参考文章(35)
Reihaneh Safavi-Naini, Shahram Bakhtiari, Josef Pieprzyk, On the Weakness of Gong's Collisionful Hash Functions. Journal of Universal Computer Science. ,vol. 3, pp. 185- 196 ,(1997)
R. R. Yager, S. Ovchinnikov, R. M. Tong, H. T. Nguyen, Fuzzy sets and applications Wiley-Interscience. ,(1987)
S. Bakhtiari, R. Safavi-Naini, J. Pieprzyk, On password-based authenticated key exchange using collisionful hash functions australasian conference on information security and privacy. pp. 299- 310 ,(1996) , 10.1007/BFB0023308
Jacques Stern, A new identification scheme based on syndrome decoding international cryptology conference. pp. 13- 21 ,(1993) , 10.1007/3-540-48329-2_2
David C. Feldmeier, Philip R. Karn, UNIX Password Security - Ten Years Later international cryptology conference. pp. 44- 63 ,(1989) , 10.1007/0-387-34805-0_6
Mohssen Alabbadi, Stephen B. Wicker, A Digital Signature Scheme Based on Linear Error-correcting Block Codes international cryptology conference. pp. 238- 248 ,(1994) , 10.1007/BFB0000438
S. Bakhtiari, R. Safavi-Naini, J. Pieprzyk, On selectable collisionful hash functions australasian conference on information security and privacy. pp. 287- 298 ,(1996) , 10.1007/BFB0023307
Charles H. Bennett, Gilles Brassard, Claude Crépeau, Marie-Hélène Skubiszewska, Practical Quantum Oblivious Transfer international cryptology conference. pp. 351- 366 ,(1991) , 10.1007/3-540-46766-1_29
Florence Jessie MacWilliams, Neil James Alexander Sloane, The Theory of Error-Correcting Codes ,(1977)
Robert J. McEliece, The theory of information and coding ,(1977)