共 59 条
[1]
Andresen G., 2011, Bitcoin improvement proposal (BIP) 0011
[2]
[Anonymous], 1992, Lecture Notes in Computer Science
[3]
Compressed Σ-Protocol Theory and Practical Application to Plug & Play Secure Algorithmics
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2020, PT III,
2020, 12172
:513-543
[4]
Attema Thomas., 2021, Cryptology ePrint Archive
[5]
Au MH, 2006, LECT NOTES COMPUT SC, V4043, P101
[6]
Bagherzandi A, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P449
[7]
Beimel Amos, 2011, Coding and Cryptology. Proceedings of the Third International Workshop, IWCC 2011, P11, DOI 10.1007/978-3-642-20901-7_2
[9]
Bellare M, 2003, LECT NOTES COMPUT SC, V2656, P614
[10]
Bellare M., 2006, P 13 ACM C COMP COMM, P390, DOI DOI 10.1145/1180405.1180453