共 17 条
[1]
Avanzi R.M.(2005)The complexity of certain multi-exponentiation techniques in cryptography J. Cryptol. 18 357-373
[2]
Carter J.L.(1979)Universal classes of hash functions J. Comput. Syst. Sci. 18 143-154
[3]
Wegman M.N.(2003)Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack SIAM J. Comput. 33 167-226
[4]
Cramer R.(2000)Complexity and fast algorithms for multiexponentiations IEEE Trans. Comput. 49 141-147
[5]
Shoup V.(2008)Fuzzy extractors: how to generate strong keys from biometrics and other noisy data SIAM J. Comput. 38 97-139
[6]
Dimitrov V.S.(1998)A survey of fast exponentiation methods J. Algorithms 27 129-146
[7]
Jullien G.A.(1996)Randomness is linear in space J. Comput. Syst. Sci. 52 43-52
[8]
Miller W.C.(1981)New hash functions and their use in authentication and set equality J. Comput. Syst. Sci. 22 265-279
[9]
Dodis Y.(undefined)undefined undefined undefined undefined-undefined
[10]
Ostrovsky R.(undefined)undefined undefined undefined undefined-undefined