共 10 条
- [1] A MODULAR APPROACH TO KEY SAFEGUARDING [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) : 208 - 210
- [2] BARNETT S, 1990, MARTICES METHODS APP
- [3] Blakley G. R., 1979, AFIPS Conference Proceedings, vol.48. 1979 National Computer Conference, P313, DOI 10.1109/MARK.1979.8817296
- [4] Herstein I. N., 1988, MATRIX THEORY LINEAR
- [7] SIMMONS GJ, 1990, LECT NOTES COMPUT SC, V434, P436
- [8] SIMMONS GJ, 1989, ADV CRYPTOLOGY CRYPT, P390