注册
/
登录
高级搜索
开启搜索历史记录
删除搜索历史记录.
搜索历史记录选项已关闭,请开启搜索历史记录选项。
我的图书馆
Your browser does not support JavaScript, or it is disabled. JavaScript must be enabled in order to view listings.
Decisional Diffie-Hellman Problem.
作者: Ran Canetti , Mayank Varia
DOI:
关键词:
摘要:
保存
引用
反馈
分享
想要
索引来源
1
下载资源
1
uni-trier.de
本地加速
uni-trier.de
PDF
下载加速
参考文章
(21)
1.
Ivan Damgård,
Efficient concurrent zero-knowledge in the auxiliary string model
theory and application of cryptographic techniques.
pp. 418- 430 ,(2000) ,
10.1007/3-540-45539-6_30
2.
Dan Boneh,
The Decision Diffie-Hellman Problem
algorithmic number theory symposium.
pp. 48- 63 ,(1998) ,
10.1007/BFB0054851
3.
Moni Naor, Gil Segev,
Public-Key Cryptosystems Resilient to Key Leakage
international cryptology conference.
pp. 18- 35 ,(2009) ,
10.1007/978-3-642-03356-8_2
4.
Oded Goldreich,
Foundations of Cryptography
Cambridge University Press.
,(2001) ,
10.1017/CBO9780511546891
5.
Anna Lysyanskaya,
Unique Signatures and Verifiable Random Functions from the DH-DDH Separation
international cryptology conference.
pp. 597- 612 ,(2002) ,
10.1007/3-540-45708-9_38
6.
Tatsuaki Okamoto, David Pointcheval,
The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes
public key cryptography.
pp. 104- 118 ,(2001) ,
10.1007/3-540-44586-2_8
7.
Markus Stadler,
Publicly verifiable secret sharing
theory and application of cryptographic techniques.
,vol. 1070, pp. 190- 199 ,(1996) ,
10.1007/3-540-68339-9_17
8.
Dan Boneh, Shai Halevi, Mike Hamburg, Rafail Ostrovsky,
Circular-Secure Encryption from Decision Diffie-Hellman
international cryptology conference.
pp. 108- 125 ,(2008) ,
10.1007/978-3-540-85174-5_7
9.
Yevgeniy Dodis,
Efficient Construction of (Distributed) Verifiable Random Functions
public key cryptography.
pp. 1- 17 ,(2003) ,
10.1007/3-540-36288-6_1
10.
Ronald Cramer, Victor Shoup,
A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack
international cryptology conference.
pp. 13- 25 ,(1998) ,
10.1007/BFB0055717
来源期刊
Encyclopedia of Cryptography and Security (2nd Ed.)
2011 年,
Volume: , Issue: ,
Page: 316-319
相似文章
0
我的图书馆
我的账户
注册
登录
Copyright 2023 ©KipHub.
高级搜索
查找文章
包含所有这些词
包含完全匹配的短语
包含至少一个这些词
不包含这些词
词语出现的位置
任意位置
标题中
显示以下作者所著的文章:
例如:
丁肇中
或
"PJ Hayes"
显示以下刊物上的文章:
例如:
《学术探索》
或
《Nature》
显示在此期间发表的文章:
—
例如:
1996
百变星君
加载中...