共 27 条
[1]
[Anonymous], 1997, Handbook of Applied Cryptography
[2]
Subversion-Resilient Signature Schemes
[J].
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2015,
:364-375
[3]
Ball J, 2013, GUARDIAN
[4]
Mass-surveillance without the State: Strongly Undetectable Algorithm-Substitution Attacks
[J].
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2015,
:1431-1440
[5]
Bellare M, 2014, LECT NOTES COMPUT SC, V8616, P1, DOI 10.1007/978-3-662-44371-2_1
[6]
Boneh D., 2011, Encyclopedia of Cryptography and Security, P347, DOI [10.1007/978-1-4419-5906-5_145, DOI 10.1007/978-1-4419-5906-5_145]
[7]
Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions
[J].
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT I,
2016, 10031
:844-876
[8]
Message Transmission with Reverse Firewalls-Secure Communication on Corrupted Machines
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2016, PT I,
2016, 9814
:341-372
[10]
Fischlin M., 2017, IACR CRYPTOLOGY EPRI, V2017, P984