共 25 条
- [1] [Anonymous], 2000, NUMBERS GAMES
- [3] Avoine G, 2011, WISEC 11: PROCEEDINGS OF THE FOURTH ACM CONFERENCE ON WIRELESS NETWORK SECURITY, P145
- [4] Avoine G, 2009, LECT NOTES COMPUT SC, V5922, P290, DOI 10.1007/978-3-642-10628-6_20
- [5] Avoine G, 2009, LECT NOTES COMPUT SC, V5735, P250, DOI 10.1007/978-3-642-04474-8_21
- [6] Bengio S., 1991, Journal of Cryptology, V4, P175, DOI 10.1007/BF00196726
- [7] Brands S., 1993, LECT NOTES COMPUTER, P344, DOI [DOI 10.1007/3-540-48285-7_30, 10.1007/3-540-48285-7_30]
- [8] Bussard L, 2005, INT FED INFO PROC, V181, P223
- [9] DESMEDT Y, 1988, LECT NOTES COMPUT SC, V293, P21