Author:
Abdalla Michel,Benhamouda Fabrice,Blazy Olivier,Chevalier Céline,Pointcheval David
Publisher
Springer Berlin Heidelberg
Reference34 articles.
1. LNCS;M. Abdalla,2013
2. Lecture Notes in Computer Science;M. Abdalla,2009
3. Lecture Notes in Computer Science;B. Barak,2005
4. Beaver, D.: Adaptive zero knowledge and computational equivocation (extended abstract). In: 28th ACM STOC, pp. 629–638. ACM Press (May 1996)
5. Bellovin, S.M., Merritt, M.: Encrypted key exchange: Password-based protocols secure against dictionary attacks. In: 1992 IEEE Symposium on Security and Privacy, pp. 72–84. IEEE Computer Society Press (May 1992)
Cited by
35 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献