共 50 条
- [3] How to Use Metaheuristics for Design of Symmetric-Key Primitives ADVANCES IN CRYPTOLOGY - ASIACRYPT 2017, PT III, 2017, 10626 : 369 - 391
- [4] A Modular Treatment of Cryptographic APIs: The Symmetric-Key Case ADVANCES IN CRYPTOLOGY - CRYPTO 2016, PT I, 2016, 9814 : 277 - 307
- [5] A general model of DPA attacks to precharged busses in symmetric-key cryptographic algorithms 2007 EUROPEAN CONFERENCE ON CIRCUIT THEORY AND DESIGN, VOLS 1-3, 2007, : 368 - 371
- [6] Specifying the needham-schroeder symmetric-key cryptographic protocol in the ambient calculus DCABES 2007 PROCEEDINGS, VOLS I AND II, 2007, : 507 - 512
- [7] On the Bit Security of Cryptographic Primitives ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT I, 2018, 10820 : 3 - 28
- [9] Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 1825 - 1842
- [10] Optimize cryptographic symmetric primitives performance Beijing Daxue Xuebao Ziran Kexue Ban, 2008, 5 (733-738):