共 39 条
[1]
Bellare M., 1995, LNCS, V950, P92, DOI [DOI 10.1007/BFB0053428, 10.1007/BFb0053428]
[2]
Ben-Or M., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P1, DOI 10.1145/62212.62213
[3]
Blum M., 1989, Proceedings of the Twenty First Annual ACM Symposium on Theory of Computing, P86, DOI 10.1145/73007.73015
[4]
BONEH D, 1997, NOTES COMPUTER SCI, V1294, P425
[5]
Boyar J., 1990, LECT NOTES COMPUTER, V537, P189, DOI DOI 10.1007/3-540-38424-3
[6]
BOYD C, 1989, CRYPTOGRAPHY CODING, P241
[8]
CERECEDO M, 1993, IEICE T FUND ELECTR, VE76A, P532
[9]
CHAUM D, 1990, LECT NOTES COMPUT SC, V435, P212
[10]
Chaum D., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P11, DOI 10.1145/62212.62214