共 50 条
- [2] Card-Based Protocols Using Regular Polygon Cards [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2017, E100A (09): : 1900 - 1909
- [3] Actively revealing card attack on card-based protocols [J]. Natural Computing, 2022, 21 : 615 - 628
- [4] Actively revealing card attack on card-based protocols [J]. NATURAL COMPUTING, 2022, 21 (04) : 615 - 628
- [5] Card-Based Cryptographic Protocols Using a Minimal Number of Cards [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT I, 2015, 9452 : 783 - 807
- [6] Analyzing Execution Time of Card-Based Protocols [J]. UNCONVENTIONAL COMPUTATION AND NATURAL COMPUTATION, UCNC 2018, 2018, 10867 : 145 - 158
- [7] Efficient Card-Based Majority Voting Protocols [J]. NEW GENERATION COMPUTING, 2022, 40 (01) : 173 - 198
- [8] Card-Based Cryptographic Protocols with Malicious Players Using Private Operations [J]. New Generation Computing, 2022, 40 : 67 - 93
- [9] Efficient Card-Based Majority Voting Protocols [J]. New Generation Computing, 2022, 40 : 173 - 198
- [10] Card-based protocols for secure ranking computations [J]. THEORETICAL COMPUTER SCIENCE, 2020, 845 : 122 - 135