共 50 条
- [1] On the Security Analysis of Weak Cryptographic Primitive Based Key Derivation Function INFORMATION SCIENCE AND APPLICATIONS 2017, ICISA 2017, 2017, 424 : 231 - 240
- [2] Docurity: A New Cryptographic Primitive for Collaborative Cloud Systems INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2023, 36 (03): : 3725 - 3742
- [3] An adaptive intrusion-tolerant approach to protecting operation security of cryptographic protocols Gaojishu Tongxin/Chinese High Technology Letters, 2009, 19 (07): : 706 - 712
- [4] On tolerant cryptographic constructions TOPICS IN CRYPTOLOGY - CT-RSA 2005, PROCEEDINGS, 2005, 3376 : 172 - 190
- [6] Controlled operations as a cryptographic primitive INFORMATION ASSURANCE IN COMPUTER NETWORKS: METHODS, MODELS AND ARCHITECTURES FOR NETWORK SECURITY, PROCEEDINGS, 2001, 2052 : 230 - 241
- [7] Universally composable security: A new paradigm for cryptographic protocols 42ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2001, : 136 - 145