Crossref Citations
This Book has been
cited by the following publications. This list is generated based on data provided by Crossref.
Pieters, Wolter
and
Tang, Qiang
2009.
Data and Applications Security XXIII.
Vol. 5645,
Issue. ,
p.
240.
Feng, Qilong
Liu, Yang
Lu, Songjian
and
Wang, Jianxin
2009.
Theory and Applications of Models of Computation.
Vol. 5532,
Issue. ,
p.
211.
Okazaki, Hiroyuki
2009.
Probability on Finite and Discrete Set and Uniform Distribution.
Formalized Mathematics,
Vol. 17,
Issue. 2,
p.
173.
Agrawal, Shweta
Boneh, Dan
and
Boyen, Xavier
2010.
Advances in Cryptology – EUROCRYPT 2010.
Vol. 6110,
Issue. ,
p.
553.
Barthe, Gilles
Daubignard, Marion
Kapron, Bruce
Lakhnech, Yassine
and
Laporte, Vincent
2010.
Logic for Programming, Artificial Intelligence, and Reasoning.
Vol. 6355,
Issue. ,
p.
46.
Dudeanu, A
Oancea, George-Razvan
and
Iftene, S
2010.
An x-Coordinate Point Compression Method for Elliptic Curves over Fp.
p.
65.
Lipton, Richard J.
Regan, Kenneth W.
and
Rudra, Atri
2011.
Mathematical Foundations of Computer Science 2011.
Vol. 6907,
Issue. ,
p.
436.
Agrawal, Shweta
Freeman, David Mandell
and
Vaikuntanathan, Vinod
2011.
Advances in Cryptology – ASIACRYPT 2011.
Vol. 7073,
Issue. ,
p.
21.
Jia-Qi, Li
and
Jun, Yang
2012.
Challenge-Response Attack on a Key Transport Protocol based on a Ring Locking Technique.
p.
704.
Barthe, Gilles
Grégoire, Benjamin
Heraud, Sylvain
Olmedo, Federico
and
Zanella Béguelin, Santiago
2012.
Principles of Security and Trust.
Vol. 7215,
Issue. ,
p.
209.
CHEON, Jung Hee
JARECKI, Stanislaw
and
SEO, Jae Hong
2012.
Multi-Party Privacy-Preserving Set Intersection with Quasi-Linear Complexity.
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences,
Vol. E95.A,
Issue. 8,
p.
1366.
Seo, Jae Hong
Cheon, Jung Hee
and
Katz, Jonathan
2012.
Public Key Cryptography – PKC 2012.
Vol. 7293,
Issue. ,
p.
398.
Fleming, Shane T.
and
Thomas, David B.
2013.
Reconfigurable Computing: Architectures, Tools and Applications.
Vol. 7806,
Issue. ,
p.
103.
YU, Yong
NI, Jianbing
and
SUN, Ying
2013.
Security Analysis of a Distributed Reprogramming Protocol for Wireless Sensor Networks.
IEICE Transactions on Information and Systems,
Vol. E96.D,
Issue. 8,
p.
1875.
Jager, Tibor
and
Schwenk, Jörg
2013.
On the Analysis of Cryptographic Assumptions in the Generic Ring Model.
Journal of Cryptology,
Vol. 26,
Issue. 2,
p.
225.
Li, Yannan
Xia, Qi
Ni, Jianbing
and
Yu, Yong
2013.
A New Construction of Proxy Signature Using Chameleon Hash Function.
p.
388.
Krenn, Stephan
Pietrzak, Krzysztof
and
Wadia, Akshay
2013.
Theory of Cryptography.
Vol. 7785,
Issue. ,
p.
23.
Fouque, Pierre-Alain
and
Tibouchi, Mehdi
2014.
Automata, Languages, and Programming.
Vol. 8572,
Issue. ,
p.
991.
Groß, Thomas R.
2014.
Efficient Certification and Zero-Knowledge Proofs of Knowledge on Infrastructure Topology Graphs.
p.
69.
Bannister, Michael J.
Devanny, William E.
Eppstein, David
and
Goodrich, Michael T.
2014.
Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications.
Vol. 8827,
Issue. ,
p.
149.