共 37 条
[31]
Kiltz E, 2010, LECT NOTES COMPUT SC, V6223, P295, DOI 10.1007/978-3-642-14623-7_16
[32]
Krawczyk H, 2003, LECT NOTES COMPUT SC, V2729, P400
[33]
No-Match Attacks and Robust Partnering Definitions - Defining Trivial Attacks for Security Protocols is Not Trivial
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:1343-1360
[34]
Two-Pass Authenticated Key Exchange with Explicit Authentication and Tight Security
[J].
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2020, PT II,
2020, 12492
:785-814
[35]
Paillier P, 2005, LECT NOTES COMPUT SC, V3788, P1
[36]
SCHNORR CP, 1990, LECT NOTES COMPUT SC, V435, P239
[37]
Seurin Y, 2012, LECT NOTES COMPUT SC, V7237, P554, DOI 10.1007/978-3-642-29011-4_33