共 28 条
[1]
Lucky Thirteen: Breaking the TLS and DTLS Record Protocols
[J].
2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2013,
:526-540
[2]
[Anonymous], The Heartbleed Bug
[3]
Aviram N, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P689
[4]
Berbecaru D, 2007, LECT NOTES COMPUT SC, V4582, P248
[5]
Towards stronger data security in an eID Management Infrastructure
[J].
2017 25TH EUROMICRO INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND NETWORK-BASED PROCESSING (PDP 2017),
2017,
:391-395
[7]
Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH
[J].
23RD ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2016),
2016,
[8]
Bleichenbacher D, 1998, LECT NOTES COMPUT SC, V1462, P1, DOI 10.1007/BFb0055716
[9]
Boyd C., 2019, Protocols for Authentication and Key Establishment, DOI [10.1007/978-3-662-58146-9, DOI 10.1007/978-3-662-58146-9]
[10]
Bright P., Apple, Google, Microsoft, and Mozilla come together to end TLS 1.0