共 41 条
[1]
Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
[2]
Abdalla M, 2001, LECT NOTES COMPUT SC, V2020, P143
[3]
Security of the J-PAKE Password-Authenticated Key Exchange Protocol
[J].
2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015,
2015,
:571-587
[4]
On the Impossibility of Tight Cryptographic Reductions
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT II,
2016, 9666
:273-304
[5]
Tightly-Secure Authenticated Key Exchange
[J].
THEORY OF CRYPTOGRAPHY (TCC 2015), PT I,
2015, 9014
:629-658
[6]
Bellare M, 2000, LECT NOTES COMPUT SC, V1807, P139
[7]
Pseudorandom functions revisited: The cascade construction and its concrete security
[J].
37TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS,
1996,
:514-523
[8]
Bellare M., 1994, LNCS, V773, P232, DOI DOI 10.1007/3-540-48329-2_21
[9]
Bellare M., 2020, INDOCRYPT 2020
[10]
Bellare M., 1993, P 1 ACM C COMP COMM, P62