{"date_updated":"2022-01-06T06:58:57Z","issue":"2","year":"2013","page":"225--245","type":"journal_article","user_id":"38235","_id":"3129","date_created":"2018-06-07T09:22:18Z","doi":"10.1007/s00145-012-9120-y","citation":{"ieee":"T. Jager and J. Schwenk, “On the Analysis of Cryptographic Assumptions in the Generic Ring Model,” J. Cryptology, no. 2, pp. 225--245, 2013.","chicago":"Jager, Tibor, and Jörg Schwenk. “On the Analysis of Cryptographic Assumptions in the Generic Ring Model.” J. Cryptology, no. 2 (2013): 225--245. https://doi.org/10.1007/s00145-012-9120-y.","bibtex":"@article{Jager_Schwenk_2013, title={On the Analysis of Cryptographic Assumptions in the Generic Ring Model}, DOI={10.1007/s00145-012-9120-y}, number={2}, journal={J. Cryptology}, author={Jager, Tibor and Schwenk, Jörg}, year={2013}, pages={225--245} }","ama":"Jager T, Schwenk J. On the Analysis of Cryptographic Assumptions in the Generic Ring Model. J Cryptology. 2013;(2):225--245. doi:10.1007/s00145-012-9120-y","mla":"Jager, Tibor, and Jörg Schwenk. “On the Analysis of Cryptographic Assumptions in the Generic Ring Model.” J. Cryptology, no. 2, 2013, pp. 225--245, doi:10.1007/s00145-012-9120-y.","short":"T. Jager, J. Schwenk, J. Cryptology (2013) 225--245.","apa":"Jager, T., & Schwenk, J. (2013). On the Analysis of Cryptographic Assumptions in the Generic Ring Model. J. Cryptology, (2), 225--245. https://doi.org/10.1007/s00145-012-9120-y"},"status":"public","author":[{"last_name":"Jager","id":"64669","full_name":"Jager, Tibor","first_name":"Tibor"},{"first_name":"Jörg","last_name":"Schwenk","full_name":"Schwenk, Jörg"}],"title":"On the Analysis of Cryptographic Assumptions in the Generic Ring Model","publication":"J. Cryptology","department":[{"_id":"558"}],"extern":"1"}