共 38 条
[1]
Abdalla M, 2005, LECT NOTES COMPUT SC, V3621, P205
[2]
Adya A., 2002, AVAILABLE RELI ABLE
[3]
Amanatidis G, 2007, LECT NOTES COMPUT SC, V4602, P14
[4]
Ballard L, 2005, LECT NOTES COMPUT SC, V3783, P414
[5]
Universal arguments and their applications
[J].
17TH ANNUAL IEEE CONFERENCE ON COMPUTATIONAL COMPLEXITY, PROCEEDINGS,
2002,
:194-203
[6]
Bellarc M, 2009, LECT NOTES COMPUT SC, V5867, P295, DOI 10.1007/978-3-642-05445-7_19
[7]
Bellare M, 2007, LECT NOTES COMPUT SC, V4622, P535
[8]
Bellovin S. M., 2004, 2004022 IACR
[9]
Ben-Or M., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P1, DOI 10.1145/62212.62213
[10]
Black J., 2002, Topics in Cryptology - CT-RSA 2002. Cryptographers' Track at the RSA Conference 2002. Proceedings (Lecture Notes in Computer Science Vol.2271), P114