共 25 条
[1]
Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
[2]
[Anonymous], 1995, SELECTED AREAS CRYPT
[3]
Bellare M, 2000, LECT NOTES COMPUT SC, V1807, P139
[4]
Bellovin S. M., 1992, Proceedings. 1992 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.92CH3157-5), P72, DOI 10.1109/RISP.1992.213269
[5]
Bellovin S.M., 1993, CCS 93, P244
[6]
Boyko V, 2000, LECT NOTES COMPUT SC, V1807, P156
[7]
Canetti R., 2005, INT C THEOR APPL CRY
[8]
Canetti R., 2002, INT C THEOR APPL CRY
[10]
Feng Hao, 2012, Applied Cryptography and Network Security. Proceedings 10th International Conference, ACNS 2012, P1, DOI 10.1007/978-3-642-31284-7_1