Cryptography Reference
In-Depth Information
[4]
Goldreich, O., S. Goldwasser, and S. Micali, “On the Cryptographic Applications of Random
Functions,” Proceedings of CRYPTO '84 , Springer-Verlag, LNCS 196, 1984, pp. 276-288.
[5]
Canetti, R., “Towards Realizing Random Oracles: Hash Functions That Hide All Partial Informa-
tion,” Proceedings of CRYPTO '97 , Springer-Verlag, LNCS 1294, 1997, pp. 455-469.
[6]
Canetti, R., O. Goldreich, and S. Halevi, “The Random Oracles Methodology, Revisited,” Pro-
ceedings of 30th STOC , ACM Press, New York, 1998, pp. 209-218.
Search WWH ::




Custom Search