[{"title":"On the Analysis of Cryptographic Assumptions in the Generic Ring Model","user_id":"38235","extern":"1","date_created":"2018-06-07T09:22:18Z","status":"public","department":[{"_id":"558"}],"publication":"J. Cryptology","author":[{"first_name":"Tibor","full_name":"Jager, Tibor","last_name":"Jager","id":"64669"},{"last_name":"Schwenk","full_name":"Schwenk, Jörg","first_name":"Jörg"}],"doi":"10.1007/s00145-012-9120-y","issue":"2","_id":"3129","date_updated":"2022-01-06T06:58:57Z","page":"225--245","citation":{"ieee":"T. Jager and J. Schwenk, “On the Analysis of Cryptographic Assumptions in the Generic Ring Model,” J. Cryptology, no. 2, pp. 225--245, 2013.","short":"T. Jager, J. Schwenk, J. Cryptology (2013) 225--245.","bibtex":"@article{Jager_Schwenk_2013, title={On the Analysis of Cryptographic Assumptions in the Generic Ring Model}, DOI={10.1007/s00145-012-9120-y}, number={2}, journal={J. Cryptology}, author={Jager, Tibor and Schwenk, Jörg}, year={2013}, pages={225--245} }","mla":"Jager, Tibor, and Jörg Schwenk. “On the Analysis of Cryptographic Assumptions in the Generic Ring Model.” J. Cryptology, no. 2, 2013, pp. 225--245, doi:10.1007/s00145-012-9120-y.","ama":"Jager T, Schwenk J. On the Analysis of Cryptographic Assumptions in the Generic Ring Model. J Cryptology. 2013;(2):225--245. doi:10.1007/s00145-012-9120-y","apa":"Jager, T., & Schwenk, J. (2013). On the Analysis of Cryptographic Assumptions in the Generic Ring Model. J. Cryptology, (2), 225--245. https://doi.org/10.1007/s00145-012-9120-y","chicago":"Jager, Tibor, and Jörg Schwenk. “On the Analysis of Cryptographic Assumptions in the Generic Ring Model.” J. Cryptology, no. 2 (2013): 225--245. https://doi.org/10.1007/s00145-012-9120-y."},"type":"journal_article","year":"2013"}]