共 17 条
[1]
[Anonymous], 1997, Enumerative combinatorics
[2]
Birkhoff G., 1969, SURVEY MODERN ALGEBR
[3]
Crepeau C., 1993, CRYPTO, P319, DOI DOI 10.1007/3-540-48329-2_27
[4]
den Boer B., 1989, ADV CRYPTOLOGY, P208
[5]
Secure Grouping Protocol Using a Deck of Cards
[J].
INFORMATION THEORETIC SECURITY, ICITS 2017,
2017, 10681
:135-152
[6]
Ibaraki T, 2016, PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON MATHEMATICS AND COMPUTERS IN SCIENCES AND IN INDUSTRY (MCSI 2016), P252, DOI [10.1109/MCSI.2016.054, 10.1109/MCSI.2016.23]
[7]
Ishikawa Rie, 2015, Unconventional Computation and Natural Computation. 14th International Conference, UCNC 2015. Proceedings, P215, DOI 10.1007/978-3-319-21819-9_16
[8]
Card-Based Cryptographic Protocols Using a Minimal Number of Cards
[J].
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT I,
2015, 9452
:783-807
[9]
Mizuki T, 2013, LECT NOTES COMPUT SC, V7956, P162, DOI 10.1007/978-3-642-39074-6_16
[10]
Mizuki T, 2009, LECT NOTES COMPUT SC, V5598, P358, DOI 10.1007/978-3-642-02270-8_36