共 53 条
[3]
Anilkumar Hari Krishnan P., 2023, 2023 IEEE International Symposium on Information Theory (ISIT), P252, DOI 10.1109/ISIT54713.2023.10206455
[4]
Ateniese G., 2006, ACM Transactions on Information and Systems Security, V9, P1, DOI 10.1145/1127345.1127346
[5]
Ben-Or M., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P1, DOI 10.1145/62212.62213
[6]
Bennett C. H., 1994, Proceedings. 1994 IEEE International Symposium on Information Theory (Cat. No.94CH3467-8), DOI 10.1109/ISIT.1994.394668
[8]
Blakley G.R., 1979, P INT WORKSH MAN REQ, P313, DOI DOI 10.1109/MARK.1979.8817296
[9]
Blundo C., 1993, STACS 93. 10th Annual Symposium on Theoretical Aspects of Computer Science, P692
[10]
Blundo C., 1994, Advances in Cryptology - CRYPTO '94. 14th Annual International Cryptology Conference. Proceedings, P150