Author:
Phan Raphael C.-W.,Wu Jiang,Ouafi Khaled,Stinson Douglas R.
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference34 articles.
1. Abdalla, M., & Bellare, M. (2000). Increasing the lifetime of a key: A comparative analysis of the security of re-keying techniques Advances in Cryptology – Asiacrypt ’00, LCNS 1976, 546–559.
2. Avoine, G. (2005). Adversarial model for radio frequency identification. Cryptology ePrint Archive, report 2005/049. http://eprint.iacr.org/2005/049 .
3. Barak, B., & Halevi, S. (2005). A model and architecture for pseudo-random generation with applications to /dev/random. Proceedings of CCS ’05, ACM, 203–212.
4. Barker, E., & Kelsey, J. (2007) Recommendation for random number generation using deterministic random bit generators (Revised). NIST Special Publication 800-90.
5. Bellare, M., Pointcheval, D., & Rogaway, P. (2000). Authenticated key exchange secure against dictionary attacks. Advances in Cryptology – EUROCRYPT ’00, LNCS 1807, 139–155.
Cited by
16 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献