共 4 条
[1]
[2]
[3]
Security of RFID protocols—A case study Deursen T V;Radomirovic S; Proceedings of the 4th International Workshop on Security and Trust Management (STM''08) 2009,
[4]
How to generate cryptographically strong sequences of pseudo-random bits Biham M; Micall S; SIAM Journal on Computing 1984,

