共 50 条
- [23] Threshold public key encryption scheme resilient against continual leakage without random oracles Frontiers of Computer Science, 2013, 7 : 955 - 968
- [24] Study on Secret Sharing for SM2 Digital Signature and Its Application 2018 14TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2018, : 205 - 209
- [25] Joint Signature and Encryption in the Presence of Continual Leakage INFORMATION SECURITY APPLICATIONS, WISA 2014, 2015, 8909 : 269 - 280
- [26] Efficient SM2 Hardware Design for Digital Signature of Internet of Vehicles 2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 890 - 896
- [27] Secure Multi-party SM2 Signature Based on SPDZ Protocol INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2023, PT I, 2024, 14526 : 85 - 103
- [28] Partially Known Nonces and Fault Injection Attacks on SM2 Signature Algorithm INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2013, 2014, 8567 : 343 - 358
- [29] Accelerating SM2 Digital Signature Algorithm Using Modern Processor Features INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2019), 2020, 11999 : 430 - 446
- [30] A Secure And High Concurrency SM2 Cooperative Signature Algorithm For Mobile Network 2021 17TH INTERNATIONAL CONFERENCE ON MOBILITY, SENSING AND NETWORKING (MSN 2021), 2021, : 818 - 824