Author:
Zeng Shengke,Chen Yong,Tan Shuangquan,He Mingxing
Funder
National Natural Science Foundation of China (CN)
the Scientific Research Funds Project of Science and Technology Department of Sichuan Province
National Natural Science Foundation of China
Open Research Subject of Key Laboratory of Digital Space Security
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Software
Reference30 articles.
1. Bellare M., Boldyreva A., Micali S. (2000) Public-key encryption in a multi-user setting: security proofs and improvements. In: Eurocrypt, LNCS 1807, pp 259–274
2. Bellare M., Canetti R., Krawczyk H. (1998) A modular approach to the design and analysis of authentication and key exchange protocols. In: STOC, pp 419–428
3. Bellare M., Palacio A. (2004) Towards plaintext-aware public-key encryption without random oracles. In: Asiacrypt, LNCS 3329, pp 48–62
4. Damgard I. (1992) Towards practical public key systems secure against chosen ciphertext attacks. In: Crypto, LNCS 576, pp 445–456
5. Di Raimondo M., Gennaro R. (2005) New approaches for deniable authentication. In: CCS, pp 112–121
Cited by
16 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献