Public key authentication schemes in asymmetric cryptography
暂无分享,去创建一个
[1] Kwangjo Kim,et al. Cryptanalysis of Lee-Hwang-Li's key authentication scheme , 2005, Appl. Math. Comput..
[2] Z. Li,et al. On the security of HY-key authentication scheme , 1999, Comput. Commun..
[3] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[4] Dawei Zhao,et al. An efficient dynamic ID-based remote user authentication scheme using self-certified public keys for multi-server environments , 2018, PloS one.
[5] Gustavus J. Simmons,et al. Contemporary Cryptology: The Science of Information Integrity , 1994 .
[6] C. V. Guru Rao,et al. Cryptanalysis of Zuhua Shao key Authentication Scheme , 2016 .
[7] Byoungcheon Lee,et al. Self-certified Signatures , 2002, INDOCRYPT.
[8] A. Peinado,et al. Cryptanalysis of LHL-key authentication scheme , 2004, Appl. Math. Comput..
[9] Cheng-Chi Lee,et al. A new key authentication scheme based on discrete logarithms , 2003, Appl. Math. Comput..
[10] Cheng-Chi Lee,et al. A secure key authentication scheme for cryptosystems based on GDLP and IFP , 2017, Soft Comput..
[11] Zuhua Shao,et al. Certificate-based verifiably encrypted RSA signatures , 2015, Trans. Emerg. Telecommun. Technol..
[12] Gwoboa Horng,et al. Key authentication scheme for cryptosystems based on discrete logarithms , 1996, Comput. Commun..
[13] Alberto Peinado. Cryptanalysis of a Key Authentication Scheme Based on the Chinese Remainder Theorem and Discrete Logarithms , 2016, SOCO-CISIS-ICEUTE.