共 27 条
[1]
[Anonymous], 1985, DESIGN THEORY
[2]
Bennett C. H., 1992, Journal of Cryptology, V5, P3, DOI 10.1007/BF00191318
[3]
Bennett C. H., 1984, PROC IEEE INT C COMP, P175, DOI [DOI 10.1016/J.TCS.2014.05.025, 10.1016/j.tcs.2014.05.025]
[4]
BENNETT CH, 1992, LECT NOTES COMPUT SC, V576, P351
[5]
Generalized privacy amplification
[J].
IEEE TRANSACTIONS ON INFORMATION THEORY,
1995, 41 (06)
:1915-1923
[8]
BIHAM E, QUANTPH9801022
[9]
BRASSARD G, 1996, P 1 INT C THEOR APPL, P183
[10]
Brassard G., 1994, LECT NOTES COMPUTER, V765, P410, DOI [DOI 10.1007/3-540-48285-7_35, 10.1007/3-540-48285-7_35]