共 37 条
[1]
Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
[2]
Abdalla M, 2005, LECT NOTES COMPUT SC, V3376, P191
[3]
Disjunctions for Hash Proof Systems: New Constructions and Applications
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT II,
2015, 9057
:69-100
[4]
Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks
[J].
PUBLIC-KEY CRYPTOGRAPHY - PKC 2015,
2015, 9020
:332-352
[5]
[Anonymous], 1989, ADV CRYPTOLOGY CRYPT, DOI DOI 10.1007/0-387-34805-0_24
[6]
[Anonymous], 2017, 200094 ISOIEC
[7]
Bellare M, 2000, LECT NOTES COMPUT SC, V1807, P139
[8]
Bellovin S. M., 1992, Proceedings. 1992 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.92CH3157-5), P72, DOI 10.1109/RISP.1992.213269
[9]
Benhamouda F., 2013, IACR CRYPTOLOGY EPRI, V2013, P833
[10]
Benhamouda F, 2013, LECT NOTES COMPUT SC, V8042, P449, DOI 10.1007/978-3-642-40041-4_25