Sciweavers

ICICS
1997
Springer

Minimizing the use of random oracles in authenticated encryption schemes

13 years 8 months ago
Minimizing the use of random oracles in authenticated encryption schemes
Mihir Bellare, Phillip Rogaway
Added 08 Aug 2010
Updated 08 Aug 2010
Type Conference
Year 1997
Where ICICS
Authors Mihir Bellare, Phillip Rogaway
Comments (0)