Cryptography Reference
In-Depth Information
[4]
Goldreich, O., S. Goldwasser, and S. Micali, “On the Cryptographic Applications of Random
Functions,”
Proceedings of CRYPTO '84
, Springer-Verlag, LNCS 196, 1984, pp. 276-288.
[5]
Canetti, R., “Towards Realizing Random Oracles: Hash Functions That Hide All Partial Informa-
tion,”
Proceedings of CRYPTO '97
, Springer-Verlag, LNCS 1294, 1997, pp. 455-469.
[6]
Canetti, R., O. Goldreich, and S. Halevi, “The Random Oracles Methodology, Revisited,”
Pro-
ceedings of 30th STOC
, ACM Press, New York, 1998, pp. 209-218.