相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Achieving One-Round Password-Based Authenticated Key Exchange over Lattices
Zengpeng Li et al.
IEEE TRANSACTIONS ON SERVICES COMPUTING (2022)
Anonymous Lightweight Chaotic Map-Based Authenticated Key Agreement Protocol for Industrial Internet of Things
Jangirala Srinivas et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2020)
Building and Studying a Password Store that Perfectly Hides Passwords from Itself
Maliheh Shirvanian et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2019)
Zipf's Law in Passwords
Ding Wang et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)
Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from LWE
Joppe Bos et al.
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2016)