-
2
-
-
85034497286
-
-
Mihir Bellare, Ran Canetti, Hugo Krawczyk, Pseudorandom functions revisited: the cascade construction and its concrete security, in [1], pp. 514-523.
-
Mihir Bellare, Ran Canetti, Hugo Krawczyk, Pseudorandom functions revisited: the cascade construction and its concrete security, in [1], pp. 514-523.
-
-
-
-
3
-
-
85034519282
-
-
Mihir Bellare, Ran Canetti, Hugo Krawczyk, Pseudorandom functions revisited: the cascade construction and its concrete security, draft available as [2], newer draft available as http:// www-cse.ucsd.edu/~mihir/papers/cascade.ps.gz.
-
Ran Canetti, Hugo Krawczyk, Pseudorandom Functions Revisited: the Cascade Construction and Its Concrete Security, Draft Available as [2], Newer Draft Available as Http:// Www-cse.ucsd.edu/~mihir/papers/cascade.ps.gz.
-
-
Bellare, M.1
-
4
-
-
85034492540
-
-
Mihir Bellare, Roch Guérin, Phillip Rogaway, XOR MACs: new methods for message authentication using finite pseudorandom functions, in [12], pp. 15-28.
-
Roch Guérin, Phillip Rogaway, XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions, in [12], Pp. 15-28.
-
-
Bellare, M.1
-
5
-
-
85034495199
-
-
Mihir Bellare, Roch Guérin, Phillip Rogaway, XOR MACs: new methods for message authentication using finite pseudorandom functions, draft available as [4], newer draft available as http:// www-cse.ucsd.edu/-mihir/papers/xormacs.ps.gz.
-
Roch Guérin, Phillip Rogaway, XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions, Draft Available as [4], Newer Draft Available as Http:// Www-cse.ucsd.edu/-mihir/papers/xormacs.ps.gz.
-
-
Bellare, M.1
-
6
-
-
85034517697
-
-
Mihir Bellare, Joe Kilian, Phillip Rogaway, The security of cipher block chaining, in [13], pp. 341-358.
-
Joe Kilian, Phillip Rogaway, the Security of Cipher Block Chaining, in [13], Pp. 341-358.
-
-
Bellare, M.1
-
7
-
-
85034502213
-
-
Mihir Bellare, Joe Kilian, Phillip Rogaway, The security of the cipher block chaining message authentication code, draft available as [6], newer draft available as http:// www-cse.ucsd.edu/-mihir/papers/cbc.ps.gz.
-
Joe Kilian, Phillip Rogaway, the Security of the Cipher Block Chaining Message Authentication Code, Draft Available as [6], Newer Draft Available as Http:// Www-cse.ucsd.edu/-mihir/papers/cbc.ps.gz.
-
-
Bellare, M.1
-
10
-
-
0024867085
-
Inferring sequences produced by a linear congruential generator missing low-order bits
-
Joan Boyar, Inferring sequences produced by a linear congruential generator missing low-order bits, Journal of Cryptology 1 (1989), 177-184.
-
Journal of Cryptology 1 (1989), 177-184.
-
-
Boyar, J.1
-
12
-
-
85034519253
-
-
editor
-
Don Coppersmith (editor), Advances in Cryptology-CRYPTO '95, Lecture Notes in Computer Science 963, Springer-Verlag, Berlin, 1995. [13] Yvo Desmedt (editor), Advances in Cryptology-CRYPTO '94, Lecture Notes in Computer Science 839, Springer-Verlag, Berlin, 1994.
-
Advances in Cryptology-CRYPTO '95, Lecture Notes in Computer Science 963, Springer-Verlag, Berlin, 1995. [13] Yvo Desmedt (Editor), Advances in Cryptology-CRYPTO '94, Lecture Notes in Computer Science 839, Springer-Verlag, Berlin, 1994.
-
-
Coppersmith, D.1
-
13
-
-
85034513903
-
-
editors
-
Shimon Even, Oded Kariv (editors), Automata, Langauges and Programming, Lecture Notes in Computer Science'115, Springer-Verlag, Berlin, 1981.
-
Automata, Langauges and Programming, Lecture Notes in Computer Science'115, Springer-Verlag, Berlin, 1981.
-
-
Even, S.1
Kariv, O.2
-
15
-
-
84968483645
-
R. F. Churchhouse, the Riemann hypothesis and pseudorandom features of the Möbius sequence
-
Irving J. Good, R. F. Churchhouse, The Riemann hypothesis and pseudorandom features of the Möbius sequence, Mathematics of Computation 22 (1968), 857-861.
-
Mathematics of Computation 22 (1968), 857-861.
-
-
Good, I.J.1
-
16
-
-
85034492152
-
-
Donald E. Knuth, The Art of Computer Programming, volume 2,2nd edition, Addison-Wesley, Reading, Massachusetts, 1981.
-
The Art of Computer Programming, Volume 2,2nd Edition, Addison-Wesley, Reading, Massachusetts, 1981.
-
-
Knuth, D.E.1
-
18
-
-
0023984964
-
-
Michael Luby, Charles Rackoff, How to construct pseudorandom permutations from pseudorandom functions, SIAM Journal of Computing 17 (1988), 373-386.
-
Michael Luby, Charles Rackoff, How to construct pseudorandom permutations from pseudorandom functions, SIAM Journal of Computing 17 (1988), 373-386.
-
-
-
-
19
-
-
84944878354
-
-
Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone, Handbook of Applied Cryptography, CRC Press, Boca Raton, Florida, 1996.
-
Handbook of Applied Cryptography, CRC Press, Boca Raton, Florida, 1996.
-
-
Menezes, A.J.1
Van Oorschot, P.C.2
Vanstone, S.A.3
-
21
-
-
84966253742
-
Harald Niederreiter, the serial test for congruential pseudorandom numbers generated by inversions
-
Harald Niederreiter, The serial test for congruential pseudorandom numbers generated by inversions, Mathematics of Computation 52 (1989), 135-144.
-
Mathematics of Computation 52 (1989), 135-144.
-
-
-
24
-
-
85034506549
-
-
Halsey L. Royden, Real Analysis, 3rd edition, Macmillan, New York, 1988.
-
Real Analysis, 3rd Edition, Macmillan, New York, 1988.
-
-
Royden, H.L.1
-
27
-
-
85034512527
-
-
Victor Shoup, On fast and provably secure message authentication based on universal hashing, draft available as [27], newer draft available as http: //www. cs .wise .edu/-shoup/papers/macs .ps. Z. [29] Alan M. Turing, Computing machinery and intelligence, MIND 59 (1950), 433-60.
-
Victor Shoup, on Fast and Provably Secure Message Authentication Based on Universal Hashing, Draft Available as [27], Newer Draft Available as Http: //Www. Cs .Wise .Edu/-shoup/papers/macs .Ps. Z. [29] Alan M. Turing, Computing Machinery and Intelligence, MIND 59 (1950), 433-60.
-
-
|