A Comparative Study on Digital Signatures Based on Elliptic Curves in High Speed Ad Hoc Networks
暂无分享,去创建一个
[1] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[2] N. Koblitz. A Course in Number Theory and Cryptography , 1987 .
[3] Claus-Peter Schnorr,et al. Efficient signature generation by smart cards , 2004, Journal of Cryptology.
[4] William Stallings,et al. THE ADVANCED ENCRYPTION STANDARD , 2002, Cryptologia.
[5] Rainer A. Rueppel,et al. A new signature scheme based on the DSA giving message recovery , 1993, CCS '93.
[6] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[7] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[8] R. A. Rueppel,et al. Message recovery for signature schemes based on the discrete logarithm problem , 1994, EUROCRYPT.
[9] Dan Boneh,et al. Digital Signature Standard , 2005, Encyclopedia of Cryptography and Security.
[10] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[11] Amir Hossein Jahangir,et al. Analysis of Public-Key Cryptography for Wireless Sensor Networks Security , 2008 .
[12] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[13] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[14] S. Vanstone,et al. Elliptic Curve Cryptosystems , 1993 .
[15] M. Rabin. DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION , 1979 .