Author:
Soukharev Vladimir,Jao David,Seshadri Srinath
Publisher
Springer International Publishing
Reference17 articles.
1. Anand, M.V., Targhi, E.E., Tabia, G.N., Unruh, D.: Post-quantum security of the CBC, CFB, OFB, CTR, and XTS modes of operation. PQCrypto (to appear, 2016)
2. Bellare, M., Namprempre, C.: Authenticated encryption: relations among notions and analysis of the generic composition paradigm. J. Cryptol. 21(4), 469–491 (2008)
3. Bernstein, D.J.: Cost analysis of hash collisions: will quantum computers make SHARCS obsolete? In: Workshop Record of SHARCS 2009: Special-Purpose Hardware for Attacking Cryptographic Systems, pp. 51–82 (2009)
4. Lecture Notes in Computer Science;M Zhandry,2013
5. Lecture Notes in Computer Science;D Boneh,2013
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献