共 49 条
[31]
Nguyen P, 1997, LECT NOTES COMPUT SC, V1294, P198
[32]
Nguyen PQ, 2005, LECT NOTES COMPUT SC, V3788, P41
[33]
Nguyen PQ, 2001, LECT NOTES COMPUT SC, V2146, P146
[34]
Niemi V., 1990, LNCS, V473, P405
[35]
Odlyzko Andrew M., 1990, Cryptology and Computational Number Theory, V42, P75, DOI 10.1090/psapm/042
[36]
Okamoto T, 2000, LECT NOTES COMPUT SC, V1880, P147
[37]
OMURA K, 2001, IEICE T FUND ELECTR, V84, P1564
[38]
Orton G., 1995, Advances in Cryptology - EUROCRYPT '94. Workshop on the Theory and Application of Cryptographic Techniques. Proceedings, P112, DOI 10.1007/BFb0053429
[39]
Pieprzyk J.P., 1985, LNCS, V219, P73
[40]
RIVEST RL, 1978, COMMUN ACM, V21, P120, DOI [10.1145/359340.359342, 10.1145/357980.358017]