共 21 条
[2]
Bellare M., 1990, Proceedings of the Twenty Second Annual ACM Symposium on Theory of Computing, P494, DOI 10.1145/100216.100285
[3]
BELLARE M, 1990, PROCEEDINGS OF THE TWENTY SECOND ANNUAL ACM SYMPOSIUM ON THEORY OF COMPUTING, P482, DOI 10.1145/100216.100283
[4]
BENOR M, 1990, LECT NOTES COMPUT SC, V403, P37
[5]
Blum Manual., 1987, INT C MATHEMATICIANS, P1444
[7]
Boyar J., 1991, Journal of Cryptology, V4, P185, DOI 10.1007/BF00196727
[9]
CHANG R, 1989, 4TH P C STRUCTR COMP, P250
[10]
FEIGE U, 1990, LECT NOTES COMPUT SC, V435, P526