共 41 条
- [1] [Anonymous], 2003, RSA Laboratories Cryptobytes
- [2] Armando A, 2005, LECT NOTES COMPUT SC, V3576, P281
- [3] Symbolic verification of privacy-type properties for security protocols with XOR [J]. 2017 IEEE 30TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2017, : 234 - 248
- [4] Basin D, 2021, PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, P179
- [5] Basin D, 2021, P IEEE S SECUR PRIV, P1766, DOI 10.1109/SP40001.2021.00037
- [6] A Formal Analysis of 5G Authentication [J]. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 1383 - 1396
- [7] Automated Symbolic Proofs of Observational Equivalence [J]. CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 1144 - 1155
- [8] Bellare M., 2001, US Patent, Patent No. 6266771
- [9] Bellare M., 1995, LNCS, P92, DOI DOI 10.1007/BFB0053428
- [10] Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate [J]. 2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, : 483 - 502