共 50 条
- [1] Actively revealing card attack on card-based protocols [J]. Natural Computing, 2022, 21 : 615 - 628
- [2] Actively revealing card attack on card-based protocols [J]. NATURAL COMPUTING, 2022, 21 (04) : 615 - 628
- [3] Card-Based Secure Sorting Protocol [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2022, 2022, 13504 : 224 - 240
- [4] Card-Based ZKP Protocol for Nurimisaki [J]. STABILIZATION, SAFETY, AND SECURITY OF DISTRIBUTED SYSTEMS (SSS 2022), 2022, 13751 : 285 - 298
- [5] Hide a Liar: Card-Based ZKP Protocol for Usowan [J]. THEORY AND APPLICATIONS OF MODELS OF COMPUTATION, TAMC 2022, 2022, 13571 : 201 - 217
- [6] Card-Based Overwriting Protocol for Equality Function and Applications [J]. UNCONVENTIONAL COMPUTATION AND NATURAL COMPUTATION, UCNC 2024, 2024, 14776 : 18 - 27