Public-Key Cryptography
暂无分享,去创建一个
[1] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[2] M. Rabin. DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION , 1979 .
[3] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[4] Manuel Blum,et al. An Efficient Probabilistic Public-Key Encryption Scheme Which Hides All Partial Information , 1985, CRYPTO.
[5] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[6] Silvio Micali,et al. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..
[7] Moni Naor,et al. Public-key cryptosystems provably secure against chosen ciphertext attacks , 1990, STOC '90.
[8] Daniel R. Simon,et al. Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack , 1991, CRYPTO.
[9] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[10] Mihir Bellare,et al. Optimal Asymmetric Encryption , 1994, EUROCRYPT.
[11] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[12] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[13] Mihir Bellare,et al. The Exact Security of Digital Signatures - HOw to Sign with RSA and Rabin , 1996, EUROCRYPT.
[14] Daniel Bleichenbacher,et al. Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1 , 1998, CRYPTO.
[15] Eric Rescorla,et al. Diffie-Hellman Key Agreement Method , 1999, RFC.
[16] William M. Daley,et al. Digital Signature Standard (DSS) , 2000 .
[17] Oded Goldreich,et al. Foundations of Cryptography: List of Figures , 2001 .
[18] Oded Goldreich. Foundations of Cryptography: Index , 2001 .
[19] Jacques Stern,et al. RSA-OAEP Is Secure under the RSA Assumption , 2001, Journal of Cryptology.
[20] Ronald Cramer,et al. Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack , 2003, SIAM J. Comput..
[21] Jonathan Katz,et al. Introduction to Modern Cryptography: Principles and Protocols , 2007 .
[22] Yehuda Lindell,et al. Introduction to Modern Cryptography , 2004 .