<menu id="guoca"></menu>
<nav id="guoca"></nav><xmp id="guoca">
  • <xmp id="guoca">
  • <nav id="guoca"><code id="guoca"></code></nav>
  • <nav id="guoca"><code id="guoca"></code></nav>

    參考文獻

    [1] ISO/IEC 14888-1, Information technology — Security techniques — Digital signatures with appendix —Part 1: General

    [2] M. ABE and T. OKAMOTO, “A signature scheme with message recovery as secure as discrete

    logarithm,” Advances in Cryptology — Asiacrypt’99, Lecture Notes in Computer Science 1716,pp. 378-389, Springer-Verlag, 1999

    [3] ANSI X9.62-1999, Public Key Cryptography For The Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA), 1999

    [4] ANSI X9.63-1999, Public Key Cryptography For The Financial Services Industry: Elliptic Curve KeyAgreement and Transport Protocols, 1999

    [5] IEEE Std 1363-2000, IEEE Standard Specifications for Public-Key Cryptography

    [6] C. H. LIM and P. J. LEE, “A study on the proposed Korean digital signature algorithm,” Advances in Cryptology — Asiacrypt’98, Lecture Notes in Computer Science 1514, pp 175-186, Springer-Verlag, 1998

    [7] A. J. MENEZES, P. C. VAN OORSCHOT and S. A. VANSTONE, “Handbook of applied cryptography,” CRC Press, 1997

    [8] A. MIYAJI, “Another Countermeasure to Forgeries over Message Recovery Signature,” IEICE Trans.,Fundamentals, vol. E80-A, No.11, pp 2192-2200, 1997

    [9] K. NYBERG and R. A. RUEPPEL, “Message recovery for signature schemes based on the discrete

    logarithm problem,” Designs, Codes and Cryptography, 7, pp 61-81, 1996

    [10] L. PINTSOV and S. VANSTONE, “Postal Revenue Collection in the Digital Age,” Proceedings of the Fourth International Financial Cryptography Conference, 2000

    [11] D. H. YUM, S. G. SIM and P. J. LEE, “New Signature Schemes Giving Message Recovery Based on EC-KCDSA,” Proceedings of the 12th Conference on Information Security and Cryptology (CISC), 2002

    本文章首發在 網安wangan.com 網站上。

    上一篇 下一篇
    討論數量: 0
    只看當前版本


    暫無話題~
    亚洲 欧美 自拍 唯美 另类