%% This BibTeX bibliography file was created using BibDesk.
%% http://bibdesk.sourceforge.net/


%% Created for Benjamin Fuller at 2012-10-17 12:21:49 -0400 


%% Saved with string encoding Unicode (UTF-8) 
@incollection {joyeSecondOrderDPA,
   author = {Joye, Marc and Paillier, Pascal and Schoenmakers, Berry},
   title = {On Second-Order Differential Power Analysis},
   booktitle = {Cryptographic Hardware and Embedded Systems‚ CHES 2005},
   series = {Lecture Notes in Computer Science},
   editor = {Rao, Josyula and Sunar, Berk},
   publisher = {Springer Berlin / Heidelberg},
   keyword = {Computer Science},
   pages = {293-308},
   volume = {3659},
   year = {2005}
}

@incollection {poppMangardDualRail,
   author = {Popp, Thomas and Mangard, Stefan},
   title = {Masked Dual-Rail Pre-charge Logic: DPA-Resistance Without Routing Constraints},
   booktitle = {Cryptographic Hardware and Embedded Systems‚ CHES 2005},
   series = {Lecture Notes in Computer Science},
   editor = {Rao, Josyula and Sunar, Berk},
   publisher = {Springer Berlin / Heidelberg},
   isbn = {978-3-540-28474-1},
   keyword = {Computer Science},
   pages = {172-186},
   volume = {3659},
   year = {2005}
}

@incollection {messergesMasking,
   author = {Messerges, Thomas},
   affiliation = {Motorola Labs, Motorola 1301 E. Algonquin Road, Room 2712 IL 60196 Schaumburg},
   title = {Securing the AES Finalists Against Power Analysis Attacks},
   booktitle = {Fast Software Encryption},
   series = {Lecture Notes in Computer Science},
   editor = {Goos, Gerhard and Hartmanis, Juris and van Leeuwen, Jan and Schneier, Bruce},
   publisher = {Springer Berlin / Heidelberg},
   keyword = {Computer Science},
   pages = {293-301},
   volume = {1978},
   year = {2001}
}


@incollection {chariTemplate,
   author = {Chari, Suresh and Rao, Josyula and Rohatgi, Pankaj},
   affiliation = {IBM Watson Research Center P.O. Box 704 NY 10598 Yorktown Heights},
   title = {Template Attacks},
   booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2002},
   series = {Lecture Notes in Computer Science},
   publisher = {Springer Berlin / Heidelberg},
   isbn = {978-3-540-00409-7},
   keyword = {Computer Science},
   pages = {51-62},
   volume = {2523},
   year = {2003}
}

@incollection {bihamShamirFault,
   author = {Biham, Eli and Shamir, Adi},
   affiliation = {Computer Science Department, Technion - Israel Institute of Technology, 32000 Haifa, Israel},
   title = {Differential fault analysis of secret key cryptosystems},
   booktitle = {Advances in Cryptology‚ CRYPTO '97},
   series = {Lecture Notes in Computer Science},
   editor = {Kaliski, Burton},
   publisher = {Springer Berlin / Heidelberg},
   isbn = {978-3-540-63384-6},
   keyword = {Computer Science},
   pages = {513-525},
   volume = {1294},
   url = {http://dx.doi.org/10.1007/BFb0052259},
   note = {10.1007/BFb0052259},
   year = {1997}
}

@INPROCEEDINGS{voipAnalysis, 
author={Wright, C.V. and Ballard, L. and Coull, S.E. and Monrose, F. and Masson, G.M.}, 
booktitle={Security and Privacy, 2008. SP 2008. IEEE Symposium on}, 
title={Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations}, 
year={2008}, 
month={may}, 
volume={}, 
number={}, 
pages={35 -49}, 
keywords={Voice over IP conversation;audio encoding;bit rate codecs;encrypted VoIP packet;uncovering spoken phrase;Internet telephony;audio coding;cryptography;speech codecs;speech coding;}, 
doi={10.1109/SP.2008.21}, 
ISSN={1081-6011}}

@incollection {DEMASmartCards,
   author = {Quisquater, Jean-Jacques and Samyde, David},
   title = {ElectroMagnetic Analysis (EMA): Measures and Counter-measures for Smart Cards},
   booktitle = {Smart Card Programming and Security},
   series = {Lecture Notes in Computer Science},
   editor = {Attali, Isabelle and Jensen, Thomas},
   publisher = {Springer Berlin / Heidelberg},
   isbn = {978-3-540-42610-3},
   keyword = {Computer Science},
   pages = {200-210},
   volume = {2140},
   year = {2001}
}

@incollection {DEMAConcrete,
   author = {Gandolfi, Karine and Mourtel, Christophe and Olivier, Francis},
   title = {Electromagnetic Analysis: Concrete Results},
   booktitle = {Cryptographic Hardware and Embedded Systems‚ CHES 2001},
   series = {Lecture Notes in Computer Science},
   publisher = {Springer Berlin / Heidelberg},
   isbn = {978-3-540-42521-2},
   keyword = {Computer Science},
   pages = {251-261},
   volume = {2162},
   year = {2001}
}

@article{Tromer:2010fk,
	Author = {Eran Tromer and Dag Arne Osvik and Adi Shamir},
	Date-Added = {2012-10-17 16:21:34 +0000},
	Date-Modified = {2012-10-17 16:21:34 +0000},
	Doi = {10.1007/s00145-009-9049-y},
	Journal = {Journal of Cryptology},
	Number = {1},
	Pages = {37--71},
	Title = {Efficient Cache Attacks on AES, and Countermeasures},
	Volume = {23},
	Year = {2010},
	Bdsk-Url-1 = {http://www.springerlink.com/content/73876v1qq07q0277/fulltext.pdf},
	Bdsk-Url-2 = {http://dx.doi.org/10.1007/s00145-009-9049-y}}

@techreport{Bernstein05cache-timingattacks,
	Author = {Daniel J. Bernstein},
	Date-Added = {2012-10-17 16:19:29 +0000},
	Date-Modified = {2012-10-17 16:19:29 +0000},
	Title = {Cache-timing attacks on AES},
	Year = {2005}}

@incollection{kocherTiming,
	Author = {Kocher, Paul},
	Booktitle = {Advances in Cryptology‚ CRYPTO ‚96},
	Editor = {Koblitz, Neal},
	Isbn = {978-3-540-61512-5},
	Keyword = {Computer Science},
	Pages = {104-113},
	Publisher = {Springer Berlin / Heidelberg},
	Series = {Lecture Notes in Computer Science},
	Title = {Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems},
	Volume = {1109},
	Year = {1996}}

@incollection{kocherDPA,
	Author = {Kocher, Paul and Jaffe, Joshua and Jun, Benjamin},
	Booktitle = {Advances in Cryptology‚ CRYPTO‚ 99},
	Editor = {Wiener, Michael},
	Isbn = {978-3-540-66347-8},
	Keyword = {Computer Science},
	Pages = {789-789},
	Publisher = {Springer Berlin / Heidelberg},
	Series = {Lecture Notes in Computer Science},
	Title = {Differential Power Analysis},
	Volume = {1666},
	Year = {1999}}

@article{coldboot,
	Address = {New York, NY, USA},
	Author = {Halderman, J. Alex and Schoen, Seth D. and Heninger, Nadia and Clarkson, William and Paul, William and Calandrino, Joseph A. and Feldman, Ariel J. and Appelbaum, Jacob and Felten, Edward W.},
	Date-Modified = {2012-10-17 16:08:33 +0000},
	Issn = {0001-0782},
	Issue_Date = {May 2009},
	Journal = {Communications of the ACM},
	Number = {5},
	Numpages = {8},
	Pages = {91--98},
	Publisher = {ACM},
	Title = {Lest we remember: cold-boot attacks on encryption keys},
	Volume = {52},
	Year = {2009}}

@inproceedings{shachamROP,
	Acmid = {1315313},
	Address = {New York, NY, USA},
	Author = {Shacham, Hovav},
	Booktitle = {Proceedings of the 14th ACM conference on Computer and communications security},
	Date-Added = {2012-10-17 15:04:53 +0000},
	Date-Modified = {2012-10-17 15:05:14 +0000},
	Doi = {10.1145/1315245.1315313},
	Isbn = {978-1-59593-703-2},
	Keywords = {instruction set, return-into-libc, turing completeness},
	Location = {Alexandria, Virginia, USA},
	Numpages = {10},
	Pages = {552--561},
	Publisher = {ACM},
	Series = {CCS '07},
	Title = {The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86)},
	Url = {http://doi.acm.org/10.1145/1315245.1315313},
	Year = {2007},
	Bdsk-Url-1 = {http://doi.acm.org/10.1145/1315245.1315313},
	Bdsk-Url-2 = {http://dx.doi.org/10.1145/1315245.1315313}}

@article{shachamROPcomplete,
	Acmid = {2133377},
	Address = {New York, NY, USA},
	Articleno = {2},
	Author = {Roemer, Ryan and Buchanan, Erik and Shacham, Hovav and Savage, Stefan},
	Date-Added = {2012-10-17 15:00:31 +0000},
	Date-Modified = {2012-10-17 15:00:42 +0000},
	Doi = {10.1145/2133375.2133377},
	Issn = {1094-9224},
	Issue_Date = {March 2012},
	Journal = {ACM Trans. Inf. Syst. Secur.},
	Keywords = {NX, RISC, Return-oriented programming, SPARC, W-xor-X, attacks, control flow integrity, memory safety, return-into-libc, x86},
	Month = mar,
	Number = {1},
	Numpages = {34},
	Pages = {2:1--2:34},
	Publisher = {ACM},
	Title = {Return-Oriented Programming: Systems, Languages, and Applications},
	Url = {http://doi.acm.org/10.1145/2133375.2133377},
	Volume = {15},
	Year = {2012},
	Bdsk-Url-1 = {http://doi.acm.org/10.1145/2133375.2133377},
	Bdsk-Url-2 = {http://dx.doi.org/10.1145/2133375.2133377}}

@inproceedings{shachamReturnLibC,
	Acmid = {1030124},
	Address = {New York, NY, USA},
	Author = {Shacham, Hovav and Page, Matthew and Pfaff, Ben and Goh, Eu-Jin and Modadugu, Nagendra and Boneh, Dan},
	Booktitle = {Proceedings of the 11th ACM conference on Computer and communications security},
	Date-Added = {2012-10-17 14:43:56 +0000},
	Date-Modified = {2012-10-17 15:05:09 +0000},
	Doi = {10.1145/1030083.1030124},
	Isbn = {1-58113-961-6},
	Keywords = {address-space randomization, automated attacks, diversity},
	Location = {Washington DC, USA},
	Numpages = {10},
	Pages = {298--307},
	Publisher = {ACM},
	Series = {CCS '04},
	Title = {On the effectiveness of address-space randomization},
	Url = {http://doi.acm.org/10.1145/1030083.1030124},
	Year = {2004},
	Bdsk-Url-1 = {http://doi.acm.org/10.1145/1030083.1030124},
	Bdsk-Url-2 = {http://dx.doi.org/10.1145/1030083.1030124}}

@chapter{Pedersen:1992fk,
	Author = {Torben Pryds Pedersen},
	Booktitle = {Advances in Cryptology --- CRYPTO '91},
	Date-Added = {2012-10-03 15:01:51 +0000},
	Date-Modified = {2012-10-03 15:01:51 +0000},
	Doi = {10.1007/3-540-46766-1_9},
	Pages = {129--140},
	Series = {Lecture Notes in Computer Science},
	Title = {Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing},
	Volume = {576},
	Year = {1992},
	Bdsk-Url-1 = {http://www.springerlink.com/content/pwqy90xna7thbxut/fulltext.pdf},
	Bdsk-Url-2 = {http://dx.doi.org/10.1007/3-540-46766-1_9}}

@inproceedings{yao1986,
	Author = {Yao, Andrew Chi-Chih},
	Booktitle = {Foundations of Computer Science, 1986., 27th Annual Symposium on},
	Date-Added = {2012-09-27 18:48:24 +0000},
	Date-Modified = {2012-09-27 18:51:12 +0000},
	Doi = {10.1109/SFCS.1986.25},
	Issn = {0272-5428},
	Month = {oct.},
	Pages = {162 -167},
	Title = {How to generate and exchange secrets},
	Year = {1986},
	Bdsk-Url-1 = {http://dx.doi.org/10.1109/SFCS.1986.25}}

@inproceedings{goldwasserMR85,
	Acmid = {22178},
	Address = {New York, NY, USA},
	Author = {Goldwasser, S and Micali, S and Rackoff, C},
	Booktitle = {Proceedings of the seventeenth annual ACM symposium on Theory of computing},
	Date-Added = {2012-09-26 02:13:22 +0000},
	Date-Modified = {2012-09-26 02:13:36 +0000},
	Doi = {10.1145/22145.22178},
	Isbn = {0-89791-151-2},
	Location = {Providence, Rhode Island, United States},
	Numpages = {14},
	Pages = {291--304},
	Publisher = {ACM},
	Series = {STOC '85},
	Title = {The knowledge complexity of interactive proof-systems},
	Url = {http://doi.acm.org/10.1145/22145.22178},
	Year = {1985},
	Bdsk-Url-1 = {http://doi.acm.org/10.1145/22145.22178},
	Bdsk-Url-2 = {http://dx.doi.org/10.1145/22145.22178}}

@inproceedings{GoldreichMW87,
	Author = {Oded Goldreich and Silvio Micali and Avi Wigderson},
	Booktitle = {STOC},
	Crossref = {1987},
	Ee = {http://doi.acm.org/10.1145/28395.28420},
	Pages = {218-229},
	Title = {How to Play any Mental Game or A Completeness Theorem for Protocols with Honest Majority},
	Year = {1987}}

@article{yao1982,
	Address = {Los Alamitos, CA, USA},
	Author = {Andrew C. Yao},
	Date-Added = {2012-09-26 01:41:54 +0000},
	Date-Modified = {2012-09-26 01:42:28 +0000},
	Doi = {http://doi.ieeecomputersociety.org/10.1109/SFCS.1982.88},
	Issn = {0272-5428},
	Journal = {Foundations of Computer Science, IEEE Annual Symposium on},
	Pages = {160-164},
	Publisher = {IEEE Computer Society},
	Title = {Protocols for secure computations},
	Volume = {0},
	Year = {1982},
	Bdsk-Url-1 = {http://doi.ieeecomputersociety.org/10.1109/SFCS.1982.88}}

@inproceedings{canettiUC,
	Author = {Canetti, R.},
	Booktitle = {Foundations of Computer Science, 2001. Proceedings. 42nd IEEE Symposium on},
	Date-Added = {2012-09-26 01:40:04 +0000},
	Date-Modified = {2012-09-26 01:40:13 +0000},
	Doi = {10.1109/SFCS.2001.959888},
	Keywords = {Internet; adversarially controlled execution; arbitrary protocols; arbitrary system; authenticated communication; complex unpredictable environments; concurrent composition; cryptographic protocol paradigm; cryptographic task; key-exchange; non-malleability; oblivious transfer; public-key encryption; secure communication; secure protocol; universally composable definitions; universally composable security; zero knowledge; bibliographies; computability; cryptography; message authentication; protocols;},
	Month = {oct.},
	Pages = {136 - 145},
	Title = {Universally composable security: a new paradigm for cryptographic protocols},
	Year = {2001},
	Bdsk-Url-1 = {http://dx.doi.org/10.1109/SFCS.2001.959888}}

@article{canettiTutorial,
	Acmid = {1165570},
	Address = {New York, NY, USA},
	Author = {Canetti, Ran},
	Date-Added = {2012-09-26 01:39:11 +0000},
	Date-Modified = {2012-09-26 01:39:22 +0000},
	Doi = {10.1145/1165555.1165570},
	Issn = {0163-5700},
	Issue_Date = {September 2006},
	Journal = {SIGACT News},
	Month = sep,
	Number = {3},
	Numpages = {26},
	Pages = {67--92},
	Publisher = {ACM},
	Title = {Security and composition of cryptographic protocols: a tutorial (part I)},
	Url = {http://doi.acm.org/10.1145/1165555.1165570},
	Volume = {37},
	Year = {2006},
	Bdsk-Url-1 = {http://doi.acm.org/10.1145/1165555.1165570},
	Bdsk-Url-2 = {http://dx.doi.org/10.1145/1165555.1165570}}

@article{GoldreichL06,
	Author = {Oded Goldreich and Yehuda Lindell},
	Ee = {http://dx.doi.org/10.1007/s00145-006-0233-z},
	Journal = {J. Cryptology},
	Number = {3},
	Pages = {241-340},
	Title = {Session-Key Generation Using Human Passwords Only},
	Volume = {19},
	Year = {2006}}

@article{DBLP:journals/tissec/GennaroL06,
	Author = {Rosario Gennaro and Yehuda Lindell},
	Bibsource = {DBLP, http://dblp.uni-trier.de},
	Ee = {http://doi.acm.org/10.1145/1151414.1151418},
	Journal = {ACM Trans. Inf. Syst. Secur.},
	Number = {2},
	Pages = {181-234},
	Title = {A framework for password-based authenticated key exchange$^{\mbox{1}}$},
	Volume = {9},
	Year = {2006}}

@article{DBLP:journals/jacm/KatzOY09,
	Author = {Jonathan Katz and Rafail Ostrovsky and Moti Yung},
	Bibsource = {DBLP, http://dblp.uni-trier.de},
	Ee = {http://doi.acm.org/10.1145/1613676.1613679},
	Journal = {J. ACM},
	Number = {1},
	Title = {Efficient and secure authenticated key exchange using weak passwords},
	Volume = {57},
	Year = {2009}}

@article{DiffieOW92,
	Author = {Whitfield Diffie and Paul C. van Oorschot and Michael J. Wiener},
	Bibsource = {DBLP, http://dblp.uni-trier.de},
	Ee = {http://dx.doi.org/10.1007/BF00124891},
	Journal = {Des. Codes Cryptography},
	Number = {2},
	Pages = {107-125},
	Title = {Authentication and Authenticated Key Exchanges},
	Volume = {2},
	Year = {1992}}

@inproceedings{CanettiK02,
	Author = {Ran Canetti and Hugo Krawczyk},
	Bibsource = {DBLP, http://dblp.uni-trier.de},
	Booktitle = {CRYPTO},
	Crossref = {DBLP:conf/crypto/2002},
	Ee = {http://dx.doi.org/10.1007/3-540-45708-9_10},
	Pages = {143-161},
	Title = {Security Analysis of IKE's Signature-Based Key-Exchange Protocol},
	Year = {2002}}

@inproceedings{DBLP:conf/eurocrypt/BellarePR00,
	Author = {Mihir Bellare and David Pointcheval and Phillip Rogaway},
	Bibsource = {DBLP, http://dblp.uni-trier.de},
	Booktitle = {EUROCRYPT},
	Crossref = {DBLP:conf/eurocrypt/2000},
	Ee = {http://dx.doi.org/10.1007/3-540-45539-6_11},
	Pages = {139-155},
	Title = {Authenticated Key Exchange Secure against Dictionary Attacks},
	Year = {2000}}

@inproceedings{blumMicali82,
	Author = {Blum, Manuel and Micali, Silvio},
	Booktitle = {Foundations of Computer Science, 1982. SFCS '08. 23rd Annual Symposium on},
	Doi = {10.1109/SFCS.1982.72},
	Issn = {0272-5428},
	Month = {nov.},
	Pages = {112 -117},
	Title = {How to generate cryptographically strong sequences of pseudo random bits},
	Year = {1982},
	Bdsk-Url-1 = {http://dx.doi.org/10.1109/SFCS.1982.72}}

@inproceedings{goldreichLevin89,
	Acmid = {73010},
	Address = {New York, NY, USA},
	Author = {Goldreich, O. and Levin, L. A.},
	Booktitle = {Proceedings of the twenty-first annual ACM symposium on Theory of computing},
	Doi = {10.1145/73007.73010},
	Isbn = {0-89791-307-8},
	Location = {Seattle, Washington, United States},
	Numpages = {8},
	Pages = {25--32},
	Publisher = {ACM},
	Series = {STOC '89},
	Title = {A hard-core predicate for all one-way functions},
	Url = {http://doi.acm.org/10.1145/73007.73010},
	Year = {1989},
	Bdsk-Url-1 = {http://doi.acm.org/10.1145/73007.73010},
	Bdsk-Url-2 = {http://dx.doi.org/10.1145/73007.73010}}

@article{Dinur07,
	Author = {Irit Dinur},
	Bibsource = {DBLP, http://dblp.uni-trier.de},
	Ee = {http://doi.acm.org/10.1145/1236457.1236459},
	Journal = {J. ACM},
	Number = {3},
	Pages = {12},
	Title = {The PCP theorem by gap amplification},
	Volume = {54},
	Year = {2007}}

@inproceedings{Kilian92,
	Author = {Joe Kilian},
	Bibsource = {DBLP, http://dblp.uni-trier.de},
	Booktitle = {STOC},
	Crossref = {DBLP:conf/stoc/STOC24},
	Ee = {http://doi.acm.org/10.1145/129712.129782},
	Pages = {723-732},
	Title = {A Note on Efficient Zero-Knowledge Proofs and Arguments (Extended Abstract)},
	Year = {1992}}

@article{Micali00,
	Author = {Silvio Micali},
	Bibsource = {DBLP, http://dblp.uni-trier.de},
	Ee = {http://dx.doi.org/10.1137/S0097539795284959},
	Journal = {SIAM J. Comput.},
	Number = {4},
	Pages = {1253-1298},
	Title = {Computationally Sound Proofs},
	Volume = {30},
	Year = {2000}}

@article{diffieHellman,
	Author = {Diffie, W. and Hellman, M.},
	Date-Added = {2012-09-06 16:50:43 +0000},
	Date-Modified = {2012-09-06 16:50:53 +0000},
	Doi = {10.1109/TIT.1976.1055638},
	Issn = {0018-9448},
	Journal = {Information Theory, IEEE Transactions on},
	Keywords = {Cryptography;},
	Month = {nov},
	Number = {6},
	Pages = {644 - 654},
	Title = {New directions in cryptography},
	Volume = {22},
	Year = {1976},
	Bdsk-Url-1 = {http://dx.doi.org/10.1109/TIT.1976.1055638}}

@article{GoldwasserMicali,
	Author = {Shafi Goldwasser and Silvio Micali},
	Date-Added = {2012-09-06 13:46:11 +0000},
	Date-Modified = {2012-09-06 13:46:22 +0000},
	Doi = {10.1016/0022-0000(84)90070-9},
	Issn = {0022-0000},
	Journal = {Journal of Computer and System Sciences},
	Number = {2},
	Pages = {270 - 299},
	Title = {Probabilistic encryption},
	Url = {http://www.sciencedirect.com/science/article/pii/0022000084900709},
	Volume = {28},
	Year = {1984},
	Bdsk-Url-1 = {http://www.sciencedirect.com/science/article/pii/0022000084900709},
	Bdsk-Url-2 = {http://dx.doi.org/10.1016/0022-0000(84)90070-9}}

@inproceedings{blumMicali82,
	Author = {Blum, Manuel and Micali, Silvio},
	Booktitle = {Foundations of Computer Science, 1982. SFCS '08. 23rd Annual Symposium on},
	Doi = {10.1109/SFCS.1982.72},
	Issn = {0272-5428},
	Month = {nov.},
	Pages = {112 -117},
	Title = {How to generate cryptographically strong sequences of pseudo random bits},
	Year = {1982},
	Bdsk-Url-1 = {http://dx.doi.org/10.1109/SFCS.1982.72}}

@inproceedings{goldreichLevin89,
	Acmid = {73010},
	Address = {New York, NY, USA},
	Author = {Goldreich, O. and Levin, L. A.},
	Booktitle = {Proceedings of the twenty-first annual ACM symposium on Theory of computing},
	Doi = {10.1145/73007.73010},
	Isbn = {0-89791-307-8},
	Location = {Seattle, Washington, United States},
	Numpages = {8},
	Pages = {25--32},
	Publisher = {ACM},
	Series = {STOC '89},
	Title = {A hard-core predicate for all one-way functions},
	Url = {http://doi.acm.org/10.1145/73007.73010},
	Year = {1989},
	Bdsk-Url-1 = {http://doi.acm.org/10.1145/73007.73010},
	Bdsk-Url-2 = {http://dx.doi.org/10.1145/73007.73010}}
