Author:
Hashimoto Keitaro,Katsumata Shuichi,Kwiatkowski Kris,Prest Thomas
Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computer Science Applications,Software
Reference81 articles.
1. D. Aharonov, O. Regev, Lattice problems in NP cap coNP, in 45th FOCS (IEEE Computer Society Press, 2004), pp. 362–371
2. J. Alawatugoda, D. Stebila, C. Boyd, Modelling after-the-fact leakage for key exchange, in S. Moriai, T. Jaeger, K. Sakurai, editors, ASIACCS 14 (ACM Press, 2014), pp. 207–216
3. J. Alwen, S. Coretti, Y. Dodis, The double ratchet: security notions, proofs, and modularization for the Signal protocol, in Y. Ishai, V. Rijmen, editors, EUROCRYPT 2019, Part I, volume 11476 of LNCS (Springer, Heidelberg, 2019), pp. 129–158
4. C. Bader, D. Hofheinz, T. Jager, E. Kiltz, Y. Li, Tightly-secure authenticated key exchange, in Y. Dodis, J.B. Nielsen, editors, TCC 2015, Part I, volume 9014 of LNCS (Springer, Heidelberg, 2015), pp. 629–658
5. M. Bellare, New proofs for NMAC and HMAC: security without collision-resistance, in C. Dwork, editor, CRYPTO 2006, volume 4117 of LNCS (Springer, Heidelberg, 2006), pp. 602–619
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献