共 50 条
- [3] Comments on the SM2 Key Exchange Protocol [J]. CRYPTOLOGY AND NETWORK SECURITY, 2011, 7092 : 160 - 171
- [5] Unbalancing Computations for SM2 Key Exchange Protocols [J]. PROCEEDINGS OF 2020 IEEE 4TH INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2020), 2020, : 335 - 341
- [6] Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols [J]. SCIENTIFIC WORLD JOURNAL, 2014,
- [7] Partially Known Nonces and Fault Injection Attacks on SM2 Signature Algorithm [J]. INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2013, 2014, 8567 : 343 - 358
- [8] Key Reuse Attack on NewHope Key Exchange Protocol [J]. INFORMATION SECURITY AND CRYPTOLOGY (ICISC 2018), 2019, 11396 : 163 - 176
- [9] Known-Key Attack on SM4 Block Cipher [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2017, E100A (12): : 2985 - 2990
- [10] Anonymous Credential Protocol Based on SM2 Digital Signature [J]. Ruan Jian Xue Bao/Journal of Software, 2024, 35 (07): : 3469 - 3481