共 37 条
- [1] Abdalla M, 2010, LECT NOTES COMPUT SC, V5978, P480, DOI 10.1007/978-3-642-11799-2_28
- [2] Abelson H., 2015, KEYS DOORMATS MANDAT
- [3] Abelson H., 1997, The risks of key recovery, key escrow, and trusted third-party encryption
- [4] Banfi F., 2023, Report 2023/249
- [5] A concrete security treatment of symmetric encryption [J]. 38TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 1997, : 394 - 403
- [6] Bellare M., 1994, Advances in Cryptology - CRYPTO '94. 14th Annual International Cryptology Conference. Proceedings, P341
- [7] Bellare M., 1995, LNCS, V950, P92, DOI DOI 10.1007/BFB0053428
- [8] Bellare M., 2001, LNCS, V2248, P566, DOI DOI 10.1007/3-540-45682-1
- [9] Bellare M, 2006, LECT NOTES COMPUT SC, V4004, P409
- [10] Bellare M, 2014, LECT NOTES COMPUT SC, V8616, P1, DOI 10.1007/978-3-662-44371-2_1