共 37 条
- [1] Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice [J]. CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 5 - 17
- [2] [Anonymous], 2017, ACM S THEORY COMPUT, DOI DOI 10.1145/3055399.3055433
- [3] [Anonymous], 2003, PROC INT CONF DATA
- [4] [Anonymous], 2015, LEIBNIZ INT PR INFOR, DOI DOI 10.4230/LIPICS.CCC.2015.512
- [5] Arnon-Friedman R., 2016, ARXIV 1607 01797
- [6] Practical device-independent quantum cryptography via entropy accumulation [J]. NATURE COMMUNICATIONS, 2018, 9
- [7] Unconditionally secure device-independent quantum key distribution with only two devices [J]. PHYSICAL REVIEW A, 2012, 86 (06):
- [8] Bavarian M., 2015, ARXIV150907466
- [9] Ben-Or M, 2005, LECT NOTES COMPUT SC, V3378, P386