共 27 条
- [21] Programmable Hash Functions and Their Applications [J]. JOURNAL OF CRYPTOLOGY, 2012, 25 (03) : 484 - 527
- [22] Hofheinz D, 2012, LECT NOTES COMPUT SC, V7293, P66, DOI 10.1007/978-3-642-30057-8_5
- [23] Hohenberger S, 2009, LECT NOTES COMPUT SC, V5479, P333, DOI 10.1007/978-3-642-01001-9_19
- [24] Kajita Kaisei, 2017, Information Security. 20th International Conference, ISC 2017. Proceedings: LNCS 10599, P137, DOI 10.1007/978-3-319-69659-1_8
- [25] Schäge S, 2011, LECT NOTES COMPUT SC, V6632, P189, DOI 10.1007/978-3-642-20465-4_12
- [26] Seo Jae Hong, 2014, IACR CRYPTOL, P138
- [27] Waters M, 2014, ANCIENT PERSIA: A CONCISE HISTORY OF THE ACHAEMENID EMPIRE, 550-330 BCE, P114