Combining Public-Key Encryption with Digital Signature Scheme
暂无分享,去创建一个
[1] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[2] S. K. Barton,et al. A high speed RSA processor , 1991 .
[3] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[4] Elaine B. Barker,et al. SP 800-57. Recommendation for Key Management, Part 1: General (revised) , 2007 .
[5] Roberto Giorgi,et al. Memory Performance of Public-Key cryptography Methods in Mobile Environments , 2003 .
[6] David Chaum,et al. Undeniable Signatures , 1989, CRYPTO.
[7] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[8] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[9] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[10] Mohammad A. Alia. Cryptosystems Based on Chaos Theory , 2015 .
[11] Steve Burnett,et al. RSA Security's official guide to cryptography , 2001 .
[12] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[13] William E. Burr,et al. Recommendation for Key Management, Part 1: General , 2005 .
[14] William M. Daley,et al. Digital Signature Standard (DSS) , 2000 .