共 50 条
- [1] New traitor tracing scheme against anonymous attack [J]. ICICIC 2006: FIRST INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING, INFORMATION AND CONTROL, VOL 1, PROCEEDINGS, 2006, : 389 - +
- [3] A Public-Key Traitor Tracing Scheme with an Optimal Transmission Rate [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2009, 5927 : 121 - 134
- [4] A traitor tracing scheme based on the RSA scheme [J]. TENCON 2005 - 2005 IEEE REGION 10 CONFERENCE, VOLS 1-5, 2006, : 625 - +
- [5] Cryptanalysis and modification of a traitor tracing scheme [J]. Wang, X. (wxmsq@eyou.com), 1600, Science Press (50):
- [6] Improved algebraic traitor tracing scheme [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2003, 2846 : 217 - 227
- [7] Traitor tracing for anonymous attack in content protection [J]. SECRYPT 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2008, : 331 - 336
- [8] Traitor tracing with optimal transmission rate [J]. INFORMATION SECURITY, PROCEEDINGS, 2007, 4779 : 71 - 88
- [9] An asymptotically optimal structural attack on the ABC multivariate encryption scheme [J]. Lect. Notes Comput. Sci, (180-196):
- [10] An Asymptotically Optimal Structural Attack on the ABC Multivariate Encryption Scheme [J]. POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2014, 2014, 8772 : 180 - 196