共 50 条
- [31] Quantum public-key encryption protocol based on single-photon Tongxin Xuebao/Journal on Communications, 2014, 35 : 9 - 13
- [32] A Scenario-Based Protocol Checker for Public-Key Authentication Scheme IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2009, E92D (06): : 1268 - 1279
- [33] Two-Message Authenticated Key Exchange from Public-Key Encryption COMPUTER SECURITY - ESORICS 2023, PT I, 2024, 14344 : 414 - 434
- [34] Analysis of Two Public-key Encryptions based on Lattice Problems INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2019, 19 (11): : 126 - 131
- [35] A Knapsack Public-key Cryptosystem Using Two Random Sequences 2014 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA), 2014, : 497 - 501
- [36] Protocol of two-phase handshaking security socket layer based on SWIM card public-key authentication Hsi-An Chiao Tung Ta Hsueh/Journal of Xi'an Jiaotong University, 2007, 41 (06): : 669 - 673
- [37] Comparative performance analysis of public-key cryptographic operations in the WTLS handshake protocol 2004 1st International Conference on Electrical and Electronics Engineering (ICEEE), 2004, : 124 - 129
- [38] Public-Key Infrastructure for the secure Border Gateway Protocol (S-BGP) DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL I, PROCEEDINGS, 2001, : 239 - 253
- [39] Implementation of Public-Key Infrastructure for Smart Parking System Using MQTT Protocol INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES, ICICCT 2019, 2020, 89 : 1029 - 1037