共 37 条
[2]
Abdalla M, 2013, LECT NOTES COMPUT SC, V7778, P292, DOI 10.1007/978-3-642-36362-7_19
[3]
Abdalla M, 2012, LECT NOTES COMPUT SC, V7237, P572, DOI 10.1007/978-3-642-29011-4_34
[4]
Abe M, 2002, LECT NOTES COMPUT SC, V2501, P415
[5]
On the Impossibility of Tight Cryptographic Reductions
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT II,
2016, 9666
:273-304
[6]
Tightly-Secure Authenticated Key Exchange
[J].
THEORY OF CRYPTOGRAPHY (TCC 2015), PT I,
2015, 9014
:629-658
[7]
Bellare M, 2000, LECT NOTES COMPUT SC, V1807, P259
[8]
Bellare M., 1994, LNCS, V773, P232, DOI DOI 10.1007/3-540-48329-2_21
[9]
Cachin C, 1999, LECT NOTES COMPUT SC, V1592, P402
[10]
Canetti R, 2001, LECT NOTES COMPUT SC, V2045, P453