共 46 条
[31]
Gertner Y., 1998, Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, P151, DOI 10.1145/276698.276723
[32]
GOLDREICH O, 1988, P ADV CRYPTOLOGY, P73
[34]
A survey of fast exponentiation methods
[J].
JOURNAL OF ALGORITHMS-COGNITION INFORMATICS AND LOGIC,
1998, 27 (01)
:129-146
[35]
Kilian J., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P20, DOI 10.1145/62212.62215
[36]
Kushilevitz E, 1997, ANN IEEE SYMP FOUND, P364
[37]
Naor M, 2001, SIAM PROC S, P448
[38]
Naor M, 2000, LECT NOTES COMPUT SC, V1976, P205
[39]
NAOR M, 1999, P 31 ACM S THEOR COM, P145
[40]
NAOR M, 1999, P ADV CRYPTOLOGY CRY, P573