共 50 条
[1]
Twisted Polynomials and Forgery Attacks on GCM
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT I,
2015, 9056
:762-786
[2]
Bellare M, 2005, LECT NOTES COMPUT SC, V3621, P527
[3]
Bellare M, 1998, LECT NOTES COMPUT SC, V1403, P266, DOI 10.1007/BFb0054132
[4]
Bellare M., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P270
[6]
Bellare M., 1996, Advances in Cryptology - CRYPTO'96. 16th Annual International Cryptology Conference. Proceedings, P1
[7]
Bellare M., 2004, IACR CRYPTOLOGY EPRI, V2004, P309
[8]
Bellare M., 1999, 1999024 IACR
[9]
Bellare M, 2006, LECT NOTES COMPUT SC, V4004, P409
[10]
Bernstein D., 2000, Floating-point arithmetic and message authentication