共 50 条
- [21] On provable security for conventional cryptography INFORMATION SECURITY AND CRYPTOLOGY - ICISC'99, 2000, 1787 : 1 - 16
- [22] Provable implementations of security protocols 21ST ANNUAL IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE, PROCEEDINGS, 2006, : 345 - 346
- [23] Cryptography and the methodology of provable security APPLIED ALGEBRA, ALGEBRAIC ALGORITHMS AND ERROR-CORRECTING CODES, PROCEEDINGS, 2003, 2643 : 1 - 5
- [24] The provable security of graph-based one-time signatures and extensions to algebraic signature schemes ADVANCES IN CRYPTOLOGY - ASIACRYPT 2002, PROCEEDINGS, 2002, 2501 : 379 - 396
- [25] Impossibility on the Provable Security of the Fiat-Shamir-Type Signatures in the Non-programmable Random Oracle Model INFORMATION SECURITY, (ISC 2016), 2016, 9866 : 389 - 407
- [26] Provable security of proxy signature schemes ICCC2004: PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION VOL 1AND 2, 2004, : 1059 - 1063
- [28] Another look at "provable security" - II PROGRESS IN CRYPTOLOGY - INDOCRYPT 2006, PROCEEDINGS, 2006, 4329 : 148 - +
- [30] Towards provable security for ubiquitous applications INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2006, 4058 : 295 - 312