Author:
Chuah Chai Wen,Mat Deris Mustafa,Dawson Edward
Reference17 articles.
1. Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: Proceedings of the 1st ACM Conference on Computer and Communications Security, pp. 62–73. ACM (1993)
2. Cao, Z.: How to Launch A Birthday Attack Against DES. IACR Cryptology ePrint Archive 2008, vol. 288 (2008)
3. Chen, L.: NIST SP 800-56C: recommendation for key derivation through extraction-then-expansion. Technical report, NIST (2011)
4. Lecture Notes in Computer Science;CC Wen,2012
5. IFIP Advances in Information and Communication Technology;CW Chuah,2013