共 24 条
- [1] [Anonymous], 1996, LNCS, DOI DOI 10.1007/3-540-68697-5_1
- [2] Bellare M, 2003, LECT NOTES COMPUT SC, V2656, P491
- [3] Bellare M, 2006, LECT NOTES COMPUT SC, V4117, P602
- [4] Bertoni G., 2008, NIST UNPUB
- [5] Bogdanov A, 2007, LECT NOTES COMPUT SC, V4727, P450
- [6] Bogdanov A, 2008, LECT NOTES COMPUT SC, V5154, P283
- [7] Brassard G., 1990, LNCS, V435
- [8] Contini S, 2006, LECT NOTES COMPUT SC, V4284, P37
- [9] Daemen Joan, 2020, Information Security and Cryptography, V2nd
- [10] Dodis Y, 2011, LECT NOTES COMPUT SC, V6632, P323, DOI 10.1007/978-3-642-20465-4_19