共 42 条
[1]
[Anonymous], 2002, Information Security and Cryptology-ICISC 2001, DOI DOI 10.1007/3-540-45861-1
[2]
Ateniese G, 2005, LECT NOTES COMPUT SC, V3679, P159
[3]
Attrapadung N, 2013, LECT NOTES COMPUT SC, V7778, P386, DOI 10.1007/978-3-642-36362-7_24
[4]
Bellare M, 2003, LECT NOTES COMPUT SC, V2656, P614
[5]
Bellare M, 2014, LECT NOTES COMPUT SC, V8383, P520, DOI 10.1007/978-3-642-54631-0_30
[6]
Boldyreva A., 2003, 2003096 CRYPT EPRINT
[7]
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P56
[9]
Boneh D, 2011, LECT NOTES COMPUT SC, V6632, P149, DOI 10.1007/978-3-642-20465-4_10
[10]
Boyle E, 2014, LECT NOTES COMPUT SC, V8383, P501, DOI 10.1007/978-3-642-54631-0_29