Secure Implementation of Identification Systems 1
暂无分享,去创建一个
[1] Jerome H. Saltzer,et al. On digital signatures , 1978, OPSR.
[2] Samy Bengio,et al. Special Uses and Abuses of the Fiat-Shamir Passport Protocol , 1987, CRYPTO.
[3] Gustavus J. Simmons,et al. The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.
[4] J. Levine,et al. The Hill cryptographic system with unknown cipher alphabet but known plaintext , 1984 .
[5] Yvo Desmedt,et al. Public-Key Systems Based on the Difficulty of Tampering (Is There a Difference Between DES and RSA?) , 1986, CRYPTO.
[6] Silvio Micali,et al. The Knowledge Complexity of Interactive Proof Systems , 1989, SIAM J. Comput..
[7] Amos Fiat,et al. How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.
[8] Butler W. Lampson,et al. A note on the confinement problem , 1973, CACM.
[9] P. D. Merillat. Secure stand alone positive personnel identity verification system (SSA-PPIV) , 1979 .
[10] Gilles Brassard,et al. How to Improve Signature Schemes , 1990, EUROCRYPT.
[11] J. Conway. On Numbers and Games , 1976 .
[12] Amos Fiat,et al. Zero Knowledge Proofs of Identity , 1987, STOC.
[13] M. Rabin. DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION , 1979 .
[14] Amos Fiat,et al. Zero-knowledge proofs of identity , 1987, Journal of Cryptology.
[15] Silvio Micali,et al. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..