SP 800-32. Introduction to Public Key Technology and the Federal PKI Infrastructure
暂无分享,去创建一个
D. Richard Kuhn | Vincent C. Hu | Shu-jen H. Chang | W. Timothy Polk | D. R. Kuhn | W. Polk | D. R. Kuhn | David R. Kuhn | Vincent C. Hu | W. T. Polk | Shu-Jen Chang
[1] Kathy Lyons-Burke. Federal Agency Use of Public Key Technology for Digital Signatures and Authentication , 2000 .
[2] William E. Burr,et al. Minimum Interoperability Specification for PKI Components (MISPC), Version 1 | NIST , 1998 .
[3] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[4] Annabelle Lee,et al. Guideline for Implementing Cryptography in the Federal Government , 1999 .
[5] William E. Burr,et al. MISPC Minimum Interoperability Specification for PKI Components, Version 1 , 1998 .
[6] David A. Cooper,et al. A model of certificate revocation , 1999, Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99).
[7] T. Moses,et al. TRUST MANAGEMENT IN THE PUBLIC-KEY INFRASTRUCTURE , 1999 .
[8] Russell Housley,et al. Planning for PKI: Best Practices Guide for Deploying Public Key Infrastructure , 2001 .
[9] Hugo Krawczyk,et al. HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.
[10] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.