{"extern":"1","_id":"3129","user_id":"38235","department":[{"_id":"558"}],"status":"public","type":"journal_article","publication":"J. Cryptology","title":"On the Analysis of Cryptographic Assumptions in the Generic Ring Model","doi":"10.1007/s00145-012-9120-y","date_updated":"2022-01-06T06:58:57Z","author":[{"first_name":"Tibor","full_name":"Jager, Tibor","id":"64669","last_name":"Jager"},{"last_name":"Schwenk","full_name":"Schwenk, Jörg","first_name":"Jörg"}],"date_created":"2018-06-07T09:22:18Z","year":"2013","citation":{"chicago":"Jager, Tibor, and Jörg Schwenk. “On the Analysis of Cryptographic Assumptions in the Generic Ring Model.” J. Cryptology, no. 2 (2013): 225--245. https://doi.org/10.1007/s00145-012-9120-y.","ieee":"T. Jager and J. Schwenk, “On the Analysis of Cryptographic Assumptions in the Generic Ring Model,” J. Cryptology, no. 2, pp. 225--245, 2013.","ama":"Jager T, Schwenk J. On the Analysis of Cryptographic Assumptions in the Generic Ring Model. J Cryptology. 2013;(2):225--245. doi:10.1007/s00145-012-9120-y","bibtex":"@article{Jager_Schwenk_2013, title={On the Analysis of Cryptographic Assumptions in the Generic Ring Model}, DOI={10.1007/s00145-012-9120-y}, number={2}, journal={J. Cryptology}, author={Jager, Tibor and Schwenk, Jörg}, year={2013}, pages={225--245} }","mla":"Jager, Tibor, and Jörg Schwenk. “On the Analysis of Cryptographic Assumptions in the Generic Ring Model.” J. Cryptology, no. 2, 2013, pp. 225--245, doi:10.1007/s00145-012-9120-y.","short":"T. Jager, J. Schwenk, J. Cryptology (2013) 225--245.","apa":"Jager, T., & Schwenk, J. (2013). On the Analysis of Cryptographic Assumptions in the Generic Ring Model. J. Cryptology, (2), 225--245. https://doi.org/10.1007/s00145-012-9120-y"},"page":"225--245","issue":"2"}