共 50 条
- [31] Inversion attacks on secure hash functions using SAT solvers THEORY AND APPLICATIONS OF SATISFIABILITY TESTING - SAT 2007, PROCEEDINGS, 2007, 4501 : 377 - +
- [33] Tightly-Secure Signatures from Chameleon Hash Functions PUBLIC-KEY CRYPTOGRAPHY - PKC 2015, 2015, 9020 : 256 - 279
- [36] One-round secure computation and secure autonomous mobile agents (Extended abstract) AUTOMATA LANGUAGES AND PROGRAMMING, 2000, 1853 : 512 - 523
- [37] Efficient secure multi-party computation - (Extended abstract) ADVANCES IN CRYPTOLOGY ASIACRYPT 2000, PROCEEDINGS, 2000, 1976 : 143 - 161
- [38] Protocols for collusion-secure asymmetric fingerprinting (extended abstract) STACS 97 - 14TH ANNUAL SYMPOSIUM ON THEORETICAL ASPECTS OF COMPUTER SCIENCE, 1997, 1200 : 399 - 412
- [39] Extended abstract: Forward-secure sequential aggregate authentication 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 86 - +
- [40] Related-Key Almost Universal Hash Functions: Definitions, Constructions and Applications FAST SOFTWARE ENCRYPTION (FSE 2016), 2016, 9783 : 514 - 532