Login / Signup
How to Construct Cryptosystems and Hash Functions in Weakened Random Oracle Models.
Yusuke Naito
Lei Wang
Kazuo Ohta
Published in:
IACR Cryptol. ePrint Arch. (2009)
Keyphrases
</>
hash functions
pattern recognition
order preserving