共 28 条
[1]
[Anonymous], 2010, INNOV COMPUT SCI
[2]
Asharov G, 2011, LECT NOTES COMPUT SC, V6632, P426, DOI 10.1007/978-3-642-20465-4_24
[5]
Beimel A., 2011, 2011396 IACR CRYPT E
[6]
Bellare M, 2009, LECT NOTES COMPUT SC, V5912, P232, DOI 10.1007/978-3-642-10366-7_14
[7]
Bosley C, 2007, LECT NOTES COMPUT SC, V4392, P1
[8]
Canetti R., 1999, Proceedings of the Thirty-First Annual ACM Symposium on Theory of Computing, P255, DOI 10.1145/301250.301313
[9]
Canetti R., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P639, DOI 10.1145/237814.238015
[10]
On the (Im)possibility of cryptography with imperfect randomness
[J].
45TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS,
2004,
:196-205