共 50 条
- [1] On the Security Analysis of Weak Cryptographic Primitive Based Key Derivation Function [J]. INFORMATION SCIENCE AND APPLICATIONS 2017, ICISA 2017, 2017, 424 : 231 - 240
- [2] Docurity: A New Cryptographic Primitive for Collaborative Cloud Systems [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2023, 36 (03): : 3725 - 3742
- [3] An adaptive intrusion-tolerant approach to protecting operation security of cryptographic protocols [J]. Gaojishu Tongxin/Chinese High Technology Letters, 2009, 19 (07): : 706 - 712
- [4] On tolerant cryptographic constructions [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2005, PROCEEDINGS, 2005, 3376 : 172 - 190
- [6] Controlled operations as a cryptographic primitive [J]. INFORMATION ASSURANCE IN COMPUTER NETWORKS: METHODS, MODELS AND ARCHITECTURES FOR NETWORK SECURITY, PROCEEDINGS, 2001, 2052 : 230 - 241
- [7] Universally composable security: A new paradigm for cryptographic protocols [J]. 42ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2001, : 136 - 145
- [9] Cryptographic Applications of Primitive Pythagorean Triples [J]. CRYPTOLOGIA, 2014, 38 (03) : 215 - 222
- [10] A language-dependent cryptographic primitive [J]. JOURNAL OF CRYPTOLOGY, 1997, 10 (01) : 37 - 49