@InProceedings{canetti_et_al:DagSemProc.08491.1, author = {Canetti, Ran and Goldwasser, Shafi and M\"{u}ller, G\"{u}nter and Steinwandt, Rainer}, title = {{08491 Abstracts Collection – Theoretical Foundations of Practical Information Security}}, booktitle = {Theoretical Foundations of Practical Information Security}, pages = {1--16}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2009}, volume = {8491}, editor = {Ran Canetti and Shafi Goldwasser and G\"{u}nter M\"{u}ller and Rainer Steinwandt}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.08491.1}, URN = {urn:nbn:de:0030-drops-18945}, doi = {10.4230/DagSemProc.08491.1}, annote = {Keywords: Organic computing, self-organisation, design, adaptivity} } @InProceedings{canetti_et_al:DagSemProc.08491.2, author = {Canetti, Ran and Goldwasser, Shafi and M\"{u}ller, G\"{u}nter and Steinwandt, Rainer}, title = {{08491 Executive Summary – Theoretical Foundations of Practical Information Security }}, booktitle = {Theoretical Foundations of Practical Information Security}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2009}, volume = {8491}, editor = {Ran Canetti and Shafi Goldwasser and G\"{u}nter M\"{u}ller and Rainer Steinwandt}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.08491.2}, URN = {urn:nbn:de:0030-drops-18938}, doi = {10.4230/DagSemProc.08491.2}, annote = {Keywords: Organic computing, self-organisation, design, adaptivity} } @InProceedings{canetti_et_al:DagSemProc.08491.3, author = {Canetti, Ran and Cheung, Ling and Kaynar, Dilsun and Lynch, Nancy and Pereira, Olivier}, title = {{Modeling Computational Security in Long-Lived Systems}}, booktitle = {Theoretical Foundations of Practical Information Security}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2009}, volume = {8491}, editor = {Ran Canetti and Shafi Goldwasser and G\"{u}nter M\"{u}ller and Rainer Steinwandt}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.08491.3}, URN = {urn:nbn:de:0030-drops-18908}, doi = {10.4230/DagSemProc.08491.3}, annote = {Keywords: Long lived security; universally composable security;} } @InProceedings{peikert:DagSemProc.08491.4, author = {Peikert, Chris}, title = {{Public-Key Cryptosystems from the Worst-Case Shortest Vector Problem}}, booktitle = {Theoretical Foundations of Practical Information Security}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2009}, volume = {8491}, editor = {Ran Canetti and Shafi Goldwasser and G\"{u}nter M\"{u}ller and Rainer Steinwandt}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.08491.4}, URN = {urn:nbn:de:0030-drops-18922}, doi = {10.4230/DagSemProc.08491.4}, annote = {Keywords: Lattice-based cryptography, learning with errors, quantum computation} } @InProceedings{garay_et_al:DagSemProc.08491.5, author = {Garay, Juan and Kiayias, Aggelos and Zhou, Hong-Sheng}, title = {{Sound and Fine-grain Specification of Ideal Functionalities}}, booktitle = {Theoretical Foundations of Practical Information Security}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2009}, volume = {8491}, editor = {Ran Canetti and Shafi Goldwasser and G\"{u}nter M\"{u}ller and Rainer Steinwandt}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.08491.5}, URN = {urn:nbn:de:0030-drops-18911}, doi = {10.4230/DagSemProc.08491.5}, annote = {Keywords: Security definitions, universal composability, cryptographic protocols, lattices and partial orders.} }