Author:
Bellare Mihir,Krovetz Ted,Rogaway Phillip
Publisher
Springer Berlin Heidelberg
Reference23 articles.
1. W. Aiello and R. Vanketesan, “Foiling birthday attacks in output-doubling transformations.” Advances in Cryptology — Eurocrypt 96 Proceedings, Lecture Notes in Computer Science Vol. 1070, U. Maurer ed., Springer-Verlag, 1996.
2. M. Bellare, O. Goldreich and H. Krawczyk, personal communications, 1995.
3. M. Bellare, R. Canetti and H. Krawczyk, “Pseudorandom functions revis-ited: The cascade construction and its concrete security.” Proceedings of the 37th Symposium on Foundations of Computer Science, IEEE, 1996.
4. M. Bellare, A. Desai, E. Jokipii and P. Rogaway, “A concrete security treatment of symmetric encryption.” Proceedings of the 38th Symposium on Foundations of Computer Science, IEEE, 1997.
5. M. Bellare, R. Guérin and P. Rogaway, “XOR MACs: New methods for message authentication using a finite pseudorandom function.” Advances in Cryp-tology — Crypto 95 Proceedings, Lecture Notes in Computer Science Vol. 963, D. Coppersmith ed., Springer-Verlag, 1995.
Cited by
72 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献