Author:
Boyd Colin,Cliff Yvonne,Gonzalez Nieto Juan,Paterson Kenneth G.
Publisher
Springer Berlin Heidelberg
Reference23 articles.
1. Lecture Notes in Computer Science;M. Abe,2005
2. Lecture Notes in Computer Science;M. Bellare,2006
3. Bellare, M., Canetti, R., Krawczyk, H.: A modular approach to the design and analysis of authentication and key exchange protocols. In: Proceedings of the thirtieth annual ACM symposium on Theory of computing, pp. 419–428. ACM Press, New York (1998)
4. Bellare, M., Kilian, J., Rogaway, P.: The security of the cipher block chaining message authentication code. Journal of Computer and System Sciences 61(3), 362–399 (2000)
5. Bernstein, D.J.: Pippenger’s exponentiation algorithm (2001),
http://cr.yp.to/papers.html
Cited by
77 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献