Author:
Krzywiecki Łukasz,Bobowski Adam,Słowik Marta,Słowik Marcin,Kozieł Patryk
Subject
Computer Networks and Communications
Reference39 articles.
1. Charm: a framework for rapidly prototyping cryptosystems;Akinyele;J. Cryptograph. Eng.,2013
2. Probabilistic key distribution in vehicular networks with infrastructure support;Almeida,2012
3. Leakage-resilient public-key cryptography in the bounded-retrieval model;Alwen,2009
4. Subversion-resilient signature schemes;Ateniese,2015
5. Stealthy dopant-level hardware trojans: extended version;Becker;J. Cryptograph. Eng.,2014
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Multi-Signature Scheme Resistant to Randomness Injection Attacks - A Bitcoin Case;2021 IEEE 20th International Symposium on Network Computing and Applications (NCA);2021-11-23
2. Certificateless Multi-Party Authenticated Encryption Mitigating Ephemeral Key Leakage;2021 IEEE 20th International Symposium on Network Computing and Applications (NCA);2021-11-23