共 25 条
[1]
An JH, 2002, LECT NOTES COMPUT SC, V2332, P83
[2]
Bao F., 1998, Public Key Cryptography. First International Workshop on Practice and Theory in Public Key Cryptography, PKC'98. Proceedings, P55, DOI 10.1007/BFb0054014
[3]
Bellare M., 1993, P ACM CCS, V93, P62, DOI DOI 10.1145/168588.168596
[4]
Bellare Mihir, 2001, ASIACRYPT 2001 LNCS, P566
[6]
Boneh D, 2003, LECT NOTES COMPUT SC, V2656, P416
[8]
Boyen X, 2003, LECT NOTES COMPUT SC, V2729, P383
[9]
Chow S. S. M., 2003, LECT NOTES COMPUTER, P352, DOI DOI 10.1007/978-3-540-24691-6_26
[10]
Dae Hyun Yum, 2002, Information Security and Cryptology - ICISC 2001. 4th International Conference. Proceedings (Lecture Notes in Computer Science Vol.2288), P305