Author:
Prabhakaran Manoj,Rosulek Mike
Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computer Science Applications,Software
Reference66 articles.
1. J. H. Ahn, D. Boneh, J. Camenisch, S. Hohenberger, abhi shelat, and B. Waters. Computing on authenticated data. In R. Cramer, editor, TCC, volume 7194 of Lecture Notes in Computer Science, pp. 1–20. Springer, 2012.
2. J. H. An, Y. Dodis, and T. Rabin. On the security of joint signature and encryption. In Knudsen [46], pp. 83–107.
3. J. K. Andersen and E. W. Weisstein. Cunningham chain. From MathWorld–A Wolfram Web Resource.
http://mathworld.wolfram.com/CunninghamChain.html
, 2005.
4. M. Bellare, A. Boldyreva, A. Desai, and D. Pointcheval. Key-privacy in public-key encryption. In C. Boyd, editor, ASIACRYPT, volume 2248 of Lecture Notes in Computer Science, pp. 566–582. Springer, 2001.
5. M. Bellare and A. Sahai. Non-malleable encryption: Equivalence between two notions, and an indistinguishability-based characterization. In M. J. Wiener, editor, CRYPTO, volume 1666 of Lecture Notes in Computer Science, pp. 519–536. Springer, 1999.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献