<menu id="guoca"></menu>
<nav id="guoca"></nav><xmp id="guoca">
  • <xmp id="guoca">
  • <nav id="guoca"><code id="guoca"></code></nav>
  • <nav id="guoca"><code id="guoca"></code></nav>

    附錄F (資料性附錄) 參考文獻

    [1]J.Brandt,I.Damgad, P.Landock and T.Pedersen, Zero-knowledge authentication scheme with sectet key exchange, in Advances in Cryptology -CRYPTO ‘88’,S.Goldwasser(editor), Springer-Verlag, Berlin (1990),pp. 583-588

    [2]C.Feige, A.Fiat and A.Shamir, Zero knowledge proofs of identity journal of Cryptology, Volume 1 (1988) pp.77-94

    [3]A.Fiat and A.Shamir, How to prove yourself: Practical solutions to identificationand signature problems, in: ‘Advances in Cryptology-CRYPTO ‘86’, A.M.Odlyzko (editor),Springer-Verlag,Berlin (1987),pp 186-194’

    [4]S.Goldwasser, S.Micali and C.Rackoff, The knowledge complexity of interactive proof systems.SIAM Joural on Computing. Volume 18(1989)pp.186-208

    [5]L.C. Guillou and J.-J.Quisquater. A practical zero-knowledge protocal fitted to security microprocessor minimizing both transmission and memory in:’Advances in Cryptology-EUROCRYPT ’88’,C.G. Gunther(editor) Springer-Verlag. Berlin (1988). Pp. 123-128.

    [6]D.E.Knuth, The art of Computer Programming, Volume 2.Addison-Wesley (2^nd^ edition,1981)

    [7]C.H.Lim and P.J.Lee.A key recovery attack on discrete log based schemes using a prime order subgroup, in: ‘Advances in Cryptology-Crypto’07’,Lecture Notes in Computer Science 1294, Springer Verlag. Berlin (1997).pp.249-263’

    [8]A.J.Menezes.. P.C van Oorschot and S.A.Vanstone, Handbook of applied cryptography. CRC Press. Boca Raton (1997).

    [9]D.Naccache. D.M’Raihi. Cryptographic smart cards. IEEE Micro. Volume 16 no.3 (June 1996)

    [10]C.P.Schnorr.Efficient iddentification and signatures for smart cards. In:’Advances in Cryptology-CRYPTO ‘89’.G.Brassard (editor),Springer-Verlag. Berlin (1990).pp.239-252.

    本文章首發在 網安wangan.com 網站上。

    上一篇 下一篇
    討論數量: 0
    只看當前版本


    暫無話題~
    亚洲 欧美 自拍 唯美 另类