共 17 条
[1]
Aho A.V., 1974, The Design and Analysis of Computer Algorithms
[2]
[Anonymous], ELEMENTARY NUMBER TH
[3]
BENALOH J, 1990, LECT NOTES COMPUT SC, V403, P27
[4]
Blakley B., 1993, Advances in Cryptology - CRYPTO '92. 12th Annual International Cryptology Conference Proceedings, P540
[5]
BLAKLEY GR, 1979, AM FEDERATION INFORM, V48, P242
[6]
Blundo C., 1994, Advances in Cryptology - CRYPTO '93. 13th Annual International Cryptology Conference Proceedings, P110
[7]
CACHIN C, 1994, CRYPTOGRAPHY CODING, P190
[8]
CAPOCELLI RM, 1992, LECT NOTES COMPUT SC, V576, P101
[9]
CHANG CC, 1995, J INFORMATION SCI EN, V11, P417
[10]
Csirmaz L., 1995, Advances in Cryptology - EUROCRYPT '94. Workshop on the Theory and Application of Cryptographic Techniques. Proceedings, P13, DOI 10.1007/BFb0053420