共 50 条
- [2] Actively revealing card attack on card-based protocols [J]. Natural Computing, 2022, 21 : 615 - 628
- [3] Actively revealing card attack on card-based protocols [J]. NATURAL COMPUTING, 2022, 21 (04) : 615 - 628
- [4] Analyzing Execution Time of Card-Based Protocols [J]. UNCONVENTIONAL COMPUTATION AND NATURAL COMPUTATION, UCNC 2018, 2018, 10867 : 145 - 158
- [5] Efficient Card-Based Majority Voting Protocols [J]. NEW GENERATION COMPUTING, 2022, 40 (01) : 173 - 198
- [6] Efficient Card-Based Majority Voting Protocols [J]. New Generation Computing, 2022, 40 : 173 - 198
- [7] Card-based protocols for secure ranking computations [J]. THEORETICAL COMPUTER SCIENCE, 2020, 845 : 122 - 135
- [8] Pile-Shifting Scramble for Card-Based Protocols [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2018, E101A (09): : 1494 - 1502
- [9] The Minimum Number of Cards in Practical Card-Based Protocols [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2017, PT III, 2017, 10626 : 126 - 155
- [10] Card-based protocols using unequal division shuffles [J]. SOFT COMPUTING, 2018, 22 (02) : 361 - 371