共 50 条
- [33] Partially known information attack on SM2 key exchange protocol Science China Information Sciences, 2019, 62
- [35] Can PoW Consensus Protocol Resist the Whale Attack? 2022 IEEE 22ND INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY, QRS, 2022, : 504 - 515
- [36] Design of key establishment protocol using one-way functions to avert insider-replay attack INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2006, 4332 : 194 - +
- [37] On a Key Exchange Protocol INNOVATIVE SECURITY SOLUTIONS FOR INFORMATION TECHNOLOGY AND COMMUNICATION: 10TH INTERNATIONAL CONFERENCE, SECITC 2017, 2017, 10543 : 187 - 199
- [38] A Linear Algebra Attack to Group-Ring-Based Key Exchange Protocols APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2014, 2014, 8479 : 37 - 43
- [40] Dynamic tree-based authenticated group key exchange protocol Science China Information Sciences, 2010, 53 : 1591 - 1602