W. Tzeng. PKC '02: Proceedings of the 5th International Workshop on Practice
and Theory in Public Key Cryptosystems, volume 2274 of Lecture Notes in Computer Science, page 159--171. London, UK, Springer, (2002)
J. Stern. ASIACRYPT '98: Proceedings of the International Conference on the
Theory and Applications of Cryptology and Information Security, page 357--371. London, UK, Springer, (1998)
J. Sakuma, and S. Kobayashi. GECCO '07: Proceedings of the 9th annual conference on Genetic and
evolutionary computation, page 1372--1379. New York, NY, USA, ACM, (2007)
W. Ogata, and K. Kurosawa. Advances in Cryptology - EUROCRYPT 96, volume 1070 of Lecture Notes in Computer Science, page 200-211. Berlin Heidelberg, Springer, (1996)
M. Naor, and B. Pinkas. SODA '01: Proceedings of the twelfth annual ACM-SIAM symposium on
Discrete algorithms, page 448--457. Philadelphia, PA, USA, Society for Industrial and Applied Mathematics, (2001)
D. Malkhi, N. Nisan, B. Pinkas, and Y. Sella. Proceedings of the 13th USENIX Security Symposium, page 287--302. Berkeley, CA, USA, USENIX Association, (2004)
K. Kurosawa, and W. Ogata. ESORICS '02: Proceedings of the 7th European Symposium on Research
in Computer Security, volume 2502 of Lecture Notes in Computer Science, page 24--38. London, UK, Springer, (2002)
F. Kerschbaum, and J. Vayssiere. Proceedings of the 13th International Conference on Parallel and
Distributed Systems, page 1--8. Washington, DC, USA, IEEE Computer Society, (2007)