共 28 条
[1]
Lucky Thirteen: Breaking the TLS and DTLS Record Protocols
[J].
2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2013,
:526-540
[2]
Alomair Basel, 2012, Applied Cryptography and Network Security. Proceedings 10th International Conference, ACNS 2012, P84, DOI 10.1007/978-3-642-31284-7_6
[3]
Andreeva E, 2014, LECT NOTES COMPUT SC, V8873, P105, DOI 10.1007/978-3-662-45611-8_6
[4]
Andreeva E, 2013, LECT NOTES COMPUT SC, V8269, P424, DOI 10.1007/978-3-642-42033-7_22
[5]
[Anonymous], 2001, P 8 ACM C COMP COMM
[6]
[Anonymous], 2007, 80038D NIST SP
[7]
Bellare M., 1997, Advances in Cryptology - EUROCRYPT '97. International Conference on the Theory and Application of Cryptographic Techniques Proceedings, P163
[8]
Bellare M, 2000, LECT NOTES COMPUT SC, V1976, P531
[9]
ALE: AES-Based Lightweight Authenticated Encryption
[J].
FAST SOFTWARE ENCRYPTION (FSE 2013),
2014, 8424
:447-466
[10]
Canvel B, 2003, LECT NOTES COMPUT SC, V2729, P583