共 20 条
[1]
Akinyele JA(2013)Charm: a framework for rapidly prototyping cryptosystems J. Cryptogr. Eng. 3 111-128
[2]
Garman C(2017)Strong authenticated key exchange with auxiliary inputs Des. Codes Cryptogr. 85 145-173
[3]
Miers I(1976)New directions in cryptography IEEE Trans. Inf. Theory 22 644-654
[4]
Pagano MW(2008)Fuzzy extractors: How to generate strong keys from biometrics and other noisy data SIAM J. Comput. 38 97-139
[5]
Rushanan M(2014)On the limits of authenticated key exchange security with an application to bad randomness IACR Cryptol. ePrint Arch. 2014 369-undefined
[6]
Green M(undefined)undefined undefined undefined undefined-undefined
[7]
Rubin AD(undefined)undefined undefined undefined undefined-undefined
[8]
Chen R(undefined)undefined undefined undefined undefined-undefined
[9]
Mu Y(undefined)undefined undefined undefined undefined-undefined
[10]
Yang G(undefined)undefined undefined undefined undefined-undefined