共 9 条
[1]
[Anonymous], 2002, P ACM WORKSH WIR SEC
[2]
BLOM R, 1985, LECT NOTES COMPUT SC, V209, P335
[3]
Blundo C., 1993, LNCS, V740, P471
[4]
Eschenauer L., 2002, Proceedings of the ACM Conference on Computer and Communications Security, P41, DOI [10.1145/586110.586117, DOI 10.1145/586110.586117]
[5]
GONG L, 1990, J CRYPTOL, V2, P51
[6]
Leighton T., 1994, Advances in Cryptology - CRYPTO '93. 13th Annual International Cryptology Conference Proceedings, P456
[7]
MATSUMOTO T, 1987, LECT NOTES COMPUTER, V293, P185
[8]
RAMKUMAR M, 2003, HARPS HASHED RANDOM
[9]
[No title captured]