共 22 条
- [1] [Anonymous], 2004, FDN CRYPTOGRAPHY BAS, DOI DOI 10.1093/LOGCOM/EXI020
- [2] Cachin C, 1999, 6TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P120, DOI 10.1145/319709.319726
- [3] Cai QY, 2004, CHINESE PHYS LETT, V21, P601, DOI 10.1088/0256-307X/21/4/003
- [4] Chen P, 2006, CHINESE PHYS, V15, P2228, DOI 10.1088/1009-1963/15/10/007
- [5] Crepeau Claude, 2002, P THIRY 4 ANN ACM S, P643, DOI DOI 10.1145/509907.510000
- [7] Gu B, 2009, CHINESE PHYS B, V18, P4690, DOI 10.1088/1674-1056/18/11/013
- [8] IOANNIDIS I, 2003, P 36 ANN HAW INT C S, P2005
- [9] Li Shun-dong, 2005, Acta Electronica Sinica, V33, P769
- [10] Symmetric cryptographic protocols for extended millionaires' problem [J]. SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2009, 52 (06): : 974 - 982