Author:
Ateniese Giuseppe,Chou Daniel H.,de Medeiros Breno,Tsudik Gene
Publisher
Springer Berlin Heidelberg
Reference39 articles.
1. Ateniese, G., de Medeiros, B.: On the key exposure problem in chameleon hashes. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol. 3352, pp. 165–179. Springer, Heidelberg (2005), Full version: Cryptology ePrint Archive, Report 2004/243
http://eprint.iacr.org/2004/243
2. Lecture Notes in Computer Science;G. Ateniese,2004
3. Lecture Notes in Computer Science;M. Bellare,1994
4. Bellare, M., Goldreich, O., Goldwasser, S.: Incremental cryptography with application to virus protection. In: Proc. of the Twenty-Seventh Annual ACM Symposium on Theory of Computing (FOCS 1995), pp. 45–56. ACM Press, New York (1995)
5. Lecture Notes in Computer Science;M. Bellare,1997
Cited by
127 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献