Author:
Jalili Rasool,Dousti Mohammad Sadeq
Publisher
American Institute of Mathematical Sciences (AIMS)
Subject
Applied Mathematics,Discrete Mathematics and Combinatorics,Computer Networks and Communications,Algebra and Number Theory
Reference62 articles.
1. Pseudorandom functions and lattices,;A. Banerjee;in Advances in Cryptology-EUROCRYPT 2012,2012
2. Provably repairing the ISO/IEC 9798 standard for entity authentication,;D. Basin;in Principles of Security and Trust,2012
3. Keying hash functions for message authentication,;M. Bellare;in Advances in Cryptology-CRYPTO '96,1996
4. A modular approach to the design and analysis of authentication and key exchange protocols (extended abstract),;M. Bellare;in Proceedings of the $30^{th}$ Annual ACM Symposium on Theory of Computing (STOC '98),1998
5. Authenticated key exchange secure against dictionary attacks,;M. Bellare;in Advances in Cryptology-EUROCRYPT '00,2000
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献