共 25 条
- [1] Agrawal S., 2011, IACR CRYPTOLOGY EPRI, V414, P2011
- [2] Agrawal S, 2010, LECT NOTES COMPUT SC, V6223, P98, DOI 10.1007/978-3-642-14623-7_6
- [3] Ajtai M., 1999, Automata, Languages and Programming. 26th International Colloquium, ICALP'99. Proceedings (Lecture Notes in Computer Science Vol.1644), P1
- [4] Bendlin Rikke., 2013, Applied Cryptography and Network Security, P218, DOI 10.1007/978-3-642-
- [5] Bettaieb S, 2013, LECT NOTES COMPUT SC, V7932, P34, DOI 10.1007/978-3-642-38616-9_3
- [6] Boneh D., 2017, IACR Cryptol. ePrint Arch., V2017, P251
- [7] Cayrel PL, 2010, LECT NOTES COMPUT SC, V6212, P255
- [8] DESMEDT Y, 1990, LECT NOTES COMPUT SC, V435, P307
- [9] NEW DIRECTIONS IN CRYPTOGRAPHY [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) : 644 - 654
- [10] Gentry C, 2008, ACM S THEORY COMPUT, P197