Inproceedings,

Constructing VIL-MACsfrom FIL-MACs: Message Authentication under Weakened Assumptions.

, and .
CRYPTO, volume 1666 of Lecture Notes in Computer Science, page 252-269. Springer, (1999)

Meta data

Tags

Users

  • @dblp

Comments and Reviews