共 22 条
[1]
Ajtai M., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P99, DOI 10.1145/237814.237838
[2]
Ajtai M., 1997, P 29 ANN ACM S THEOR, P284, DOI DOI 10.1145/258533.258604
[3]
Ambedkar B R, 2016, INT J ENG SCI COMPUT, V6, P2304, DOI [10.4010/2016.550, DOI 10.4010/2016.550]
[4]
Elbarkouky Mohamed M. G., 2015, 2015 Annual Conference of the North American Fuzzy Information Processing Society (NAFIPS) held jointly with 2015 5th World Conference on Soft Computing (WConSC), P1, DOI 10.1109/NAFIPS-WConSC.2015.7284152
[5]
Gertry C, 2002, ADV CRYPTOLOGY EUROC, P299
[6]
Hoffstein J, 2003, LECT NOTES COMPUT SC, V2612, P122
[7]
Hoffstein J, 2001, LECT NOTES COMPUT SC, V2045, P211
[8]
Hoffstein J, ENHANCED ENCODING VE
[9]
Hoffstein J, 2014, LECT NOTES COMPUT SC, V8772, P142, DOI 10.1007/978-3-319-11659-4_9
[10]
Hu Yu-Pu, 2008, Chinese Journal of Computers, V31, P1661, DOI 10.3724/SP.J.1016.2008.01661