共 50 条
- [31] An approach to finding the attacks on the cryptographic protocols Operating Systems Review (ACM), 2000, 34 (03): : 19 - 28
- [33] Reconstruction of attacks against cryptographic protocols 18TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2005, : 140 - 154
- [34] Synthesis of Fault Attacks on Cryptographic Implementations CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 1016 - 1027
- [36] Side-channel cryptographic attacks using pseudo-boolean optimization Constraints, 2016, 21 : 616 - 645
- [37] Using Animation in Active Learning Tool to Detect Possible Attacks in Cryptographic Protocols VISUAL INFORMATICS: BRIDGING RESEARCH AND PRACTICE, 2009, 5857 : 510 - 520
- [38] Hardening Encrypted Patient Names Against Cryptographic Attacks Using Cellular Automata 2018 18TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW), 2018, : 518 - 522