcrypt/2006,
  editor    = {Phong Q. Nguyen},
  title     = {Progressin Cryptology - {VIETCRYPT} 2006, First International Conferenceon
               Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised
               Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {4341},
  publisher = {Springer},
  year      = {2006},
  isbn      = {3-540-68799-8},
  timestamp = {Tue, 20 Feb 2007 13:27:14 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/vietcrypt/2006},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}


@inproceedings{
DBLP:conf/tcc/Rothblum13,
  author    = {Ron Rothblum},
  title     = {On the Circular Security of Bit-Encryption},
  booktitle = {TCC},
  year      = {2013},
  pages     = {579-598},
  ee        = {http://dx.doi.org/10.1007/978-3-642-36594-2_32},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}



@inproceedings{
RR94,
  author    = {Alexander A. Razborov and
               Steven Rudich},
  title     = {Natural proofs},
  booktitle = {STOC},
  year      = {1994},
  pages     = {204-213},
}

@article{
RSA78,
  author    = {Ronald L. Rivest and
               Adi Shamir and
               Leonard M. Adleman},
  title     = {A Method for Obtaining Digital Signatures and Public-Key
               Cryptosystems},
  journal   = {Commun. ACM},
  volume    = {21},
  number    = {2},
  year      = {1978},
  pages     = {120-126},
}



@inproceedings{DBLP:conf/stoc/SahaiW14,
  author    = {Amit Sahai and
               Brent Waters},
  title     = {How to use indistinguishability obfuscation: deniable encryption,
               and more},
  booktitle = {STOC},
  year      = {2014},
  pages     = {475-484},
  ee        = {http://doi.acm.org/10.1145/2591796.2591825},
  crossref  = {DBLP:conf/stoc/2014},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{DBLP:conf/stoc/2014,
  editor    = {David B. Shmoys},
  title     = {Symposium on Theory of Computing, STOC 2014, New York, NY,
               USA, May 31 - June 03, 2014},
  booktitle = {STOC},
  publisher = {ACM},
  year      = {2014},
  isbn      = {978-1-4503-2710-7},
  ee        = {http://dl.acm.org/citation.cfm?id=2591796},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}


@article{
Shamir79,
  author    = {Adi Shamir},
  title     = {How to Share a Secret},
  journal   = {Commun. ACM},
  volume    = {22},
  number    = {11},
  year      = {1979},
  pages     = {612-613},
}

@inproceedings{
Shamir90,
  author    = {Adi Shamir},
  title     = {IP=PSPACE},
  booktitle = {FOCS},
  year      = {1990},
  pages     = {11-15},
}


@incollection{suzuki2006birthday,
  title={Birthday paradox for multi-collisions},
  author={Suzuki, Kazuhiro and Tonien, Dongvu and Kurosawa, Kaoru and Toyota, Koji},
  booktitle={Information Security and Cryptology--ICISC 2006},
  pages={29--40},
  year={2006},
  publisher={Springer}
}


@inproceedings{
SV97,
  author    = {Amit Sahai and
               Salil P. Vadhan},
  title     = {A Complete Promise Problem for Statistical Zero-Knowledge},
  booktitle = {FOCS},
  year      = {1997},
  pages     = {448-457},
}


@article{DBLP:journals/eatcs/Szelepcsenyi87,
  author    = {R{\'o}bert Szelepcs{\'e}nyi},
  title     = {The moethod of focing for nondeterministic automata},
  journal   = {Bulletin of the EATCS},
  volume    = {33},
  year      = {1987},
  pages     = {96-99},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}


@inproceedings{
VZ12,
  author    = {Salil P. Vadhan and
               Colin Jia Zheng},
  title     = {Characterizing pseudoentropy and simplifying pseudorandom
               generator constructions},
  booktitle = {STOC},
  year      = {2012},
  pages     = {817-836},
}

@inproceedings{
VZ13,
  author    = {Salil P. Vadhan and
               Colin Jia Zheng},
  title     = {A Uniform Min-Max Theorem with Applications in Cryptography},
  booktitle = {CRYPTO},
  year      = {2013},
}


@misc{cryptoeprint:2014:588,
    author = {Brent Waters},
    title = {A Punctured Programming Approach to Adaptively Secure  Functional Encryption},
    howpublished = {Cryptology ePrint Archive, Report 2014/588},
    year = {2014},
%    note = {\url{http://eprint.iacr.org/}},
}


@inproceedings{
Yao82a,
  author    = {Andrew Chi-Chih Yao},
  title     = {Theory and Applications of Trapdoor Functions (Extended
               Abstract)},
  booktitle = {FOCS},
  year      = {1982},
  pages     = {80-91},
}



@inproceedings{DBLP:conf/crypto/Yamakawa0HK14,
  author    = {Takashi Yamakawa and
               Shota Yamada and
               Goichiro Hanaoka and
               Noboru Kunihiro},
  title     = {Self-bilinear Map on Unknown Order Groups from Indistinguishability
               Obfuscation and Its Applications},
  booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}},
  pages     = {90--107},
  year      = {2014},
  crossref  = {DBLP:conf/crypto/2014-2},
  url       = {http://dx.doi.org/10.1007/978-3-662-44381-1_6},
  doi       = {10.1007/978-3-662-44381-1_6},
  timestamp = {Tue, 15 Jul 2014 12:40:49 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/Yamakawa0HK14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/2014-2,
  editor    = {Juan A. Garay and
               Rosario Gennaro},
  title     = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8617},
  publisher = {Springer},
  year      = {2014},
  url       = {http://dx.doi.org/10.1007/978-3-662-44381-1},
  doi       = {10.1007/978-3-662-44381-1},
  isbn      = {978-3-662-44380-4},
  timestamp = {Tue, 15 Jul 2014 12:38:25 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/2014-2},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}



@article{zhang2014bounded,
  title={Bounded gaps between primes},
  author={Zhang, Yitang},
  journal={Annals of Mathematics},
  volume={179},
  number={3},
  pages={1121--1174},
  year={2014},
  publisher={Princeton University and the Institute for Advanced Study}
}


@article{DBLP:journals/iacr/Zimmerman14,
  author    = {Joe Zimmerman},
  title     = {How to Obfuscate Programs Directly},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {776},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/776},
  timestamp = {Wed, 15 Oct 2014 13:16:53 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/Zimmerman14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
