作者: Mihir Bellare , Phillip Rogaway
DOI: 10.1007/BFB0053428
关键词: Discrete mathematics 、 Chosen-ciphertext attack 、 Hash function 、 Cryptographic hash function 、 Hash chain 、 SHA-2 、 MDC-2 、 Collision attack 、 Plaintext-aware encryption 、 Computer science
摘要: … In the find-stage it is given an encryption algorithm s and outputs a pair z0, zt of messages. It also outputs a string c which could record, for example, its history and its inputs. Now we …