共 37 条
- [1] [Anonymous], 1988, P 20 ANN ACM S THEOR
- [2] [Anonymous], 2014, ACM CCS
- [3] Post-zeroizing Obfuscation: New Mathematical Tools, and the Case of Evasive Circuits [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT II, 2016, 9666 : 764 - 791
- [4] Barak B, 2014, LECT NOTES COMPUT SC, V8441, P221, DOI 10.1007/978-3-642-55220-5_13
- [5] Barrington D.A., 1986, P 18 ANN ACM S THEOR, P1
- [6] Becker A., 2016, SODA, P10, DOI 10.1137/1
- [7] Bernstein D. J., 2003, ALGORITHMIC NUMBER T, V44, P325
- [8] Boneh D., 2003, Contemporary Mathematics, V324, P71, DOI DOI 10.1090/CONM/324/05731
- [9] Lattice-Based SNARGs and Their Application to More Efficient Obfuscation [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT III, 2017, 10212 : 247 - 277
- [10] GGH15 Beyond Permutation Branching Programs: Proofs, Attacks, and Candidates [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT II, 2018, 10992 : 577 - 607