共 27 条
- [1] Security of the J-PAKE Password-Authenticated Key Exchange Protocol [J]. 2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015, 2015, : 571 - 587
- [2] Bellare M, 2000, LECT NOTES COMPUT SC, V1807, P139
- [3] BELLOVIN SM, 1992, 1992 IEEE COMPUTER SOCIETY SYMPOSIUM ON RESEARCH IN SECURITY AND PRIVACY : PROCEEDINGS, P72
- [4] Cramer R, 2002, LECT NOTES COMPUT SC, V2332, P45
- [7] Gorbenko Y, 2016, 2016 THIRD INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE PROBLEMS OF INFOCOMMUNICATIONS SCIENCE AND TECHNOLOGY (PIC S&T), P51, DOI 10.1109/INFOCOMMST.2016.7905333
- [8] A New Framework for Efficient Password-Based Authenticated Key Exchange [J]. PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 516 - 525
- [9] cuGimli: optimized implementation of the Gimli authenticated encryption and hash function on GPU for IoT applications [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (01): : 433 - 450
- [10] Hu Xue-Xian, 2011, Journal of Software, V22, P2820, DOI 10.3724/SP.J.1001.2011.03910