Author:
Dai Wei,Hoang Viet Tung,Tessaro Stefano
Publisher
Springer International Publishing
Reference31 articles.
1. Lecture Notes in Computer Science;S Bai,2015
2. Bellare, M., Impagliazzo, R.: A tool for obtaining tighter security analyses of pseudorandom function based constructions, with applications to PRP to PRF conversion. Cryptology ePrint Archive, Report 1999/024 (1999).
http://eprint.iacr.org/1999/024
3. Lecture Notes in Computer Science;M Bellare,2009
4. Lecture Notes in Computer Science;M Bellare,2006
5. Bernstein, D.J.: How to stretch random functions: the security of protected counter sums. J. Cryptol. 12(3), 185–192 (1999)
Cited by
66 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献