Publisher
Springer Berlin Heidelberg
Reference120 articles.
1. W. Alexi, B. Chor, O. Goldreich and C.P. Schnorr. RSA/Rabin Functions: Certain Parts are As Hard As the Whole. SIAMJ. on Comput., Vol. 17, April 1988, pages 194–209.
2. D. Beaver. Foundations of Secure Interactive Computing. In Crypto91, Springer-Verlag LNCS (Vol. 576), pages 377–391.
3. M. Bellare, R. Canetti and H. Krawczyk. Pseudorandom functions Revisited: The Cascade Construction and its Concrete Security. In 37th FOCS, pages 514–523, 1996.
4. M. Bellare, R. Canetti and H. Krawczyk. Keying Hash Functions for Message Authentication. In Crypto96, Springer LNCS (Vol. 1109), pages 1–15.
5. M. Bellare and O. Goldreich. On Defining Proofs of Knowledge. In Crypto92, Springer-Verlag LNCS (Vol. 740), pages 390–420.
Cited by
19 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Towards Building Quantum Resistant Blockchain;2023 International Conference on Electrical, Computer and Energy Technologies (ICECET);2023-11-16
2. Image encryption scheme based on alternate quantum walks and discrete cosine transform;Optics Express;2021-08-18
3. A Second Look at Fischlin’s Transformation;Progress in Cryptology – AFRICACRYPT 2014;2014
4. Bibliography;Theory of Computational Complexity;2013-12-06
5. Another Look at Tightness;Selected Areas in Cryptography;2012