01.08.2013 Views

(2012): Volumes 7200–7249 - Index of files in - University of Utah

(2012): Volumes 7200–7249 - Index of files in - University of Utah

(2012): Volumes 7200–7249 - Index of files in - University of Utah

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

REFERENCES 97<br />

Computer Science, 7222:129–137, <strong>2012</strong>. CODEN LNCSD9. ISSN 0302-<br />

9743 (pr<strong>in</strong>t), 1611-3349 (electronic). URL http://l<strong>in</strong>k.spr<strong>in</strong>ger.com/<br />

chapter/10.1007/978-3-642-32298-3_9/.<br />

Luo:<strong>2012</strong>:IDE<br />

[437] Yiyuan Luo, Xuejia Lai, and Zheng Gong. Indifferentiability <strong>of</strong> doma<strong>in</strong><br />

extension modes for hash functions. Lecture Notes <strong>in</strong> Computer Science,<br />

7222:138–155, <strong>2012</strong>. CODEN LNCSD9. ISSN 0302-9743 (pr<strong>in</strong>t), 1611-<br />

3349 (electronic). URL http://l<strong>in</strong>k.spr<strong>in</strong>ger.com/chapter/10.1007/<br />

978-3-642-32298-3_10/.<br />

Halunen:<strong>2012</strong>:MGB<br />

[438] Kimmo Halunen. Multicollisions and graph-based hash functions. Lecture<br />

Notes <strong>in</strong> Computer Science, 7222:156–167, <strong>2012</strong>. CODEN LNCSD9. ISSN<br />

0302-9743 (pr<strong>in</strong>t), 1611-3349 (electronic). URL http://l<strong>in</strong>k.spr<strong>in</strong>ger.<br />

com/chapter/10.1007/978-3-642-32298-3_11/.<br />

Peng:<strong>2012</strong>:GFE<br />

[439] Kun Peng. A general, flexible and efficient pro<strong>of</strong> <strong>of</strong> <strong>in</strong>clusion and exclusion.<br />

Lecture Notes <strong>in</strong> Computer Science, 7222:168–183, <strong>2012</strong>. CODEN<br />

LNCSD9. ISSN 0302-9743 (pr<strong>in</strong>t), 1611-3349 (electronic). URL http://<br />

l<strong>in</strong>k.spr<strong>in</strong>ger.com/chapter/10.1007/978-3-642-32298-3_12/.<br />

Gligoroski:<strong>2012</strong>:MS<br />

[440] Danilo Gligoroski, Rune Ste<strong>in</strong>smo Ødeg˚ard, Rune Erlend Jensen, and<br />

Ludovic Perret. MQQ-SIG. Lecture Notes <strong>in</strong> Computer Science, 7222:<br />

184–203, <strong>2012</strong>. CODEN LNCSD9. ISSN 0302-9743 (pr<strong>in</strong>t), 1611-3349<br />

(electronic). URL http://l<strong>in</strong>k.spr<strong>in</strong>ger.com/chapter/10.1007/978-<br />

3-642-32298-3_13/.<br />

Matsuo:<strong>2012</strong>:MAK<br />

[441] Sh<strong>in</strong>’ichiro Matsuo, Daisuke Moriyama, and Moti Yung. Multifactor<br />

authenticated key renewal. Lecture Notes <strong>in</strong> Computer Science, 7222:<br />

204–220, <strong>2012</strong>. CODEN LNCSD9. ISSN 0302-9743 (pr<strong>in</strong>t), 1611-3349<br />

(electronic). URL http://l<strong>in</strong>k.spr<strong>in</strong>ger.com/chapter/10.1007/978-<br />

3-642-32298-3_14/.<br />

Kutylowski:<strong>2012</strong>:RIS<br />

[442] Miros̷law Kuty̷lowski, ̷Lukasz Krzywiecki, Przemys̷law Kubiak, and<br />

Micha̷l Koza. Restricted identification scheme and Diffie–Hellman<br />

l<strong>in</strong>k<strong>in</strong>g problem. Lecture Notes <strong>in</strong> Computer Science, 7222:221–238,<br />

<strong>2012</strong>. CODEN LNCSD9. ISSN 0302-9743 (pr<strong>in</strong>t), 1611-3349 (electronic).<br />

URL http://l<strong>in</strong>k.spr<strong>in</strong>ger.com/chapter/10.1007/978-3-<br />

642-32298-3_15/.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!