參考文獻
[1] Guillou Louis C., Quisquater Jean-Jacques, “A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory”, Advances in Cryptology-Eurocrypt ’88, Christoph G. Gunther (Ed.), Lecture Notes in Computer Science 330, Springer-Verlag, 1988, pp. 123-128.
[2] M. Girault & J. Stern, “On the length of cryptographic hash-values used in identification schemes,” Advances in Cryptology-Crypto ’94, Y. Desmedt (Ed.), Lecture Notes in Computer Science 330, Springer-Verlag, 1994, pp. 202-215.
推薦文章: