共 37 条
[3]
Bringer J., 2014, P 2 ACM WORKSH INF H, P187, DOI DOI 10.1145/2600918.2600922
[4]
Bringer J, 2013, LECT NOTES COMPUT SC, V7862, P164, DOI 10.1007/978-3-642-41320-9_11
[5]
Lattice-Based Secure Biometric Authentication for Hamming Distance
[J].
INFORMATION SECURITY AND PRIVACY, ACISP 2021,
2021, 13083
:653-672
[6]
An Efficient Toolkit for Computing Private Set Operations
[J].
INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT II,
2017, 10343
:261-278
[7]
Dou J., 2023, Comput. Sci., V49, P355