暂无分享,去创建一个
[1] Alistair Sinclair,et al. The Extended k-tree Algorithm , 2011, Journal of Cryptology.
[2] John Black,et al. CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions , 2000, CRYPTO.
[3] Tsuyoshi Takagi,et al. A New Public-Key Cryptosystem over a Quadratic Order with Quadratic Decryption Time , 2000, Journal of Cryptology.
[4] Ivan Damgård,et al. Two-Key Triple Encryption , 1998, Journal of Cryptology.
[5] Rosario Gennaro,et al. Securing Threshold Cryptosystems against Chosen Ciphertext Attack , 1998, Journal of Cryptology.
[6] John Black,et al. CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions , 2000, Journal of Cryptology.
[7] Carlisle M. Adams,et al. The structured design of cryptographically good s-boxes , 1990, Journal of Cryptology.
[8] Marc Fischlin,et al. Efficient Non-malleable Commitment Schemes , 2000, Journal of Cryptology.
[9] Peter Gemmell,et al. Authenticated Key Exchange Provably Secure Against the Man-in-the-Middle Attack , 2001, Journal of Cryptology.
[10] David A. Wagner,et al. Tweakable Block Ciphers , 2002, Journal of Cryptology.
[11] Onur Aciiçmez,et al. Predicting Secret Keys Via Branch Prediction , 2007, CT-RSA.
[12] Bruce Schneier,et al. Key-Schedule Cryptanalysis of DEAL , 1999, Selected Areas in Cryptography.
[13] Luke O'Connor. An analysis of a class of algorithms for S-box construction , 2006, Journal of Cryptology.
[14] Kristin E. Lauter,et al. Cryptographic Hash Functions from Expander Graphs , 2008, Journal of Cryptology.