Computer Science ›› 2014, Vol. 41 ›› Issue (4): 168-171.
Previous Articles Next Articles
SONG Sheng-yu,ZHANG Zi-nan,WANG Ya-di and LI Jun-feng
[1] Canetti R.Universally composable security:A new paradigm for cryptographic protocols[C]∥Proceedings of the 42nd IEEE Symposium on the FOCS.New York:IEEE Computer Society Press,2001:136-145 [2] Canetti R,Halevi S,Katz J,et al.Universally composable password-based key exchange[C]∥Advances in Cryptology,Eurocrypt’05.LNCS.Vol.3494,Berlin:Springer-Verlag,2005:404-421 [3] Moran T,Segev G.David and goliath commitments:UC computation for asymmetric parties using tamper-proof hardware[C]∥EUROCRYPT,volume 4965of Lecture Notes in Computer Science.Springer,2008:527-544 [4] Pappu R S.Physical One-Way Functions[D].Massachusetts Institute of Technology,2001 [5] Tuyls P,Schrijen G J,koricB,et al.Read-Proof Hardware from Protective Coatings.Cryptographic Hardware and Embedded Systems Workshop[C]∥Lecture Notes in Computer Science.New York,NY:Springer,2006,4249:369-383 [6] Hammouri G,ztürk E,Birand B,et al.Unclonable Lightweight Authentication Scheme[C]∥Proceedings of the 10th International Conference on Information and Communications Security (ICICS 2008).Heidelberg:Springer,2008:33-48 [7] Dodis Y,Ostrovsky R,Reyzin L,et al.Fuzzy extractors:How to generate strong keys from biometrics and other noisy data[J].SIAM J.Comput.,2008,38(1):97-139 [8] 冯涛,李凤华,马建峰,等.UC安全的并行可否认认证新方法[J].中国科学E辑:信息科学,2008,8:1220-1233 [9] Ben-Or M,Goldwasser S,Wigderson A.Completeness theorems for non-cryptographic fault-tolerant distributed computation[C]∥Proc.20th STOC.ACM,1988:1-10 [10] Canetti R.Universally composable security:A new paradigm for cryptographic protocols [C]∥Proceedings of the 42nd IEEE Symposium on the FOCS.New York:IEEE Computer Society Press,2001:136-145 |
No related articles found! |
|