共 24 条
[1]
Adams C., 1990, Journal of Cryptology, V3, P27, DOI 10.1007/BF00203967
[2]
BELLARE M, 1997, P 4 ACM C COMP COMM
[3]
Caelli WJ, 1996, LECT NOTES COMPUT SC, V1029, P40, DOI 10.1007/BFb0032345
[6]
DESMEDT Y, 1995, LNCS, V921, P147
[7]
DESMEDT Y, 1993, LECT NOTES COMPUTER, V718, P3
[9]
Frankel Y, 1995, LECT NOTES COMPUT SC, V963, P222
[10]
Ganesan R, 1996, COMMUN ACM, V39, P33