共 50 条
- [22] EHNP Strikes Back: Analyzing SM2 Implementations PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2022, 2022, 13503 : 576 - 600
- [23] An Efficient ASIC Implementation of Public Key Cryptography Algorithm SM2 Based on Module Arithmetic Logic Unit 2019 IEEE 13TH INTERNATIONAL CONFERENCE ON ASIC (ASICON), 2019,
- [24] Asymmetric disribution of computations in Internet Key Exchange Protocol 2008 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-4, 2008, : 1449 - +
- [25] Comparative Analysis of Internet Key Exchange Protocols 2015 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES (ICICT), 2015,
- [26] Modelling Time for Authenticated Key Exchange Protocols COMPUTER SECURITY - ESORICS 2014, PT II, 2014, 8713 : 277 - 294
- [27] Security Verification for Authentication and Key Exchange Protocols INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (03): : 1 - 11
- [29] Downgrade Resilience in Key-Exchange Protocols 2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2016, : 506 - 525
- [30] Analysis of Two Authenticated Key Exchange Protocols MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 398 - +