On the Impossibility of Tight Cryptographic Reductions. Bader, C., Jager, T., Li, Y., & Schäge, S. IACR Cryptology ePrint Archive, 2015:374, 2015. Paper bibtex @article{DBLP:journals/iacr/BaderJLS15,
author = {Christoph Bader and
Tibor Jager and
Yong Li and
Sven Sch{\"{a}}ge},
title = {On the Impossibility of Tight Cryptographic Reductions},
journal = {{IACR} Cryptology ePrint Archive},
volume = {2015},
pages = {374},
year = {2015},
url = {http://eprint.iacr.org/2015/374},
timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
biburl = {https://dblp.org/rec/bib/journals/iacr/BaderJLS15},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"QmSnAeN5zr8ELyvGR","bibbaseid":"bader-jager-li-schge-ontheimpossibilityoftightcryptographicreductions-2015","downloads":0,"creationDate":"2017-02-15T09:30:53.195Z","title":"On the Impossibility of Tight Cryptographic Reductions","author_short":["Bader, C.","Jager, T.","Li, Y.","Schäge, S."],"year":2015,"bibtype":"article","biburl":"https://dblp.org/pid/53/1548.bib","bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Christoph"],"propositions":[],"lastnames":["Bader"],"suffixes":[]},{"firstnames":["Tibor"],"propositions":[],"lastnames":["Jager"],"suffixes":[]},{"firstnames":["Yong"],"propositions":[],"lastnames":["Li"],"suffixes":[]},{"firstnames":["Sven"],"propositions":[],"lastnames":["Schäge"],"suffixes":[]}],"title":"On the Impossibility of Tight Cryptographic Reductions","journal":"IACR Cryptology ePrint Archive","volume":"2015","pages":"374","year":"2015","url":"http://eprint.iacr.org/2015/374","timestamp":"Thu, 08 Jun 2017 01:00:00 +0200","biburl":"https://dblp.org/rec/bib/journals/iacr/BaderJLS15","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@article{DBLP:journals/iacr/BaderJLS15,\n author = {Christoph Bader and\n Tibor Jager and\n Yong Li and\n Sven Sch{\\\"{a}}ge},\n title = {On the Impossibility of Tight Cryptographic Reductions},\n journal = {{IACR} Cryptology ePrint Archive},\n volume = {2015},\n pages = {374},\n year = {2015},\n url = {http://eprint.iacr.org/2015/374},\n timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},\n biburl = {https://dblp.org/rec/bib/journals/iacr/BaderJLS15},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Bader, C.","Jager, T.","Li, Y.","Schäge, S."],"key":"DBLP:journals/iacr/BaderJLS15","id":"DBLP:journals/iacr/BaderJLS15","bibbaseid":"bader-jager-li-schge-ontheimpossibilityoftightcryptographicreductions-2015","role":"author","urls":{"Paper":"http://eprint.iacr.org/2015/374"},"downloads":0},"search_terms":["impossibility","tight","cryptographic","reductions","bader","jager","li","schäge"],"keywords":[],"authorIDs":[],"dataSources":["daSCQD6mQ2J9P67ha"]}