{"publication":"J. Cryptology","user_id":"38235","author":[{"id":"64669","last_name":"Jager","full_name":"Jager, Tibor","first_name":"Tibor"},{"first_name":"Jörg","full_name":"Schwenk, Jörg","last_name":"Schwenk"}],"doi":"10.1007/s00145-012-9120-y","type":"journal_article","_id":"3129","issue":"2","status":"public","date_created":"2018-06-07T09:22:18Z","citation":{"ama":"Jager T, Schwenk J. On the Analysis of Cryptographic Assumptions in the Generic Ring Model. J Cryptology. 2013;(2):225--245. doi:10.1007/s00145-012-9120-y","apa":"Jager, T., & Schwenk, J. (2013). On the Analysis of Cryptographic Assumptions in the Generic Ring Model. J. Cryptology, (2), 225--245. https://doi.org/10.1007/s00145-012-9120-y","ieee":"T. Jager and J. Schwenk, “On the Analysis of Cryptographic Assumptions in the Generic Ring Model,” J. Cryptology, no. 2, pp. 225--245, 2013.","mla":"Jager, Tibor, and Jörg Schwenk. “On the Analysis of Cryptographic Assumptions in the Generic Ring Model.” J. Cryptology, no. 2, 2013, pp. 225--245, doi:10.1007/s00145-012-9120-y.","chicago":"Jager, Tibor, and Jörg Schwenk. “On the Analysis of Cryptographic Assumptions in the Generic Ring Model.” J. Cryptology, no. 2 (2013): 225--245. https://doi.org/10.1007/s00145-012-9120-y.","bibtex":"@article{Jager_Schwenk_2013, title={On the Analysis of Cryptographic Assumptions in the Generic Ring Model}, DOI={10.1007/s00145-012-9120-y}, number={2}, journal={J. Cryptology}, author={Jager, Tibor and Schwenk, Jörg}, year={2013}, pages={225--245} }","short":"T. Jager, J. Schwenk, J. Cryptology (2013) 225--245."},"date_updated":"2022-01-06T06:58:57Z","extern":"1","title":"On the Analysis of Cryptographic Assumptions in the Generic Ring Model","department":[{"_id":"558"}],"page":"225--245","year":"2013"}