共 7 条
[1]
[Anonymous], IEICE TECH REP, V113, P29
[2]
Cimato S, 2012, DIGIT IMAG COMPUT, P1
[7]
Naor M., 1994, Workshop on the theory and application of of cryptographic techniques, P1, DOI [DOI 10.1007/BFB0053419, 10.1007/BFb0053419, DOI 10.1007/978-1-4939-9484-7_1]