Author:
Maurer Ueli,Renner Renato,Holenstein Clemens
Publisher
Springer Berlin Heidelberg
Reference17 articles.
1. Bellare, M., Boldyreva, A., Palacio, A.: An un-instantiable random-oracle-model scheme for a hybrid-encryption problem (2003), ePrint archive: http://eprint.iacr.org/2003/077/
2. Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: Ashby, V. (ed.) 1st ACM Conference on Computer and Communications Security, pp. 62–73. ACM Press, New York (1993)
3. Lecture Notes in Computer Science;M. Bellare,1996
4. Canetti, R.: Security and composition of multi-party cryptographic protocols. Journal of Cryptology 13(1), 143–202 (2000)
5. Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: Proc. 42nd IEEE Symposium on Foundations of Computer Science (FOCS), pp. 136–145 (2001)
Cited by
237 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Feistel Ciphers Based on a Single Primitive;IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences;2024-08-01
2. Indifferentiability of 3-Round Confusion-Diffusion Networks;Lecture Notes in Computer Science;2024
3. Succinctly-Committing Authenticated Encryption;Lecture Notes in Computer Science;2024
4. Hash Functions;Symmetric Cryptography 1;2023-12-08
5. Feistel Ciphers Based on a Single Primitive;Cryptography and Coding;2023-12-04