[1]Freier A O, Karlton P, Kocher P C. The SSL protocol version 3.0[EB/OL].[19960304].http://www.freesaft.org//CIE/Topics/ssldraft/3SPEC.HTM.
[2]Dolev D, Yao A C. On the security of public key protocols[C]∥Proc of the IEEE 22nd Annual Symposium on Foundations of Computer Science,1981:350357.
[3]Dierks T, Allen C. Standards Track Request for Comments 2246[S]. The TLS protocol Version 1.0. Network Working Group, 1999.
[4]Dierks T, Rescorla E. Standards Track Request for Comments 4346[S].The transport layer security (TLS) protocol version 1.1. Network Working Group, 2006.
[5]Dierks T, Rescorla E. Standards Track Request for Comments 5246[S].The transport layer security (TLS) protocol version 1.2. Network Working Group, 2008.
[6]Khare R,Lawrence S.Standards Track Request for Comments 2817[S].Upgrading to TLS within HTTP/1.1. Network Working Group, 2000.
[7]Rescorla E. Informational Request for Comments 2818[S].HTTP Over TLS. Network Working Group, 2000.
[8]Wagner D, Schneier B. Analysis of the SSL 3.0 protocol[C]∥Proc of the 2nd USENIX Workshop on Electronic Commercem,1996:2940.
[9]Mitchell J, Shmatikov V, Stern U. Finitestate analysis of SSL 3.0[C]∥Proc of the 7th USENIX Security Symposium, 1998:201216.
[10]Paulson L C.Inductive analysis of the internet protocol TLS[J]. ACM Transactions on Computer and System Security, 1999,2(3):332351.
[11]Bleichenbacher D. Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1[C]∥Proc of CRYPTO ’98, 1998:112.
[12]Manger J.A chosen ciphertext attack on RSA optimal asymmetric encryption padding (OAEP) as standardized in PKCS#1 v2.0[C]∥Proc of CRYPTO ’01, 2001:230238. |