共 44 条
[1]
Abe Masayuki, 2012, International Journal of Applied Cryptography, V2, P229, DOI 10.1504/IJACT.2012.045581
[2]
Abe M., 2011, LNCS
[3]
Abe M., 2013, Diradicals, P1
[5]
Abe M, 2013, LECT NOTES COMPUT SC, V7778, P312, DOI 10.1007/978-3-642-36362-7_20
[6]
Abe M, 2012, LECT NOTES COMPUT SC, V7658, P4, DOI 10.1007/978-3-642-34961-4_3
[7]
Abe M, 2011, LECT NOTES COMPUT SC, V7073, P628, DOI 10.1007/978-3-642-25385-0_34
[8]
Abe Masayuki., 2010, Cryptology ePrint Archive
[9]
Belenkiy M, 2009, LECT NOTES COMPUT SC, V5677, P108, DOI 10.1007/978-3-642-03356-8_7
[10]
Bellare M, 2005, LECT NOTES COMPUT SC, V3376, P136