Crossref Citations
This Book has been
cited by the following publications. This list is generated based on data provided by Crossref.
Pieters, Wolter
and
Tang, Qiang
2009.
Data and Applications Security XXIII.
Vol. 5645,
Issue. ,
p.
240.
Feng, Qilong
Liu, Yang
Lu, Songjian
and
Wang, Jianxin
2009.
Theory and Applications of Models of Computation.
Vol. 5532,
Issue. ,
p.
211.
Okazaki, Hiroyuki
2009.
Probability on Finite and Discrete Set and Uniform Distribution.
Formalized Mathematics,
Vol. 17,
Issue. 2,
p.
173.
Dudeanu, A
Oancea, George-Razvan
and
Iftene, S
2010.
An x-Coordinate Point Compression Method for Elliptic Curves over Fp.
p.
65.
Agrawal, Shweta
Boneh, Dan
and
Boyen, Xavier
2010.
Advances in Cryptology – EUROCRYPT 2010.
Vol. 6110,
Issue. ,
p.
553.
Barthe, Gilles
Daubignard, Marion
Kapron, Bruce
Lakhnech, Yassine
and
Laporte, Vincent
2010.
Logic for Programming, Artificial Intelligence, and Reasoning.
Vol. 6355,
Issue. ,
p.
46.
Agrawal, Shweta
Freeman, David Mandell
and
Vaikuntanathan, Vinod
2011.
Advances in Cryptology – ASIACRYPT 2011.
Vol. 7073,
Issue. ,
p.
21.
Lipton, Richard J.
Regan, Kenneth W.
and
Rudra, Atri
2011.
Mathematical Foundations of Computer Science 2011.
Vol. 6907,
Issue. ,
p.
436.
CHEON, Jung Hee
JARECKI, Stanislaw
and
SEO, Jae Hong
2012.
Multi-Party Privacy-Preserving Set Intersection with Quasi-Linear Complexity.
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences,
Vol. E95.A,
Issue. 8,
p.
1366.
Barthe, Gilles
Grégoire, Benjamin
Heraud, Sylvain
Olmedo, Federico
and
Zanella Béguelin, Santiago
2012.
Principles of Security and Trust.
Vol. 7215,
Issue. ,
p.
209.
Jia-Qi, Li
and
Jun, Yang
2012.
Challenge-Response Attack on a Key Transport Protocol based on a Ring Locking Technique.
p.
704.
Seo, Jae Hong
Cheon, Jung Hee
and
Katz, Jonathan
2012.
Public Key Cryptography – PKC 2012.
Vol. 7293,
Issue. ,
p.
398.
Fleming, Shane T.
and
Thomas, David B.
2013.
Reconfigurable Computing: Architectures, Tools and Applications.
Vol. 7806,
Issue. ,
p.
103.
Krenn, Stephan
Pietrzak, Krzysztof
and
Wadia, Akshay
2013.
Theory of Cryptography.
Vol. 7785,
Issue. ,
p.
23.
Jager, Tibor
and
Schwenk, Jörg
2013.
On the Analysis of Cryptographic Assumptions in the Generic Ring Model.
Journal of Cryptology,
Vol. 26,
Issue. 2,
p.
225.
YU, Yong
NI, Jianbing
and
SUN, Ying
2013.
Security Analysis of a Distributed Reprogramming Protocol for Wireless Sensor Networks.
IEICE Transactions on Information and Systems,
Vol. E96.D,
Issue. 8,
p.
1875.
Li, Yannan
Xia, Qi
Ni, Jianbing
and
Yu, Yong
2013.
A New Construction of Proxy Signature Using Chameleon Hash Function.
p.
388.
Dwivedi, Shri Prakash
2014.
Computing multiplicative order and primitive root in finite cyclic group.
p.
130.
Golovnev, Alexander
Kulikov, Alexander S.
and
Mihajlin, Ivan
2014.
Automata, Languages, and Programming.
Vol. 8572,
Issue. ,
p.
551.
ADAMSKI, Tomasz
2014.
THE AVERAGE COMPLEXITY OF THE PROBABILISTIC ALGORITHM FOR FINDING PRIMITIVE ROOTS MODULO n.
National Security Studies,
Vol. 6,
Issue. 2,
p.
247.