共 16 条
[1]
Ambainis A., 1999, Proceedings of the Thirty-First Annual ACM Symposium on Theory of Computing, P376, DOI 10.1145/301250.301347
[2]
[Anonymous], ARXIV10102163
[3]
Cryptography in the bounded quantum-storage model
[J].
46TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS,
2005,
:449-458
[4]
Damgard IB, 2007, LECT NOTES COMPUT SC, V4622, P360
[7]
Nayak A., 1999, P 40 IEEE FOCS, P369
[9]
OPPENHEIM JJ, IN PRESS