共 44 条
[1]
[Anonymous], 2013, IEEE STANDARDS, P1, DOI [DOI 10.1109/IEEESTD.2013.6509896, 10.1109/IEEESTD.2013. 6469140, DOI 10.1109/IEEESTD.2013.6469140]
[2]
[Anonymous], 1984, Advances in Cryptology: Proceedings of CRYPTO 84, Lecture Notes in Computer Science, DOI DOI 10.1007/3-540-39568-7
[3]
Subversion-Resilient Signature Schemes
[J].
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2015,
:364-375
[4]
Barreto PSLM, 2005, LECT NOTES COMPUT SC, V3788, P515
[5]
Mass-surveillance without the State: Strongly Undetectable Algorithm-Substitution Attacks
[J].
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2015,
:1431-1440
[6]
Bellare M, 2014, LECT NOTES COMPUT SC, V8616, P1, DOI 10.1007/978-3-662-44371-2_1
[7]
Secure Sampling of Public Parameters for Succinct Zero Knowledge Proofs
[J].
2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015,
2015,
:287-304
[8]
Algorithm Substitution Attacks from a Steganographic Perspective
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:1649-1660
[9]
Bernstein Daniel J., 2016, The New Codebreakers Essays Dedicated to David Kahn on the Occasion of His 85th Birthday. LNCS 9100, P256, DOI 10.1007/978-3-662-49301-4_17