共 50 条
- [1] The sponge construction as a source of secure cryptographic primitives [J]. 2013 MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS CONFERENCE (MCC), 2013,
- [2] Cryptographic Primitives for Building Secure and Privacy Respecting Protocols [J]. PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 361 - 361
- [3] Secure group instant messaging using cryptographic primitives [J]. NETWORKING AND MOBILE COMPUTING, PROCEEDINGS, 2005, 3619 : 1002 - 1011
- [5] Public-Key Cryptographic Primitives Provably as Secure as Subset Sum [J]. THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2010, 5978 : 382 - +
- [6] A Study of Cryptographic Backdoors in Cryptographic Primitives [J]. 26TH IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE 2018), 2018, : 1664 - 1669
- [7] A Feebly Secure Trapdoor Function [J]. COMPUTER SCIENCE - THEORY AND APPLICATIONS, 2009, 5675 : 129 - 142
- [8] On the Design of Cryptographic Primitives [J]. Acta Applicandae Mathematica, 2006, 93 : 279 - 297
- [9] SN-SEC: a secure wireless sensor platform with hardware cryptographic primitives [J]. Personal and Ubiquitous Computing, 2013, 17 : 1051 - 1059