共 19 条
[1]
AlFardan N., 2013, P 22 USENIX SEC S, P305
[2]
AlFardan N., 2012, NETW DISTR SYST SEC
[3]
Lucky Thirteen: Breaking the TLS and DTLS Record Protocols
[J].
2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2013,
:526-540
[4]
Almeida J.B., 2015, IACR CRYPTOLOGY EPRI, V2015, P1241
[5]
[Anonymous], 2015, S2N IMPL TLS SSL PRO
[6]
Canvel B, 2003, LECT NOTES COMPUT SC, V2729, P583
[7]
Coron JS, 2010, LECT NOTES COMPUT SC, V6225, P95, DOI 10.1007/978-3-642-15031-9_7
[8]
Garman C, 2015, PROCEEDINGS OF THE 24TH USENIX SECURITY SYMPOSIUM, P113
[9]
Irazoqui G., 2015, PROC 10 ACM S INFOR, P85, DOI [10.1145/2714576.2714625, DOI 10.1145/2714576.2714625]
[10]
Krawczyk H., 1997, Internet Engineering Task Force (IETF)