共 10 条
[1]
Abe M.(2008)Tag-KEM/DEM: a new framework for hybrid encryption J. Cryptol. 21 97-130
[2]
Gennaro R.(2004)The random oracle methodology, revisited J. ACM 51 557-594
[3]
Kurosawa K.(2003)Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack SIAM J. Comput. 33 167-226
[4]
Canetti R.(1976)New directions in cryptography IEEE Trans. Inf. Theory IT-22 644-654
[5]
Goldreich O.(undefined)undefined undefined undefined undefined-undefined
[6]
Halevi S.(undefined)undefined undefined undefined undefined-undefined
[7]
Cramer R.(undefined)undefined undefined undefined undefined-undefined
[8]
Shoup V.(undefined)undefined undefined undefined undefined-undefined
[9]
Diffie W.(undefined)undefined undefined undefined undefined-undefined
[10]
Hellman M.(undefined)undefined undefined undefined undefined-undefined