共 50 条
- [12] Study of Vulnerabilities in the Cryptography Algorithms PERVASIVE COMPUTING AND SOCIAL NETWORKING, ICPCSN 2022, 2023, 475 : 65 - 76
- [14] An empirical analysis of vulnerabilities in virtualization technologies 2016 8TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM 2016), 2016, : 533 - 538
- [15] Relating cryptography and cryptographic protocols: A panel 14TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2001, : 111 - 111
- [16] An Analysis of Speculative Type Confusion Vulnerabilities in the Wild PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, 2021, : 2399 - 2416
- [18] An Empirical Analysis of Cryptographic Misuse on Different Platforms COMPUTER SCIENCE AND TECHNOLOGY (CST2016), 2017, : 316 - 324
- [19] Implementation vulnerabilities in general quantum cryptography NEW JOURNAL OF PHYSICS, 2018, 20
- [20] Neural Cryptography: Vulnerabilities and Attack Strategies DISRUPTIVE TECHNOLOGIES IN INFORMATION SCIENCES VIII, 2024, 13058