A Modified Securities Model Based on Public Key Infrastructure
暂无分享,去创建一个
Mei Liu | Wuzheng Tan | Dan Li | Yongquan Xie | Yongquan Xie | Wuzheng Tan | Mei Liu | Dan Li
[1] Dan Boneh,et al. The Decision Diffie-Hellman Problem , 1998, ANTS.
[2] Arto Salomaa,et al. Public-Key Cryptography , 1991, EATCS Monographs on Theoretical Computer Science.
[3] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[4] Jeffrey Shallit,et al. Algorithmic Number Theory , 1996, Lecture Notes in Computer Science.
[5] Aggelos Kiayias,et al. BiTR: Built-in Tamper Resilience , 2011, IACR Cryptol. ePrint Arch..
[6] Feng Ye,et al. A Modification on Public Key Infrastructure Application , 2009, 2009 International Conference on E-Business and Information System Security.
[7] Loren M. Kohnfelder,et al. Towards a practical public-key cryptosystem. , 1978 .
[8] Mihir Bellare,et al. Relations among Notions of Security for Public-Key Encryption Schemes , 1998, IACR Cryptol. ePrint Arch..
[9] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[10] Hugo Krawczyk,et al. Advances in Cryptology - CRYPTO '98 , 1998 .
[11] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[12] Kaisa Nyberg,et al. Advances in Cryptology — EUROCRYPT'98 , 1998 .
[13] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[14] Dan Boneh,et al. Breaking RSA May Not Be Equivalent to Factoring , 1998, EUROCRYPT.
[15] Ernest F. Brickell,et al. Design Validations for Discrete Logarithm Based Signature Schemes , 2000, Public Key Cryptography.
[16] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[17] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[18] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..