共 34 条
[1]
Abdalla M, 2000, LECT NOTES COMPUT SC, V1976, P546
[2]
Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice
[J].
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2015,
:5-17
[3]
AlFardan N., 2013, P 22 USENIX SEC S, P305
[4]
Lucky Thirteen: Breaking the TLS and DTLS Record Protocols
[J].
2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2013,
:526-540
[5]
[Anonymous], 2014, 1SC27 ISOIEC JTC
[6]
[Anonymous], 4344 IETF RFC
[7]
Aviram N., 2016, DROWN BREAKING TLS U
[8]
A concrete security treatment of symmetric encryption
[J].
38TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS,
1997,
:394-403
[9]
Bellare M., 1994, Advances in Cryptology - CRYPTO '94. 14th Annual International Cryptology Conference. Proceedings, P341
[10]
A Messy State of the Union: Taming the Composite State Machines of TLS
[J].
2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015,
2015,
:535-552