共 37 条
[1]
[Anonymous], 1993, ACM CCS 1993, DOI DOI 10.1145/168588.168596
[2]
[Anonymous], 2000, Efficient multi-exponentiation and application to batch verification of digital signatures
[3]
[Anonymous], 2012, ITCS, DOI 10.1145/ 2090236.2090263
[4]
[Anonymous], 2006, A GUIDE TO NUMPY
[5]
Bayer S, 2013, LECT NOTES COMPUT SC, V7881, P646, DOI 10.1007/978-3-642-38348-9_38
[6]
Bayer S, 2012, LECT NOTES COMPUT SC, V7237, P263, DOI 10.1007/978-3-642-29011-4_17
[7]
Ben-Sasson E, 2014, PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM, P781
[8]
Ben-Sasson E, 2013, LECT NOTES COMPUT SC, V8043, P90, DOI 10.1007/978-3-642-40084-1_6
[9]
Bitansky N, 2013, STOC'13: PROCEEDINGS OF THE 2013 ACM SYMPOSIUM ON THEORY OF COMPUTING, P111