共 51 条
[1]
Abraham D., 2009, Network Security, V2009, P4, DOI [10.1016/S1353-4858(09)70097-2, DOI 10.1016/S1353-4858(09)70097-2]
[2]
PASTA: PASsword-based Threshold Authentication
[J].
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18),
2018,
:2042-2059
[3]
ALEX HALDERMAN J., 2005, Proceedings of the WWW, P471
[4]
Scrypt Is Maximally Memory-Hard
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT III,
2017, 10212
:33-62
[5]
On the Complexity of Scrypt and Proofs of Space in the Parallel Random Oracle Model
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT II,
2016, 9666
:358-387
[6]
[Anonymous], 2012, P USENIX SEC S BELL
[7]
Subversion-Resilient Signature Schemes
[J].
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2015,
:364-375
[8]
Balfanz D., 2015, FIDO Alliance Proposed Standard, P1
[9]
BlueWallet: The secure Bitcoin wallet
[J].
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics),
2014, 8743
:65-80
[10]
Universally composable security: A new paradigm for cryptographic protocols
[J].
42ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS,
2001,
:136-145