共 28 条
- [1] ALRIYAMI S, TRIPARTITTE AUTHENTI
- [2] Bellare M., 1995, Proceedings of the Twenty-Seventh Annual ACM Symposium on the Theory of Computing, P57, DOI 10.1145/225058.225084
- [3] Bellare M, 1994, LECT NOTES COMPUTER, V773, P232, DOI DOI 10.1007/3-540-48329-2
- [4] Blake-Wilson S, 1997, LECT NOTES COMPUT SC, V1355, P30, DOI 10.1007/BFb0024447
- [5] Boneh D., 2001, LNCS, P514, DOI [DOI 10.1007/3-540-45682-1_30, DOI 10.1007/3-540-45682-130]
- [6] BONEH D, 2001, LNCS, V2139
- [7] Chen L, 2002, LECT NOTES COMPUT SC, V2433, P322
- [8] Chen L, 2002, LECT NOTES COMPUT SC, V2437, P260
- [9] NEW DIRECTIONS IN CRYPTOGRAPHY [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) : 644 - 654