共 36 条
[1]
Optimizing Obfuscation: Avoiding Barrington's Theorem
[J].
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2014,
:646-658
[2]
Ananth Prabhanjan, 2013, IACR Cryptol. ePrint Arch., P689
[3]
[Anonymous], 2000, PKCS 5 PASS BAS CRYP
[4]
[Anonymous], 2013703 CRYPT EPRINT
[5]
Barak B., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P1
[6]
Barak B, 2014, LECT NOTES COMPUT SC, V8441, P221, DOI 10.1007/978-3-642-55220-5_13
[7]
Bellare M, 1998, LECT NOTES COMPUT SC, V1462, P26, DOI 10.1007/BFb0055718
[8]
Bellare M., 1996, Advances in Cryptology - CRYPTO'96. 16th Annual International Cryptology Conference. Proceedings, P1
[9]
Bellare M., 2013, 2013704 CRYPT EPRINT
[10]
Bellare M, 2006, LECT NOTES COMPUT SC, V4004, P409