共 10 条
[1]
Bellare M., 1995, ADV CRYPTOLOGY EUROC, V950, P92, DOI DOI 10.1007/BFB0053428
[2]
Bleichenbacher D, 1998, LECT NOTES COMPUT SC, V1462, P1, DOI 10.1007/BFb0055716
[3]
Boneh D., 1998, Algorithmic Number Theory. Third International Symposium, ANTS-III. Proceedings, P48, DOI 10.1007/BFb0054851
[4]
Cramer R, 1998, LECT NOTES COMPUT SC, V1462, P13, DOI 10.1007/BFb0055717
[7]
Meelu P, 2010, AIP CONF PROC, V1324, P463, DOI 10.1063/1.3526259
[8]
Naor M., 1989, Proceedings of the Twenty First Annual ACM Symposium on Theory of Computing, P33, DOI 10.1145/73007.73011
[9]
RIVEST RL, 1978, COMMUN ACM, V21, P120, DOI 10.1145/357980.358017
[10]
Van Tilborg H.C., 2014, Encyclopedia of cryptography and security