共 82 条
- [51] A New Sampling Protocol and Applications to Basing Cryptographic Primitives on the Hardness of NP [J]. 25TH ANNUAL IEEE CONFERENCE ON COMPUTATIONAL COMPLEXITY - CCC 2010, 2010, : 76 - 87
- [52] Haitner I, 2009, LECT NOTES COMPUT SC, V5444, P202
- [54] Hsiao CY, 2004, LECT NOTES COMPUT SC, V3152, P92
- [55] Impagliazzo R., 1989, Proceedings of the Twenty First Annual ACM Symposium on Theory of Computing, P44, DOI 10.1145/73007.73012
- [56] Ishai Y, 2005, LECT NOTES COMPUT SC, V3378, P445
- [57] Jeong Han Kim, 1999, 40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039), P535, DOI 10.1109/SFFCS.1999.814627
- [59] Kleinberg J. M., 2006, P 38 ANN ACM S THEOR
- [60] One-Way Functions and (Im)perfect Obfuscation [J]. 2014 55TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS 2014), 2014, : 374 - 383