共 25 条
[2]
[Anonymous], 2007, Applied Cryptography: Protocols, Algorithms, and Source Code in C
[3]
Fan J. W., 2013, Advanced Materials Research, V614-615, P1220, DOI 10.4028/www.scientific.net/AMR.631-632.1220
[7]
Attacking code-based cryptosystems with information set decoding using special-purpose hardware
[J].
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics),
2014, 8772
:126-141