共 39 条
[11]
Cervesato I., 2001, 16th Annual Symposium on Logic in Computer ScienceLICS, V1, P1
[12]
Chen T., 2015, R PACKAGE VERSION 04
[13]
ON THE SECURITY OF RECENT PROTOCOLS
[J].
INFORMATION PROCESSING LETTERS,
1995, 56 (03)
:151-155
[15]
Cremers CJF, 2008, LECT NOTES COMPUT SC, V5123, P414
[16]
TIMESTAMPS IN KEY DISTRIBUTION PROTOCOLS
[J].
COMMUNICATIONS OF THE ACM,
1981, 24 (08)
:533-536
[17]
Dierks T., 2008, The transport layer security (TLS) protocol version, DOI DOI 10.17487/RFC5246
[18]
Strand spaces: Why is a security protocol correct?
[J].
1998 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS,
1998,
:160-171
[19]
Improving Attacks on Round-Reduced Speck32/64 Using Deep Learning
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT II,
2019, 11693
:150-179