共 17 条
- [1] Avanzi R.M.(2005)The complexity of certain multi-exponentiation techniques in cryptography J. Cryptol. 18 357-373
- [2] Carter J.L.(1979)Universal classes of hash functions J. Comput. Syst. Sci. 18 143-154
- [3] Wegman M.N.(2003)Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack SIAM J. Comput. 33 167-226
- [4] Cramer R.(2000)Complexity and fast algorithms for multiexponentiations IEEE Trans. Comput. 49 141-147
- [5] Shoup V.(2008)Fuzzy extractors: how to generate strong keys from biometrics and other noisy data SIAM J. Comput. 38 97-139
- [6] Dimitrov V.S.(1998)A survey of fast exponentiation methods J. Algorithms 27 129-146
- [7] Jullien G.A.(1996)Randomness is linear in space J. Comput. Syst. Sci. 52 43-52
- [8] Miller W.C.(1981)New hash functions and their use in authentication and set equality J. Comput. Syst. Sci. 22 265-279
- [9] Dodis Y.(undefined)undefined undefined undefined undefined-undefined
- [10] Ostrovsky R.(undefined)undefined undefined undefined undefined-undefined