共 10 条
[1]
ADLEMAN LM, 1977, 9TH P ACN S THEOR CO, P151
[2]
Baker T., 1975, SIAM Journal on Computing, V4, P431, DOI 10.1137/0204037
[3]
BALCAZAR JL, 1984, UNPUB IMMUNITY SIMPL
[4]
BOOK RV, 1984, SIAM J COMPUT, V13, P461, DOI 10.1137/0213030
[5]
THE COMPLEXITY OF PROMISE PROBLEMS WITH APPLICATIONS TO PUBLIC-KEY CRYPTOGRAPHY
[J].
INFORMATION AND CONTROL,
1984, 61 (02)
:159-173
[6]
Grollmann J., 1984, 25th Annual Symposium on Foundations of Computer Science (Cat. No. 84CH2085-9), P495, DOI 10.1109/SFCS.1984.715952
[9]
SIPSER M, 1982, LECT NOTES COMPUT SC, V140, P523
[10]
Valiant L. G., 1976, Information Processing Letters, V5, P20, DOI 10.1016/0020-0190(76)90097-1