共 11 条
- [1] Biham E(2002)How to decrypt or even substitute DES-encrypted messages in 2 Inf. Process. Lett. 84 117-124
- [2] den Boer B(1993) steps J. Comput. Secur. 2 65-72
- [3] Daemen J(2012)A simple and key-economical unconditional authentication scheme Proc. Rom. Acad. Ser. A 13 395-400
- [4] Rijmen V(1997)On the related-key attacks against aes J. Cryptol. 10 151-162
- [5] Even S(2004)A construction of a cipher from a single pseudorandom permutation Des. Codes Cryptogr. 33 261-274
- [6] Mansour Y(2004)Security of signature schemes in a multi-user setting SIAM J. Comput. 33 505-543
- [7] Menezes A(1981)On universal classes of extremely random constant-time hash functions J. Comput. Syst. Sci. 22 265-279
- [8] Smart NP(undefined)New hash functions and their use in authentication and set equality undefined undefined undefined-undefined
- [9] Siegel A(undefined)undefined undefined undefined undefined-undefined
- [10] Wegman MN(undefined)undefined undefined undefined undefined-undefined