共 50 条
- [21] Fingerprinting Cryptographic Protocols with Key Exchange using an Entropy Measure 2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018), 2018, : 170 - 179
- [24] Symmetric and asymmetric cryptographic key exchange protocols in the octonion algebra Applicable Algebra in Engineering, Communication and Computing, 2021, 32 : 81 - 96
- [28] Self-Guarding Cryptographic Protocols against Algorithm Substitution Attacks IEEE 31ST COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2018), 2018, : 76 - 90
- [30] Honest functions and their application to the analysis of cryptographic protocols Proceedings of the Computer Security Foundations Workshop, 1999, : 83 - 89