Author: Dolev Shlomi
Publisher: Springer Publishing Company
ISSN: 1432-4350
Source: Theory of Computing Systems, Vol.48, Iss.1, 2011-01, pp. : 132-149
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
The Security of the IAPM and IACBC Modes
By Hastad Johan
Journal of Cryptology, Vol. 20, Iss. 2, 2007-04 ,pp. :
Formal Proofs for the Security of Signcryption
Journal of Cryptology, Vol. 20, Iss. 2, 2007-04 ,pp. :
Another Look at "Provable Security"
By Koblitz Neal
Journal of Cryptology, Vol. 20, Iss. 1, 2007-01 ,pp. :
The Americas, Vol. 55, Iss. 3, 1999-01 ,pp. :