共 29 条
[1]
[Anonymous], 1982, 23 ANN S FDN COMPUTE, DOI DOI 10.1109/SFCS.1982.45
[2]
Bellare M, 1996, J CRYPTOL, V9, P149, DOI 10.1007/s001459900009
[3]
BELLARE M, 1989, LECT NOTES COMPUTER, V435, P194
[4]
Bellare M., 1989, INT CRYPTOLOGY C ADV, P547, DOI DOI 10.1007/0-387-34805-0_48
[6]
Blum M., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P103, DOI 10.1145/62212.62222
[8]
Blum Manual., 1987, INT C MATHEMATICIANS, P1444
[9]
De Santis A., 1992, Proceedings 33rd Annual Symposium on Foundations of Computer Science (Cat. No.92CH3188-0), P427, DOI 10.1109/SFCS.1992.267809
[10]
DESANTIS A, 1988, LECTURE NOTES COMPUT, V403, P269