共 6 条
- [1] Cramer R.(2003)Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack SIAM J. Comput. 33 167-226
- [2] Shoup V.(1992)Authentication and authenticated key exchange Des. Codes Cryptogr. 2 107-125
- [3] Diffie W.(1999)Inductive analysis of the Internet protocol TLS ACM Trans. Inf. Syst. Secur. 2 332-351
- [4] van Oorschot P.C.(undefined)undefined undefined undefined undefined-undefined
- [5] Weiner M.J.(undefined)undefined undefined undefined undefined-undefined
- [6] Paulson L.(undefined)undefined undefined undefined undefined-undefined