Author:
Duc Alexandre,Vaudenay Serge
Publisher
Springer Berlin Heidelberg
Reference65 articles.
1. Ajtai, M.: Generating Hard Instances of Lattice Problems (Extended Abstract). In: STOC, pp. 99–108 (1996)
2. Ajtai, M., Dwork, C.: A Public-Key Cryptosystem with Worst-Case/Average-Case Equivalence. In: STOC, pp. 284–293 (1997)
3. Aumasson, J.P., Finiasz, M., Meier, W., Vaudenay, S.: TCHo: A Hardware-Oriented Trapdoor Cipher. In: J. Pieprzyk, H. Ghodosi, E. Dawson (eds.) ACISP, Lecture Notes in Computer Science, vol. 4586, pp. 184–199. Springer (2007)
4. Baignères, T., Junod, P., Vaudenay, S.: How Far Can We Go Beyond Linear Cryptanalysis? In: Lee [37], pp. 432–450
5. Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A Concrete Security Treatment of Symmetric Encryption: Analysis of the DES Modes of Operation (Full Version) (1997). Available at http://cseweb.ucsd.edu/users/mihir
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献