共 33 条
[1]
Advanced Encryption Standard (AES), 2001, FIPS PUB 197
[2]
Second Preimage Analysis of Whirlwind
[J].
INFORMATION SECURITY AND CRYPTOLOGY (INSCRYPT 2014),
2015, 8957
:311-328
[3]
AlTawy R, 2014, LECT NOTES COMPUT SC, V8469, P109
[4]
[Anonymous], 2010, 1011822010 ISOIEC
[5]
Aoki K, 2009, LECT NOTES COMPUT SC, V5381, P103, DOI 10.1007/978-3-642-04159-4_7
[6]
Aoki K, 2009, LECT NOTES COMPUT SC, V5912, P578, DOI 10.1007/978-3-642-10366-7_34
[7]
Aoki K, 2009, LECT NOTES COMPUT SC, V5677, P70, DOI 10.1007/978-3-642-03356-8_5
[8]
Aumasson JP, 2009, LECT NOTES COMPUT SC, V5381, P120, DOI 10.1007/978-3-642-04159-4_8
[9]
Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:1465-1482
[10]
Σοφοζ - Forward Secure Searchable Encryption
[J].
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2016,
:1143-1154