共 55 条
- [2] [Anonymous], 1993, ACM CCS 1993, DOI DOI 10.1145/168588.168596
- [3] Subversion-Resilient Signature Schemes [J]. CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 364 - 375
- [4] Mass-surveillance without the State: Strongly Undetectable Algorithm-Substitution Attacks [J]. CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 1431 - 1440
- [5] Bellare M, 2014, LECT NOTES COMPUT SC, V8616, P1, DOI 10.1007/978-3-662-44371-2_1
- [6] Resisting Randomness Subversion: Fast Deterministic and Hedged Public-Key Encryption in the Standard Model [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT II, 2015, 9057 : 627 - 656
- [7] Bellare M, 2013, LECT NOTES COMPUT SC, V8043, P398, DOI 10.1007/978-3-642-40084-1_23
- [9] BLUM M, 1990, PROCEEDINGS OF THE TWENTY SECOND ANNUAL ACM SYMPOSIUM ON THEORY OF COMPUTING, P73, DOI 10.1145/100216.100225
- [10] Blum M., 1989, Proceedings of the Twenty First Annual ACM Symposium on Theory of Computing, P86, DOI 10.1145/73007.73015