Crossref Citations
This Book has been
cited by the following publications. This list is generated based on data provided by Crossref.
Feng, Qilong
Liu, Yang
Lu, Songjian
and
Wang, Jianxin
2009.
Theory and Applications of Models of Computation.
Vol. 5532,
Issue. ,
p.
211.
Okazaki, Hiroyuki
2009.
Probability on Finite and Discrete Set and Uniform Distribution.
Formalized Mathematics,
Vol. 17,
Issue. 2,
p.
173.
Pieters, Wolter
and
Tang, Qiang
2009.
Data and Applications Security XXIII.
Vol. 5645,
Issue. ,
p.
240.
Agrawal, Shweta
Boneh, Dan
and
Boyen, Xavier
2010.
Advances in Cryptology – EUROCRYPT 2010.
Vol. 6110,
Issue. ,
p.
553.
Dudeanu, A
Oancea, George-Razvan
and
Iftene, S
2010.
An x-Coordinate Point Compression Method for Elliptic Curves over Fp.
p.
65.
Barthe, Gilles
Daubignard, Marion
Kapron, Bruce
Lakhnech, Yassine
and
Laporte, Vincent
2010.
Logic for Programming, Artificial Intelligence, and Reasoning.
Vol. 6355,
Issue. ,
p.
46.
Agrawal, Shweta
Freeman, David Mandell
and
Vaikuntanathan, Vinod
2011.
Advances in Cryptology – ASIACRYPT 2011.
Vol. 7073,
Issue. ,
p.
21.
Lipton, Richard J.
Regan, Kenneth W.
and
Rudra, Atri
2011.
Mathematical Foundations of Computer Science 2011.
Vol. 6907,
Issue. ,
p.
436.
Barthe, Gilles
Grégoire, Benjamin
Heraud, Sylvain
Olmedo, Federico
and
Zanella Béguelin, Santiago
2012.
Principles of Security and Trust.
Vol. 7215,
Issue. ,
p.
209.
CHEON, Jung Hee
JARECKI, Stanislaw
and
SEO, Jae Hong
2012.
Multi-Party Privacy-Preserving Set Intersection with Quasi-Linear Complexity.
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences,
Vol. E95.A,
Issue. 8,
p.
1366.
Seo, Jae Hong
Cheon, Jung Hee
and
Katz, Jonathan
2012.
Public Key Cryptography – PKC 2012.
Vol. 7293,
Issue. ,
p.
398.
Jia-Qi, Li
and
Jun, Yang
2012.
Challenge-Response Attack on a Key Transport Protocol based on a Ring Locking Technique.
p.
704.
Krenn, Stephan
Pietrzak, Krzysztof
and
Wadia, Akshay
2013.
Theory of Cryptography.
Vol. 7785,
Issue. ,
p.
23.
Li, Yannan
Xia, Qi
Ni, Jianbing
and
Yu, Yong
2013.
A New Construction of Proxy Signature Using Chameleon Hash Function.
p.
388.
YU, Yong
NI, Jianbing
and
SUN, Ying
2013.
Security Analysis of a Distributed Reprogramming Protocol for Wireless Sensor Networks.
IEICE Transactions on Information and Systems,
Vol. E96.D,
Issue. 8,
p.
1875.
Jager, Tibor
and
Schwenk, Jörg
2013.
On the Analysis of Cryptographic Assumptions in the Generic Ring Model.
Journal of Cryptology,
Vol. 26,
Issue. 2,
p.
225.
Fleming, Shane T.
and
Thomas, David B.
2013.
Reconfigurable Computing: Architectures, Tools and Applications.
Vol. 7806,
Issue. ,
p.
103.
Golovnev, Alexander
Kulikov, Alexander S.
and
Mihajlin, Ivan
2014.
Automata, Languages, and Programming.
Vol. 8572,
Issue. ,
p.
551.
Renault, Jérôme
Renou, Ludovic
and
Tomala, Tristan
2014.
Secure message transmission on directed networks.
Games and Economic Behavior,
Vol. 85,
Issue. ,
p.
1.
GUO, Qian
and
KAN, Haibin
2014.
An Average-Case Efficient Algorithm on Testing the Identity of Boolean Functions in Trace Representation.
IEICE Transactions on Information and Systems,
Vol. E97.D,
Issue. 3,
p.
583.