共 21 条
[1]
[Anonymous], IACR CRYPTOLOGY EPRI
[2]
Boldyreva A, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P417
[3]
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P223
[4]
Boneh D., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P213
[5]
Dodis Y, 2002, LECT NOTES COMPUT SC, V2696, P61
[6]
Gentry C, 2006, LECT NOTES COMPUT SC, V4004, P445
[7]
Goldreich O., 1984, 25th Annual Symposium on Foundations of Computer Science (Cat. No. 84CH2085-9), P464, DOI 10.1109/SFCS.1984.715949
[8]
Halevy D, 2002, LECT NOTES COMPUT SC, V2442, P47
[9]
Hanaoka Y, 2005, LECT NOTES COMPUT SC, V3788, P495
[10]
Jae Hong Seo, 2015, Topics in Cryptology - CT-RSA 2015. The Cryptographers' Track at the RSA Conference 2015. Proceedings: LNCS 9048, P106, DOI 10.1007/978-3-319-16715-2_6