共 38 条
- [1] Bellare M, 2000, LECT NOTES COMPUT SC, V1807, P139
- [2] Bellare M., 1995, Proceedings of the Twenty-Seventh Annual ACM Symposium on the Theory of Computing, P57, DOI 10.1145/225058.225084
- [3] Bellare M, 1994, LECT NOTES COMPUTER, V773, P232, DOI DOI 10.1007/3-540-48329-2
- [4] Bellare M., 1995, P 1 ACM C COMPUTER C, P62
- [5] Bellovin S. M., 1992, Proceedings. 1992 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.92CH3157-5), P72, DOI 10.1109/RISP.1992.213269
- [6] Bellovin SM, 1993, P CCS, P244
- [7] Blum M., 1988, P 20 ANN ACM S THEOR, P103, DOI DOI 10.1145/62212.62222
- [8] Boneh D., 1998, Algorithmic Number Theory. Third International Symposium, ANTS-III. Proceedings, P48, DOI 10.1007/BFb0054851
- [9] Boyd C., 1986, CRYPTOGRAPHY CODING, P241
- [10] Boyko V, 2000, LECT NOTES COMPUT SC, V1807, P156