共 33 条
[1]
[Anonymous], 2001, FDN CRYPTOGRAPHY
[2]
How to go beyond the black-box simulation barrier
[J].
42ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS,
2001,
:106-115
[3]
Barak B., 2002, 34 ACM STOC, P484
[4]
BEAVER D, 1992, LECT NOTES COMPUT SC, V576, P377
[5]
BEAVER D, 1990, PROCEEDINGS OF THE TWENTY SECOND ANNUAL ACM SYMPOSIUM ON THEORY OF COMPUTING, P503, DOI 10.1145/100216.100287
[6]
Beaver Donald, 1989, LNCS, V435, P589
[8]
Bellare M., 1993, LNCS, V740, P390
[9]
BLUM M, 1982, P IEEE SPRING COMPCO, P133
[10]
Boneh D, 1997, LECT NOTES COMPUT SC, V1294, P425