共 50 条
- [32] On the Security Analysis of Weak Cryptographic Primitive Based Key Derivation Function INFORMATION SCIENCE AND APPLICATIONS 2017, ICISA 2017, 2017, 424 : 231 - 240
- [33] UHF RFID Information Security Transmission Technology and Application Based on Domestic Cryptographic Algorithm 2019 6TH INTERNATIONAL CONFERENCE ON BEHAVIORAL, ECONOMIC AND SOCIO-CULTURAL COMPUTING (BESC 2019), 2019,
- [34] Security evaluation of Midoril28 cryptographic algorithm under integral fault analysis Guofang Keji Daxue Xuebao/Journal of National University of Defense Technology, 2024, 46 (04): : 229 - 246
- [35] What makes a cryptographic protocol secure? The evolution of requirements specification in formal cryptographic protocol analysis PROGRAMMING LANGUAGES AND SYSTEMS, 2003, 2618 : 10 - 21
- [36] A Cryptographic Hardware Engineering Course based on FPGA and Security Analysis Equipment PROCEEDING OF THE GREAT LAKES SYMPOSIUM ON VLSI 2024, GLSVLSI 2024, 2024, : 706 - 711
- [37] Security analysis of three cryptographic schemes from other cryptographic schemes INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2005, 3822 : 290 - 301
- [38] A Secure Multi-Party Strings Sorting Protocol Based on National Cryptographic Algorithm Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2024, 46 (09): : 3763 - 3770
- [39] Formal analysis of cryptographic protocol based on intruders algorithmic knowledge logic ICEMI 2005: Conference Proceedings of the Seventh International Conference on Electronic Measurement & Instruments, Vol 7, 2005, : 530 - 533
- [40] Message format extraction of cryptographic protocol based on dynamic binary analysis 1600, Australian Computer Society (46): : 2 - 3