Author:
Guo Chun,Wang Lei,Lin Dongdai
Publisher
Springer Nature Switzerland
Reference51 articles.
1. Lecture Notes in Computer Science;E Andreeva,2013
2. Avanzi, R.: A Salad of Block Ciphers. IACR Cryptology ePrint Archive, p. 1171 (2016). http://eprint.iacr.org/2016/1171
3. Barak, B., Mahmoody-Ghidary, M.: Lower bounds on signatures from symmetric primitives. In: 48th FOCS, pp. 680–688. IEEE (2007). https://doi.org/10.1109/FOCS.2007.38
4. Barak, B., Mahmoody, M.: Merkle’s key agreement protocol is optimal: an $$O(n^2)$$ attack on any key agreement from random oracles. J. Cryptol. 30(3), 699–734 (2016). https://doi.org/10.1007/s00145-016-9233-9
5. Lecture Notes in Computer Science;M Barbosa,2018
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献