共 56 条
[1]
Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
[2]
Abdalla M, 2005, LECT NOTES COMPUT SC, V3788, P566
[3]
Abdalla M, 2001, LECT NOTES COMPUT SC, V2020, P441
[4]
Robust Password-Protected Secret Sharing
[J].
COMPUTER SECURITY - ESORICS 2016, PT II,
2016, 9879
:61-79
[5]
Scrypt Is Maximally Memory-Hard
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT III,
2017, 10212
:33-62
[6]
On the Complexity of Scrypt and Proofs of Space in the Parallel Random Oracle Model
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT II,
2016, 9666
:358-387
[7]
[Anonymous], 2002, 198 NFIPS, P29
[8]
[Anonymous], P 16 INF SEC C ISC 2
[9]
Aranha D.F., RELIC is an Efficient LIbrary for Cryptography
[10]
Bagherzandi A, 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), P433