共 44 条
[1]
Ajtai M., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P99, DOI 10.1145/237814.237838
[2]
Ajtai M., 1999, Automata, Languages and Programming. 26th International Colloquium, ICALP'99. Proceedings (Lecture Notes in Computer Science Vol.1644), P1
[3]
AJTAI M, 1997, P 29 ANN ACM S THEOR, P284, DOI DOI 10.1145/258533.258604
[4]
Bellare M., 2006, ACM C COMP COMM SEC, P390, DOI [10.1145/1180405.1180453, DOI 10.1145/1180405.1180453]
[5]
Bonnet C., 2000, 2000013056 SAE, DOI [DOI 10.4271/2000-01-3056, 10.4271/2000-01-3056]
[6]
Boudgoust K., 2021, Cryptol. ePrint Arch.
[7]
Bulletproofs: Short Proofs for Confidential Transactions and More
[J].
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2018,
:315-334