共 29 条
[1]
[Anonymous], 1997, ACM C COMPUTER COMMU, P78, DOI DOI 10.1145/266420.266439
[2]
[Anonymous], LNCS
[3]
Bellare M, 1998, LECT NOTES COMPUT SC, V1462, P26, DOI 10.1007/BFb0055718
[4]
A concrete security treatment of symmetric encryption
[J].
38TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS,
1997,
:394-403
[6]
Bellare M., 1995, P 1 ACM C COMPUTER C, P62
[7]
Ben-Or M., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P1, DOI 10.1145/62212.62213
[8]
Burmester M, 1998, LECT NOTES COMPUT SC, V1514, P380
[9]
CRAMER R, 1994, LNCS, V839, P174, DOI DOI 10.1007/3-540-48658-5
[10]
FEIGE U, 1990, PROCEEDINGS OF THE TWENTY SECOND ANNUAL ACM SYMPOSIUM ON THEORY OF COMPUTING, P416, DOI 10.1145/100216.100272