[1]冯登国, 张敏, 张妍. 云计算安全研究[J]. 软件学报, 2011, 22(1): 7183
[2]Thakur J, Kumar N. DES and AES and blowfish, symmetric key cryptography algorithms simulation based performance analysis[J]. International Journal of Emerging Technology and Advanced Engineering, 2011, 11(2): 612
[3]Sun X R, Lai X J. The key dependent attack on blockciphers[C] //Proc of ASMCRYPT2009. Berlin: Spring, 2009: 1936
[4]Fujisaki E, Okamoto T. Secure integration of asymmetric and symmetric encryption schemes[J]. Journal of Cryptology, 2013, 26(1): 80101
[5]Ma A G, Cheng Y, Xing Z C. Accurate and simplified prediction of AVF for delay and energy efficient cache design[J]. Journal of Computer Science and Technology, 2011, 26(3): 504519
[6]国家密码管理局. SM2椭圆曲线公钥密码算法[EB/OL]. 2010 [2018-03-15]. http://www.oscca.gov.cn/News/201012/News_1197.Htm
[7]国家密码管理局. GM/T 0004—2012信息安全技术SM3密码杂凑算法[S/OL]. 2012 [2018-03-15]. http://www.oscca.gov.cn/UpFile/2010122214187786.pdf
[8]国家密码管理局. 国家密码管理局公告(第7号)[EB/OL].[2018-03-15]. http://www.oscca.gov.cn/News/200709/News 1105.htm
[9]黄汝维, 桂小林, 余思, 等. 云环境中支持隐私保护的可计算加密方法[J]. 计算机学报, 2011, 34(12): 23912402
[10]Ateniese G, Fu K, Green M, et al. Improved proxy re-encryption schemes with applications to secure distributed storage[J]. ACM Trans on Information and System Security, 2006, 9(I): 130
[11]Kamara S, Lauter K. Cryptographic cloud storage[C] //Proc of the 14th Int Conf on Financial Cryptography and Data Security. Berlin: Springer, 2010: 136149