冰雹 发表于 2025-4-1 04:33:05

Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA,very-restricted computing power and built-in memory capacity; (2) the counterpart servers have enormous computing power, but they are not perfectly secure; (3) neither PKI (Public Key Infrastructures) nor TRM (Tamper-Resistant Modules) is available..Our main goal of this paper is to provide its secu
页: 1 2 3 4 5 6 [7]
查看完整版本: Titlebook: Applied Cryptography and Network Security; Third International John Ioannidis,Angelos Keromytis,Moti Yung Conference proceedings 2005 Spri