共 27 条
- [12] Mizuki T, 2013, LECT NOTES COMPUT SC, V7956, P162, DOI 10.1007/978-3-642-39074-6_16
- [14] Efficient Card-Based Cryptographic Protocols for Millionaires' Problem Utilizing Private Permutations [J]. CRYPTOLOGY AND NETWORK SECURITY, CANS 2016, 2016, 10052 : 500 - 517
- [15] Nishida T, 2013, LECT NOTES COMPUT SC, V8273, P193, DOI 10.1007/978-3-642-45008-2_16
- [16] Nuida Koji, 2023, Advances in Information and Computer Security: 18th International Workshop on Security, IWSEC 2023, Proceedings. Lecture Notes in Computer Science (14128), P237, DOI 10.1007/978-3-031-41326-1_13
- [17] Efficient Card-based Cryptographic Protocols for the Millionaires' Problem Using Private Input Operations [J]. 2018 13TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS 2018), 2018, : 23 - 28
- [18] Securely Computing the n-Variable Equality Function with 2n Cards [J]. THEORY AND APPLICATIONS OF MODELS OF COMPUTATION, TAMC 2020, 2020, 12337 : 25 - 36
- [19] Shinagawa K., 2018, FUN WITH ALGORITHMS, P1
- [20] Card-Based Protocols Using Regular Polygon Cards [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2017, E100A (09): : 1900 - 1909