Key-Dependent Message Security: Generic Amplification and Completeness. Applebaum, B. J. Cryptology, 27(3):429–451, 2014. Paper doi bibtex @article{DBLP:journals/joc/Applebaum14,
author = {Benny Applebaum},
title = {Key-Dependent Message Security: Generic Amplification and Completeness},
journal = {J. Cryptology},
volume = {27},
number = {3},
pages = {429--451},
year = {2014},
url = {https://doi.org/10.1007/s00145-013-9149-6},
doi = {10.1007/s00145-013-9149-6},
timestamp = {Thu, 18 May 2017 01:00:00 +0200},
biburl = {https://dblp.org/rec/bib/journals/joc/Applebaum14},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"edDMzAXBNKXgkSZYv","bibbaseid":"applebaum-keydependentmessagesecuritygenericamplificationandcompleteness-2014","downloads":0,"creationDate":"2018-06-23T23:31:51.978Z","title":"Key-Dependent Message Security: Generic Amplification and Completeness","author_short":["Applebaum, B."],"year":2014,"bibtype":"article","biburl":"https://dblp.org/pid/46/1698.bib","bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Benny"],"propositions":[],"lastnames":["Applebaum"],"suffixes":[]}],"title":"Key-Dependent Message Security: Generic Amplification and Completeness","journal":"J. Cryptology","volume":"27","number":"3","pages":"429–451","year":"2014","url":"https://doi.org/10.1007/s00145-013-9149-6","doi":"10.1007/s00145-013-9149-6","timestamp":"Thu, 18 May 2017 01:00:00 +0200","biburl":"https://dblp.org/rec/bib/journals/joc/Applebaum14","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@article{DBLP:journals/joc/Applebaum14,\n author = {Benny Applebaum},\n title = {Key-Dependent Message Security: Generic Amplification and Completeness},\n journal = {J. Cryptology},\n volume = {27},\n number = {3},\n pages = {429--451},\n year = {2014},\n url = {https://doi.org/10.1007/s00145-013-9149-6},\n doi = {10.1007/s00145-013-9149-6},\n timestamp = {Thu, 18 May 2017 01:00:00 +0200},\n biburl = {https://dblp.org/rec/bib/journals/joc/Applebaum14},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Applebaum, B."],"key":"DBLP:journals/joc/Applebaum14","id":"DBLP:journals/joc/Applebaum14","bibbaseid":"applebaum-keydependentmessagesecuritygenericamplificationandcompleteness-2014","role":"author","urls":{"Paper":"https://doi.org/10.1007/s00145-013-9149-6"},"downloads":0},"search_terms":["key","dependent","message","security","generic","amplification","completeness","applebaum"],"keywords":[],"authorIDs":[],"dataSources":["2xaNXwf2c7EGDLe8d"]}