共 36 条
[1]
Allauzen C, 1999, LECT NOTES COMPUT SC, V1725, P295
[2]
Amir A, 2000, PROCEEDINGS OF THE ELEVENTH ANNUAL ACM-SIAM SYMPOSIUM ON DISCRETE ALGORITHMS, P794
[3]
[Anonymous], 2004, FDN CRYPTOGRAPHY BAS
[4]
[Anonymous], 1987, P 19 ANN ACM S THEOR, DOI DOI 10.1145/28395.28420
[5]
[Anonymous], J CRYPTOLOGY
[6]
[Anonymous], 2001, FDN CRYPTOGRAPHY BAS
[7]
Baron Joshua, 2012, Security and Cryptography for Networks. Proceedings of the 8th International Conference (SCN 2012), P222, DOI 10.1007/978-3-642-32928-9_13
[8]
Bayer S, 2012, LECT NOTES COMPUT SC, V7237, P263, DOI 10.1007/978-3-642-29011-4_17
[9]
Beaver D., 1992, CRYPTO, V576, P377, DOI DOI 10.1007/3-540-46766-1