共 26 条
[1]
[Anonymous], 2016, Tech. Rep
[2]
[Anonymous], 2009, Post quantum cryptography
[3]
[Anonymous], PARI GP VERS 2 7 5
[4]
[Anonymous], 1978, FDN SECURE COMPUTATI
[5]
Barni M, 2010, MM&SEC 2010: 2010 ACM SIGMM MULTIMEDIA AND SECURITY WORKSHOP, PROCEEDINGS, P231
[6]
Blake IF, 2004, LECT NOTES COMPUT SC, V3329, P515
[7]
Brakerski Zvika, 2014, ACM Transactions on Computation Theory, V6, DOI 10.1145/2633600
[8]
Brakerski Z, 2011, LECT NOTES COMPUT SC, V6841, P505, DOI 10.1007/978-3-642-22792-9_29
[9]
Chen YM, 2011, LECT NOTES COMPUT SC, V7073, P1, DOI 10.1007/978-3-642-25385-0_1
[10]
Damgard Ivan, 2008, International Journal of Applied Cryptography, V1, P22, DOI 10.1504/IJACT.2008.017048