共 35 条
[1]
Applebaum B, 2009, LECT NOTES COMPUT SC, V5677, P595, DOI 10.1007/978-3-642-03356-8_35
[2]
Blum M., 1982, Digest of Papers Spring COMPCON 82. High Technology in the Information Industry, P133, DOI 10.1145/1008908.1008911
[3]
Branco Pedro, 2019, Cryptography and Coding. 17th IMA International Conference, IMACC 2019. Proceedings. Lecture Notes in Computer Science (LNCS 11929), P78, DOI 10.1007/978-3-030-35199-1_5
[4]
Branco P., IACR T CRYPTOGRAPHIC
[6]
Canetti R., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P19
[7]
Universally composable security: A new paradigm for cryptographic protocols
[J].
42ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS,
2001,
:136-145
[8]
Canetti R., 2020, 20201212 CRYPT EPRIN
[9]
Cramer R, 2000, LECT NOTES COMPUT SC, V1807, P316
[10]
CREPEAU C, 1988, LECT NOTES COMPUT SC, V293, P350