共 22 条
- [11] Hong D, 2003, LECT NOTES COMPUT SC, V2887, P154
- [12] Iwata T, 2003, LECT NOTES COMPUT SC, V2887, P129
- [13] Iwata T, 2003, LECT NOTES COMPUT SC, V2898, P306
- [14] IWATA T, NEW SECURITY PROOFS
- [15] Jonsson J, 2003, LECT NOTES COMPUT SC, V2595, P76
- [16] Jutla CS, 2001, LECT NOTES COMPUT SC, V2045, P529
- [17] KANG JS, 2001, LNCS, V2248, P255
- [18] Analysis of 3gpp-MAC and two-key 3gpp-MAC[J]. Knudsen, LR;Mitchell, CJ. DISCRETE APPLIED MATHEMATICS, 2003(01)
- [19] KOHNO T, 2004, FAST SOFTWARE ENCRYP
- [20] HOW TO CONSTRUCT PSEUDORANDOM PERMUTATIONS FROM PSEUDORANDOM FUNCTIONS[J]. LUBY, M;RACKOFF, C. SIAM JOURNAL ON COMPUTING, 1988(02)