Remote auditing of software outputs using a trusted coprocessor
暂无分享,去创建一个
[1] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[2] David Chaum,et al. Wallet Databases with Observers , 1992, CRYPTO.
[3] 염흥렬,et al. [서평]「Applied Cryptography」 , 1997 .
[4] Joan Feigenbaum,et al. Advances in Cryptology-Crypto 91 , 1992 .
[5] Gustavus J. Simmons,et al. The Smart Card: A Standardized Security Device Dedicated to Public Cryptology , 1992 .
[6] Bruce Schneier,et al. Authenticating Outputs of Computer Software Using a Cryptographic Coprocessor , 1996, CARDIS.
[7] Ralph Howard,et al. Data encryption standard , 1987 .
[8] Gustavus J. Simmons,et al. Contemporary Cryptology: The Science of Information Integrity , 1994 .
[9] Xuejia Lai,et al. Markov Ciphers and Differential Cryptanalysis , 1991, EUROCRYPT.
[10] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[11] Bennet S. Yee,et al. Secure Coprocessors in Electronic Commerce Applications , 1995, USENIX Workshop on Electronic Commerce.
[12] Bruce Schneier,et al. A Peer-to-Peer Software Metering System , 1999 .
[13] Bruce Schneier,et al. Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish) , 1993, FSE.
[14] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.