Author:
Koblitz Neal, ,Menezes Alfred,
Publisher
American Institute of Mathematical Sciences (AIMS)
Subject
Applied Mathematics,Discrete Mathematics and Combinatorics,Computer Networks and Communications,Algebra and Number Theory,Applied Mathematics,Discrete Mathematics and Combinatorics,Computer Networks and Communications,Algebra and Number Theory
Reference103 articles.
1. On cipher-dependent related-key attacks in the ideal-cipher model,;M. Albrecht;in,2011
2. Plaintext recovery attacks against SSH,;M. Albrecht;in,2009
3. Public-key encryption in the bounded-retrieval model,;J. Alwen;in,2010
4. Leakage-resilient public-key cryptography in the bounded-retrieval model,;J. Alwen;in,2009
5. "Security Engineering,'' 2nd edition,;R. Anderson;Wiley,2008
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献