ISO/IEC JTC 1/SC 27 Information technology - Security techniques Secretariat: DIN, Germany
暂无分享,去创建一个
[1] Eli Biham,et al. New types of cryptanalytic attacks using related keys , 1994, Journal of Cryptology.
[2] Paul C. van Oorschot,et al. A Known Plaintext Attack on Two-Key Triple Encryption , 1991, EUROCRYPT.
[3] Gerhard Goos,et al. Fast Software Encryption , 2001, Lecture Notes in Computer Science.
[4] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[5] Stuart Haber,et al. Improving the Efficiency and Reliability of Digital Time-Stamping , 1993 .
[6] Arjen K. Lenstra,et al. Selecting Cryptographic Key Sizes , 2000, Public Key Cryptography.
[7] Paul E. Hoffman,et al. Determining Strengths For Public Keys Used For Exchanging Symmetric Keys , 2004, RFC.