共 28 条
[1]
Aaronson S, 2012, STOC'12: PROCEEDINGS OF THE 2012 ACM SYMPOSIUM ON THEORY OF COMPUTING, P41
[3]
Badertscher C., 2019, IACR CRYPTOL EPRINT
[4]
Badertscher C, 2020, Arxiv, DOI arXiv:2007.01668
[5]
Bellare M., 1993, Advances in Cryptology - CRYPTO '92. 12th Annual International Cryptology Conference Proceedings, P390
[6]
Ben-David S, 2017, Arxiv, DOI [arXiv:1609.09047, 10.48550/ARXIV.1609.09047]
[7]
Broadbent A, 2021, Arxiv, DOI arXiv:1911.07782
[8]
Chase M, 2006, LECT NOTES COMPUT SC, V4117, P78
[9]
Coladangelo A, 2020, Arxiv, DOI [arXiv:1911.07546, 10.1007/978-3-030-56877-1.28]
[10]
Feige U., 1988, Journal of Cryptology, V1, P77, DOI 10.1007/BF02351717