An Analysis of Proxy Signatures: Is a Secure Channel Necessary?
暂无分享,去创建一个
[1] Dongho Won,et al. Proxy signatures, Revisited , 1997, ICICS.
[2] Byoungcheon Lee,et al. Secure Mobile Agent Using Strong Non-designated Proxy Signature , 2001, ACISP.
[3] Byoungcheon Lee,et al. Strong Proxy Signature and its Applications , 2000 .
[4] Jacques Stern,et al. Security Proofs for Signature Schemes , 1996, EUROCRYPT.
[5] Hugo Krawczyk,et al. LFSR-based Hashing and Authentication , 1994, CRYPTO.
[6] Hugo Krawczyk,et al. MMH: Software Message Authentication in the Gbit/Second Rates , 1997, FSE.
[7] Hugo Krawczyk,et al. UMAC: Fast and Secure Message Authentication , 1999, CRYPTO.
[8] Germán Sáez,et al. Fully Distributed Proxy Signature Schemes , 2002, IACR Cryptol. ePrint Arch..
[9] M. Mambo,et al. Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .
[10] Larry Carter,et al. Universal Classes of Hash Functions , 1979, J. Comput. Syst. Sci..
[11] Phillip Rogaway,et al. Fast Universal Hashing with Small Keys and No Preprocessing: The PolyR Construction , 2000, ICISC.
[12] Phillip Rogaway,et al. Software-optimized universal hashing and message authentication , 2000 .
[13] Patrick Horster,et al. Self-certified keys — Concepts and Applications , 1997 .
[14] I. Damgård,et al. Average case error estimates for the strong probable prime test , 1993 .
[15] Takeshi Okamoto,et al. Extended Proxy Signatures for Smart Cards , 1999, ISW.