共 36 条
[1]
Aaronson S, 2012, QUANTUM INF COMPUT, V12, P21
[2]
Aiello B, 2001, LECT NOTES COMPUT SC, V2045, P119
[3]
Ambainis Andris, 2005, Theory Comput., V1, P37
[4]
Ambrona M, 2017, CRYPTO 2017
[5]
Cryptography in NC0
[J].
45TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS,
2004,
:166-175
[6]
Applebaum B, 2017, 2017164 CRYPT EPRINT
[7]
From Private Simultaneous Messages to Zero-Information Arthur-Merlin Protocols and Back
[J].
THEORY OF CRYPTOGRAPHY, TCC 2016-A, PT II,
2016, 9563
:65-82
[8]
Attrapadung N, 2014, LECT NOTES COMPUT SC, V8441, P557, DOI 10.1007/978-3-642-55220-5_31
[9]
Brickell E. F., 1991, Journal of Cryptology, V4, P123, DOI 10.1007/BF00196772
[10]
Capocelli R. M., 1993, Journal of Cryptology, V6, P157, DOI 10.1007/BF00198463