共 30 条
[1]
Barkol O, 2005, LECT NOTES COMPUT SC, V3621, P395
[2]
BEAVER D, 1991, LECT NOTES COMPUT SC, V537, P62
[3]
Beerliová-Trubíniová Z, 2008, LECT NOTES COMPUT SC, V4948, P213, DOI 10.1007/978-3-540-78524-8_13
[4]
Ben-Or M., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P1, DOI 10.1145/62212.62213
[5]
Ben-Sasson E, 2012, LECT NOTES COMPUT SC, V7417, P663
[7]
Chaum D., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P11, DOI 10.1145/62212.62214
[9]
Cramer R, 2002, LECT NOTES COMPUT SC, V2442, P272
[10]
Damgard I., 2015, UNCONDITIONALLY SECU