共 40 条
[1]
Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice
[J].
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2015,
:5-17
[2]
Altman J., 2010, 5929 IETF RFC
[3]
[Anonymous], 4253 RFC
[4]
[Anonymous], 2014, TRANSPORT LAYER SECU
[5]
[Anonymous], 1981, The Art of Computer Programming
[6]
[Anonymous], 2008, The transport layer security (TLS) protocol version 1.2
[7]
Bellovin S., 2006, NDSS
[8]
Multi-Ciphersuite Security of the Secure Shell (SSH) Protocol
[J].
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2014,
:369-381
[9]
Verified Contributive Channel Bindings for Compound Authentication
[J].
22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015),
2015,
[10]
Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS
[J].
2014 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2014),
2014,
:98-113