Author:
Bellare Mihir,Kohno Tadayoshi
Publisher
Springer Berlin Heidelberg
Reference17 articles.
1. M. Bellare, J. Kilian, and P. Rogaway. The security of the cipher block chaining message authentication code. Journal of Computer and System Sciences, 61(3):362–399, 2000.
2. M. Bellare and T. Kohno. A theoretical treatment of related-key attacks: RKAPRPs, RKA-PRFs, and applications. Full version of this paper, available at http://www-cse.ucsd.edu/users/tkohno/papers/RKA/ , 2003.
3. Lect Notes Comput Sci;E. Biham,1993
4. Lect Notes Comput Sci;J. Black,2000
5. N. Courtois and J. Pieprzyk. Cryptanalysis of block ciphers with overdefined systems of equations. Cryptology ePrint Archive http://eprint.iacr.org/ Report 2002/044, 2002.
Cited by
181 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献