Cryptology ePrint Archive: Report 2009/550

Available versions in chronological order


How to Construct Cryptosystems and Hash Functions in Weakened Random Oracle Models
Yusuke Naito and Lei Wang and Kazuo Ohta


[ Cryptology ePrint archive ]