<menu id="guoca"></menu>
<nav id="guoca"></nav><xmp id="guoca">
  • <xmp id="guoca">
  • <nav id="guoca"><code id="guoca"></code></nav>
  • <nav id="guoca"><code id="guoca"></code></nav>

    參考文獻

    [1] Guillou Louis C., Quisquater Jean-Jacques, “A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory”, Advances in Cryptology-Eurocrypt ’88, Christoph G. Gunther (Ed.), Lecture Notes in Computer Science 330, Springer-Verlag, 1988, pp. 123-128.
    [2] M. Girault & J. Stern, “On the length of cryptographic hash-values used in identification schemes,” Advances in Cryptology-Crypto ’94, Y. Desmedt (Ed.), Lecture Notes in Computer Science 330, Springer-Verlag, 1994, pp. 202-215.

    本文章首發在 網安wangan.com 網站上。

    上一篇 下一篇
    討論數量: 0
    只看當前版本


    暫無話題~
    亚洲 欧美 自拍 唯美 另类