共 17 条
- [1] BENALOH J, 1990, LECT NOTES COMPUT SC, V403, P27
- [2] Blakley G. R., 1979, AFIPS Conference Proceedings, vol.48. 1979 National Computer Conference, P313, DOI 10.1109/MARK.1979.8817296
- [3] Brickell E. F., 1992, Journal of Cryptology, V5, P153, DOI 10.1007/BF02451112
- [4] CAPOCELLI RM, 1992, LECT NOTES COMPUT SC, V576, P101
- [5] Denning DER, 1983, CRYPTOGRAPHY DATA SE
- [6] HAMMING RW, 1986, CODING INFORMATIN TH
- [7] Ito M., 1993, Journal of Cryptology, V6, P15, DOI 10.1007/BF02620229
- [8] Ito M., 1987, PROC IEEE GLOBAL TEL, P99
- [9] Jackson W.-A., 1994, LECTURE NOTES COMPUT, V773, P126
- [10] LAMPSON BW, 1971, P 5 PRINC S INF SCI, P437