Implementation of an identity based encryption sub-system for secure e-mail and other applications
暂无分享,去创建一个
[1] Nigel P. Smart,et al. Cryptography: An Introduction , 2004 .
[2] John T. Kohl,et al. The Kerberos Network Authentication Service (V5 , 2004 .
[3] Vincent Rijmen,et al. Rijndael, the advanced encryption standard , 2001 .
[4] Ian F. Blake,et al. Elliptic curves in cryptography , 1999 .
[5] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[6] R. Montoro,et al. The curious incident of the dog in the night-time , 2005 .
[7] Peter C. Gutmann. Cryptographic Security Architecture: Design and Verification , 2003 .
[8] Antoine Joux,et al. A One Round Protocol for Tripartite Diffie–Hellman , 2000, Journal of Cryptology.
[9] Vincent Rijmen,et al. The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .
[10] Masao Kasahara,et al. ID based Cryptosystems with Pairing on Elliptic Curve , 2003, IACR Cryptol. ePrint Arch..
[11] Alfred Menezes,et al. Elliptic curve public key cryptosystems , 1993, The Kluwer international series in engineering and computer science.
[12] Carlisle M. Adams,et al. X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP , 1999, RFC.
[13] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[14] R Ogden,et al. An open secret. , 1997, Nursing standard (Royal College of Nursing (Great Britain) : 1987).
[15] Mark Bartel,et al. Xml-Signature Syntax and Processing , 2000 .
[16] Jon Postel,et al. Simple Mail Transfer Protocol , 1981, RFC.
[17] Wenbo Mao,et al. Modern Cryptography: Theory and Practice , 2003 .
[18] Vincent Rijmen,et al. The Block Cipher Rijndael , 1998, CARDIS.
[19] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[20] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.