Author:
Coron Jean -Sebastien,Naccache David
Publisher
Springer Berlin Heidelberg
Reference8 articles.
1. Lect Notes Comput Sci;M. Bellare,1998
2. Lect Notes Comput Sci;M. Bellare,1996
3. M. Bellare, P. Rogaway, Random oracles are practical: A paradigm for designing efficient protocols, First ACM Conference on computer and communications security, ACM, 1994.
4. G. Davida, Chosen signature cryptanalysis of the RSA (MIT) public-key cryptosystem, Technical report TR-CS-82-2, Department of EECS, University of Wisconsin, 1982.
5. C. Lim & P. Lee, Security of interactive DSA batch verification, Electronic Letters, vol. 30, no. 19, pp. 1592–1593, 1994.
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献