共 64 条
[1]
Akavik A, 2009, LECT NOTES COMPUT SC, V5444, P474
[2]
Alwen J, 2010, LECT NOTES COMPUT SC, V6110, P113
[3]
Alwen J, 2009, LECT NOTES COMPUT SC, V5677, P36, DOI 10.1007/978-3-642-03356-8_3
[4]
[Anonymous], 2007, Report 2007/074
[5]
[Anonymous], 2010, PROC IEEE 51 ANN S F, DOI DOI 10.1109/TPWRD.2020.3021909
[6]
[Anonymous], 1989, ADV CRYPTOLOGY CRYPT
[7]
Ateniese G., 2005, Proc. ACM Conf. on Computer and Communication Security (ACM CCS 2005), P92, DOI DOI 10.1145/1102120.1102134.19
[8]
UNIVERSAL ARGUMENTS AND THEIR APPLICATIONS
[J].
SIAM JOURNAL ON COMPUTING,
2008, 38 (05)
:1661-1694
[9]
Bellare M, 2009, LECT NOTES COMPUT SC, V5479, P1, DOI 10.1007/978-3-642-01001-9_1
[10]
Biham E, 1997, LECT NOTES COMPUT SC, V1294, P513