Publisher
Springer International Publishing
Reference17 articles.
1. Bellare M, Rogaway P (1993) Random Oracles are practical: a paradigm for designing efficient protocols. In: Denning D, Pyle R, Ganesan R, Sandhu R, Ashby V (eds) Proceedings of the first ACM conference on computer and communications security. ACM Press, New York, pp 62–73
2. LNCS;M Bellare,1998
3. Blum M, Goldwasser S (1984) An efficient probabilistic public-key encryption scheme which hides all partial information. In: Proceedings of advances in cryptology, proceedings of CRYPTO ’84, Santa Barbara, CA, 19–22 August 1984, pp 289–302.
http://dx.doi.org/10.1007/3-540-39568-7_23
4. LNCS;D Boneh,2004
5. LNCS;J Camenisch,2000