共 50 条
- [2] On the provable security of BEAR and LION schemes [J]. Applicable Algebra in Engineering, Communication and Computing, 2011, 22 : 413 - 423
- [3] Attacking visible watermarking schemes [J]. IEEE TRANSACTIONS ON MULTIMEDIA, 2004, 6 (01) : 16 - 30
- [5] DAVINCI,LEONARDO ANATOMIC STUDIES ON LION AND BEAR [J]. DISEASES IN ZOO ANIMALS, 1989, : 467 - 468
- [7] Attacking and repairing batch verification schemes [J]. ADVANCES IN CRYPTOLOGY ASIACRYPT 2000, PROCEEDINGS, 2000, 1976 : 58 - 71
- [8] THE BEAR AND THE LION - SOVIET IMPERIALISM AND IRAN - SICKER,M [J]. MIDDLE EAST JOURNAL, 1989, 43 (03): : 514 - 514
- [9] THE BEAR AND THE LION - SOVIET IMPERIALISM AND IRAN - SICKER,M [J]. OSTEUROPA, 1990, 40 (06): : 558 - 566
- [10] Attacking Cryptographic Schemes Based on "Perturbation Polynomials" [J]. CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2009, : 1 - 10