共 27 条
[1]
Alkim E, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P327
[2]
Alwen J., 2018, 20181037 CRYPT EPRIN
[3]
[Anonymous], 2017, WhatsApp
[4]
Bellare M, 2003, LECT NOTES COMPUT SC, V2612, P1
[5]
Ratcheted Encryption and Key Exchange: The Security of Messaging
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT III,
2017, 10403
:619-650
[6]
Borisov N., 2004, Proceedings of the 2004 AC M Workshop on Privacy in the Electronic Society, DOI [10.1145/1029179.1029200, DOI 10.1145/1029179.1029200]
[7]
Bos J.W., 2017, IACR Cryptology ePrint Archive, V2017, P634
[8]
A Formal Security Analysis of the Signal Messaging Protocol
[J].
2017 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P),
2017,
:451-466
[9]
On Post-Compromise Security
[J].
2016 IEEE 29TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2016),
2016,
:164-178
[10]
Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT III,
2018, 10822
:425-455