共 50 条
- [31] A Simple Secret Sharing Scheme Using a Key and its Security against Substitution of Shares 2010 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, 2010, : 2483 - 2487
- [33] Security Analysis of the First Certificateless Proxy Signature Scheme against Malicious-But-Passive KGC Attacks Liu, Peishun (liups@ouc.edu.cn), 1600, Oxford University Press (64): : 653 - 660
- [34] Security Analysis of the First Certificateless Proxy Signature Scheme Against Malicious-But-Passive KGC Attacks COMPUTER JOURNAL, 2021, 64 (04): : 653 - 660
- [35] Study on Secret Sharing for SM2 Digital Signature and Its Application 2018 14TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2018, : 205 - 209
- [37] Efficient SM2 Hardware Design for Digital Signature of Internet of Vehicles 2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 890 - 896
- [38] An improved defense scheme against attacks on wireless security 2007 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-3, 2007, : 986 - 989
- [39] Security of Public Key Encryption Against Resetting Attacks PROGRESS IN CRYPTOLOGY - INDOCRYPT 2020, 2020, 12578 : 508 - 528