共 36 条
- [1] Aggarwal D, 2011, LECT NOTES COMPUT SC, V7073, P686, DOI 10.1007/978-3-642-25385-0_37
- [2] Measuring Information Leakage using Generalized Gain Functions [J]. 2012 IEEE 25TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2012, : 265 - 279
- [3] [Anonymous], 2011, ECRYPT 2 YEARLY REPO
- [4] Belaid S., 2014, IACR CRYPTOLOGY EPRI, V2014, P53
- [5] Bhattacharya Sayan, 2011, Internet and Network Economics. Proceedings 7th International Workshop, WINE 2011, P13, DOI 10.1007/978-3-642-25510-6_2
- [6] Blocki J., 2013, Proceedings of the Twenty-Third international joint conference on Artificial Intelligence, P41
- [7] Boreale M., 2012, 2012 Ninth International Conference on Quantitative Evaluation of Systems (QEST 2012), P158, DOI 10.1109/QEST.2012.31
- [8] Boreale M, 2011, LECT NOTES COMPUT SC, V6604, P396, DOI 10.1007/978-3-642-19805-2_27
- [9] Constant time modular inversion [J]. JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2014, 4 (04) : 275 - 281