共 19 条
- [2] Crepeau C., 1994, Advances in Cryptology - CRYPTO '93. 13th Annual International Cryptology Conference Proceedings, P319
- [3] den Boer B., 1990, Advances in Cryptology - EUROCRYPT '89. Workshop on the Theory and Application of Cryptographic Techniques Proceedings, P208
- [4] Comparing information without leaking it [J]. COMMUNICATIONS OF THE ACM, 1996, 39 (05) : 77 - 85
- [5] Goldreich O., 2004, The Foundations of Cryptography-Volume 2, V2
- [6] Mizuki T, 2014, LECT NOTES COMPUT SC, V8496, P313, DOI 10.1007/978-3-319-07890-8_27
- [8] Mizuki T, 2013, LECT NOTES COMPUT SC, V7956, P162, DOI 10.1007/978-3-642-39074-6_16
- [9] Mizuki T, 2012, LECT NOTES COMPUT SC, V7658, P598, DOI 10.1007/978-3-642-34961-4_36
- [10] Mizuki T, 2006, AUSTRALAS J COMB, V36, P279