Author:
Dutta Avijit,Nandi Mridul,Paul Goutam
Publisher
Springer International Publishing
Reference51 articles.
1. An, J.H., Bellare, M.: Constructing vil-macsfrom fil-macs: message authentication under weakened assumptions. In: Wiener [40], pp. 252–269
2. Lecture Notes in Computer Science;M Bellare,1996
3. Bellare, M., Goldreich, O., Krawczyk, H.: Stateless evaluation of pseudorandom functions: security beyond the birthday barrier. In: Wiener [40], pp. 270–287
4. Lecture Notes in Computer Science;M Bellare,1994
5. Bellare, M., Pietrzak, K., Rogaway, P.: Improved security analyses for CBC macs. In: Shoup [35], pp. 527–545
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献