共 40 条
- [1] Agrawal S, 2010, LECT NOTES COMPUT SC, V6223, P98, DOI 10.1007/978-3-642-14623-7_6
- [2] Ajtai M., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P99, DOI 10.1145/237814.237838
- [3] Ajtai M, 1999, AUTOMATA LANGUAGES P, P11
- [5] Aurora: Transparent Succinct Arguments for R1CS [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2019, PT I, 2019, 11476 : 103 - 128
- [6] Ligero plus plus : A New Optimized Sublinear IOP [J]. CCS '20: PROCEEDINGS OF THE 2020 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2020, : 2025 - 2038
- [7] Bresson J., 2002, P ANN INT CRYPT C SA, P18
- [8] Usage of Deep Learning and Blockchain in Compilation and Copyright Protection of Digital Music [J]. IEEE ACCESS, 2020, 8 (08): : 164144 - 164154
- [9] Bonsai Trees, or How to Delegate a Lattice Basis [J]. JOURNAL OF CRYPTOLOGY, 2012, 25 (04) : 601 - 639
- [10] Chow S. S. M., 2005, P 3 INT C NEW YORK N, P7