共 10 条
[1]
An JH, 2002, LECT NOTES COMPUT SC, V2332, P83
[2]
BAEK J, 2002, LECT NOTES COMPUTER, V2274, P80, DOI DOI 10.1007/S00145-007-0211_0
[3]
A concrete security treatment of symmetric encryption
[J].
38TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS,
1997,
:394-403
[4]
Boneh D., 2001, LNCS, P514, DOI [DOI 10.1007/3-540-45682-1_30, DOI 10.1007/3-540-45682-130]
[5]
Boyen X, 2003, LECT NOTES COMPUT SC, V2729, P383
[6]
Goldreich Oded, 2004, FDN CRYPTOGRAPHY BAS, V2
[7]
Libert B, 2005, LECT NOTES COMPUT SC, V3352, P220
[8]
Libert B, 2004, LECT NOTES COMPUT SC, V2947, P187
[9]
On the security of signcryption scheme with key privacy
[J].
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES,
2005, E88A (04)
:1093-1095
[10]
Zheng YL, 1997, LECT NOTES COMPUT SC, V1294, P165