共 69 条
[1]
Aas J, 2018, LETS ENCRYPT LOOKING
[2]
Abdalla M, 2001, LECT NOTES COMPUT SC, V2020, P143
[3]
Abramov R, 2011, IFIP ADV INF COMM TE, V354, P29
[4]
Anderson T, 1999, ACM SIGCOMM COMP COM, V29
[5]
[Anonymous], 2018, RFC 8446, DOI [10.17487/RFC8446, DOI 10.17487/RFC8446]
[6]
[Anonymous], 2012, WOOT
[7]
Session Resumption Protocols and Efficient Forward Security for TLS 1.3 0-RTT
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2019, PT II,
2019, 11477
:117-150
[8]
Barbosa M, 2009, LECT NOTES COMPUT SC, V5580, P235, DOI 10.1007/978-3-642-02384-2_15
[9]
Bellare M., 2004, ACM Transactions on Information and Systems Security, V7, P206, DOI 10.1145/996943.996945
[10]
Bellare M., 1996, Advances in Cryptology - CRYPTO'96. 16th Annual International Cryptology Conference. Proceedings, P1