Author:
Chen Yu,Qin Baodong,Zhang Jiang,Deng Yi,Chow Sherman S. M.
Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computer Science Applications,Software
Reference58 articles.
1. M. Abdalla, F. Benhamouda, A. Passelègue, K.G. Paterson, Related-key security for pseudorandom functions beyond the linear barrier, in Advances in Cryptology—CRYPTO 2014. LNCS, vol. 8616 (Springer, 2014), pp. 77–94
2. A. Akavia, S. Goldwasser, V. Vaikuntanathan, Simultaneous hardcore bits and cryptography against memory attacks, in Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009. LNCS, vol. 5444 (Springer, 2009), pp. 474–495
3. B. Applebaum, D. Harnik, Y. Ishai, Semantic security under related-key attacks and applications, in Innovations in Computer Science—ICS 2010 (2011), pp. 45–60
4. M. Bellare, A. Boldyreva, A. O’Neill, Deterministic and efficiently searchable encryption, in Advances in Cryptology—CRYPTO 2007. LNCS, vol. 4622 (Springer, 2007), pp. 535–552
5. M. Bellare, D. Cash, Pseudorandom functions and permutations provably secure against related-key attacks, in Advances in Cryptology—CRYPTO 2010 (2010), pp. 666–684
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献