Author:
Tillich Jean-Pierre,Zémor Gilles
Publisher
Springer Berlin Heidelberg
Reference19 articles.
1. Lecture Notes in Computer Science;K.S. Abdukhalikov,1998
2. Charles, D.X., Goren, E.Z., Lauter, K.E.: Cryptographic hash functions from expander graphs. In: Second NIST cryptographic hash workshop, Santa Barbara, USA (August 2006)
3. Charles, D.X., Goren, E.Z., Lauter, K.E.: Cryptographic hash functions from expander graphs. Journal of Cryptology, to appear in print, published online (September 15, 2007)
http://www.springerlink.com/content/cv4r187833614475/
4. Lecture Notes in Computer Science;C. Charnes,1995
5. Davidoff, G., Sarnak, P., Valette, A.: Elementary Number Theory, Group Theory, and Ramanujan Graphs. Cambridge University Press, Cambridge (2003)
Cited by
15 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献