Author:
Xu Jin,Wen Qiaoyan,Wang Dayin
Publisher
Springer Berlin Heidelberg
Reference11 articles.
1. Lecture Notes in Computer Science;R.C.W. Phan,2005
2. Lecture Notes in Computer Science;H. Wu,2002
3. Lecture Notes in Computer Science;A. Joux,2003
4. Rogaway, P.: The EMD Mode of Operation. Cryptology ePrint archive[EB/OL] (2002),
http://eprint.iacr.org/2002/148/
5. Lecture Notes in Computer Science;J. Black,2002