共 30 条
[1]
Five-Card AND Protocol in Committed Format Using Only Practical Shuffles
[J].
APKC'18: PROCEEDINGS OF THE 5TH ACM ASIA PUBLIC-KEY CRYPTOGRAPHY WORKSHOP,
2018,
:3-8
[2]
Crepeau C., 1993, LNCS, V773, P319, DOI DOI 10.1007/3-540-48329-2_27
[3]
DENBOER B, 1990, LECT NOTES COMPUT SC, V434, P208
[4]
Necessary and Sufficient Numbers of Cards for Securely Computing Two-Bit Output Functions
[J].
PARADIGMS IN CRYPTOLOGY - MYCRYPT 2016: MALICIOUS AND EXPLORATORY CRYPTOLOGY,
2017, 10311
:193-211
[5]
Secure Grouping Protocol Using a Deck of Cards
[J].
INFORMATION THEORETIC SECURITY, ICITS 2017,
2017, 10681
:135-152
[6]
Ibaraki T, 2016, PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON MATHEMATICS AND COMPUTERS IN SCIENCES AND IN INDUSTRY (MCSI 2016), P252, DOI [10.1109/MCSI.2016.23, 10.1109/MCSI.2016.054]
[7]
Ishikawa Rie, 2015, Unconventional Computation and Natural Computation. 14th International Conference, UCNC 2015. Proceedings, P215, DOI 10.1007/978-3-319-21819-9_16
[8]
The Minimum Number of Cards in Practical Card-Based Protocols
[J].
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2017, PT III,
2017, 10626
:126-155
[9]
Koch A., 2017, 2017423 CRYPT EPRINT
[10]
Koch A., 2018, 2018951 IACR CRYPT E