共 26 条
[1]
Adams C., 2005, ENCY CRYPTOGRAPHY SE, P446
[2]
Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice
[J].
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2015,
:5-17
[3]
[Anonymous], 959482014 ISOIEC
[4]
[Anonymous], 2010, INFOCOM
[5]
[Anonymous], 2015, ARXIV150603471
[6]
Bashir K., 2012, INT J ENG TECHNOL, V4, P307
[7]
Bellovin S. M., 1990, Computer Communication Review, V20, P119, DOI 10.1145/381906.381946
[8]
Elliptic Curve Cryptography in Practice
[J].
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014,
2014, 8437
:157-175
[9]
Cervesato Iliano., 2005, Proceedings of the 2005 workshop on Issues in the theory of security, P12
[10]
Chundong Wang, 2013, 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies (EIDWT), P256, DOI 10.1109/EIDWT.2013.49