共 25 条
[1]
Non-malleable Codes from Additive Combinatorics
[J].
STOC'14: PROCEEDINGS OF THE 46TH ANNUAL 2014 ACM SYMPOSIUM ON THEORY OF COMPUTING,
2014,
:774-783
[2]
[Anonymous], 2006, Foundations of Cryptography: Volume 1, Basic Tools
[3]
[Anonymous], 2010, J ACM
[4]
[Anonymous], LNCS
[5]
[Anonymous], 1996, SECURE SCHEMES SECRE
[6]
[Anonymous], 20151095 CRYPT EPRIN
[7]
Beimel Amos, 2011, Coding and Cryptology. Proceedings of the Third International Workshop, IWCC 2011, P11, DOI 10.1007/978-3-642-20901-7_2
[8]
Ben-Or M., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P1, DOI 10.1145/62212.62213
[9]
Blakley G. R., 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK), P313, DOI 10.1109/MARK.1979.8817296
[10]
CHATTOPADHYAY E, 2016, STOC