共 19 条
[1]
Abadalla M., 2005, LNCS, V3386, P65
[2]
Abdalla M, 2008, LECT NOTES COMPUT SC, V4964, P335, DOI 10.1007/978-3-540-79263-5_22
[3]
Bellare M, 2000, LECT NOTES COMPUT SC, V1807, P139
[4]
Boyko V, 2000, LECT NOTES COMPUT SC, V1807, P156
[5]
Bresson Emmanuel., 2003, ACM C COMPUTER COMMU, P241, DOI DOI 10.1145/948109.948142
[6]
Canetti R, 2005, LECT NOTES COMPUT SC, V3494, P404
[7]
Universally composable security: A new paradigm for cryptographic protocols
[J].
42ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS,
2001,
:136-145
[8]
Canetti R, 2003, LECT NOTES COMPUT SC, V2729, P265
[9]
CARTER JL, 1979, J COMPUT SYST SCI, V18, P143, DOI 10.1016/0022-0000(79)90044-8
[10]
Cramer R, 2002, LECT NOTES COMPUT SC, V2332, P45