Author:
Bellare Mihir,Guérin Roch,Rogaway Phillip
Publisher
Springer Berlin Heidelberg
Reference15 articles.
1. N. Alon, L. Babai and A. Itai. A fast and simple randomized parallel algorithm for the maximal independent set problem. J. of Algorithms, Vol.7, 567–583, 1986.
2. M. Bellare, R. Guérin and P. Rogaway. XOR MACs: New methods for message authentication using finite pseudorandom functions. Available from the authors or out of http://www.cs.ucdavis.edu/~rogaway/
3. M. Bellare, J. Kilian and P. Rogaway. On the security of cipher block chaining. Advances in Cryptology — Crypto 94 Proceedings.
4. M. Bellare, O. Goldreich and S. Goldwasser. Incremental cryptography: The case of hashing and signing. Advances in Cryptology — Crypto 94 Proceedings.
5. M. Bellare, O. Goldreich and S. Goldwasser. Incremental cryptography and application to virus protection. Proceedings of the Twenty Seventh Annual Symposium on the Theory of Computing, ACM, 1995.
Cited by
99 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献