共 33 条
[11]
Boldyreva A, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P276
[13]
Chatterjee S., 2012, LNCS, V7118, P293
[14]
Cramer R, 1998, LECT NOTES COMPUT SC, V1462, P13, DOI 10.1007/BFb0055717
[16]
Fujisaki E, 1999, LECT NOTES COMPUT SC, V1560, P53
[17]
Galindo D, 2005, LECT NOTES COMPUT SC, V3580, P791
[18]
Halevi S., 2007, J MATH CRYPTOL, V1, P385
[19]
Halevi S., PLAUSIBLE APPROACH C
[20]
Hwang J.Y., 2009, ASIACCS 09, P157