共 7 条
[1]
ADAMS CM, 1990, THESIS QUEENS U KING
[2]
Anderson R. J., 1991, Cryptologia, V15, P194, DOI 10.1080/0161-119191865858
[3]
AYOUB F, 1982, COMPUT SECUR, V2, P261
[4]
Biham E., 1991, Journal of Cryptology, V4, P3, DOI 10.1007/BF00630563
[6]
KAM JB, 1979, IEEE T COMPUT, V28, P747, DOI 10.1109/TC.1979.1675242
[7]
OCONNOR LJ, 1994, LECT NOTES COMPUTER, V765, P360