共 34 条
- [1] Aboud SJ, 2014, INT J ADV COMPUT SC, V5, P63
- [2] Aguilar-Melchor C, 2013, CRYPTOGRAPHY CODING, V8308
- [3] Ajtai M., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P99, DOI 10.1145/237814.237838
- [4] Ajtai M., 1999, Automata, Languages and Programming. 26th International Colloquium, ICALP'99. Proceedings (Lecture Notes in Computer Science Vol.1644), P1
- [5] [Anonymous], 1994, Advances in Cryptology CRYPTO 93, DOI DOI 10.1007/3-540-48329-22
- [6] BOYAR J, 1991, LECT NOTES COMPUT SC, V537, P189
- [7] CHAUM D, 1990, LECT NOTES COMPUT SC, V435, P212
- [8] CHAUM D, 1992, LECT NOTES COMPUT SC, V576, P470
- [9] Damgard I, 1996, LECT NOTES COMPUT SC, V1070, P372
- [10] Galbraith S. D., 2002, Topics in Cryptology - CT-RSA 2002. Cryptographers' Track at the RSA Conference 2002. Proceedings (Lecture Notes in Computer Science Vol.2271), P200