共 50 条
- [11] Modeling for security verification of a cryptographic protocol with MAC payload ADVANCES IN INTELLIGENT COMPUTING, PT 2, PROCEEDINGS, 2005, 3645 : 538 - 547
- [12] An Optimal Cryptographic Approach for Addressing Security Breaches to Build Resilient WSN INFORMATION AND COMMUNICATION TECHNOLOGY FOR INTELLIGENT SYSTEMS, ICTIS 2018, VOL 2, 2019, 107 : 21 - 27
- [13] Mechanized verification of cryptographic security of cryptographic security protocol implementation in JAVA through model extraction in the computational model Journal of Software Engineering, 2015, 9 (01): : 1 - 32
- [14] Enhancing financial transaction security with lightweight cryptographic algorithms JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (2B): : 741 - 751
- [15] Machine-checked security proofs of cryptographic signature schemes COMPUTER SECURITY - ESORICS 2005, PROCEEDINGS, 2005, 3679 : 140 - 158
- [16] ENHANCING THE SECURITY OF ELGAMAL SIGNATURE SCHEME IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1994, 141 (04): : 249 - 252
- [17] ENHANCING THE SECURITY OF ELGAMALS SIGNATURE SCHEME IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1995, 142 (05): : 376 - 376
- [19] Application of NTRU Cryptographic Algorithm for SCADA security 2014 11TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS (ITNG), 2014, : 341 - 346
- [20] On the Security of the Digital Signature Algorithm Designs, Codes and Cryptography, 2002, 26 : 87 - 96