On the performance, feasibility, and use of forward-secure signatures
暂无分享,去创建一个
Tal Malkin | Patrick D. McDaniel | Sugih Jamin | Eric Cronin | P. Mcdaniel | S. Jamin | T. Malkin | E. Cronin
[1] Claus-Peter Schnorr,et al. Fast Signature Generation With a Fiat Shamir-Like Scheme , 1991, EUROCRYPT.
[2] Paul C. van Oorschot,et al. Authentication and authenticated key exchanges , 1992, Des. Codes Cryptogr..
[3] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[4] David Chaum,et al. Provably Unforgeable Signatures , 1992, CRYPTO.
[5] Hugo Krawczyk,et al. Simple forward-secure signatures from any signature scheme , 2000, IACR Cryptol. ePrint Arch..
[6] Shouhuai Xu,et al. Strong Key-Insulated Signature Schemes , 2003, Public Key Cryptography.
[7] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[8] Keith Bostic,et al. The design and implementa-tion of the 4.4BSD operating system , 1996 .
[9] T. Dierks,et al. The TLS protocol , 1999 .
[10] Dawn Xiaodong Song,et al. Practical forward secure group signature schemes , 2001, CCS '01.
[11] John Viega,et al. Network Security with OpenSSL , 2002 .
[12] Ralph C. Merkle,et al. A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.
[13] Ran Canetti,et al. The random oracle methodology, revisited , 2000, JACM.
[14] Leonid Reyzin,et al. A New Forward-Secure Digital Signature Scheme , 2000, ASIACRYPT.
[15] Niels Provos,et al. Encrypting Virtual Memory , 2000, USENIX Security Symposium.
[16] Gene Itkis,et al. SiBIR: Signer-Base Intrusion-Resilient Signatures , 2002, CRYPTO.
[17] Gene Itkis,et al. Forward-Secure Signatures with Optimal Signing and Verifying , 2001, CRYPTO.
[18] Jean-Jacques Quisquater,et al. A "Paradoxical" Indentity-Based Signature Scheme Resulting from Zero-Knowledge , 1988, CRYPTO.
[19] Samuel J. Leffler,et al. The design and implementation of the 4.3 BSD Unix operating system , 1991, Addison-Wesley series in computer science.
[20] Whitfield Diffie,et al. Multiuser cryptographic techniques , 1976, AFIPS '76.
[21] Markus Jakobsson,et al. How to Forget a Secret , 1999, STACS.
[22] Mihir Bellare,et al. Forward-Security in Private-Key Cryptography , 2003, CT-RSA.
[23] Ross J. Anderson,et al. Two remarks on public key cryptology , 2002 .
[24] Mihir Bellare,et al. A Forward-Secure Digital Signature Scheme , 1999, CRYPTO.
[25] Amos Fiat,et al. How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.
[26] Ran Canetti,et al. The random oracle methodology, revisited , 2000, JACM.
[27] Peter Gutmann,et al. Secure deletion of data from magnetic and solid-state memory , 1996 .
[28] Tal Malkin,et al. Efficient Generic Forward-Secure Signatures with an Unbounded Number Of Time Periods , 2002, EUROCRYPT.
[29] 尚弘 島影. National Institute of Standards and Technologyにおける超伝導研究及び生活 , 2001 .
[30] Leonid Reyzin,et al. Forward-Secure Signatures with Fast Key Update , 2002, SCN.
[31] Shouhuai Xu,et al. Key-Insulated Public Key Cryptosystems , 2002, EUROCRYPT.