共 40 条
[2]
Boyar J. F., 1990, Journal of Cryptology, V2, P63, DOI 10.1007/BF00204448
[5]
Oblivious transfer with a memory-bounded receiver
[J].
39TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS,
1998,
:493-502
[6]
CHAUM D, 1988, LECT NOTES COMPUT SC, V293, P87
[7]
COLDREICH O, 2001, FDN CRYPTOGRAPHY BAS
[8]
Crépeau C, 2006, LECT NOTES COMPUT SC, V4004, P201
[10]
NEW DIRECTIONS IN CRYPTOGRAPHY
[J].
IEEE TRANSACTIONS ON INFORMATION THEORY,
1976, 22 (06)
:644-654