共 50 条
- [1] Secure JTAG Implementation Using Schnorr Protocol Journal of Electronic Testing, 2013, 29 : 193 - 209
- [2] Implementation of a Secure RFID Protocol 2013 21ST SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2013,
- [3] Concurrently Secure Blind Schnorr Signatures ADVANCES IN CRYPTOLOGY, PT II, EUROCRYPT 2024, 2024, 14652 : 124 - 160
- [4] Implementation of Passif Secure RFID Protocol 2018 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2018, : 439 - 442
- [5] DESIGN AND IMPLEMENTATION OF A SECURE MODBUS PROTOCOL CRITICAL INFRASTRUCTURE PROTECTION III, 2009, 311 : 83 - 96
- [7] Encryption-Based Secure JTAG 2019 IEEE 22ND INTERNATIONAL SYMPOSIUM ON DESIGN AND DIAGNOSTICS OF ELECTRONIC CIRCUITS & SYSTEMS (DDECS), 2019,
- [8] Reusing Nonces in Schnorr Signatures (and Keeping It Secure ...) COMPUTER SECURITY - ESORICS 2017, PT I, 2018, 10492 : 224 - 241
- [9] Design and implementation of a secure mobile IP protocol 2004 INTERNATIONAL NETWORKING AND COMMUNICATIONS CONFERENCE, PROCEEDINGS, 2004, : 53 - 57