共 39 条
- [1] Ben-Or M., 1985, 12TH P ICALP C NAPFL, P43
- [2] HOW TO EXCHANGE (SECRET) KEYS [J]. ACM TRANSACTIONS ON COMPUTER SYSTEMS, 1983, 1 (02): : 175 - 193
- [3] BLUM M, 1982, SPR P IEEE COMPCOM, P133
- [4] BRICKELL E, 1986, P CRYPTO 85 HEIDELBE
- [5] CHAUM D, 1983, ADV CRYPTOGRAPHY
- [6] Denning D.E.R., 1982, CRYPTOGRAPHY DATA SE, V112, DOI [10.5555/539308, DOI 10.5555/539308]
- [7] NEW DIRECTIONS IN CRYPTOGRAPHY [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) : 644 - 654
- [8] El Gamal T., 1985, P CRYPTO 84 ADV CRYP, P10, DOI DOI 10.1007/3-540-39568-7_2
- [9] ESTES D, 1986, P CRYPTO 85 HEIDELBE, P3
- [10] Even S., 1983, Advances in Cryptology, Proceedings of Crypto 82, P205