共 50 条
- [1] Security on SM2 and GOST Signatures against Related Key Attacks [J]. 2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 155 - 163
- [2] Continual leakage resilient SM2 signature scheme [J]. PROCEEDINGS OF 2020 3RD INTERNATIONAL CONFERENCE ON UNMANNED SYSTEMS (ICUS), 2020, : 931 - 936
- [3] Adaptor Signature Scheme Based on the SM2 Digital Signature Algorithm [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2021, 58 (10): : 2278 - 2286
- [5] An Efficient and Provably Secure SM2 Key-Insulated Signature Scheme for Industrial Internet of Things [J]. CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES, 2024, 138 (01): : 903 - 915
- [6] Partially Known Nonces and Fault Injection Attacks on SM2 Signature Algorithm [J]. INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2013, 2014, 8567 : 343 - 358
- [8] Algorithm-Based Countermeasures against Power Analysis Attacks for Public-key Cryptography SM2 [J]. 2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 435 - 439
- [10] An Efficient Scheme for Implementation of SM2 Digital Signature over GF(p) [J]. CONTEMPORARY RESEARCH ON E-BUSINESS TECHNOLOGY AND STRATEGY, 2012, 332 : 250 - 258