共 50 条
- [32] Detecting collusion attacks in security protocols FRONTIERS OF WWW RESEARCH AND DEVELOPMENT - APWEB 2006, PROCEEDINGS, 2006, 3841 : 297 - 306
- [33] Securing Software Cryptographic Primitives for Embedded Systems against Side Channel Attacks 2014 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2014,
- [34] Algebraic Replay Attacks on Authentication in RFID Protocols ADVANCES IN SECURITY OF INFORMATION AND COMMUNICATION NETWORKS, 2013, 381 : 153 - +
- [35] First implementation of cryptographic protocols based on algebraic number fields INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2001, 2119 : 84 - 103
- [36] Quantum communication attacks on classical cryptographic protocols: (invited talk) Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2011, 6673 LNCS
- [37] Performance Evaluations of Cryptographic Protocols Verification Tools Dealing with Algebraic Properties FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2015), 2016, 9482 : 137 - 155
- [38] Self-Guarding Cryptographic Protocols against Algorithm Substitution Attacks IEEE 31ST COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2018), 2018, : 76 - 90
- [39] Predicting New Attacks: A Case Study in Security Analysis of Cryptographic Protocols ADVANCED MULTIMEDIA AND UBIQUITOUS ENGINEERING: FUTURETECH & MUE, 2016, 393 : 263 - 270
- [40] On the security of αη: Response to 'some attacks on quantum-based cryptographic protocols' Quantum Information and Computation, 2006, 6 (07): : 561 - 582