共 61 条
[21]
Canard Sebastien, 2012, Progress in Cryptology - AFRICACRYPT 2012. Proceedings 5th International Conference on Cryptology in Africa, P35, DOI 10.1007/978-3-642-31410-0_3
[22]
Canard S., 2013, P 8 ACM SIGSAC S INF, P381
[23]
Canard S, 2008, LECT NOTES COMPUT SC, V5037, P258, DOI 10.1007/978-3-540-68914-0_16
[24]
On Extended Sanitizable Signature Schemes
[J].
TOPICS IN CRYPTOLOGY - CT-RSA 2010, PROCEEDINGS,
2010, 5985
:179-194
[25]
Catalano D, 2008, LECT NOTES COMPUT SC, V4939, P101
[26]
Chen XF, 2007, LECT NOTES COMPUT SC, V4521, P18
[27]
Chen XF, 2011, LECT NOTES COMPUT SC, V6584, P415, DOI 10.1007/978-3-642-21518-6_29
[28]
de Meer Hermann, 2013, 2013 International Conference on Availability, Reliability and Security (ARES), P188, DOI 10.1109/ARES.2013.26
[29]
Demirel D., 2015, TECHNICAL REPORT
[30]
Derler D., 2016, IFIP ADV INF COMMUN, V476, P170, DOI [10.1007/978-3-319-41763-9_12, DOI 10.1007/978-3-319-41763-9_12]