% This BibTeX bibliography file was created using BibDesk.
%% http://bibdesk.sourceforge.net/


%% Created for Benjamin Fuller at 2013-04-03 10:28:01 -0400 


%% Saved with string encoding Unicode (UTF-8)
@incollection{dodis2013overcoming,
  title={Overcoming weak expectations},
  author={Dodis, Yevgeniy and Yu, Yu},
  booktitle={Theory of Cryptography},
  pages={1--22},
  year={2013},
  publisher={Springer}
}

@misc{galea2014making,
    author = {Jake Longo Galea and Daniel Martin and Elisabeth Oswald and Daniel Page and Martijn Stam},
    title = {Making and Breaking Leakage Simulators},
    howpublished = {Cryptology ePrint Archive, Report 2014/357},
    year = {2014},
    note = {\url{http://eprint.iacr.org/}},
}

@incollection{duc2014unifying,
  title={Unifying Leakage Models: From Probing Attacks to Noisy Leakage.},
  author={Duc, Alexandre and Dziembowski, Stefan and Faust, Sebastian},
  booktitle={Advances in Cryptology--EUROCRYPT 2014},
  pages={423--440},
  year={2014},
  publisher={Springer}
}

@incollection{ishai2003private,
  title={Private circuits: Securing hardware against probing attacks},
  author={Ishai, Yuval and Sahai, Amit and Wagner, David},
  booktitle={Advances in Cryptology-CRYPTO 2003},
  pages={463--481},
  year={2003},
  publisher={Springer}
}

@incollection{ducunifying,
  title={Unifying Leakage Models: from Probing Attacks to Noisy Leakage},
  author={Duc, Alexandre and Dziembowski, Stefan and Faust, Sebastian},
  year={2014},
  booktitle={To appear in Advances in Cryptology - EUROCRYPT 2014}
}

@incollection{boneh1998decision,
  title={The decision {D}iffie-{H}ellman problem},
  author={Boneh, Dan},
  booktitle={Algorithmic number theory},
  pages={48--63},
  year={1998},
  publisher={Springer}
}

@article{miles2013iterated,
  title={Iterated group products and leakage resilience against NC\^{} 1},
  author={Miles, Eric},
  journal={arXiv preprint arXiv:1312.3193},
  year={2013}
}

@techreport{lamport1979constructing,
  title={Constructing digital signatures from a one-way function},
  author={Lamport, Leslie},
  year={1979},
  institution={Technical Report CSL-98, SRI International}
}

@incollection{katz2009signature,
  title={Signature schemes with bounded leakage resilience},
  author={Katz, Jonathan and Vaikuntanathan, Vinod},
  booktitle={Advances in Cryptology--ASIACRYPT 2009},
  pages={703--720},
  year={2009},
  publisher={Springer}
}

@incollection{faust2012signature,
  title={Signature schemes secure against hard-to-invert leakage},
  author={Faust, Sebastian and Hazay, Carmit and Nielsen, Jesper Buus and Nordholt, Peter Sebastian and Zottarel, Angela},
  booktitle={Advances in Cryptology--ASIACRYPT 2012},
  pages={98--115},
  year={2012},
  publisher={Springer}
}

@inproceedings{dodis2009cryptography,
  title={On cryptography with auxiliary input},
  author={Dodis, Yevgeniy and Kalai, Yael Tauman and Lovett, Shachar},
  booktitle={Proceedings of the 41st annual ACM symposium on Theory of computing},
  pages={621--630},
  year={2009},
  organization={ACM}
}

@article{halderman2009lest,
  title={Lest we remember: cold-boot attacks on encryption keys},
  author={Halderman, J Alex and Schoen, Seth D and Heninger, Nadia and Clarkson, William and Paul, William and Calandrino, Joseph A and Feldman, Ariel J and Appelbaum, Jacob and Felten, Edward W},
  journal={Communications of the ACM},
  volume={52},
  number={5},
  pages={91--98},
  year={2009},
  publisher={ACM}
}

@inproceedings{miles2013shielding,
  title={Shielding circuits with groups.},
  author={Miles, Eric and Viola, Emanuele},
  booktitle={Electronic Colloquium on Computational Complexity (ECCC)},
  volume={20},
  pages={3},
  year={2013}
}
@incollection{faust2010protecting,
  title={Protecting circuits from leakage: the computationally-bounded and noisy cases},
  author={Faust, Sebastian and Rabin, Tal and Reyzin, Leonid and Tromer, Eran and Vaikuntanathan, Vinod},
  booktitle={Advances in Cryptology--EUROCRYPT 2010},
  pages={135--156},
  year={2010},
  publisher={Springer}
}
@inproceedings{kocher1999differential,
  title={Differential power analysis},
  author={Kocher, Paul and Jaffe, Joshua and Jun, Benjamin},
  booktitle={Advances in Cryptology—CRYPTO’99},
  pages={388--397},
  year={1999},
  organization={Springer}
}

@incollection{standaertleakage,
  title={Leakage-Resilient Symmetric Cryptography Under Empirically Verifiable Assumptions},
  author={Standaert, Fran{\c{c}}ois-Xavier and Pereira, Olivier and Yu, Yu},
  year={2013},
  booktitle={Advances In Cryptology-- CRYPTO},
  publisher={Springer}
}

@misc{fullerMengReyzin2013,
  title={Computational Fuzzy Extractors},
  author={Fuller, Benjamin and Meng, Xianrui and Reyzin, Leonid},
  Url = {{http://eprint.iacr.org/2013/416}},
  Howpublished = {Cryptology ePrint Archive},
  Year = {2013}
}

@inproceedings{brakerski2013classical,
  title={Classical hardness of learning with errors},
  author={Brakerski, Zvika and Langlois, Adeline and Peikert, Chris and Regev, Oded and Stehl{\'e}, Damien},
  booktitle={Proceedings of the 45th annual ACM symposium on Symposium on theory of computing},
  pages={575--584},
  year={2013},
  organization={ACM}
}

@book{Vad12,
author={Salil Vadhan},
title={Pseudorandomness},
series={Foundations and Trends in Theoretical Computer Science},
publisher = {Now Publishers},
year = {2012}
}


@article{dodis2013key,
  title={Key Derivation Without Entropy Waste},
  author={Dodis, Yevgeniy and Pietrzak, Krzysztof and Wichs, Daniel},
  year={2013}
}

@incollection{barak2011leftover,
  title={Leftover hash lemma, revisited},
  author={Barak, Boaz and Dodis, Yevgeniy and Krawczyk, Hugo and Pereira, Olivier and Pietrzak, Krzysztof and Standaert, Fran{\c{c}}ois-Xavier and Yu, Yu},
  booktitle={Advances in Cryptology--CRYPTO 2011},
  pages={1--20},
  year={2011},
  publisher={Springer}
}

@incollection{dachman2012computational,
  title={Computational extractors and pseudorandomness},
  author={Dachman-Soled, Dana and Gennaro, Rosario and Krawczyk, Hugo and Malkin, Tal},
  booktitle={Theory of Cryptography},
  pages={383--403},
  year={2012},
  publisher={Springer}
}

@incollection{krawczyk2010cryptographic,
  title={Cryptographic extraction and key derivation: The {HKDF} scheme},
  author={Krawczyk, Hugo},
  booktitle={Advances in Cryptology--CRYPTO 2010},
  pages={631--648},
  year={2010},
  publisher={Springer}
}

@incollection{reyzin2011some,
  title={Some notions of entropy for cryptography},
  author={Reyzin, Leonid},
  booktitle={Information Theoretic Security},
  pages={138--142},
  year={2011},
  publisher={Springer}
}

@misc{venkatLecture,
	Author = {Guruswami, Venkatesan},
	Howpublished = {University Lecture},
	Institution = {Carnegie Mellon University},
	Title = {Introduction to Coding Theory - Lecture 2: {G}ilbert-{V}arshamov bound},
	Year = {2010}}

@article{cooper2000rank,
	Author = {Cooper, Colin},
	Journal = {Random Structures \& Algorithms},
	Number = {2},
	Pages = {209--232},
	Publisher = {Wiley Online Library},
	Title = {On the rank of random matrices},
	Volume = {16},
	Year = {2000}}

@incollection{micciancio2013hardness,
	Author = {Micciancio, Daniele and Peikert, Chris},
	Title = {{Hardness of {SIS} and {LWE} with Small Parameters}},
        Howpublished = {Cryptology ePrint Archive},
	Year = {2013},
	Booktitle = {Advances in Cryptology - CRYPTO 2013},
	Series = {Lecture Notes in Computer Science},
	Bdsk-Url-1 = {%7Bhttp://eprint.iacr.org/2013/069%7D}}

@article{applebaum2006pseudorandom,
	Author = {Applebaum, Benny and Ishai, Yuval and Kushilevitz, Eyal},
	Journal = {Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques},
	Pages = {260--271},
	Publisher = {Springer},
	Title = {{On pseudorandom generators with linear stretch in {NC 0}}},
	Year = {2006}}

@inproceedings{CRVW02,
	Author = {Michael R. Capalbo and Omer Reingold and Salil P. Vadhan and Avi Wigderson},
	Bibsource = {DBLP, http://dblp.uni-trier.de},
	Booktitle = {IEEE Conference on Computational Complexity},
	Ee = {http://computer.org/proceedings/ccc/1468/14680015abs.htm},
	Pages = {15},
	Title = {Randomness Conductors and Constant-Degree Lossless Expanders},
	Year = {2002}}

@inproceedings{KanukurthiR09,
	Author = {Bhavana Kanukurthi and Leonid Reyzin},
	Bibsource = {DBLP, http://dblp.uni-trier.de},
	Booktitle = {EUROCRYPT},
	Ee = {http://dx.doi.org/10.1007/978-3-642-01001-9_12},
	Pages = {206-223},
	Title = {Key Agreement from Close Secrets over Unsecured Channels},
	Year = {2009}}

@incollection{akavia2009,
	Author = {Akavia, Adi and Goldwasser, Shafi and Vaikuntanathan, Vinod},
	Booktitle = {Theory of Cryptography},
	Doi = {10.1007/978-3-642-00457-5_28},
	Editor = {Reingold, Omer},
	Isbn = {978-3-642-00456-8},
	Pages = {474-495},
	Publisher = {Springer Berlin Heidelberg},
	Series = {Lecture Notes in Computer Science},
	Title = {Simultaneous Hardcore Bits and Cryptography against Memory Attacks},
	Url = {http://dx.doi.org/10.1007/978-3-642-00457-5_28},
	Volume = {5444},
	Year = {2009},
	Bdsk-Url-1 = {http://dx.doi.org/10.1007/978-3-642-00457-5_28}}

@inproceedings{JW99,
	Author = {Ari Juels and Martin Wattenberg},
	Crossref = {CCS1999},
	Pages = {28--36},
	Title = {A Fuzzy Commitment Scheme}}

@proceedings{CCS1999,
	Booktitle = {Sixth ACM Conference on Computer and Communication Security},
	C-Address = {Singapore},
	Crossrefonly = 1,
	Key = {ACM},
	Month = nov,
	Publisher = {ACM},
	Title = {Sixth ACM Conference on Computer and Communication Security},
	Year = 1999}

@book{vadhan2012,
	Author = {Vadhan, Salil},
	Date-Added = {2013-02-12 15:22:08 +0000},
	Date-Modified = {2013-02-12 15:23:04 +0000},
	Publisher = {Foundations and Trends in Theoretical Computer Science},
	Title = {Pseudorandomness},
	Year = {2012}}

@article{berlekamp1978,
	Author = {Berlekamp, Elwyn and McEliece, Robert and van Tilborg, Henk},
	Doi = {10.1109/TIT.1978.1055873},
	Issn = {0018-9448},
	Journal = {IEEE Transactions on Information Theory},
	Keywords = {Decoding;Equations;Estimation theory;Feedback;Gaussian channels;Linear code;Polynomials;Processor scheduling;Rate-distortion;Source coding; Decoding; Linear codes;},
	Month = {May},
	Number = {3},
	Pages = {384 - 386},
	Title = {On the inherent intractability of certain coding problems},
	Volume = {24},
	Year = {1978},
	Bdsk-Url-1 = {http://dx.doi.org/10.1109/TIT.1978.1055873}}

@inproceedings{castelluccia2005shake,
	Author = {Castelluccia, Claude and Mutaf, Pars},
	Booktitle = {Proceedings of the 3rd international conference on Mobile systems, applications, and services},
	Organization = {ACM},
	Pages = {51--64},
	Title = {Shake Them Up!: A movement-based pairing protocol for {CPU}-constrained devices},
	Year = {2005}}

@inproceedings{suh2007physical,
	Author = {Suh, G. Edward and Devadas, Srinivas},
	Booktitle = {Proceedings of the 44th annual Design Automation Conference},
	Organization = {ACM},
	Pages = {9--14},
	Title = {Physical unclonable functions for device authentication and secret key generation},
	Year = {2007}}

@incollection{tuyls2006puf,
	Author = {Tuyls, Pim and Schrijen, Geert-Jan and \v{S}koriƒ{\'a}, Boris and Geloven, Jan and Verhaegh, Nynke and Wolters, Rob},
	Booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2006},
	Doi = {10.1007/11894063_29},
	Editor = {Goubin, Louis and Matsui, Mitsuru},
	Isbn = {978-3-540-46559-1},
	Pages = {369-383},
	Publisher = {Springer Berlin Heidelberg},
	Series = {Lecture Notes in Computer Science},
	Title = {Read-Proof Hardware from Protective Coatings},
	Url = {http://dx.doi.org/10.1007/11894063_29},
	Volume = {4249},
	Year = {2006},
	Bdsk-Url-1 = {http://dx.doi.org/10.1007/11894063_29}}

@article{brostoff2000passfaces,
	Author = {Brostoff, Sacha and Sasse, M.Angela},
	Journal = {People and Computers},
	Pages = {405--424},
	Title = {Are Passfaces more usable than passwords?: A field trial investigation},
	Year = {2000}}

@article{zviran1993comparison,
	Author = {Zviran, Moshe and Haga, William J.},
	Journal = {The Computer Journal},
	Number = {3},
	Pages = {227--237},
	Publisher = {Br Computer Soc},
	Title = {A comparison of password techniques for multilevel authentication mechanisms},
	Volume = {36},
	Year = {1993}}

@article{daugman2004,
	Author = {Daugman, John},
	Doi = {10.1109/TCSVT.2003.818350},
	Issn = {1051-8215},
	Journal = {Circuits and Systems for Video Technology, IEEE Transactions on},
	Keywords = {Demodulation;Entropy;Image databases;Iris recognition;Ligaments;Lighting;Pattern matching;Pattern recognition;Pigmentation;Testing; biometrics (access control); decision theory; entropy; image matching; statistical analysis; transform coding; wavelet transforms; biometrics; decision theory; discrimination entropy; iris pattern recognition; iris phase structure; iris recognition; multi-scale quadrature wavelet coding; one-to-many identification mode; one-to-one identification mode; personal identity; statistical independence; verification;},
	Month = {January},
	Number = {1},
	Pages = {21 - 30},
	Title = {How iris recognition works},
	Volume = {14},
	Year = {2004},
	Bdsk-Url-1 = {http://dx.doi.org/10.1109/TCSVT.2003.818350}}

@inproceedings{chandran2010privacy,
	Acmid = {1806796},
	Address = {New York, NY, USA},
	Author = {Chandran, Nishanth and Kanukurthi, Bhavana and Ostrovsky, Rafail and Reyzin, Leonid},
	Booktitle = {Proceedings of the 42nd ACM Symposium on Theory of Computing},
	Doi = {10.1145/1806689.1806796},
	Isbn = {978-1-4503-0050-6},
	Keywords = {entropy loss, information-theoretic key agreement, privacy amplification},
	Location = {Cambridge, Massachusetts, USA},
	Numpages = {10},
	Pages = {785--794},
	Publisher = {ACM},
	Title = {Privacy amplification with asymptotically optimal entropy loss},
	Url = {http://doi.acm.org/10.1145/1806689.1806796},
	Year = {2010},
	Bdsk-Url-1 = {http://doi.acm.org/10.1145/1806689.1806796},
	Bdsk-Url-2 = {http://dx.doi.org/10.1145/1806689.1806796}}

@inproceedings{dodisWichs2009,
	Acmid = {1536496},
	Address = {New York, NY, USA},
	Author = {Dodis, Yevgeniy and Wichs, Daniel},
	Booktitle = {Proceedings of the 41st annual ACM Symposium on Theory of Computing},
	Doi = {10.1145/1536414.1536496},
	Isbn = {978-1-60558-506-2},
	Keywords = {authenticated key agreement, authentication, bounded retrieval model, encryption, information reconcilliation, information theoretic security, privacy amplification, randomness extractors},
	Location = {Bethesda, MD, USA},
	Numpages = {10},
	Pages = {601--610},
	Publisher = {ACM},
	Title = {Non-malleable extractors and symmetric key cryptography from weak secrets},
	Url = {http://doi.acm.org/10.1145/1536414.1536496},
	Year = {2009},
	Bdsk-Url-1 = {http://doi.acm.org/10.1145/1536414.1536496},
	Bdsk-Url-2 = {http://dx.doi.org/10.1145/1536414.1536496}}

@article{KZ07,
	Author = {Jesse Kamp and David Zuckerman},
	Bibsource = {DBLP, http://dblp.uni-trier.de},
	Ee = {http://dx.doi.org/10.1137/S0097539705446846},
	Journal = {SIAM Journal on Computing},
	Number = {5},
	Pages = {1231-1247},
	Title = {Deterministic Extractors for Bit-Fixing Sources and Exposure-Resilient Cryptography},
	Volume = {36},
	Year = {2007}}

@article{bennett1988privacy,
	Author = {Bennett, Charles H. and Brassard, Gilles and Robert, Jean-Marc},
	Journal = {SIAM journal on Computing},
	Number = {2},
	Pages = {210--229},
	Publisher = {SIAM},
	Title = {Privacy amplification by public discussion},
	Volume = {17},
	Year = {1988}}

@article{kaplan2005derandomized,
	Author = {Kaplan, E. and Naor, M. and Reingold, O.},
	Journal = {Approximation, Randomization and Combinatorial Optimization. Algorithms and Techniques},
	Pages = {608--608},
	Publisher = {Springer},
	Title = {Derandomized constructions of k-wise (almost) independent permutations},
	Year = {2005}}

@article{smith2007scrambling,
	Author = {Smith, Adam},
	Journal = {ACM-SIAM Symposium on Discrete Algorithms},
	Number = {48},
	Pages = {395},
	Publisher = {SIAM},
	Title = {Scrambling adversarial errors using few random bits, optimal information reconciliation, and better private codes},
	Year = {2007}}

@book{cover2006elements,
	Author = {Cover, Thomas M. and Thomas, Joy A.},
	Date-Modified = {2013-04-03 14:28:01 +0000},
	Edition = {2nd},
	Publisher = {Wiley-InterScience},
	Title = {Elements of information theory},
	Year = {2006}}

@inproceedings{Juels1999,
	Acmid = {319714},
	Address = {New York, NY, USA},
	Author = {Juels, Ari and Wattenberg, Martin},
	Booktitle = {Proceedings of the 6th ACM conference on Computer and communications security},
	Doi = {10.1145/319709.319714},
	Isbn = {1-58113-148-8},
	Location = {Kent Ridge Digital Labs, Singapore},
	Numpages = {9},
	Pages = {28--36},
	Publisher = {ACM},
	Series = {CCS '99},
	Title = {A fuzzy commitment scheme},
	Url = {http://doi.acm.org/10.1145/319709.319714},
	Year = {1999},
	Bdsk-Url-1 = {http://doi.acm.org/10.1145/319709.319714},
	Bdsk-Url-2 = {http://dx.doi.org/10.1145/319709.319714}}

@incollection{Lai2006,
	Author = {Li, Qiming and Sutcu, Yagiz and Memon, Nasir},
	Booktitle = {Advances in Cryptology ‚ ASIACRYPT 2006},
	Doi = {10.1007/11935230_7},
	Editor = {Lai, Xuejia and Chen, Kefei},
	Isbn = {978-3-540-49475-1},
	Keywords = {Secure sketch; biometric template; continuous domain},
	Pages = {99-113},
	Publisher = {Springer Berlin Heidelberg},
	Series = {Lecture Notes in Computer Science},
	Title = {Secure Sketch for Biometric Templates},
	Url = {http://dx.doi.org/10.1007/11935230_7},
	Volume = {4284},
	Year = {2006},
	Bdsk-Url-1 = {http://dx.doi.org/10.1007/11935230_7}}

@inproceedings{Boyen2004,
	Acmid = {1030096},
	Address = {New York, NY, USA},
	Author = {Boyen, Xavier},
	Booktitle = {Proceedings of the 11th ACM conference on Computer and communications security},
	Doi = {10.1145/1030083.1030096},
	Isbn = {1-58113-961-6},
	Keywords = {biometric keying, chosen perturbation security, fuzzy extractor, zero storage biometric authentication},
	Location = {Washington DC, USA},
	Numpages = {10},
	Pages = {82--91},
	Publisher = {ACM},
	Series = {CCS '04},
	Title = {Reusable cryptographic fuzzy extractors},
	Url = {http://doi.acm.org/10.1145/1030083.1030096},
	Year = {2004},
	Bdsk-Url-1 = {http://doi.acm.org/10.1145/1030083.1030096},
	Bdsk-Url-2 = {http://dx.doi.org/10.1145/1030083.1030096}}

@incollection{dkrs2006,
	Author = {Dodis, Yevgeniy and Katz, Jonathan and Reyzin, Leonid and Smith, Adam},
	Booktitle = {Advances in Cryptology - CRYPTO 2006},
	Doi = {10.1007/11818175_14},
	Editor = {Dwork, Cynthia},
	Isbn = {978-3-540-37432-9},
	Pages = {232-250},
	Publisher = {Springer Berlin Heidelberg},
	Series = {Lecture Notes in Computer Science},
	Title = {Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets},
	Url = {http://dx.doi.org/10.1007/11818175_14},
	Volume = {4117},
	Year = {2006},
	Bdsk-Url-1 = {http://dx.doi.org/10.1007/11818175_14}}

@article{juels2006,
	Author = {Juels, Ari and Sudan, Madhu},
	Doi = {10.1007/s10623-005-6343-z},
	Issn = {0925-1022},
	Issue = {2},
	Journal = {Designs, Codes and Cryptography},
	Keywords = {authentication; cryptography; error-correting codes},
	Language = {English},
	Pages = {237-257},
	Publisher = {Kluwer Academic Publishers},
	Title = {A Fuzzy Vault Scheme},
	Url = {http://dx.doi.org/10.1007/s10623-005-6343-z},
	Volume = {38},
	Year = {2006},
	Bdsk-Url-1 = {http://dx.doi.org/10.1007/s10623-005-6343-z}}

@inproceedings{dottling2012,
	Author = {Nico D\"{o}ttling and J\"{o}rn M\"{u}ller-Quade},
title     = {Lossy Codes and a New Variant of the Learning-With-Errors
               Problem},
  booktitle = {EUROCRYPT},
  year      = {2013},
  pages     = {18-34},
  ee        = {http://dx.doi.org/10.1007/978-3-642-38348-9_2},
  crossref  = {DBLP:conf/eurocrypt/2013},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{DBLP:conf/eurocrypt/2013,
  editor    = {Thomas Johansson and
               Phong Q. Nguyen},
  title     = {Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International
               Conference on the Theory and Applications of Cryptographic
               Techniques, Athens, Greece, May 26-30, 2013. Proceedings},
  booktitle = {EUROCRYPT},
  publisher = {Springer},
  series    = {Lecture Notes in Computer Science},
  volume    = {7881},
  year      = {2013},
  isbn      = {978-3-642-38347-2, 978-3-642-38348-9},
  ee        = {http://dx.doi.org/10.1007/978-3-642-38348-9},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}


@inproceedings{peikert2009latticereduction,
	Acmid = {1536461},
	Address = {New York, NY, USA},
	Author = {Peikert, Chris},
	Booktitle = {Proceedings of the 41st annual ACM Symposium on Theory of Computing},
	Doi = {10.1145/1536414.1536461},
	Isbn = {978-1-60558-506-2},
	Keywords = {cryptography, lattices},
	Location = {Bethesda, MD, USA},
	Numpages = {10},
	Pages = {333--342},
	Publisher = {ACM},
	Title = {Public-key cryptosystems from the worst-case shortest vector problem: extended abstract},
	Url = {http://doi.acm.org/10.1145/1536414.1536461},
	Year = {2009},
	Bdsk-Url-1 = {http://doi.acm.org/10.1145/1536414.1536461},
	Bdsk-Url-2 = {http://dx.doi.org/10.1145/1536414.1536461}}

@inproceedings{regev2005LWE,
	Acmid = {1060603},
	Address = {New York, NY, USA},
	Author = {Regev, Oded},
	Booktitle = {Proceedings of the thirty-seventh annual ACM Symposium on Theory of Computing},
	Date-Added = {2012-11-15 16:33:51 +0000},
	Date-Modified = {2012-11-15 16:34:01 +0000},
	Doi = {10.1145/1060590.1060603},
	Isbn = {1-58113-960-8},
	Keywords = {computational learning theory, cryptography, lattices, public key encryption, quantum computing, statistical queries},
	Location = {Baltimore, MD, USA},
	Numpages = {10},
	Pages = {84--93},
	Publisher = {ACM},
	Title = {On lattices, learning with errors, random linear codes, and cryptography},
	Url = {http://doi.acm.org/10.1145/1060590.1060603},
	Year = {2005},
	Bdsk-Url-1 = {http://doi.acm.org/10.1145/1060590.1060603},
	Bdsk-Url-2 = {http://dx.doi.org/10.1145/1060590.1060603}}

@article{daugman2006probing,
	Author = {Daugman, J.},
	Journal = {Proceedings of the IEEE},
	Number = {11},
	Pages = {1927--1935},
	Publisher = {IEEE},
	Title = {Probing the uniqueness and randomness of IrisCodes: Results from 200 billion iris pair comparisons},
	Volume = {94},
	Year = {2006}}

@article{blantonnon,
	Author = {Blanton, M. and Aliasgari, M.},
	Title = {On the (Non-) Reusability of Fuzzy Sketches and Extractors and Security Improvements in the Computational Setting},
	Url = {http://eprint.iacr.org/2012/608},
	Year = {2012},
	Bdsk-Url-1 = {http://eprint.iacr.org/2012/608}}

@article{forney1966,
	Abstract = {Massachusetts Institute of Technology. Dept. of Electrical Engineering. Thesis. 1965. Sc.D.},
	Author = {George David Forney},
	Institution = {NDLTD Union Catalog [http://alcme.oclc.org/ndltd/servlet/OAIHandler] (United States)},
	Keywords = {Electrical Engineering},
	Publisher = {Massachusetts Institute of Technology},
	Title = {Concatenated codes.},
	Url = {http://hdl.handle.net/1721.1/13449},
	Year = {1965},
	Bdsk-Url-1 = {http://hdl.handle.net/1721.1/13449}}

@book{shannon1949mathematical,
	Author = {Shannon, Claude E. and Weaver, Warren and Blahut, Richard E. and Hajek, Bruce},
	Publisher = {University of Illinois press Urbana},
	Title = {The mathematical theory of communication},
	Volume = {117},
	Year = {1949}}

@inproceedings{ApplebaumCPS09,
	Author = {Benny Applebaum and David Cash and Chris Peikert and Amit Sahai},
	Bibsource = {DBLP, http://dblp.uni-trier.de},
	Booktitle = {CRYPTO},
	Crossref = {DBLP:conf/crypto/2009},
	Ee = {http://dx.doi.org/10.1007/978-3-642-03356-8_35},
	Pages = {595-618},
	Title = {Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems},
	Year = {2009}}

@proceedings{DBLP:conf/crypto/2009,
	Bibsource = {DBLP, http://dblp.uni-trier.de},
	Booktitle = {CRYPTO},
	Editor = {Shai Halevi},
	Ee = {http://dx.doi.org/10.1007/978-3-642-03356-8},
	Isbn = {978-3-642-03355-1},
	Publisher = {Springer},
	Series = {Lecture Notes in Computer Science},
	Title = {Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings},
	Volume = {5677},
	Year = {2009}}

@article{regevLWEsurvey,
	Address = {Los Alamitos, CA, USA},
	Author = {Oded Regev},
	Doi = {http://doi.ieeecomputersociety.org/10.1109/CCC.2010.26},
	Issn = {1093-0159},
	Journal = {Annual IEEE Conference on Computational Complexity},
	Pages = {191-204},
	Publisher = {IEEE Computer Society},
	Title = {The Learning with Errors Problem (Invited Survey)},
	Volume = {0},
	Year = {2010},
	Bdsk-Url-1 = {http://doi.ieeecomputersociety.org/10.1109/CCC.2010.26}}

@inproceedings{goldwasserRobustLWE,
	Author = {Shafi Goldwasser and Yael Kalai and Chris Peikert and Vinod Vaikuntanathan},
	Booktitle = {Invoations of Computer Science},
	Title = {Robustness of the Learning with Errors Assumption},
	Year = {2010}}

@incollection{peikertGaussianSampler,
	Affiliation = {Georgia Institute of Technology},
	Author = {Peikert, Chris},
	Booktitle = {Advances in Cryptology - CRYPTO 2010},
	Editor = {Rabin, Tal},
	Keyword = {Computer Science},
	Pages = {80-97},
	Publisher = {Springer Berlin / Heidelberg},
	Series = {Lecture Notes in Computer Science},
	Title = {An Efficient and Parallel Gaussian Sampler for Lattices},
	Volume = {6223},
	Year = {2010}}

@inproceedings{Boyen05secureremote,
	Author = {Xavier Boyen and Yevgeniy Dodis and Jonathan Katz and Rafail Ostrovsky and Adam Smith},
	Booktitle = {EUROCRYPT},
	Pages = {147--163},
	Publisher = {Springer},
	Title = {Secure remote authentication using biometric data},
	Year = {2005}}

@inproceedings{DBLP:bibsonomy_rfc5246,
	Author = {T. Dierks and E. Rescorla and E. Rescorla},
	Title = {The Transport Layer Security (TLS) Protocol Version 1.2},
	Year = {2008}}

@article{von1928theorie,
	Author = {Von Neumann, J.},
	Date-Added = {2010-04-28 15:11:57 -0400},
	Date-Modified = {2010-04-28 15:11:57 -0400},
	Journal = {Mathematische Annalen},
	Number = {1},
	Pages = {295--320},
	Title = {Zur theorie der gesellschaftsspiele},
	Volume = {100},
	Year = {1928}}

@inproceedings{Wee12,
	Author = {Hoeteck Wee},
	Booktitle = {Eurocrypt},
	Title = {Dual Projective Hashing and its Applications---Lossy Trapdoor Functions and More},
	Year = 2012}

@misc{fullerONeillReyzin11,
	Author = {Benjamin Fuller and Adam O'Neill and Leonid Reyzin},
	Howpublished = {Cryptology ePrint Archive},
	Title = {A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy},
	Year = {2012}}

@inproceedings{DBLP:conf/crypto/BrakerskiS11,
	Author = {Zvika Brakerski and Gil Segev},
	Booktitle = {CRYPTO},
	Pages = {543-560},
	Title = {Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting},
	Year = {2011}}

@article{DBLP:journals/eccc/AlonL11,
	Author = {Noga Alon and Shachar Lovett},
	Bibsource = {DBLP, http://dblp.uni-trier.de},
	Ee = {http://eccc.hpi-web.de/report/2011/049},
	Journal = {Electronic Colloquium on Computational Complexity (ECCC)},
	Pages = {49},
	Title = {Almost k-wise vs. k-wise independent permutations, and uniformity for general group actions},
	Volume = {18},
	Year = {2011}}

@article{DBLP:journals/corr/abs-1111-0492,
	Author = {Greg Kuperberg and Shachar Lovett and Ron Peled},
	Bibsource = {DBLP, http://dblp.uni-trier.de},
	Ee = {http://arxiv.org/abs/1111.0492},
	Journal = {CoRR},
	Title = {Probabilistic existence of rigid combinatorial structures},
	Volume = {abs/1111.0492},
	Year = {2011}}

@article{nisan1993randomness,
	Author = {Nisan, Noam and Zuckerman, David},
	Date-Added = {2011-09-12 16:37:11 -0400},
	Date-Modified = {2011-09-12 16:37:11 -0400},
	Journal = {Journal of Computer and System Sciences},
	Organization = {Citeseer},
	Pages = {43--52},
	Title = {Randomness is Linear in Space},
	Year = {1993}}

@article{gentry2011separating,
	Author = {Gentry, Craig and Wichs, Daniel},
	Date-Added = {2011-09-12 16:11:16 -0400},
	Date-Modified = {2011-09-12 16:23:11 -0400},
	Journal = {STOC. ACM, New York},
	Pages = {99-108},
	Title = {Separating Succinct Non-Interactive Arguments From All Falsifiable Assumptions},
	Year = {2011}}

@inproceedings{chung2011memory,
	Author = {Chung, Kai-Min and Kalai, Yael Tauman and Liu, Feng-Hao and Raz, Ran},
	Booktitle = {CRYPTO},
	Date-Added = {2011-09-12 16:10:11 -0400},
	Date-Modified = {2011-09-12 16:22:03 -0400},
	Pages = {151-168},
	Title = {Memory Delegation},
	Year = {2011}}

@conference{reingold2008dense,
	Author = {Reingold, Omer and Trevisan, Luca and Tulsiani, Madhur and Vadhan, Salil},
	Booktitle = {2008 49th Annual IEEE Symposium on Foundations of Computer Science},
	Date-Added = {2011-09-12 16:08:37 -0400},
	Date-Modified = {2011-09-12 16:14:54 -0400},
	Issn = {0272-5428},
	Organization = {IEEE},
	Pages = {76--85},
	Title = {Dense Subsets of Pseudorandom Sets},
	Year = {2008}}

@conference{barak-computational,
	Author = {Barak, Boaz and Shaltiel, Ronen and Wigderson, Avi},
	Booktitle = {11th International Conference on Random Structures and Algorithms},
	Date-Added = {2011-09-12 16:07:43 -0400},
	Date-Modified = {2011-09-12 16:12:36 -0400},
	Pages = {200--215},
	Title = {Computational Analogues of Entropy},
	Year = {2003}}

@inproceedings{DBLP:conf/crypto/BellareDPR98,
	Author = {Mihir Bellare and Anand Desai and David Pointcheval and Phillip Rogaway},
	Booktitle = {CRYPTO},
	Pages = {26-45},
	Title = {Relations Among Notions of Security for Public-Key Encryption Schemes},
	Year = {1998}}

@inproceedings{DBLP:conf/eurocrypt/HsiaoLR07,
	Author = {Chun-Yuan Hsiao and Chi-Jen Lu and Leonid Reyzin},
	Booktitle = {EUROCRYPT},
	Pages = {169-186},
	Title = {Conditional Computational Entropy, or Toward Separating Pseudoentropy from Compressibility},
	Year = {2007}}

@misc{cryptoeprint:2011:209,
	Author = {Zvika Brakerski and Gil Segev},
	Howpublished = {Cryptology ePrint Archive, Report 2011/209},
	Note = {\url{http://eprint.iacr.org/}},
	Title = {{Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting}},
	Year = {2011}}

@book{goldreich04:_found_of_crypt,
	Author = {Oded Goldreich},
	Publisher = {Cambridge University Press},
	Title = {Foundations of Cryptography},
	Volume = {I},
	Year = 2004}

@inproceedings{DBLP:conf/stoc/HaitnerRV10,
	Author = {Iftach Haitner and Omer Reingold and Salil P. Vadhan},
	Booktitle = {STOC},
	Pages = {437-446},
	Title = {Efficiency Improvements in Constructing Pseudorandom Generators from One-way Functions},
	Year = {2010}}

@inproceedings{DBLP:conf/asiacrypt/CramerHHIKPSV07,
	Author = {Ronald Cramer and Goichiro Hanaoka and Dennis Hofheinz and Hideki Imai and Eike Kiltz and Rafael Pass and Abhi Shelat and Vinod Vaikuntanathan},
	Booktitle = {ASIACRYPT},
	Pages = {502-518},
	Title = {Bounded {CCA}2-Secure Encryption},
	Year = {2007}}

@inproceedings{DBLP:conf/focs/GertnerKMRV00,
	Author = {Yael Gertner and Sampath Kannan and Tal Malkin and Omer Reingold and Mahesh Viswanathan},
	Booktitle = {FOCS},
	Pages = {325-335},
	Title = {The Relationship between Public Key Encryption and Oblivious Transfer},
	Year = {2000}}

@inproceedings{DBLP:conf/stoc/HaitnerRVW09,
	Author = {Iftach Haitner and Omer Reingold and Salil P. Vadhan and Hoeteck Wee},
	Booktitle = {STOC},
	Pages = {611-620},
	Title = {Inaccessible Entropy},
	Year = {2009}}

@inproceedings{DBLP:conf/fse/Rogaway04,
	Author = {Phillip Rogaway},
	Booktitle = {FSE},
	Pages = {348-359},
	Title = {Nonce-Based Symmetric Encryption},
	Year = {2004}}

@inproceedings{DBLP:conf/eurocrypt/RogawayS06,
	Author = {Phillip Rogaway and Thomas Shrimpton},
	Booktitle = {EUROCRYPT},
	Pages = {373-390},
	Title = {A Provable-Security Treatment of the Key-Wrap Problem},
	Year = {2006}}

@inproceedings{RenWol04a,
	Author = {Renato Renner and Stefan Wolf},
	Booktitle = {IEEE International Symposium on Information Theory --- ISIT 2004},
	Month = Jun,
	Pages = {233},
	Publisher = {IEEE},
	Title = {Smooth {R}{\'e}nyi Entropy and Applications},
	Year = 2004}

@article{Niederreiter,
	Author = {Harald Niederreiter},
	Journal = {Problems of Control and Information Theory},
	Pages = {367-391},
	Title = {Knapsack-type cryptosystems and algebraic coding theory},
	Volume = {15},
	Year = {1986}}

@article{DBLP:journals/algorithmica/Zuckerman96,
	Author = {David Zuckerman},
	Journal = {Algorithmica},
	Number = {4/5},
	Pages = {367-391},
	Title = {Simulating {BPP} Using a General Weak Random Source},
	Volume = {16},
	Year = {1996}}

@article{DBLP:journals/joc/BonehB08,
	Author = {Dan Boneh and Xavier Boyen},
	Journal = {J. Cryptology},
	Number = {2},
	Pages = {149-177},
	Title = {Short Signatures Without Random Oracles and the {SDH} Assumption in Bilinear Groups},
	Volume = {21},
	Year = {2008}}

@inproceedings{DBLP:conf/crypto/Krawczyk10,
	Author = {Hugo Krawczyk},
	Booktitle = {CRYPTO},
	Pages = {631-648},
	Title = {Cryptographic Extraction and Key Derivation: The {HKDF} Scheme},
	Year = {2010}}

@article{DBLP:journals/jcss/GoldwasserM84,
	Author = {Shafi Goldwasser and Silvio Micali},
	Bibsource = {DBLP, http://dblp.uni-trier.de},
	Journal = {J. Comput. Syst. Sci.},
	Number = {2},
	Pages = {270-299},
	Title = {Probabilistic Encryption},
	Volume = {28},
	Year = {1984}}

@inproceedings{DBLP:conf/sigmetrics/GoldbergXTBR08,
	Author = {Sharon Goldberg and David Xiao and Eran Tromer and Boaz Barak and Jennifer Rexford},
	Booktitle = {SIGMETRICS},
	Pages = {193-204},
	Title = {Path-quality monitoring in the presence of adversaries},
	Year = {2008}}

@inproceedings{DBLP:conf/eurocrypt/BonehCOP04,
	Author = {Dan Boneh and Giovanni Di Crescenzo and Rafail Ostrovsky and Giuseppe Persiano},
	Booktitle = {EUROCRYPT},
	Pages = {506-522},
	Title = {Public Key Encryption with Keyword Search},
	Year = {2004}}

@inproceedings{ccsw,
	Author = {Mariana Raykova and Binh Vo and Steven Bellovin and Tal Malkin},
	Booktitle = {ACM Cloud Computing Security Workshop},
	Title = {Secure Anonymous Database Search},
	Year = {2009}}

@inproceedings{DBLP:conf/asiacrypt/BellareBNRSSY09,
	Author = {Mihir Bellare and Zvika Brakerski and Moni Naor and Thomas Ristenpart and Gil Segev and Hovav Shacham and Scott Yilek},
	Booktitle = {ASIACRYPT},
	Pages = {232-249},
	Title = {Hedged Public-Key Encryption: How to Protect against Bad Randomness},
	Year = {2009}}

@inproceedings{DBLP:conf/aaecc/CuiMKI09,
	Author = {Yang Cui and Kirill Morozov and Kazukuni Kobara and Hideki Imai},
	Booktitle = {AAECC},
	Pages = {159-168},
	Title = {Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based {PKE}},
	Year = {2009}}

@inproceedings{DBLP:conf/eurocrypt/BarakGX08,
	Author = {Boaz Barak and Sharon Goldberg and David Xiao},
	Booktitle = {EUROCRYPT},
	Pages = {341-360},
	Title = {Protocols and Lower Bounds for Failure Localization in the Internet},
	Year = {2008}}

@inproceedings{DBLP:conf/sigcomm/AndersenBFKMS08,
	Author = {David G. Andersen and Hari Balakrishnan and Nick Feamster and Teemu Koponen and Daekyeong Moon and Scott Shenker},
	Booktitle = {SIGCOMM},
	Pages = {339-350},
	Title = {Accountable internet protocol ({AIP})},
	Year = {2008}}

@misc{cryptoeprint:2004:152,
	Author = {Neal Koblitz and Alfred Menezes},
	Howpublished = {Cryptology ePrint Archive, Report 2004/152},
	Note = {\url{http://eprint.iacr.org/}},
	Title = {Another Look at ``Provable Security''},
	Year = {2004}}

@inproceedings{GOR,
	Author = {Vipul Goyal and Adam O'Neill and Vanishree Rao},
	Booktitle = {TCC},
	Title = {Correlated-Input Secure Hash Functions},
	Year = {2011}}

@techreport{FR11,
	Author = {Benjamin Fuller and Leonid Reyzin},
	Date-Modified = {2011-09-15 16:02:12 -0400},
	Institution = {Boston University},
	Title = {Computational Entropy and Information Leakage},
	Url = {http://cs-people.bu.edu/bfuller/metricEntropy.pdf},
	Year = {2011},
	Bdsk-Url-1 = {http://cs-people.bu.edu/bfuller/metricEntropy.pdf}}

@misc{de,
	Author = {Adam O'Neill},
	Note = {Unpubished Manuscript},
	Title = {Deterministic Public-Key Encryption Revisited},
	Year = {2010}}

@misc{fehr,
	Author = {Serge Fehr},
	Note = {Unpubished Manuscript},
	Title = {Secure Deterministic Encryption for High-Entropy Messages},
	Year = {2008}}

@misc{opdeniable,
	Author = {Adam O'Neill and Chris Peikert},
	Note = {Manuscript},
	Title = {Bideniable Encryption},
	Year = {2010}}

@misc{osrational,
	Author = {Adam O'Neill and Ashish Sangwan},
	Note = {Manuscript},
	Title = {Rational Secret Sharing with Honest and Malicious Players},
	Year = {2009}}

@misc{epelgamal,
	Author = {Eike Kiltz and Krzysztof Pietrzak},
	Note = {Manuscript, 2009},
	Title = {How to secure {ElGamal} against Side-Channel Attacks}}

@misc{orchid,
	Author = {Murtaza Motiwala and Andy Bavier and Nick Feamster},
	Note = {NSDI April 2007, Boston (Poster)},
	Title = {Network Troubleshooting: An In-band Approach}}

@misc{kiltz10,
	Author = {Eike Kiltz},
	Note = {Personal correspondence, 2010}}

@misc{dario,
	Author = {Angelo De Caro and Dario Fiore},
	Note = {Personal correspondence, 2010}}

@inproceedings{DBLP:conf/crypto/Kocher96,
	Author = {Paul C. Kocher},
	Booktitle = {CRYPTO},
	Pages = {104-113},
	Title = {Timing Attacks on Implementations of {D}iffie-{H}ellman, {RSA}, {DSS}, and Other Systems},
	Year = {1996}}

@article{DBLP:journals/iacr/KiltzOS11,
	Author = {Eike Kiltz and Adam O'Neill and Adam Smith},
	Bibsource = {DBLP, http://dblp.uni-trier.de},
	Ee = {http://eprint.iacr.org/2011/559},
	Journal = {IACR Cryptology ePrint Archive},
	Pages = {559},
	Title = {Instantiability of {RSA}-{OAEP} under Chosen-Plaintext Attack},
	Volume = {2011},
	Year = {2011}}

@inproceedings{DBLP:conf/tcc/DodisS05,
	Author = {Yevgeniy Dodis and Adam Smith},
	Booktitle = {TCC},
	Pages = {556-577},
	Title = {Entropic Security and the Encryption of High Entropy Messages},
	Year = {2005}}

@inproceedings{DBLP:conf/stoc/DodisS05,
	Author = {Yevgeniy Dodis and Adam Smith},
	Booktitle = {STOC},
	Pages = {654-663},
	Title = {Correcting errors without leaking partial information},
	Year = {2005}}

@inproceedings{DBLP:conf/eurocrypt/KiltzPSY09,
	Author = {Eike Kiltz and Krzysztof Pietrzak and Martijn Stam and Moti Yung},
	Booktitle = {EUROCRYPT},
	Pages = {590-609},
	Title = {A New Randomness Extraction Paradigm for Hybrid Encryption},
	Year = {2009}}

@article{DBLP:journals/siamcomp/AlexiCGS88,
	Author = {Werner Alexi and Benny Chor and Oded Goldreich and Claus-Peter Schnorr},
	Journal = {SIAM Journal on Computing},
	Number = {2},
	Title = {{RSA} and {Rabin} Functions: Certain Parts are as Hard as the Whole},
	Volume = {17},
	Year = {1988}}

@article{DBLP:journals/algorithmica/KaplanNR09,
	Author = {Eyal Kaplan and Moni Naor and Omer Reingold},
	Journal = {Algorithmica},
	Number = {1},
	Pages = {113-133},
	Title = {Derandomized Constructions of {\it k}-Wise (Almost) Independent Permutations},
	Volume = {55},
	Year = {2009}}

@article{DBLP:journals/siamcomp/ChorG88,
	Author = {Benny Chor and Oded Goldreich},
	Journal = {SIAM Journal on Computing},
	Number = {2},
	Title = {Unbiased Bits from Sources of Weak Randomness and Probabilistic Communication Complexity},
	Volume = {17},
	Year = {1988}}

@inproceedings{DBLP:conf/eurocrypt/BellareR94,
	Author = {Mihir Bellare and Phillip Rogaway},
	Booktitle = {EUROCRYPT},
	Pages = {92-111},
	Title = {Optimal Asymmetric Encryption},
	Year = {1994}}

@inproceedings{DBLP:conf/crypto/Boneh01,
	Author = {Dan Boneh},
	Bibsource = {DBLP, http://dblp.uni-trier.de},
	Booktitle = {CRYPTO},
	Crossref = {DBLP:conf/crypto/2001},
	Ee = {http://dx.doi.org/10.1007/3-540-44647-8_17},
	Pages = {275-291},
	Title = {Simplified {OAEP} for the {RSA} and {R}abin Functions},
	Year = {2001}}

@article{DBLP:journals/joc/Coppersmith97,
	Author = {Don Coppersmith},
	Journal = {J. Cryptology},
	Number = {4},
	Pages = {233-260},
	Title = {Small Solutions to Polynomial Equations, and Low Exponent {RSA} Vulnerabilities},
	Volume = {10},
	Year = {1997}}

@misc{flmoorchid,
	Author = {Murtaza Motiwala and Adam O'Neill and Robert Lychev and Nick Feamster and Andy Bavier},
	Note = {Manuscript. Authors in order of contribution},
	Title = {In-Band Network Fault Localization},
	Year = {2010}}

@misc{philcc,
	Author = {Phillip Rogaway},
	Note = {Corresponds to an invited talk at Eurocrypt 2009. \url{http://www.cs.ucdavis.edu/~rogaway/papers/cc.html}},
	Title = {Practice-Oriented Provable Security and the Social Construction of Cryptography},
	Year = {2009}}

@inproceedings{DBLP:conf/eurocrypt/KiltzMO10,
	Author = {Eike Kiltz and Payman Mohassel and Adam O'Neill},
	Booktitle = {EUROCRYPT},
	Pages = {673-692},
	Title = {Adaptive Trapdoor Functions and Chosen-Ciphertext Security},
	Year = {2010}}

@inproceedings{DBLP:conf/eurocrypt/KiltzP09,
	Author = {Eike Kiltz and Krzysztof Pietrzak},
	Booktitle = {EUROCRYPT},
	Pages = {389-406},
	Title = {On the Security of Padding-Based Encryption Schemes - or - Why We Cannot Prove {OAEP} Secure in the Standard Model},
	Year = {2009}}

@inproceedings{DBLP:conf/crypto/DodisOP05,
	Author = {Yevgeniy Dodis and Roberto Oliveira and Krzysztof Pietrzak},
	Booktitle = {CRYPTO},
	Pages = {449-466},
	Title = {On the Generic Insecurity of the Full Domain Hash},
	Year = {2005}}

@article{DBLP:journals/jacm/CanettiGH04,
	Author = {Ran Canetti and Oded Goldreich and Shai Halevi},
	Journal = {J. ACM},
	Note = {Preliminary version in STOC 1998},
	Number = {4},
	Pages = {557-594},
	Title = {The random oracle methodology, revisited},
	Volume = {51},
	Year = {2004}}

@inproceedings{DBLP:conf/eurocrypt/BellareR96,
	Author = {Mihir Bellare and Phillip Rogaway},
	Booktitle = {EUROCRYPT},
	Pages = {399-416},
	Title = {The Exact Security of Digital Signatures - How to Sign with {RSA} and {R}abin},
	Year = {1996}}

@inproceedings{DBLP:conf/ccs/BellareR93,
	Author = {Mihir Bellare and Phillip Rogaway},
	Booktitle = {ACM Conference on Computer and Communications Security},
	Pages = {62-73},
	Title = {Random Oracles are Practical: A Paradigm for Designing Efficient Protocols},
	Year = {1993}}

@inproceedings{DBLP:conf/ac/Bellare98,
	Author = {Mihir Bellare},
	Booktitle = {Lectures on Data Security},
	Pages = {1-15},
	Title = {Practice-Oriented Provable Security},
	Year = {1998}}

@inproceedings{DBLP:conf/crypto/BellareBO07,
	Author = {Mihir Bellare and Alexandra Boldyreva and Adam O'Neill},
	Booktitle = {CRYPTO},
	Pages = {535-552},
	Title = {Deterministic and Efficiently Searchable Encryption},
	Year = {2007}}

@inproceedings{DBLP:conf/eurocrypt/BoldyrevaCLO09,
	Author = {Alexandra Boldyreva and Nathan Chenette and Younho Lee and Adam O'Neill},
	Booktitle = {EUROCRYPT},
	Pages = {224-241},
	Title = {Order-Preserving Symmetric Encryption},
	Year = {2009}}

@inproceedings{DBLP:conf/crypto/BellareFOR08,
	Author = {Mihir Bellare and Marc Fischlin and Adam O'Neill and Thomas Ristenpart},
	Booktitle = {CRYPTO},
	Pages = {360-378},
	Title = {Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles},
	Year = {2008}}

@inproceedings{DBLP:conf/ccs/BoldyrevaGOY07,
	Author = {Alexandra Boldyreva and Craig Gentry and Adam O'Neill and Dae Hyun Yum},
	Booktitle = {ACM Conference on Computer and Communications Security},
	Pages = {276-285},
	Title = {Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing},
	Year = {2007}}

@misc{cryptoeprint:2009:512,
	Author = {Joel Alwen and Yevgeniy Dodis and Moni Naor and Gil Segev and Shabsi Walfish and Daniel Wichs},
	Howpublished = {Cryptology ePrint Archive, Report 2009/512},
	Note = {\url{http://eprint.iacr.org/}},
	Title = {Public-Key Encryption in the Bounded-Retrieval Model},
	Year = 2009}

@inproceedings{DBLP:conf/tcc/AbdallaBN10,
	Author = {Michel Abdalla and Mihir Bellare and Gregory Neven},
	Booktitle = {TCC},
	Pages = {480-497},
	Title = {Robust Encryption},
	Year = 2010}

@inproceedings{DBLP:conf/asiacrypt/ChoiDMW09,
	Author = {Seung Geol Choi and Dana Dachman-Soled and Tal Malkin and Hoeteck Wee},
	Booktitle = {ASIACRYPT},
	Pages = {287-302},
	Title = {Improved Non-committing Encryption with Applications to Adaptively Secure Protocols},
	Year = 2009}

@inproceedings{alwen09:_survey,
	Author = {Joel Alwen and Yevgeniy Dodis and Daniel Wichs},
	Booktitle = {ICITS},
	Title = {Survey: Leakage Resilience and the Bounded Retrieval Model},
	Year = 2009}

@inproceedings{DBLP:conf/crypto/HohenbergerW09,
	Author = {Susan Hohenberger and Brent Waters},
	Booktitle = {CRYPTO},
	Pages = {654-670},
	Title = {Short and Stateless Signatures from the {RSA} Assumption},
	Year = 2009}

@inproceedings{DBLP:conf/crypto/LeurentN09,
	Author = {Ga{\"e}tan Leurent and Phong Q. Nguyen},
	Booktitle = {CRYPTO},
	Pages = {445-464},
	Title = {How Risky Is the Random-Oracle Model?},
	Year = 2009}

@inproceedings{DBLP:conf/eurocrypt/BellareHY09,
	Author = {Mihir Bellare and Dennis Hofheinz and Scott Yilek},
	Booktitle = {EUROCRYPT},
	Pages = {1-35},
	Title = {Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening},
	Year = 2009}

@inproceedings{DBLP:conf/eurocrypt/HohenbergerW09,
	Author = {Susan Hohenberger and Brent Waters},
	Booktitle = {EUROCRYPT},
	Pages = {333-350},
	Title = {Realizing Hash-and-Sign Signatures under Standard Assumptions},
	Year = 2009}

@inproceedings{DBLP:conf/crypto/NaorS09,
	Author = {Moni Naor and Gil Segev},
	Booktitle = {CRYPTO},
	Pages = {18-35},
	Title = {Public-Key Cryptosystems Resilient to Key Leakage},
	Year = 2009}

@inproceedings{DBLP:conf/tcc/RosenS09,
	Author = {Alon Rosen and Gil Segev},
	Booktitle = {TCC},
	Pages = {419-436},
	Title = {Chosen-Ciphertext Security via Correlated Products},
	Year = {2009}}

@inproceedings{DBLP:conf/eurocrypt/CachinMS99,
	Author = {Christian Cachin and Silvio Micali and Markus Stadler},
	Booktitle = {EUROCRYPT},
	Pages = {402-414},
	Title = {Computationally Private Information Retrieval with Polylogarithmic Communication},
	Year = {1999}}

@article{DBLP:journals/joc/NaorR99,
	Author = {Moni Naor and Omer Reingold},
	Journal = {J. Cryptology},
	Number = {1},
	Pages = {29-66},
	Title = {On the Construction of Pseudorandom Permutations: {L}uby-{R}ackoff Revisited},
	Volume = {12},
	Year = {1999}}

@inproceedings{DBLP:conf/stoc/PeikertW08,
	Author = {Chris Peikert and Brent Waters},
	Booktitle = {STOC},
	Pages = {187-196},
	Title = {Lossy trapdoor functions and their applications},
	Year = 2008}

@inproceedings{DBLP:conf/crypto/BoldyrevaFO08,
	Author = {Alexandra Boldyreva and Serge Fehr and Adam O'Neill},
	Booktitle = {CRYPTO},
	Pages = {335-359},
	Title = {On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles},
	Year = 2008}

@inproceedings{DBLP:conf/crypto/PeikertVW08,
	Author = {Chris Peikert and Vinod Vaikuntanathan and Brent Waters},
	Booktitle = {CRYPTO},
	Pages = {554-571},
	Title = {A Framework for Efficient and Composable Oblivious Transfer},
	Year = 2008}

@inproceedings{DBLP:conf/focs/DziembowskiP08,
	Author = {Stefan Dziembowski and Krzysztof Pietrzak},
	Booktitle = {FOCS},
	Pages = {293-302},
	Title = {Leakage-Resilient Cryptography},
	Year = 2008}

@article{DBLP:journals/joc/CanettiHK07,
	Author = {Ran Canetti and Shai Halevi and Jonathan Katz},
	Journal = {J. Cryptology},
	Note = {Preliminary version in EUROCRYPT 2003},
	Number = 3,
	Pages = {265-294},
	Title = {A Forward-Secure Public-Key Encryption Scheme},
	Volume = 20,
	Year = 2007}

@inproceedings{DBLP:conf/acns/HuangWZ07,
	Author = {Qiong Huang and Duncan S. Wong and Yiming Zhao},
	Booktitle = {ACNS},
	Pages = {1-17},
	Title = {Generic Transformation to Strongly Unforgeable Signatures},
	Year = 2007}

@inproceedings{DBLP:conf/tcc/MicaliPSW05,
	Author = {Silvio Micali and Chris Peikert and Madhu Sudan and David A. Wilson},
	Booktitle = {TCC},
	Pages = {1-16},
	Title = {Optimal Error Correction Against Computationally Bounded Noise},
	Year = 2005}

@inproceedings{DBLP:conf/tcc/CanettiHK05,
	Author = {Ran Canetti and Shai Halevi and Jonathan Katz},
	Booktitle = {TCC},
	Pages = {150-168},
	Title = {Adaptively-Secure, Non-interactive Public-Key Encryption},
	Year = 2005}

@inproceedings{DBLP:conf/podc/LepinskiMP04,
	Author = {Matt Lepinski and Silvio Micali and Chris Peikert and Abhi Shelat},
	Booktitle = {PODC},
	Pages = {1-10},
	Title = {Completely fair {SFE} and coalition-safe cheap talk},
	Year = 2004}

@inproceedings{DBLP:conf/tcc/MicaliR04,
	Author = {Silvio Micali and Leonid Reyzin},
	Booktitle = {TCC},
	Pages = {278-296},
	Title = {Physically Observable Cryptography (Extended Abstract)},
	Year = 2004}

@article{DBLP:journals/jacm/DworkNRS03,
	Author = {Cynthia Dwork and Moni Naor and Omer Reingold and Larry J. Stockmeyer},
	Journal = {J. ACM},
	Note = {Preliminary version in FOCS 1999},
	Number = 6,
	Pages = {852-921},
	Title = {Magic Functions},
	Volume = 50,
	Year = 2003}

@article{DBLP:journals/jacm/BlumKW03,
	Author = {Avrim Blum and Adam Kalai and Hal Wasserman},
	Journal = {J. ACM},
	Number = 4,
	Pages = {506-519},
	Title = {Noise-tolerant learning, the parity problem, and the statistical query model},
	Volume = 50,
	Year = 2003}

@inproceedings{DBLP:conf/crypto/Nielsen02,
	Author = {Jesper Buus Nielsen},
	Booktitle = {CRYPTO},
	Pages = {111-126},
	Title = {Separating Random Oracle Proofs from Complexity Theoretic Proofs: The Non-committing Encryption Case},
	Year = 2002}

@inproceedings{DBLP:conf/crypto/ShamirT01,
	Author = {Adi Shamir and Yael Tauman},
	Booktitle = {CRYPTO},
	Pages = {355-367},
	Title = {Improved Online/Offline Signature Schemes},
	Year = 2001}

@inproceedings{DBLP:conf/asiacrypt/BellareBDP01,
	Author = {Mihir Bellare and Alexandra Boldyreva and Anand Desai and David Pointcheval},
	Booktitle = {ASIACRYPT},
	Pages = {566-582},
	Title = {Key-Privacy in Public-Key Encryption},
	Year = 2001}

@article{DBLP:journals/siamcomp/DolevDN00,
	Author = {Danny Dolev and Cynthia Dwork and Moni Naor},
	Journal = {SIAM J. Comput.},
	Number = 2,
	Pages = {391-437},
	Title = {Nonmalleable Cryptography},
	Volume = 30,
	Year = 2000}

@inproceedings{DBLP:conf/ndss/KrawczykR00,
	Author = {Hugo Krawczyk and Tal Rabin},
	Booktitle = {NDSS},
	Title = {Chameleon Signatures},
	Year = 2000}

@inproceedings{DBLP:conf/asiacrypt/BoldyrevaCFW09,
	Author = {Alexandra Boldyreva and David Cash and Marc Fischlin and Bogdan Warinschi},
	Booktitle = {ASIACRYPT},
	Pages = {524-541},
	Title = {Foundations of Non-malleable Hash and One-Way Functions},
	Year = {2009}}

@inproceedings{DBLP:conf/crypto/Coron00,
	Author = {Jean-S{\'e}bastien Coron},
	Booktitle = {CRYPTO},
	Pages = {229-235},
	Title = {On the Exact Security of Full Domain Hash},
	Year = 2000}

@article{DBLP:journals/tissec/CramerS00,
	Author = {Ronald Cramer and Victor Shoup},
	Journal = {ACM Trans. Inf. Syst. Secur.},
	Note = {Preliminary version in CCS 1999},
	Number = 3,
	Pages = {161-185},
	Title = {Signature schemes based on the strong {RSA} assumption},
	Volume = 3,
	Year = 2000}

@inproceedings{DBLP:conf/crypto/DamgardN00,
	Author = {Ivan Damg{\aa}rd and Jesper Buus Nielsen},
	Booktitle = {CRYPTO},
	Pages = {432-450},
	Title = {Improved Non-committing Encryption Schemes Based on a General Complexity Assumption},
	Year = 2000}

@inproceedings{DBLP:conf/crypto/BellareM99,
	Author = {Mihir Bellare and Sara K. Miner},
	Booktitle = {CRYPTO},
	Pages = {431-448},
	Title = {A Forward-Secure Digital Signature Scheme},
	Year = 1999}

@inproceedings{DBLP:conf/eurocrypt/GennaroHR99,
	Author = {Rosario Gennaro and Shai Halevi and Tal Rabin},
	Booktitle = {EUROCRYPT},
	Pages = {123-139},
	Title = {Secure Hash-and-Sign Signatures Without the Random Oracle},
	Year = 1999}

@inproceedings{DBLP:conf/crypto/FujisakiO99,
	Author = {Eiichiro Fujisaki and Tatsuaki Okamoto},
	Booktitle = {CRYPTO},
	Pages = {537-554},
	Title = {Secure Integration of Asymmetric and Symmetric Encryption Schemes},
	Year = 1999}

@article{DBLP:journals/siamcomp/Shor97,
	Author = {Peter W. Shor},
	Journal = {SIAM J. Comput.},
	Number = 5,
	Pages = {1484-1509},
	Title = {Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer},
	Volume = 26,
	Year = 1997}

@inproceedings{DBLP:conf/focs/BellareDJR97,
	Author = {Mihir Bellare and Anand Desai and E. Jokipii and Phillip Rogaway},
	Booktitle = {FOCS},
	Pages = {394-403},
	Title = {A Concrete Security Treatment of Symmetric Encryption},
	Year = 1997}

@inproceedings{DBLP:conf/crypto/CanettiDNO97,
	Author = {Ran Canetti and Cynthia Dwork and Moni Naor and Rafail Ostrovsky},
	Booktitle = {CRYPTO},
	Pages = {90-104},
	Title = {Deniable Encryption},
	Year = 1997}

@inproceedings{DBLP:conf/focs/CanettiG96,
	Author = {Ran Canetti and Rosario Gennaro},
	Booktitle = {FOCS},
	Pages = {504-513},
	Title = {Incoercible Multiparty Computation (extended abstract)},
	Year = 1996}

@inproceedings{DBLP:conf/stoc/CanettiFGN96,
	Author = {Ran Canetti and Uriel Feige and Oded Goldreich and Moni Naor},
	Booktitle = {STOC},
	Pages = {639-648},
	Title = {Adaptively Secure Multi-Party Computation},
	Year = 1996}

@article{DBLP:journals/joc/ImpagliazzoN96,
	Author = {Russell Impagliazzo and Moni Naor},
	Journal = {J. Cryptology},
	Number = 4,
	Pages = {199-216},
	Title = {Efficient Cryptographic Schemes Provably as Secure as Subset Sum},
	Volume = 9,
	Year = 1996}

@article{DBLP:journals/cn/BrumleyB05,
	Author = {David Brumley and Dan Boneh},
	Journal = {Computer Networks},
	Number = {5},
	Pages = {701-716},
	Title = {Remote timing attacks are practical},
	Volume = {48},
	Year = {2005}}

@article{DBLP:journals/joc/TromerOS10,
	Author = {Eran Tromer and Dag Arne Osvik and Adi Shamir},
	Journal = {J. Cryptology},
	Number = 1,
	Pages = {37-71},
	Title = {Efficient Cache Attacks on {AES}, and Countermeasures},
	Volume = 23,
	Year = 2010}

@inproceedings{DBLP:conf/coco/Impagliazzo95,
	Author = {Russell Impagliazzo},
	Booktitle = {Structure in Complexity Theory Conference},
	Pages = {134-147},
	Title = {A Personal View of Average-Case Complexity},
	Year = 1995}

@book{lenstra93:_devel_of_number_field_sieve,
	Editor = {A. K. Lenstra and H. W. Lenstra},
	Month = {August},
	Publisher = {Springer-Verlag},
	Title = {The development of the number field sieve},
	Year = 1993}

@inproceedings{DBLP:conf/crypto/RackoffS91,
	Author = {Charles Rackoff and Daniel R. Simon},
	Booktitle = {CRYPTO},
	Pages = {433-444},
	Title = {Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack},
	Year = 1991}

@inproceedings{DBLP:conf/crypto/BlumFKL93,
	Author = {Avrim Blum and Merrick L. Furst and Michael J. Kearns and Richard J. Lipton},
	Booktitle = {CRYPTO},
	Pages = {278-291},
	Title = {Cryptographic Primitives Based on Hard Learning Problems},
	Year = 1993}

@inproceedings{DBLP:conf/stoc/NaorY90,
	Author = {Moni Naor and Moti Yung},
	Booktitle = {STOC},
	Pages = {427-437},
	Title = {Public-key Cryptosystems Provably Secure against Chosen Ciphertext Attacks},
	Year = 1990}

@inproceedings{DBLP:conf/stoc/NaorY89,
	Author = {Moni Naor and Moti Yung},
	Booktitle = {STOC},
	Pages = {33-43},
	Title = {Universal One-Way Hash Functions and their Cryptographic Applications},
	Year = 1989}

@article{DBLP:journals/siamcomp/GoldwasserMR88,
	Author = {Shafi Goldwasser and Silvio Micali and Ronald L. Rivest},
	Journal = {SIAM J. Comput.},
	Note = {Preliminary version in FOCS 1984},
	Number = 2,
	Pages = {281-308},
	Title = {A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks},
	Volume = 17,
	Year = 1988}

@article{DBLP:journals/siamcomp/BlumM84,
	Author = {Manuel Blum and Silvio Micali},
	Journal = {SIAM J. Comput.},
	Number = 4,
	Pages = {850-864},
	Title = {How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits},
	Volume = 13,
	Year = 1984}

@article{DBLP:journals/cacm/Shamir79,
	Author = {Adi Shamir},
	Journal = {Commun. ACM},
	Number = 11,
	Pages = {612-613},
	Title = {How to Share a Secret},
	Volume = 22,
	Year = 1979}

@article{DBLP:journals/cacm/RivestSA78,
	Author = {Ronald L. Rivest and Adi Shamir and Leonard M. Adleman},
	Journal = {Commun. ACM},
	Number = 2,
	Pages = {120-126},
	Title = {A Method for Obtaining Digital Signatures and Public-Key Cryptosystems},
	Volume = 21,
	Year = 1978}

@article{diffie76:_new_direc_in_crypt,
	Author = {Whitfield Diffie and Martin E. Hellman},
	Date = {November 1976},
	Journal = {IEEE Transactions on Information Theory},
	Number = 6,
	Pages = {644-654},
	Title = {New Directions in Cryptography},
	Volume = {IT-22},
	Year = 1976}

@techreport{rabin79:_digit_signat_and_public_key,
	Author = {Michael O. Rabin},
	Institution = {MIT Laboratory for Computer Science},
	Number = {MIT/LCS/TR-212},
	Title = {Digitalized signatures and public-key functions as intractable as factorization},
	Year = 1979}

@misc{sha3,
	Note = {Internet website; accessed 16 May 2010. \url{http://csrc.nist.gov/groups/ST/hash/sha-3/index.html}},
	Title = {CRYPTOGRAPHIC HASH ALGORITHM COMPETITION}}

@misc{RubberHose,
	Note = {Internet website; accessed 9 February 2010. \url{http://iq.org/~proff/marutukku.org/}},
	Title = {The rubberhose encryption system.}}

@misc{wiki:deniable,
	Author = {Wikipedia},
	Note = {Internet website; accessed 9 February 2010. \url{http://en.wikipedia.org/wiki/Deniable_encryption}},
	Title = {Deniable encryption --- {Wikipedia,} The Free Encyclopedia},
	Year = 2010}

@article{DBLP:journals/siamcomp/HastadILL99,
	Author = {Johan H{\aa}stad and Russell Impagliazzo and Leonid A. Levin and Michael Luby},
	Journal = {SIAM Journal on Computing},
	Number = {4},
	Pages = {1364-1396},
	Title = {A Pseudorandom Generator from any One-way Function},
	Volume = {28},
	Year = {1999}}

@inproceedings{DBLP:conf/ccs/BellareKN02,
	Author = {Mihir Bellare and Tadayoshi Kohno and Chanathip Namprempre},
	Booktitle = {ACM Conference on Computer and Communications Security},
	Pages = {1-11},
	Title = {Authenticated encryption in {SSH}: provably fixing the {SSH} binary packet protocol}}

@article{DBLP:journals/siamcomp/LubyR88,
	Author = {Michael Luby and Charles Rackoff},
	Journal = {SIAM J. Comput.},
	Number = {2},
	Pages = {373-386},
	Title = {How to Construct Pseudorandom Permutations from Pseudorandom Functions},
	Volume = {17},
	Year = {1988}}

@inproceedings{DBLP:conf/asiacrypt/WagnerG00,
	Author = {David Wagner and Ian Goldberg},
	Booktitle = {ASIACRYPT},
	Ee = {http://link.springer.de/link/service/series/0558/bibs/1976/19760560.htm},
	Pages = {560-572},
	Title = {Proofs of Security for the {U}nix Password Hashing Algorithm},
	Year = {2000}}

@inproceedings{DBLP:conf/dbsec/AmanatidisBO07,
	Author = {Georgios Amanatidis and Alexandra Boldyreva and Adam O'Neill},
	Booktitle = {DBSec},
	Pages = {14-30},
	Title = {Provably-Secure Schemes for Basic Query Support in Outsourced Databases},
	Year = {2007}}

@inproceedings{DBLP:conf/eurocrypt/CoronJNP00,
	Author = {Jean-S{\'e}bastien Coron and Marc Joye and David Naccache and Pascal Paillier},
	Booktitle = {EUROCRYPT},
	Pages = {369-381},
	Title = {New Attacks on {PKCS}\#1 {v}1.5 Encryption},
	Year = {2000}}

@article{DBLP:journals/tissec/BoldyrevaGOY08,
	Author = {Alexandra Boldyreva and Craig Gentry and Adam O'Neill and Dae Hyun Yum},
	Journal = {ACM Trans. Inf. Syst. Secur.},
	Number = {1},
	Title = {New Multiparty Signature Schemes for Network Routing Applications},
	Volume = {12},
	Year = {2008}}

@inproceedings{DBLP:conf/eurocrypt/KatzSW08,
	Author = {Jonathan Katz and Amit Sahai and Brent Waters},
	Booktitle = {EUROCRYPT},
	Pages = {146-162},
	Title = {Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products},
	Year = {2008}}

@inproceedings{blind,
	Author = {Paul Blair and Adam O'Neill},
	Booktitle = {Proc. of Technology and Persons with Disabilities Conference},
	Title = {An Architecture to Enable Community-Based Wayfinding for the Blind},
	Year = {2005}}

@inproceedings{vanish,
	Author = {Roxana Geambasu and Tadayoshi Kohno and Amit Levy and Henry M. Levy},
	Booktitle = {Proc. of the 18th USENIX Security Symposium},
	Title = {Vanish: Increasing Data Privacy with Self-Destructing Data},
	Year = 2009}

@inproceedings{DBLP:conf/crypto/Merkle89,
	Author = {Ralph C. Merkle},
	Booktitle = {CRYPTO},
	Note = {Preliminary version written in 1979},
	Pages = {218-238},
	Title = {A Certified Digital Signature},
	Year = {1989}}

@article{DBLP:journals/jacm/GoldreichGM86,
	Author = {Oded Goldreich and Shafi Goldwasser and Silvio Micali},
	Journal = {J. ACM},
	Number = {4},
	Pages = {792-807},
	Title = {How to construct random functions},
	Volume = {33},
	Year = {1986}}

@inproceedings{DBLP:conf/stoc/GoldreichL89,
	Author = {Oded Goldreich and Leonid A. Levin},
	Booktitle = {STOC},
	Pages = {25-32},
	Title = {A Hard-Core Predicate for all One-Way Functions},
	Year = {1989}}

@article{DBLP:journals/joc/FujisakiOPS04,
	Author = {Eiichiro Fujisaki and Tatsuaki Okamoto and David Pointcheval and Jacques Stern},
	Journal = {J. Cryptology},
	Number = {2},
	Pages = {81-104},
	Title = {{RSA}-{OAEP} Is Secure under the {RSA} Assumption},
	Volume = {17},
	Year = {2004}}

@inproceedings{DBLP:conf/eurocrypt/BellareBM00,
	Author = {Mihir Bellare and Alexandra Boldyreva and Silvio Micali},
	Booktitle = {EUROCRYPT},
	Pages = {259-274},
	Title = {Public-Key Encryption in a Multi-user Setting: Security Proofs and Improvements},
	Year = {2000}}

@article{Des,
	Author = {Desrosiers, Simon Pierre},
	Issn = {1570-0755},
	Journal = {Quantum Information Processing},
	Number = {4},
	Pages = {331--345},
	Title = {Entropic security in quantum cryptography},
	Volume = {8},
	Year = {2009}}

@inproceedings{DBLP:conf/pkc/DentFMSS10,
	Author = {Alexander W. Dent and Marc Fischlin and Mark Manulis and Martijn Stam and Dominique Schr{\"o}der},
	Booktitle = {Public Key Cryptography},
	Pages = {462-479},
	Title = {Confidential Signatures and Deterministic Signcryption},
	Year = {2010}}

@inproceedings{DBLP:conf/crypto/DodisGHKR04,
	Author = {Yevgeniy Dodis and Rosario Gennaro and Johan H{\aa}stad and Hugo Krawczyk and Tal Rabin},
	Booktitle = {CRYPTO},
	Pages = {494-510},
	Title = {Randomness Extraction and Key Derivation Using the {CBC}, Cascade and {HMAC} Modes},
	Year = {2004}}

@inproceedings{DBLP:conf/focs/SrinivasanZ94,
	Author = {Aravind Srinivasan and David Zuckerman},
	Booktitle = {FOCS},
	Pages = {264-275},
	Title = {Computing with Very Weak Random Sources},
	Year = {1994}}

@inproceedings{DBLP:conf/pkc/MolY10,
	Author = {Petros Mol and Scott Yilek},
	Bibsource = {DBLP, http://dblp.uni-trier.de},
	Booktitle = {Public Key Cryptography},
	Crossref = {DBLP:conf/pkc/2010},
	Ee = {http://dx.doi.org/10.1007/978-3-642-13013-7_18},
	Pages = {296-311},
	Title = {Chosen-Ciphertext Security from Slightly Lossy Trapdoor Functions},
	Year = {2010}}

@inproceedings{DBLP:conf/eurocrypt/BellareR06,
	Author = {Mihir Bellare and Phillip Rogaway},
	Booktitle = {EUROCRYPT},
	Pages = {409-426},
	Title = {The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs},
	Year = {2006}}

@inproceedings{DBLP:conf/crypto/PandeyPV08,
	Author = {Omkant Pandey and Rafael Pass and Vinod Vaikuntanathan},
	Booktitle = {CRYPTO},
	Pages = {57-74},
	Title = {Adaptive One-Way Functions and Applications},
	Year = {2008}}

@inproceedings{DBLP:conf/focs/MyersS09,
	Author = {Steven Myers and Abhi Shelat},
	Booktitle = {FOCS},
	Pages = {607-616},
	Title = {Bit Encryption Is Complete},
	Year = {2009}}

@inproceedings{DBLP:conf/tcc/Kiltz06,
	Author = {Eike Kiltz},
	Booktitle = {TCC},
	Pages = {581-600},
	Title = {Chosen-Ciphertext Security from Tag-Based Encryption},
	Year = {2006}}

@article{DBLP:journals/siamcomp/BonehCHK07,
	Author = {Dan Boneh and Ran Canetti and Shai Halevi and Jonathan Katz},
	Journal = {SIAM J. Comput.},
	Number = {5},
	Pages = {1301-1328},
	Title = {Chosen-Ciphertext Security from Identity-Based Encryption},
	Volume = {36},
	Year = {2007}}

@article{Lipton,
	Author = {Richard Lipton},
	Journal = {SIAM J. Comput.},
	Number = {5},
	Pages = {1301-1328},
	Title = {How to Cheat at Mental Poker},
	Volume = {36},
	Year = {2007}}

@inproceedings{Lipton,
	Author = {Richard Lipton},
	Booktitle = {AMS Short Course on Cryptology},
	Title = {How to Cheat at Mental Poker},
	Year = {1981}}

@inproceedings{DBLP:conf/tcc/Vahlis10,
	Author = {Yevgeniy Vahlis},
	Bibsource = {DBLP, http://dblp.uni-trier.de},
	Booktitle = {TCC},
	Crossref = {DBLP:conf/tcc/2010},
	Ee = {http://dx.doi.org/10.1007/978-3-642-11799-2_11},
	Pages = {165-182},
	Title = {Two Is a Crowd? A Black-Box Separation of One-Wayness and Security under Correlated Inputs},
	Year = {2010}}

@inproceedings{DBLP:conf/tcc/ReingoldTV04,
	Author = {Omer Reingold and Luca Trevisan and Salil P. Vadhan},
	Booktitle = {TCC},
	Pages = {1-20},
	Title = {Notions of Reducibility between Cryptographic Primitives},
	Year = {2004}}

@inproceedings{DBLP:conf/asiacrypt/PaillierV06,
	Author = {Pascal Paillier and Jorge Luis Villar},
	Booktitle = {ASIACRYPT},
	Pages = {252-266},
	Title = {Trading One-Wayness Against Chosen-Ciphertext Security in Factoring-Based Encryption},
	Year = {2006}}

@inproceedings{DBLP:conf/provsec/Chevallier-MamesJ09,
	Author = {Beno\^{\i}t Chevallier-Mames and Marc Joye},
	Booktitle = {ProvSec},
	Pages = {32-46},
	Title = {Chosen-Ciphertext Secure {RSA}-Type Cryptosystems},
	Year = {2009}}

@inproceedings{DBLP:conf/focs/MicaliRV99,
	Author = {Silvio Micali and Michael O. Rabin and Salil P. Vadhan},
	Booktitle = {FOCS},
	Pages = {120-130},
	Title = {Verifiable Random Functions},
	Year = {1999}}

@article{DBLP:journals/joc/CatalanoGH02,
	Author = {Dario Catalano and Rosario Gennaro and Nick Howgrave-Graham},
	Journal = {J. Cryptology},
	Title = {{P}aillier's Trapdoor Function Hides up to \textit{O}({\it n}) Bits},
	Year = {2002}}

@inproceedings{DBLP:conf/asiacrypt/SteinfeldPW06,
	Author = {Ron Steinfeld and Josef Pieprzyk and Huaxiong Wang},
	Booktitle = {ASIACRYPT},
	Pages = {194-209},
	Title = {On the Provable Security of an Efficient {RSA}-Based Pseudorandom Generator},
	Year = {2006}}

@article{DBLP:journals/ieeesp/Tsang07,
	Author = {Patrick P. Tsang},
	Journal = {IEEE Security {\&} Privacy},
	Number = {2},
	Pages = {76-79},
	Title = {When Cryptographers Turn Lead into Gold},
	Volume = {5},
	Year = {2007}}

@misc{Tahoe,
	Note = {Internet website; accessed 7 July 2010. \url{http://tahoe-lafs.org/~warner/tahoe.html}},
	Title = {Tahoe: A Secure Distributed File System}}

@inproceedings{DBLP:conf/crypto/CramerS98,
	Author = {Ronald Cramer and Victor Shoup},
	Booktitle = {CRYPTO},
	Pages = {13-25},
	Title = {A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack},
	Year = {1998}}

@article{MRS88,
	Author = {Silvio Micali and Charles Rackoff and Bob Sloan},
	Journal = {SIAM J. Comput.},
	Number = {2},
	Title = {The Notion of Security for Probabilistic Cryptosystems},
	Volume = {17},
	Year = {1988}}

@inproceedings{DBLP:conf/crypto/BellareHSV98,
	Author = {Mihir Bellare and Shai Halevi and Amit Sahai and Salil P. Vadhan},
	Booktitle = {CRYPTO},
	Pages = {283-298},
	Title = {Many-to-One Trapdoor Functions and Their Ralation to Public-Key Cryptosystems},
	Year = {1998}}

@inproceedings{DBLP:conf/focs/Yao82a,
	Author = {Andrew Chi-Chih Yao},
	Booktitle = {FOCS},
	Pages = {80-91},
	Title = {Theory and Applications of Trapdoor Functions (Extended Abstract)},
	Year = {1982}}

@inproceedings{DBLP:conf/eurocrypt/Paillier99,
	Author = {Pascal Paillier},
	Booktitle = {EUROCRYPT},
	Pages = {223-238},
	Title = {Public-Key Cryptosystems Based on Composite Degree Residuosity Classes},
	Year = {1999}}

@inproceedings{DBLP:conf/pkc/DamgardJ01,
	Author = {Ivan Damg{\aa}rd and Mads Jurik},
	Booktitle = {Public Key Cryptography},
	Pages = {119-136},
	Title = {A Generalisation, a Simplification and Some Applications of {P}aillier's Probabilistic Public-Key System},
	Year = {2001}}

@inproceedings{DBLP:conf/crypto/DamgardN02a,
	Author = {Ivan Damg{\aa}rd and Jesper Buus Nielsen},
	Booktitle = {CRYPTO},
	Pages = {581-596},
	Title = {Perfect Hiding and Perfect Binding Universally Composable Commitment Schemes with Constant Expansion Factor},
	Year = {2002}}

@inproceedings{DBLP:conf/crypto/DamgardN03,
	Author = {Ivan Damg{\aa}rd and Jesper Buus Nielsen},
	Booktitle = {CRYPTO},
	Pages = {247-264},
	Title = {Universally Composable Efficient Multiparty Computation from Threshold Homomorphic Encryption},
	Year = {2003}}

@article{DBLP:journals/joc/BellareNPS03,
	Author = {Mihir Bellare and Chanathip Namprempre and David Pointcheval and Michael Semanko},
	Journal = {J. Cryptology},
	Number = {3},
	Pages = {185-215},
	Title = {The One-More-{RSA}-Inversion Problems and the Security of {C}haum's Blind Signature Scheme},
	Volume = {16},
	Year = {2003}}

@article{DBLP:journals/tissec/BellareKN04,
	Author = {Mihir Bellare and Tadayoshi Kohno and Chanathip Namprempre},
	Journal = {ACM Trans. Inf. Syst. Secur.},
	Number = {2},
	Pages = {206-241},
	Title = {Breaking and provably repairing the {SSH} authenticated encryption scheme: A case study of the Encode-then-Encrypt-and-MAC paradigm},
	Volume = {7},
	Year = {2004}}

@inproceedings{DBLP:conf/stoc/CanettiMR98,
	Author = {Ran Canetti and Daniele Micciancio and Omer Reingold},
	Booktitle = {STOC},
	Pages = {131-140},
	Title = {Perfectly One-Way Probabilistic Hash Functions (Preliminary Version)},
	Year = {1998}}

@inproceedings{DBLP:conf/crypto/Canetti97,
	Author = {Ran Canetti},
	Booktitle = {CRYPTO},
	Pages = {455-469},
	Title = {Towards Realizing Random Oracles: Hash Functions That Hide All Partial Information},
	Year = {1997}}

@article{DBLP:journals/tit/RussellW06,
	Author = {Alexander Russell and Hong Wang},
	Journal = {IEEE Transactions on Information Theory},
	Number = {3},
	Pages = {1130-1140},
	Title = {How to fool an unbounded adversary with a short key},
	Volume = {52},
	Year = {2006}}

@article{DBLP:journals/joc/CanettiHK07,
	Author = {Ran Canetti and Shai Halevi and Jonathan Katz},
	Journal = {J. Cryptology},
	Number = {3},
	Pages = {265-294},
	Title = {A Forward-Secure Public-Key Encryption Scheme},
	Volume = {20},
	Year = {2007}}

@article{DBLP:journals/siamcomp/DodisORS08,
	Author = {Yevgeniy Dodis and Rafail Ostrovsky and Leonid Reyzin and Adam Smith},
	Journal = {SIAM Journal on Computing},
	Number = {1},
	Pages = {97-139},
	Title = {Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data},
	Volume = {38},
	Year = {2008}}

@inproceedings{DBLP:conf/dbsec/KantarciogluC05,
	Author = {Murat Kantarcioglu and Chris Clifton},
	Booktitle = {DBSec},
	Pages = {325-337},
	Title = {Security Issues in Querying Encrypted Data},
	Year = {2005}}

@inproceedings{DBLP:conf/sigmod/HacigumusILM02,
	Author = {Hakan Hacig{\"u}m{\"u}s and Balakrishna R. Iyer and Chen Li and Sharad Mehrotra},
	Booktitle = {SIGMOD Conference},
	Pages = {216-227},
	Title = {Executing {SQL} over encrypted data in the database-service-provider model},
	Year = {2002}}

@inproceedings{DBLP:conf/icde/HacigumusMI02,
	Author = {Hakan Hacig{\"u}m{\"u}s and Sharad Mehrotra and Balakrishna R. Iyer},
	Booktitle = {ICDE},
	Pages = {29-},
	Title = {Providing Database as a Service},
	Year = {2002}}

@inproceedings{DBLP:conf/osdi/AdyaBCCCDHLTW02,
	Author = {Atul Adya and William J. Bolosky and Miguel Castro and Gerald Cermak and Ronnie Chaiken and John R. Douceur and Jon Howell and Jacob R. Lorch and Marvin Theimer and Roger Wattenhofer},
	Booktitle = {OSDI},
	Title = {{FARSITE}: Federated, Available, and Reliable Storage for an Incompletely Trusted Environment},
	Year = {2002}}

@inproceedings{DBLP:conf/acns/BoyenW10,
	Author = {Xavier Boyen and Brent Waters},
	Booktitle = {ACNS},
	Pages = {35-52},
	Title = {Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions},
	Year = {2010}}

@inproceedings{DBLP:conf/tcc/CanettiD09,
	Author = {Ran Canetti and Ronny Ramzi Dakdouk},
	Booktitle = {TCC},
	Pages = {595-613},
	Title = {Towards a Theory of Extractable Functions},
	Year = {2009}}

@inproceedings{DBLP:conf/tcc/FaustKPR10,
	Author = {Sebastian Faust and Eike Kiltz and Krzysztof Pietrzak and Guy N. Rothblum},
	Booktitle = {TCC},
	Pages = {343-360},
	Title = {Leakage-Resilient Signatures},
	Year = {2010}}

@article{DBLP:journals/tit/Elgamal85,
	Author = {Taher El Gamal},
	Journal = {IEEE Transactions on Information Theory},
	Number = {4},
	Title = {A public key cryptosystem and a signature scheme based on discrete logarithms},
	Volume = {31},
	Year = {1985}}

@book{1111205,
	Address = {New York, NY, USA},
	Author = {Shoup, Victor},
	Isbn = {0-5218-5154-8},
	Publisher = {Cambridge University Press},
	Title = {A computational introduction to number theory and algebra},
	Year = {2005}}

@inproceedings{YRSES09,
	Author = {Scott Yilek and Eric Rescorla and Hovav Shacham and Brandon Enright and Stefan Savage},
	Booktitle = {Proceedings of the 9th {ACM SIGCOMM} Conference on Internet Measurement -- {IMC 2009}},
	Pages = {15--27},
	Publisher = {{ACM}},
	Title = {{When Private Keys are Public: Results from the 2008 {D}ebian {OpenSSL} Vulnerability}},
	Year = {2009}}

@inproceedings{DBLP:conf/crypto/Wee10,
	Author = {Hoeteck Wee},
	Booktitle = {CRYPTO},
	Title = {Efficient Chosen-Ciphertext Security via Extractable Hash Proofs},
	Year = {2010}}

@inproceedings{DBLP:conf/focs/GertnerMR01,
	Author = {Yael Gertner and Tal Malkin and Omer Reingold},
	Booktitle = {FOCS},
	Pages = {126-135},
	Title = {On the Impossibility of Basing Trapdoor Functions on Trapdoor Predicates},
	Year = {2001}}

@inproceedings{DBLP:conf/crypto/CramerS98,
	Author = {Ronald Cramer and Victor Shoup},
	Booktitle = {CRYPTO},
	Pages = {13-25},
	Title = {A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack},
	Year = {1998}}

@inproceedings{DBLP:conf/crypto/BellareR97,
	Author = {Mihir Bellare and Phillip Rogaway},
	Bibsource = {DBLP, http://dblp.uni-trier.de},
	Booktitle = {CRYPTO},
	Crossref = {DBLP:conf/crypto/1997},
	Ee = {http://dx.doi.org/10.1007/BFb0052256},
	Pages = {470-484},
	Title = {Collision-Resistant Hashing: Towards Making {UOWHFs} Practical},
	Year = {1997}}

@article{DBLP:journals/siamcomp/RosenS10,
	Author = {Alon Rosen and Gil Segev},
	Journal = {SIAM J. Comput.},
	Number = {7},
	Pages = {3058-3088},
	Title = {Chosen-Ciphertext Security via Correlated Products},
	Volume = {39},
	Year = {2010}}

@inproceedings{DBLP:conf/pkc/FreemanGKRS10,
	Author = {David Mandell Freeman and Oded Goldreich and Eike Kiltz and Alon Rosen and Gil Segev},
	Booktitle = {Public Key Cryptography},
	Pages = {279-295},
	Title = {More Constructions of Lossy and Correlation-Secure Trapdoor Functions},
	Year = {2010}}

@misc{cryptoeprint:2010:100,
	Author = {Brett Hemenway and Steve Lu and Rafail Ostrovsky},
	Howpublished = {Cryptology ePrint Archive, Report 2010/100},
	Note = {\url{http://eprint.iacr.org/}},
	Title = {Correlated Product Security From Any One-Way Function and the New Notion of Decisional Correlated Product Security},
	Year = {2010}}

@inproceedings{DBLP:conf/icalp/HaitnerHR06,
	Author = {Iftach Haitner and Danny Harnik and Omer Reingold},
	Booktitle = {ICALP (2)},
	Pages = {228-239},
	Title = {Efficient Pseudorandom Generators from Exponentially Hard One-Way Functions},
	Year = {2006}}

@inproceedings{groceKatz10pake,
	Author = {Adam Groce and Jonathan Katz},
	Bibsource = {DBLP, http://dblp.uni-trier.de},
	Booktitle = {ACM Conference on Computer and Communications Security},
	Date-Modified = {2012-05-16 15:22:16 +0000},
	Ee = {http://doi.acm.org/10.1145/1866307.1866365},
	Pages = {516-525},
	Title = {A new framework for efficient password-based authenticated key exchange},
	Year = {2010}}
