共 25 条
[2]
Bellare M, 2000, LECT NOTES COMPUT SC, V1976, P531
[3]
Bellare M, 2000, LECT NOTES COMPUT SC, V1976, P317
[4]
Universally composable security: A new paradigm for cryptographic protocols
[J].
42ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS,
2001,
:136-145
[5]
Canetti R, 2003, LECT NOTES COMPUT SC, V2729, P565
[6]
Coretti S, 2013, LECT NOTES COMPUT SC, V8269, P134, DOI 10.1007/978-3-642-42033-7_8
[7]
Data Is a Stream: Security of Stream-Based Channels
[J].
ADVANCES IN CRYPTOLOGY, PT II,
2015, 9216
:545-564
[8]
Gajek S, 2008, LECT NOTES COMPUT SC, V5324, P313, DOI 10.1007/978-3-540-88733-1_22
[9]
He C., 2005, CCS 05 P 12 ACM C CO, P2
[10]
Jager T, 2012, LECT NOTES COMPUT SC, V7417, P273