Author:
Chen Long,Li Yanan,Tang Qiang
Publisher
Springer International Publishing
Reference22 articles.
1. Bellare, M., Namprempre, C.: Authenticated encryption: relations among notions and analysis of the generic composition paradigm. J. Cryptol. 21(4), 469–491 (2008). https://doi.org/10.1007/s00145-008-9026-x
2. Lecture Notes in Computer Science;D Boneh,2004
3. Boneh, D., Eskandarian, S., Kim, S., Shih, M.: Improving speed and security in updatable encryption schemes. Cryptology ePrint Archive, Report 2020/222 (2020). https://eprint.iacr.org/2020/222
4. Lecture Notes in Computer Science;D Boneh,2013
5. Lecture Notes in Computer Science;C Boyd,2020
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献