Cryptology ePrint Archive: Report 2009/550
Available versions in chronological order
20091116:203256 (posted 16-Nov-2009 20:32:56 UTC)
How to Construct Cryptosystems and Hash Functions in Weakened Random Oracle Models
Yusuke Naito and Lei Wang and Kazuo Ohta
[
Cryptology ePrint archive
]