共 22 条
- [11] Hall C, 1998, LECT NOTES COMPUT SC, V1462, P370, DOI 10.1007/BFb0055742
- [12] Iwata T, 2017, IACR T SYMMETRIC CRY, V2017, P240, DOI 10.13154/tosc.v2017.i4.240-267
- [14] Lucks S, 2000, LECT NOTES COMPUT SC, V1807, P470
- [15] Mandal A, 2012, LECT NOTES COMPUT SC, V7194, P285, DOI 10.1007/978-3-642-28914-9_16
- [16] Mandal A, 2010, LECT NOTES COMPUT SC, V6498, P69, DOI 10.1007/978-3-642-17401-8_6
- [17] Maurer U, 2004, LECT NOTES COMPUT SC, V2951, P21
- [18] Mennink Bart, 2019, Topics in Cryptology - CT-RSA 2019. The Cryptographers Track at the RSA Conference 2019. Proceedings: Lecture Notes in Computer Science (LNCS 11405), P313, DOI 10.1007/978-3-030-12612-4_16
- [19] Mennink Bart, 2015, Applied Cryptography and Network Security. 13th International Conference, ACNS 2015. RevisedSelected Papers: LNCS 9092, P619, DOI 10.1007/978-3-319-28166-7_30
- [20] Patarin J, 2008, LECT NOTES COMPUT SC, V5155, P232