共 50 条
- [31] A two-party SM2 signing Protocol and its application [J]. Tian, Hai-Bo (tianhb@mail.sysu.edu.cn), 1600, Science Press (43): : 701 - 710
- [32] Partially known information attack on SM2 key exchange protocol [J]. Science China Information Sciences, 2019, 62
- [34] Partially Known Nonces and Fault Injection Attacks on SM2 Signature Algorithm [J]. INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2013, 2014, 8567 : 343 - 358
- [35] Non-interactive SM2 threshold signature scheme with identifiable abort [J]. Frontiers of Computer Science, 2024, 18
- [36] Security of the SM2 Signature Scheme Against Generalized Key Substitution Attacks [J]. SECURITY STANDARDISATION RESEARCH, SSR 2015, 2015, 9497 : 140 - 153
- [37] A Secure And High Concurrency SM2 Cooperative Signature Algorithm For Mobile Network [J]. 2021 17TH INTERNATIONAL CONFERENCE ON MOBILITY, SENSING AND NETWORKING (MSN 2021), 2021, : 818 - 824
- [39] A SM2 Elliptic Curve Threshold Signature Scheme without a Trusted Center [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (02): : 897 - 913