Author:
Brown Daniel R. L.,Johnson Don B.
Publisher
Springer Berlin Heidelberg
Reference17 articles.
1. Lect Notes Comput Sci;M. Abe,1999
2. Lect Notes Comput Sci;W. Aiello,1998
3. M. Bellare, et al., “A concrete security treatment of symmetric encryption: Analysis of the DES modes of operation”, Proc. 38th FOCS, 1997, 394–403.
4. M. Bellare and P. Rogaway, “Random oracles are practical: a paradigm for designing efficient protocols”, 1st ACM Conference on Computer and Communications Security, (1993) 62–73.
5. Lect Notes Comput Sci;M. Bellare,1996
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献