附錄F (資料性附錄) 參考文獻
[1]J.Brandt,I.Damgad, P.Landock and T.Pedersen, Zero-knowledge authentication scheme with sectet key exchange, in Advances in Cryptology -CRYPTO ‘88’,S.Goldwasser(editor), Springer-Verlag, Berlin (1990),pp. 583-588
[2]C.Feige, A.Fiat and A.Shamir, Zero knowledge proofs of identity journal of Cryptology, Volume 1 (1988) pp.77-94
[3]A.Fiat and A.Shamir, How to prove yourself: Practical solutions to identificationand signature problems, in: ‘Advances in Cryptology-CRYPTO ‘86’, A.M.Odlyzko (editor),Springer-Verlag,Berlin (1987),pp 186-194’
[4]S.Goldwasser, S.Micali and C.Rackoff, The knowledge complexity of interactive proof systems.SIAM Joural on Computing. Volume 18(1989)pp.186-208
[5]L.C. Guillou and J.-J.Quisquater. A practical zero-knowledge protocal fitted to security microprocessor minimizing both transmission and memory in:’Advances in Cryptology-EUROCRYPT ’88’,C.G. Gunther(editor) Springer-Verlag. Berlin (1988). Pp. 123-128.
[6]D.E.Knuth, The art of Computer Programming, Volume 2.Addison-Wesley (2^nd^ edition,1981)
[7]C.H.Lim and P.J.Lee.A key recovery attack on discrete log based schemes using a prime order subgroup, in: ‘Advances in Cryptology-Crypto’07’,Lecture Notes in Computer Science 1294, Springer Verlag. Berlin (1997).pp.249-263’
[8]A.J.Menezes.. P.C van Oorschot and S.A.Vanstone, Handbook of applied cryptography. CRC Press. Boca Raton (1997).
[9]D.Naccache. D.M’Raihi. Cryptographic smart cards. IEEE Micro. Volume 16 no.3 (June 1996)
[10]C.P.Schnorr.Efficient iddentification and signatures for smart cards. In:’Advances in Cryptology-CRYPTO ‘89’.G.Brassard (editor),Springer-Verlag. Berlin (1990).pp.239-252.
推薦文章: