References
- Abadi , A. , Feigenbaum , J. and Kilian , J. 1989 . On Hiding Information from an Oracle . Journal of Computer and System Sciences , 39 ( 1 ) : 21 – 50 .
- Feigenbaum , J. 1986 . Encrypting Problem Instances, or,..., Can You Take Advantage of Someone Without Having to Trust Him?" Advances in Cryptology-CRYPTO′86. , Edited by: Williams , H.C. 477 – 488 . Springer-Verlag .
- Kawamura , S. and Shimbo , A. 1990 . Performance Analysis of Server-Aided Secret Computation Protocols for the RSA Cryptosystem . The Transactions of The Institute of Electronics, Information and Communication Engineers IEICE , 73 ( 7 ) : 1073 – 1080 .
- Knuth , D. 1969 . The Art of Computer Programming , 2 ( 7 )
- Kranakis , E. 1986 . Primality and Cryptography , 149 – 152 . New York : John Wiley & Sons Ltd .
- Matsumoto , T. , Kato , K. and Imai , H. 1990 . Crypto′88, Lecture Note on Computer Sciences 403 , : 497 – 506 .
- Rivest , R. , Shamir , A. and Adleman , L. 1978 . A Method for Obtaining Digital Signature and Public Key Cryptosystems . Communications of the ACM , 21 ( 2 ) : 120 – 126 .