共 45 条
[1]
[Anonymous], [No title captured]
[2]
Assmus Jr. E.F., 1992, CAMBRIDGE TRACTS MAT, V103
[3]
Atallah M. J., 2008, P 2008 ACM S INF COM, P312
[4]
Bellare M, 1995, LECT NOTES COMPUT SC, V963, P15
[5]
A concrete security treatment of symmetric encryption
[J].
38TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS,
1997,
:394-403
[7]
Bellare M., 1995, Proceedings of the Twenty-Seventh Annual ACM Symposium on the Theory of Computing, P45, DOI 10.1145/225058.225080
[8]
Black J, 2002, LECT NOTES COMPUT SC, V2332, P384
[9]
Black J, 2000, LECT NOTES COMPUT SC, V1880, P197
[10]
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506