共 25 条
[1]
[Anonymous], 1993, P WORKSH THEOR APPL
[2]
[Anonymous], 1994, Advances in Cryptography EUROCRYPT Lecture Notes in Computer Science
[3]
[Anonymous], P 26 S FDN COMP SCI
[4]
Baraani-Dastjerdi A., 1995, Proceedings. 11th Annual Computer Security Applications Conference, P143
[5]
Boyd C., 1988, Advances in Cryptology - EUROCRYPT '88. Workshop on the Theory and Application of Cryptographic Techniques. Proceedings, P455
[6]
Boyd C., 1989, P ADV CRYPT EUROCRYP, P617
[7]
Chang CC, 1997, NETWORKS, V29, P81, DOI 10.1002/(SICI)1097-0037(199703)29:2<81::AID-NET2>3.0.CO
[8]
2-7
[9]
Chaum D., 1988, Advances in Cryptology - EUROCRYPT '88. Workshop on the Theory and Application of Cryptographic Techniques. Proceedings, P177
[10]
Chaum D., 1983, Advances in Cryptology, Proceedings of Crypto 82, P199