共 32 条
[1]
Abdelaal AE, 2017, P AMER CONTR CONF, P1017, DOI 10.23919/ACC.2017.7963086
[2]
Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice
[J].
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2015,
:5-17
[3]
Andonovski Goran, 2015, 2015 IEEE International Conference on Evolving and Adaptive Intelligent Systems (EAIS), P1, DOI 10.1109/EAIS.2015.7368793
[4]
[Anonymous], SECP256K1 BITCOIN WI
[5]
Biyik E, 2015, P AMER CONTR CONF, P1683, DOI 10.1109/ACC.2015.7170975
[9]
Cowling Ian D., 2007, Proceedings of the European Control Conference 2007 (ECC), P4001
[10]
Eijs H., Pycryptodome: Cryptographic Library for Python