Author:
Ruan Ou,Zhang Mingwu,Chen Jing
Publisher
Springer International Publishing
Reference32 articles.
1. Chen, C.S., Wang, T., Tian, J.: Improving timing attack on RSA-CRT via error detection and correction strategy. Inf. Sci. 232, 464–474 (2013)
2. Krawczyk, H.: On extract-then-expand key derivation functions and an HMAC based KDF (2008).
http://webee.technion.ac.il/~hugo/kdf/kdf.pdf
3. Lecture Notes in Computer Science;F Davì,2010
4. Dziembowski, S., Faust, S.: Leakage-resilient cryptography from the inner-product extractor. In: Lee, D.H., Wang, X.Y., (eds.) Asiacrypt 2011, Seoul, South Korea, pp. 702–721 (2011)
5. Bellovin, S.M., Merritt, M.: Encrypted key exchange: password-based protocols secure against dictionary attacks. In: Proceedings of IEEE Symposium on Security & Privacy, Oakland, California pp. 72–84. IEEE Computer Society Press (1992)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献