共 26 条
[2]
A Probably Secure Bi-GISIS Based Modified AKE Scheme With Reusable Keys
[J].
IEEE ACCESS,
2020, 8 (08)
:26210-26222
[3]
[Anonymous], 2022, Post-Quantum Cryptography - Selected Algorithms
[4]
Middle-Product Learning with Rounding Problem and Its Applications
[J].
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2019, PT I,
2019, 11921
:55-81
[5]
Banerjee A, 2012, LECT NOTES COMPUT SC, V7237, P719, DOI 10.1007/978-3-642-29011-4_42
[6]
Bellare M., 1993, P 1 ACM C COMP COMM, P62
[7]
Bhattacharya S., 2018, 2018725 CRYPT EPRINT
[8]
The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes
[J].
2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2012,
:553-567
[9]
D'Anvers Jan-Pieter, 2018, Progress in Cryptology - AFRICACRYPT 2018. 10th International Conference on Cryptology in Africa. Proceedings: LNCS 10831, P282, DOI 10.1007/978-3-319-89339-6_16
[10]
LBA-PAKE: Lattice-Based Anonymous Password Authenticated Key Exchange for Mobile Devices
[J].
IEEE SYSTEMS JOURNAL,
2021, 15 (04)
:5067-5077