Cited By
View all- Frankel YGemmell PYung MMiller G(1996)Witness-based cryptographic program checking and robust function sharingProceedings of the twenty-eighth annual ACM symposium on Theory of Computing10.1145/237814.237998(499-508)Online publication date: 1-Jul-1996
- Bellare MRogaway PDenning DPyle RGanesan RSandhu RAshby V(1993)Random oracles are practicalProceedings of the 1st ACM conference on Computer and communications security10.1145/168588.168596(62-73)Online publication date: 1-Dec-1993
- Rackoff CSimon DKosaraju RJohnson DAggarwal A(1993)Cryptographic defense against traffic analysisProceedings of the twenty-fifth annual ACM symposium on Theory of Computing10.1145/167088.167260(672-681)Online publication date: 1-Jun-1993
- Show More Cited By