Author:
Guo Tingting,Wang Peng,Hu Lei,Ye Dingfeng
Publisher
Springer International Publishing
Reference37 articles.
1. Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A concrete security treatment of symmetric encryption. In: FOCS 1997, pp. 394–403. IEEE Computer Society (1997). https://doi.org/10.1109/SFCS.1997.646128
2. Bellare, M., Impagliazzo, R.: A tool for obtaining tighter security analyses of pseudorandom function based constructions, with applications to PRP to PRF conversion. IACR Cryptol. ePrint Arch. 1999, 24 (1999). https://eprint.iacr.org/1999/024
3. Lecture Notes in Computer Science;M Bellare,1998
4. Lecture Notes in Computer Science;M Bellare,2006
5. Lecture Notes in Computer Science;DJ Bernstein,2005
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献