Author:
Wang Hua,Cao Jinli,Zhang Yanchun
Publisher
Springer International Publishing
Reference81 articles.
1. Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: First ACM Conference on Computer and Communications Security, pp. 62–73. IEEE, Piscataway (1993)
2. Bellare, M., Goldreich, O., Krawczyk, H.: Stateless evaluation of pseudorandom functions: security beyond the birthday barrier. In: Advances in Cryptology—Crypto 99. Lectures Notes in Computer Science, vol. 1666. Springer, Berlin (1999)
3. Boyko, V., Peinado, M., Venkatesan, R.: Speeding up discrete log and factoring based schemes via precomputations. In: Advances in Cryptology—Eurocrypt’98. Lectures Notes in Computer Science, vol. 1807. Springer, Berlin (1998)
4. Canetti, R., Goldreich, O., Halevi, S.: The random oracle methodology. In: Proceedings of the 30th ACM STOC ’98, pp. 209–218. IEEE, Piscataway (1998)
5. Canetti, R., Micciancio, D., Reingold, O.: Perfectly one-way probabilistic hash functions. In: Proceedings of the 30th ACM STOC ’98. IEEE, Piscataway (1998)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献