Author:
Liu Yamin,Li Bao,Lu Xianhui,Jia Xiaoying
Publisher
Springer Berlin Heidelberg
Reference17 articles.
1. Lecture Notes in Computer Science;M. Bellare,2000
2. Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A concrete security treatment of symmetric encryption. In: FOCS, pp. 394–403 (1997)
3. Bellare, M., Desai, A., Pointcheval, D., Rogaway, P.: Relations among notions of security for public-key encryption schemes. In: Krawczyk [13], pp. 26–45
4. Lecture Notes in Computer Science;M. Bellare,2004
5. Lecture Notes in Computer Science;M. Bellare,1995