排序方式: 共有1条查询结果,搜索用时 31 毫秒
1
1.
Designs, Codes and Cryptography - With the development of side-channel attacks, a necessity arises to invent authenticated key exchange protocols in a leakage-resilient manner. Constructing... 相似文献
1