Author:
Dodis Yevgeniy,Fazio Nelly
Publisher
Springer Berlin Heidelberg
Reference24 articles.
1. Lecture Notes in Computer Science;J.H. An,2002
2. Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A Concrete Security Treatment of Symmetric Encryption: Analysis of the DES Modes of Operation. In: Proceedings of the 38th Annual Symposium on Foundations of Computer Science - FOCS 1997, pp. 394–403 (1997)
3. Lecture Notes in Computer Science;D. Boneh,2001
4. Canetti, R., Garay, J., Itkis, G., Micciancio, D., Naor, M., Pinkas, B.: Multicast Security: A Taxonomy and some Efficient Constructions. In: Proceedings of IEEE INFOCOM 1999, vol. 2, pp. 708–716 (1999)
5. Canetti, R., Malkin, T., Nissim, K.: Efficient Communication-Storage Tradeoffs for Multicast Encryption. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 459–474. Springer, Heidelberg (1999)
Cited by
128 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献