Author:
Black John,Rogaway Phillip
Publisher
Springer Berlin Heidelberg
Reference14 articles.
1. Lect Notes Comput Sci;R. Anderson,1996
2. Bellare, M., Kilian, J., and Rogaway, P. The security of the cipher block chaining message authentication code. Journal of Computer and System Sciences 61, 3 (2000), 362–399. Earlier version in CRYPTO’ 94. See http://www.cs.ucdavis.edu/~rogaway .
3. Lect Notes Comput Sci;M. Bellare,1999
4. Bellovin, S., and Merritt, M. Encrypted key exchange: password-based protocols secure against dictionary attacks. In 1992 IEEE Computer Society Symposium on Research in Security and Privacy (1992), IEEE Computer Society Press, pp. 72–84.
5. Certicom Research. Standards for efficient cryptography, SEC1: Elliptic curve cryptography, version 1, Sept. 2000. Available on-line at http://www.secg.org .
Cited by
87 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献