Author:
Chen Yu Long,Dutta Avijit,Nandi Mridul
Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computational Theory and Mathematics,Computer Networks and Communications
Reference48 articles.
1. László, B.: The fourier transform and equations over finite abelian groups (lecture notes, version 1.3) (2002)
2. Bellare, M., Bernstein, D.J., Tessaro, S.: Hash-function based prfs: AMAC and its multi-user security. In: Fischlin, M., Coron, J.-S. (eds.) Advances in Cryptology -EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I, vol. 9665 of Lecture Notes in Computer Science, pp 566–595. Springer (2016)
3. Bellare, M., Boldyreva, A., Micali, S.: Public-key encryption in a multi-user setting Security proofs and improvements. In: Preneel, B. (ed.) Advances in Cryptology -EUROCRYPT 2000, International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000, Proceeding, vol. 1807 of Lecture Notes in Computer Science, pp 259–274. Springer (2000)
4. Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A concrete security treatment of symmetric encryption. In: 38th Annual Symposium on Foundations of Computer Science, Miami Beach, Florida, USA, FOCS ’97, October 19-22, 1997, pp 394–403. IEEE Computer Society (1997)
5. Bellare, M., Björn, T: The multi-user security of authenticated encryption: AES-GCM in TLS 1.3. In: Robshaw, M., Katz, J. (eds.) Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I, vol. 9814 of Lecture Notes in Computer Science, pp 247–276. Springer (2016)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献