共 50 条
[34]
On the Exact Round Complexity of Secure Three-Party Computation
[J].
Journal of Cryptology,
2021, 34
[35]
Cryptanalysis of a Simple Three-party Key Exchange Protocol
[J].
INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS,
2010, 34 (03)
:337-339
[37]
Three-party Encrypted Key Exchange: Attacks and a Solution
[J].
Operating Systems Review (ACM),
2000, 34 (04)
:12-20
[38]
Three-party Quantum Authenticated Key Distribution with Partially Trusted Third Party
[J].
GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE,
2008,
[39]
Three-party authenticated key agreements for optimal communicatione
[J].
PLOS ONE,
2017, 12 (03)