Author:
Malkin Tal,Micciancio Daniele,Miner Sara
Publisher
Springer Berlin Heidelberg
Reference16 articles.
1. R. Anderson. Two remarks on public-key cryptology. Manuscript, Sep. 2000. Relevant material presented by the author in an invited lecture at the Fourth ACM Conference on Computer and Communications Security (Apr. 1997).
2. Lect Notes Comput Sci;M. Abdalla,2000
3. Lect Notes Comput Sci;M. Bellare,1999
4. M. Blum and S. Micali. How to generate cryptographically strong sequences of pseudorandom bits. SIAM Journal of Computing 13(4)(Nov. 1984), pp. 850–864.
5. O. Goldreich, S. Goldwasser, and S. Micali. How to construct random functions. Journal of the ACM, 33(4)(Oct. 1986), pp. 281–308. Preliminary version in the Proceedings of the IEEE Symposium on the Foundations of Computer Science, 1984, pp 464–479.
Cited by
57 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献