共 28 条
[1]
Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
[2]
Abdalla M, 2005, LECT NOTES COMPUT SC, V3376, P191
[3]
Abdalla M., REDUCING NEED TRUSTE
[4]
Ahmetzyanova L. R., 2018, MATEM VOPR KRIPTOGR, V9, P23
[5]
Alekseev E. K., 2020, MATEM VOPR KRIPTOGR
[6]
[Алексеев Евгений Константинович Alekseev Evgeny Konstantinovich], 2018, [Математические вопросы криптографии, Matematicheskie voprosy kriptografii], V9, P5, DOI 10.4213/mvk260
[7]
[Алексеев Евгений Константинович Alekseev Evgeny Konstantinovich], 2016, [Математические вопросы криптографии, Matematicheskie voprosy kriptografii], V7, P7
[8]
[Anonymous], 2003, ACMCCS
[9]
[Anonymous], 1993, ACM CCS 1993, DOI DOI 10.1145/168588.168596
[10]
[Anonymous], 2012, GOST R 34.11-2012 Information Technology. Cryptographic Data Security. Hash Function