Author:
Benmocha Gal,Biham Eli,Perle Stav
Publisher
Springer International Publishing
Reference22 articles.
1. Austein, R.: [cryptech tech] incremental digest outputs. https://lists.cryptech.is/archives/tech/2014-November/001008.html. Accessed Nov 2014
2. Bellare, M.: New proofs for NMAC and HMAC security without collision resistance. J. Cryptol. 28(4), 844–878 (2015)
3. Lecture Notes in Computer Science;M Bellare,1996
4. Lecture Notes in Computer Science;M Bellare,1994
5. Bellare, M., Goldreich, O., Goldwasser, S.: Incremental cryptography and application to virus protection. In Proceedings of the 27th Annual ACM Symposium on the Theory of Computing, pp. 45–56. ACM Press (1995)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献