共 50 条
[1]
Abelson H., 1997, World Wide Web J., V2, P241
[2]
Keys under doormats: mandating insecurity by requiring government access to all data and communications
[J].
JOURNAL OF CYBERSECURITY,
2015, 1 (01)
:69-79
[3]
Alagic G., 2020, Status report on the second round of the NIST post-quantum cryptography standardization process, DOI DOI 10.6028/NIST.IR.8309
[4]
Alberts ChristopherJ., 1999, OPERATIONALLY CRITIC
[5]
[Anonymous], 2015, COMMERCIAL NATL SECU
[6]
[Anonymous], 2006, NIST COMMENTS CRYPTA
[7]
[Anonymous], CRYPTOGRAPHIC AGILIT
[8]
[Anonymous], 2014, SECURITY ADVISORY
[9]
Barker E., 2019, Transitioning the use of cryptographic algorithms and key lengths
[10]
Bellovin Steven M., Analysis of the CLEAR Protocol per the National Academies Framework