共 26 条
[1]
Abadi M., 1990, Journal of Cryptology, V2, P1, DOI 10.1007/BF02252866
[3]
BEAVER D, 1992, LNCS, V576
[4]
Bellare M., 1989, INT CRYPTOLOGY C ADV, P547, DOI DOI 10.1007/0-387-34805-0_48
[5]
Ben-Or M., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P1, DOI 10.1145/62212.62213
[6]
Blum M., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P103, DOI 10.1145/62212.62222
[7]
BONEH D, 1996, LNCS, V1109
[8]
BRASSARD G, 1986, P 27 FOCS
[10]
CANETTI R, 2000, P 32 STOC