共 17 条
- [1] [Anonymous], 1997, Enumerative combinatorics
- [2] Birkhoff G., 1969, SURVEY MODERN ALGEBR
- [3] Crepeau C., 1993, CRYPTO, P319, DOI DOI 10.1007/3-540-48329-2_27
- [4] den Boer B., 1989, ADV CRYPTOLOGY, P208
- [5] Secure Grouping Protocol Using a Deck of Cards [J]. INFORMATION THEORETIC SECURITY, ICITS 2017, 2017, 10681 : 135 - 152
- [6] Ibaraki T, 2016, PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON MATHEMATICS AND COMPUTERS IN SCIENCES AND IN INDUSTRY (MCSI 2016), P252, DOI [10.1109/MCSI.2016.054, 10.1109/MCSI.2016.23]
- [7] Ishikawa Rie, 2015, Unconventional Computation and Natural Computation. 14th International Conference, UCNC 2015. Proceedings, P215, DOI 10.1007/978-3-319-21819-9_16
- [8] Card-Based Cryptographic Protocols Using a Minimal Number of Cards [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT I, 2015, 9452 : 783 - 807
- [9] Mizuki T, 2013, LECT NOTES COMPUT SC, V7956, P162, DOI 10.1007/978-3-642-39074-6_16
- [10] Mizuki T, 2009, LECT NOTES COMPUT SC, V5598, P358, DOI 10.1007/978-3-642-02270-8_36