Valid HTML 4.0! Valid CSS!
%%% -*-BibTeX-*-
%%% ====================================================================
%%%  BibTeX-file{
%%%     author          = "Nelson H. F. Beebe",
%%%     version         = "1.03",
%%%     date            = "14 October 2017",
%%%     time            = "10:23:36 MDT",
%%%     filename        = "lncs2005a.bib",
%%%     address         = "University of Utah
%%%                        Department of Mathematics, 110 LCB
%%%                        155 S 1400 E RM 233
%%%                        Salt Lake City, UT 84112-0090
%%%                        USA",
%%%     telephone       = "+1 801 581 5254",
%%%     FAX             = "+1 801 581 4148",
%%%     URL             = "http://www.math.utah.edu/~beebe",
%%%     checksum        = "56261 1183 4676 49683",
%%%     email           = "beebe at math.utah.edu, beebe at acm.org,
%%%                        beebe at computer.org (Internet)",
%%%     codetable       = "ISO/ASCII",
%%%     keywords        = "BibTeX, bibliography, Lecture Notes in
%%%                        Computer Science",
%%%     license         = "public domain",
%%%     supported       = "yes",
%%%     docstring       = "This is a bibliography of papers published in
%%%                        Lecture Notes in Computer Science
%%%                        (Springer-Verlag) for 2005.
%%%
%%%                        The companion bibliographies lncs2005b.bib,
%%%                        lncs2005c.bib, and lncs2005d.bib cover
%%%                        other volumes for the same year.
%%%
%%%                        Bibliography entries below treat the series
%%%                        as a journal, rather than as conference
%%%                        proceedings.
%%%
%%%                        The companion bibliography lncs.bib lists
%%%                        just the individual volumes in the series,
%%%                        and the lncs19xy*.bib files list individual
%%%                        papers for year 19xy.  The large number of
%%%                        papers in this collection, and limitations
%%%                        in TeX and BibTeX, and in WWW HTTP transfer
%%%                        speeds, necessitate the splitting of the
%%%                        papers bibliographies into yearly files.
%%%
%%%                        At version 1.03, the year coverage looked
%%%                        like this:
%%%
%%%                             2005 (  53)
%%%
%%%                             Article:         53
%%%
%%%                             Total entries:   53
%%%
%%%                        This bibliography has been constructed
%%%                        primarily from the publisher Web site.
%%%                        Regrettably, final page numbers are not
%%%                        available at that source.
%%%
%%%                        Numerous errors in the sources noted above
%%%                        have been corrected.  Spelling has been
%%%                        verified with the UNIX spell and GNU ispell
%%%                        programs using the exception dictionary
%%%                        stored in the companion file with extension
%%%                        .sok.
%%%
%%%                        BibTeX citation tags are uniformly chosen as
%%%                        name:year:abbrev, where name is the family
%%%                        name of the first author or editor, year is a
%%%                        4-digit number, and abbrev is a 3-letter
%%%                        condensation of important title words.
%%%                        Citation labels were automatically generated
%%%                        by software developed for the BibNet Project.
%%%
%%%                        In this bibliography, entries are sorted in
%%%                        publication order, with the help of ``bibsort
%%%                        -byvolume''.  The bibsort utility is available
%%%                        from ftp.math.utah.edu in /pub/tex/bib.
%%%
%%%                        The checksum field above contains a CRC-16
%%%                        checksum as the first value, followed by the
%%%                        equivalent of the standard UNIX wc (word
%%%                        count) utility output of lines, words, and
%%%                        characters.  This is produced by Robert
%%%                        Solovay's checksum utility.",
%%%  }
%%% ====================================================================
@Preamble{
    "\hyphenation{
        Ay-ka-nat
        Giun-chi-glia
        Lakh-neche
        Mal-er-ba
        Mart-el-li
        Reut-e-nau-er
        Thiel-sch-er
        }" #
    "\ifx \undefined \FEATPOST \def \FEATPOST {{\manfnt FEAT}\-{\manfnt POST}\spacefactor1000 }\fi" #
    "\ifx \undefined \MF \def \MF{{\manfnt META}\-{\manfnt FONT}\spacefactor1000 }\fi" #
    "\ifx \undefined \MP \def \MP{{\manfnt META}\-{\manfnt POST}\spacefactor1000 }\fi" #
    "\ifx \undefined \circled \def \circled #1{(#1)}\fi" #
    "\ifx \undefined \manfnt \font \manfnt = logo10 \fi" #
    "\ifx \undefined \mathcal \def \mathcal #1{{\cal #1}}\fi" #
    "\ifx \undefined \pdfTeX \def \pdfTeX {pdf\TeX}\fi" #
    "\ifx \undefined \reg \def \reg {\circled{R}}\fi"
}

%%% ====================================================================
%%% Acknowledgement abbreviations:
@String{ack-nhfb = "Nelson H. F. Beebe,
                    University of Utah,
                    Department of Mathematics, 110 LCB,
                    155 S 1400 E RM 233,
                    Salt Lake City, UT 84112-0090, USA,
                    Tel: +1 801 581 5254,
                    FAX: +1 801 581 4148,
                    e-mail: \path|beebe@math.utah.edu|,
                            \path|beebe@acm.org|,
                            \path|beebe@computer.org| (Internet),
                    URL: \path|http://www.math.utah.edu/~beebe/|"}

%%% ====================================================================
%%% Journal abbreviations:
@String{j-LECT-NOTES-COMP-SCI   = "Lecture Notes in Computer Science"}

%%% ====================================================================
%%% Publisher abbreviations:
@String{pub-SV                  = "Springer-Verlag Inc."}

@String{pub-SV:adr              = "New York, NY, USA"}

%%% ====================================================================
%%% Series abbreviations:
@String{ser-LNAI                = "Lecture Notes in Artificial Intelligence"}

@String{ser-LNCS                = "Lecture Notes in Computer Science"}

%%% ====================================================================
%%% Bibliography entries:
@Article{Wang:2005:ECS,
  author =       "Xiaoyun Wang and Hongbo Yu and Yiqun Lisa Yin",
  title =        "Efficient Collision Search Attacks on {SHA-0}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "3621",
  pages =        "1--??",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11535218_1",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Mon Apr 3 08:32:34 2006",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
  abstract =     "In this paper, we present new techniques for collision
                 search in the hash function SHA-0. Using the new
                 techniques, we can find collisions of the full 80-step
                 SHA-0 with complexity less than $ 2^{39} $ hash
                 operations.",
  acknowledgement = ack-nhfb,
  keywords =     "Collision search attacks; Hash functions; SHA-0;
                 SHA-1.",
}

@Article{Wang:2005:FCF,
  author =       "Xiaoyun Wang and Yiqun Lisa Yin and Hongbo Yu",
  title =        "Finding Collisions in the Full {SHA-1}",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "3621",
  pages =        "17--??",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11535218_2",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Mon Apr 3 08:32:34 2006",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
  abstract =     "In this paper, we present new collision search attacks
                 on the hash function SHA-1. We show that collisions of
                 SHA-1 can be found with complexity less than $ 2^{69} $
                 hash operations. This is the first attack on the full
                 80-step SHA-1 with complexity less than the $ 2^{80} $
                 theoretical bound.",
  acknowledgement = ack-nhfb,
  keywords =     "Collision search attacks; Hash functions; SHA-0;
                 SHA-1.",
}

@Article{Dwork:2005:PPW,
  author =       "Cynthia Dwork and Moni Naor and Hoeteck Wee",
  title =        "Pebbling and Proofs of Work",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "3621",
  pages =        "37--??",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11535218_3",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Mon Apr 3 08:32:34 2006",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
  acknowledgement = ack-nhfb,
}

@Article{Pietrzak:2005:CDI,
  author =       "Krzysztof Pietrzak",
  title =        "Composition Does Not Imply Adaptive Security",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "3621",
  pages =        "55--??",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11535218_4",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Mon Apr 3 08:32:34 2006",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
  acknowledgement = ack-nhfb,
}

@Article{Granger:2005:DLP,
  author =       "R. Granger and F. Vercauteren",
  title =        "On the Discrete Logarithm Problem on Algebraic Tori",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "3621",
  pages =        "66--??",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11535218_5",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Mon Apr 3 08:32:34 2006",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
  acknowledgement = ack-nhfb,
}

@Article{Myasnikov:2005:PAB,
  author =       "Alexei Myasnikov and Vladimir Shpilrain and Alexander
                 Ushakov",
  title =        "A Practical Attack on a Braid Group Based
                 Cryptographic Protocol",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "3621",
  pages =        "86--??",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11535218_6",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Mon Apr 3 08:32:34 2006",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
  acknowledgement = ack-nhfb,
}

@Article{Lu:2005:CCA,
  author =       "Yi Lu and Willi Meier and Serge Vaudenay",
  title =        "The Conditional Correlation Attack: {A} Practical
                 Attack on {Bluetooth} Encryption",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "3621",
  pages =        "97--??",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11535218_7",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Mon Apr 3 08:32:34 2006",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
  abstract =     "Motivated by the security of the nonlinear filter
                 generator, the concept of correlation was previously
                 extended to the conditional correlation, that studied
                 the linear correlation of the inputs conditioned on a
                 given (short) output pattern of some specific nonlinear
                 function. Based on the conditional correlations,
                 conditional correlation attacks were shown to be
                 successful and efficient against the nonlinear filter
                 generator. In this paper, we further generalize the
                 concept of conditional correlations by assigning it
                 with a different meaning, i.e. the correlation of the
                 output of an arbitrary function conditioned on the
                 unknown (partial) input which is uniformly distributed.
                 Based on this generalized conditional correlation, a
                 general statistical model is studied for dedicated
                 key-recovery distinguishers. It is shown that the
                 generalized conditional correlation is no smaller than
                 the unconditional correlation. Consequently, our
                 distinguisher improves on the traditional one (in the
                 worst case it degrades into the traditional one). In
                 particular, the distinguisher may be successful even if
                 no ordinary correlation exists. As an application, a
                 conditional correlation attack is developed and
                 optimized against Bluetooth two-level E0. The attack is
                 based on a recently detected flaw in the
                 resynchronization of E0, as well as the investigation
                 of conditional correlations in the Finite State Machine
                 (FSM) governing the keystream output of E0. Our best
                 attack finds the original encryption key for two-level
                 E0 using the first 24 bits of $ 2^{23.8} $ frames and
                 with $ 2^{38} $ computations. This is clearly the
                 fastest and only practical known-plaintext attack on
                 Bluetooth encryption compared with all existing
                 attacks. Current experiments confirm our analysis.",
  acknowledgement = ack-nhfb,
  keywords =     "Bluetooth; Correlation; E0.; Stream Ciphers",
}

@Article{Pass:2005:UCN,
  author =       "Rafael Pass and abhi shelat",
  title =        "Unconditional Characterizations of Non-interactive
                 Zero-Knowledge",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "3621",
  pages =        "118--??",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11535218_8",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Mon Apr 3 08:32:34 2006",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
  acknowledgement = ack-nhfb,
  xxnote =       "Yes, second author is lowercase name.",
}

@Article{Alwen:2005:IFR,
  author =       "Jo{\"e} Alwen and Giuseppe Persiano and Ivan
                 Visconti",
  title =        "Impossibility and Feasibility Results for Zero
                 Knowledge with Public Keys",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "3621",
  pages =        "135--??",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11535218_9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Mon Apr 3 08:32:34 2006",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
  acknowledgement = ack-nhfb,
}

@Article{Fischlin:2005:CEN,
  author =       "Marc Fischlin",
  title =        "Communication-Efficient Non-interactive Proofs of
                 Knowledge with Online Extractors",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "3621",
  pages =        "152--??",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11535218_10",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Mon Apr 3 08:32:34 2006",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
  acknowledgement = ack-nhfb,
}

@Article{Camenisch:2005:FTO,
  author =       "Jan Camenisch and Anna Lysyanskaya",
  title =        "A Formal Treatment of Onion Routing",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "3621",
  pages =        "169--??",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11535218_11",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Mon Apr 3 08:32:34 2006",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
  acknowledgement = ack-nhfb,
}

@Article{Peng:2005:SES,
  author =       "Kun Peng and Colin Boyd and Ed Dawson",
  title =        "Simple and Efficient Shuffling with Provable
                 Correctness and {ZK} Privacy",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "3621",
  pages =        "188--??",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11535218_12",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Mon Apr 3 08:32:34 2006",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
  acknowledgement = ack-nhfb,
}

@Article{Abdalla:2005:SER,
  author =       "Michel Abdalla and Mihir Bellare and Dario Catalano
                 and Eike Kiltz and Tadayoshi Kohno and Tanja Lange and
                 John Malone-Lee and Gregory Neven and Pascal Paillier
                 and Haixia Shi",
  title =        "Searchable Encryption Revisited: Consistency
                 Properties, Relation to Anonymous {IBE}, and
                 Extensions",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "3621",
  pages =        "205--??",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11535218_13",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Mon Apr 3 08:32:34 2006",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
  acknowledgement = ack-nhfb,
}

@Article{Ostrovsky:2005:PSS,
  author =       "Rafail Ostrovsky and William E. Skeith III",
  title =        "Private Searching on Streaming Data",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "3621",
  pages =        "223--??",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11535218_14",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Mon Apr 3 08:32:34 2006",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
  acknowledgement = ack-nhfb,
}

@Article{Kissner:2005:PPS,
  author =       "Lea Kissner and Dawn Song",
  title =        "Privacy-Preserving Set Operations",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "3621",
  pages =        "241--??",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11535218_15",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Mon Apr 3 08:32:34 2006",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
  acknowledgement = ack-nhfb,
}

@Article{Boneh:2005:CRB,
  author =       "Dan Boneh and Craig Gentry and Brent Waters",
  title =        "Collusion Resistant Broadcast Encryption with Short
                 Ciphertexts and Private Keys",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "3621",
  pages =        "258--??",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11535218_16",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Mon Apr 3 08:32:34 2006",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
  acknowledgement = ack-nhfb,
}

@Article{Hwang:2005:GTS,
  author =       "Jung Yeon Hwang and Dong Hoon Lee and Jongin Lim",
  title =        "Generic Transformation for Scalable Broadcast
                 Encryption Schemes",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "3621",
  pages =        "276--??",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11535218_17",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Mon Apr 3 08:32:34 2006",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
  acknowledgement = ack-nhfb,
}

@Article{Juels:2005:APD,
  author =       "Ari Juels and Stephen A. Weis",
  title =        "Authenticating Pervasive Devices with Human
                 Protocols",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "3621",
  pages =        "293--??",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11535218_18",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Mon Apr 3 08:32:34 2006",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
  acknowledgement = ack-nhfb,
}

@Article{Vaudenay:2005:SCI,
  author =       "Serge Vaudenay",
  title =        "Secure Communications over Insecure Channels Based on
                 Short Authenticated Strings",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "3621",
  pages =        "309--??",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11535218_19",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Mon Apr 3 08:32:34 2006",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
  acknowledgement = ack-nhfb,
}

@Article{Cramer:2005:CMS,
  author =       "Ronald Cramer and Vanesa Daza and Ignacio Gracia and
                 Jorge Jim{\'e}nez Urroz and Gregor Leander and Jaume
                 Mart{\'\i}-Farr{\'e} and Carles Padr{\'o}",
  title =        "On Codes, Matroids and Secure Multi-party Computation
                 from Linear Secret Sharing Schemes",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "3621",
  pages =        "327--??",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11535218_20",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Mon Apr 3 08:32:34 2006",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
  acknowledgement = ack-nhfb,
}

@Article{Cramer:2005:BBS,
  author =       "Ronald Cramer and Serge Fehr and Martijn Stam",
  title =        "Black-Box Secret Sharing from Primitive Sets in
                 Algebraic Number Fields",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "3621",
  pages =        "344--??",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11535218_21",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Mon Apr 3 08:32:34 2006",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
  acknowledgement = ack-nhfb,
}

@Article{Barak:2005:SCA,
  author =       "Boaz Barak and Ran Canetti and Yehuda Lindell and
                 Rafael Pass and Tal Rabin",
  title =        "Secure Computation Without Authentication",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "3621",
  pages =        "361--??",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11535218_22",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Mon Apr 3 08:32:34 2006",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
  acknowledgement = ack-nhfb,
}

@Article{Damgaard:2005:CRM,
  author =       "Ivan Damg{\aa}rd and Yuval Ishai",
  title =        "Constant-Round Multiparty Computation Using a
                 Black-Box Pseudorandom Generator",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "3621",
  pages =        "378--??",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11535218_23",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Mon Apr 3 08:32:34 2006",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
  acknowledgement = ack-nhfb,
}

@Article{Barkol:2005:SCC,
  author =       "Omer Barkol and Yuval Ishai",
  title =        "Secure Computation of Constant-Depth Circuits with
                 Applications to Database Search Problems",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "3621",
  pages =        "395--??",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11535218_24",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Mon Apr 3 08:32:34 2006",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
  acknowledgement = ack-nhfb,
}

@Article{Boldyreva:2005:ARO,
  author =       "Alexandra Boldyreva and Marc Fischlin",
  title =        "Analysis of Random Oracle Instantiation Scenarios for
                 {OAEP} and Other Practical Schemes",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "3621",
  pages =        "412--??",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11535218_25",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Mon Apr 3 08:32:34 2006",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
  acknowledgement = ack-nhfb,
}

@Article{Coron:2005:MDR,
  author =       "Jean-S{\'e}bastien Coron and Yevgeniy Dodis and
                 C{\'e}cile Malinaud and Prashant Puniya",
  title =        "{Merkle--Damg{\aa}rd} Revisited: How to Construct a
                 Hash Function",
  journal =      j-LECT-NOTES-COMP-SCI,
  pages =        "430--??",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11535218_26",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Mon Apr 3 09:26:13 2006",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
  acknowledgement = ack-nhfb,
}

@Article{Dodis:2005:GIF,
  author =       "Yevgeniy Dodis and Roberto Oliveira and Krzysztof
                 Pietrzak",
  title =        "On the Generic Insecurity of the Full Domain Hash",
  journal =      j-LECT-NOTES-COMP-SCI,
  pages =        "449--??",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11535218_27",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Mon Apr 3 09:26:13 2006",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
  acknowledgement = ack-nhfb,
}

@Article{Wolf:2005:NML,
  author =       "Stefan Wolf and J{\"u}rg Wullschleger",
  title =        "New Monotones and Lower Bounds in Unconditional
                 Two-Party Computation",
  journal =      j-LECT-NOTES-COMP-SCI,
  pages =        "467--??",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11535218_28",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Mon Apr 3 09:26:13 2006",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
  acknowledgement = ack-nhfb,
}

@Article{Holenstein:2005:OWS,
  author =       "Thomas Holenstein and Renato Renner",
  title =        "One-Way Secret-Key Agreement and Applications to
                 Circuit Polarization and Immunization of Public-Key
                 Encryption",
  journal =      j-LECT-NOTES-COMP-SCI,
  pages =        "478--??",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11535218_29",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Mon Apr 3 09:26:13 2006",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
  acknowledgement = ack-nhfb,
}

@Article{Damgaard:2005:QCN,
  author =       "Ivan Damg{\aa}rd and Thomas Brochmann Pedersen and
                 Louis Salvail",
  title =        "A Quantum Cipher with Near Optimal Key-Recycling",
  journal =      j-LECT-NOTES-COMP-SCI,
  pages =        "494--??",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11535218_30",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Mon Apr 3 09:26:13 2006",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
  acknowledgement = ack-nhfb,
}

@Article{Chevallier-Mames:2005:ECB,
  author =       "Beno{\^\i}t Chevallier-Mames",
  title =        "An Efficient {CDH}-Based Signature Scheme with a Tight
                 Security Reduction",
  journal =      j-LECT-NOTES-COMP-SCI,
  pages =        "511--??",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11535218_31",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Mon Apr 3 09:26:13 2006",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
  acknowledgement = ack-nhfb,
}

@Article{Bellare:2005:ISA,
  author =       "Mihir Bellare and Krzysztof Pietrzak and Phillip
                 Rogaway",
  title =        "Improved Security Analyses for {CBC} {MACs}",
  journal =      j-LECT-NOTES-COMP-SCI,
  pages =        "527--??",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11535218_32",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Mon Apr 3 09:26:13 2006",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
  acknowledgement = ack-nhfb,
}

@Article{Krawczyk:2005:HHP,
  author =       "Hugo Krawczyk",
  title =        "{HMQV}: {A} High-Performance Secure {Diffie--Hellman}
                 Protocol",
  journal =      j-LECT-NOTES-COMP-SCI,
  pages =        "546--??",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11535218_33",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Mon Apr 3 09:26:13 2006",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
  acknowledgement = ack-nhfb,
}

@Article{Abramov:2005:RLS,
  author =       "S. A. Abramov and M. Bronstein and D. E. Khmelnov",
  title =        "On Regular and Logarithmic Solutions of Ordinary
                 Linear Differential Systems",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "3718",
  pages =        "1--12",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11555964_1",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Aug 12 10:20:51 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/11555964_1.pdf;
                 http://link.springer.com/content/pdf/bfm:978-3-540-32070-8/1.pdf",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/11555964",
  book-URL =     "http://www.springerlink.com/content/978-3-540-32070-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Basu:2005:CBN,
  author =       "Saugata Basu and Michael Kettner",
  title =        "Computing the {Betti} Numbers of Arrangements in
                 Practice",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "3718",
  pages =        "13--31",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11555964_2",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Aug 12 10:20:51 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/11555964_2.pdf",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/11555964",
  book-URL =     "http://www.springerlink.com/content/978-3-540-32070-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Belyaeva:2005:MSN,
  author =       "I. N. Belyaeva and N. A. Chekanov and A. A. Gusev and
                 V. A. Rostovtsev and Yu. A. Ukolov and Y. Uwano and S.
                 I. Vinitsky",
  title =        "A {MAPLE} Symbolic-Numeric Program for Solving the
                 {$2$D}-Eigenvalue Problem by a Self-consistent Basis
                 Method",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "3718",
  pages =        "32--39",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11555964_3",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Aug 12 10:20:51 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib;
                 http://www.math.utah.edu/pub/tex/bib/maple-extract.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/11555964_3.pdf",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/11555964",
  book-URL =     "http://www.springerlink.com/content/978-3-540-32070-8",
  fjournal =     "Lecture Notes in Computer Science",
  journal-URL =  "http://link.springer.com/bookseries/558",
}

@Article{Berghammer:2005:ROB,
  author =       "Rudolf Berghammer and Frank Neumann",
  title =        "{RelView} --- an {OBDD}-Based Computer Algebra System
                 for Relations",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "3718",
  pages =        "40--51",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11555964_4",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Aug 12 10:20:51 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/11555964_4.pdf",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/11555964",
  book-URL =     "http://www.springerlink.com/content/978-3-540-32070-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Borges-Quintana:2005:UGB,
  author =       "M. Borges-Quintana and M. A. Borges-Trenard and E.
                 Mart{\'\i}nez-Moro",
  title =        "On the Use of {Gr{\"o}bner} Bases for Computing the
                 Structure of Finite {Abelian} Groups",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "3718",
  pages =        "52--64",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11555964_5",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Aug 12 10:20:51 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/11555964_5.pdf",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/11555964",
  book-URL =     "http://www.springerlink.com/content/978-3-540-32070-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Bruno:2005:NFI,
  author =       "Alexander D. Bruno and Victor F. Edneral",
  title =        "Normal Forms and Integrability of {ODE} Systems",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "3718",
  pages =        "65--74",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11555964_6",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Aug 12 10:20:51 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/11555964_6.pdf",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/11555964",
  book-URL =     "http://www.springerlink.com/content/978-3-540-32070-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Buse:2005:RBM,
  author =       "Laurent Bus{\'e} and Houssam Khalil and Bernard
                 Mourrain",
  title =        "Resultant-Based Methods for Plane Curves Intersection
                 Problems",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "3718",
  pages =        "75--92",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11555964_7",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Aug 12 10:20:51 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/11555964_7.pdf",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/11555964",
  book-URL =     "http://www.springerlink.com/content/978-3-540-32070-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Cattani:2005:SCS,
  author =       "Carlo Cattani and Evgenii A. Grebenikov and Alexander
                 N. Prokopenya",
  title =        "Symbolic Calculations in Studying the Stability of
                 Dynamically Symmetric Satellite Motion",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "3718",
  pages =        "93--104",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11555964_8",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Aug 12 10:20:51 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/11555964_8.pdf",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/11555964",
  book-URL =     "http://www.springerlink.com/content/978-3-540-32070-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Chibisov:2005:GOG,
  author =       "Dmytro Chibisov and Victor Ganzha and Ernst W. Mayr
                 and Evgenii V. Vorozhtsov",
  title =        "Generation of Orthogonal Grids on Curvilinear Trimmed
                 Regions in Constant Time",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "3718",
  pages =        "105--114",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11555964_9",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Aug 12 10:20:51 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/11555964_9.pdf",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/11555964",
  book-URL =     "http://www.springerlink.com/content/978-3-540-32070-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Chibisov:2005:CAN,
  author =       "Dmytro Chibisov and Victor Ganzha and Sergey Pankratov
                 and Christoph Zenger",
  title =        "Computer Algebra in Nanosciences: Modeling Electronic
                 States in Quantum Dots",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "3718",
  pages =        "115--124",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11555964_10",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Aug 12 10:20:51 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/11555964_10.pdf",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/11555964",
  book-URL =     "http://www.springerlink.com/content/978-3-540-32070-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Chtcherba:2005:CDR,
  author =       "Arthur D. Chtcherba and Deepak Kapur and Manfred
                 Minimair",
  title =        "{Cayley--Dixon} Resultant Matrices of Multi-univariate
                 Composed Polynomials",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "3718",
  pages =        "125--137",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11555964_11",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Aug 12 10:20:51 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/11555964_11.pdf",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/11555964",
  book-URL =     "http://www.springerlink.com/content/978-3-540-32070-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Eigenwillig:2005:DAP,
  author =       "Arno Eigenwillig and Lutz Kettner and Werner Krandick
                 and Kurt Mehlhorn and Susanne Schmitt {\textellipsis}",
  title =        "A {Descartes} Algorithm for Polynomials with
                 Bit-Stream Coefficients",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "3718",
  pages =        "138--149",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11555964_12",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Aug 12 10:20:51 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/11555964_12.pdf",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/11555964",
  book-URL =     "http://www.springerlink.com/content/978-3-540-32070-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Emiris:2005:RSB,
  author =       "Ioannis Z. Emiris and Elias P. Tsigaridas",
  title =        "Real Solving of Bivariate Polynomial Systems",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "3718",
  pages =        "150--161",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11555964_13",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Aug 12 10:20:51 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/11555964_13.pdf",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/11555964",
  book-URL =     "http://www.springerlink.com/content/978-3-540-32070-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Gago-Vargas:2005:NCC,
  author =       "J. Gago-Vargas and M. I. Hartillo-Hermoso and J. M.
                 Ucha-Enr{\'\i}quez",
  title =        "Nouvelle Cuisine for the Computation of the
                 Annihilating Ideal of $ f^s $",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "3718",
  pages =        "162--173",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11555964_14",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Aug 12 10:20:51 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/11555964_14.pdf",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/11555964",
  book-URL =     "http://www.springerlink.com/content/978-3-540-32070-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Gerdt:2005:JLM,
  author =       "Vladimir P. Gerdt and Yuri A. Blinkov",
  title =        "{Janet}-Like Monomial Division",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "3718",
  pages =        "174--183",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11555964_15",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Aug 12 10:20:51 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/11555964_15.pdf",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/11555964",
  book-URL =     "http://www.springerlink.com/content/978-3-540-32070-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Gerdt:2005:JLG,
  author =       "Vladimir P. Gerdt and Yuri A. Blinkov",
  title =        "{Janet}-Like {Gr{\"o}bner} Bases",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "3718",
  pages =        "184--195",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11555964_16",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Aug 12 10:20:51 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/11555964_16.pdf",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/11555964",
  book-URL =     "http://www.springerlink.com/content/978-3-540-32070-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Gomez:2005:CDM,
  author =       "Domingo G{\'o}mez and Jaime Gutierrez and {\'A}lvar
                 Ibeas",
  title =        "Circulant Digraphs and Monomial Ideals",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "3718",
  pages =        "196--207",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11555964_17",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Aug 12 10:20:51 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/11555964_17.pdf",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/11555964",
  book-URL =     "http://www.springerlink.com/content/978-3-540-32070-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Gonzalez--Diaz:2005:ATA,
  author =       "Rocio Gonzalez--Diaz and Belen Medrano and Pedro Real
                 and Javier S{\'a}nchez--Pel{\'a}ez",
  title =        "Algebraic Topological Analysis of Time-Sequence of
                 Digital Images",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "3718",
  pages =        "208--219",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11555964_18",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Aug 12 10:20:51 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/11555964_18.pdf",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/11555964",
  book-URL =     "http://www.springerlink.com/content/978-3-540-32070-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Gonzalez--Vega:2005:HSP,
  author =       "Laureano Gonzalez--Vega and Carlo Traverso and Alberto
                 Zanoni",
  title =        "{Hilbert} Stratification and Parametric {Gr{\"o}bner}
                 Bases",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "3718",
  pages =        "220--235",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11555964_19",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Aug 12 10:20:51 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/11555964_19.pdf",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/11555964",
  book-URL =     "http://www.springerlink.com/content/978-3-540-32070-8",
  fjournal =     "Lecture Notes in Computer Science",
}

@Article{Grebenicov:2005:ISP,
  author =       "E. A. Grebenicov and D. Kozak-Skoworodkin and M.
                 Jakubiak",
  title =        "Investigation of the Stability Problem for the
                 Critical Cases of the {Newtonian} Many-Body Problem",
  journal =      j-LECT-NOTES-COMP-SCI,
  volume =       "3718",
  pages =        "236--243",
  year =         "2005",
  CODEN =        "LNCSD9",
  DOI =          "https://doi.org/10.1007/11555964_20",
  ISSN =         "0302-9743 (print), 1611-3349 (electronic)",
  ISSN-L =       "0302-9743",
  bibdate =      "Tue Aug 12 10:20:51 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/lncs2005a.bib",
  URL =          "http://link.springer.com/content/pdf/10.1007/11555964_20.pdf",
  acknowledgement = ack-nhfb,
  book-DOI =     "https://doi.org/10.1007/11555964",
  book-URL =     "http://www.springerlink.com/content/978-3-540-32070-8",
  fjournal =     "Lecture Notes in Computer Science",
}