Publisher
Springer Berlin Heidelberg
Reference26 articles.
1. Basturk, E., Bellare, M., Chow, C.-S., Guerin, R.: Secure transport protocols for high-speed networks. IBM Research Report Report RC 19981 IBM T. J. Watson Research Center Yorktown Heights, NY 10598 1994.
2. Bellare, M., Canetti, R., Krawczyk, H.: Keying hash functions for message authentication. In Advances in Cryptology — CRYPTO'96 (Berlin, New York, Tokyo, 1996) vol. 1109 of Lecture Notes in Computer Science Springer-Verlag pp. 1–15.
3. Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In Proceedings of the First ACM Conference on Computer and Communications Security (New York, November 1993) The Association for Computing Machinery pp. 62–73.
4. Brickell, E., McCurley, K.: Interactive identification and digital signatures. AT&T Technical Journal (1991) 73–86.
5. Chaum, D.: Zero-knowledge undeniable signatures. In Advances in Cryptology — EUROCRYPT'90 (Berlin, New York, Tokyo, 1990) vol. 473 of Lecture Notes in Computer Science Springer-Verlag pp. 458–464.
Cited by
429 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献