On the security of the blockchain BIX protocol and certificates
暂无分享,去创建一个
Massimiliano Sala | Giancarlo Rinaldo | Riccardo Longo | Federico Pintore | Federico Pintore | M. Sala | G. Rinaldo | Riccardo Longo
[1] Alfred Menezes,et al. The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.
[2] Russ Housley,et al. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2002, RFC.
[3] N. Rosanov. Proof of existence , 2011, Nature Photonics.
[4] Raphael M. Reischuk,et al. IKP: Turning a PKI Around with Blockchains , 2016, IACR Cryptol. ePrint Arch..
[5] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[6] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[7] Shawn Wilkinson,et al. Storj A Peer-to-Peer Cloud Storage Network , 2014 .
[8] Quynh H. Dang,et al. Secure Hash Standard | NIST , 2015 .
[9] Sead Muftic,et al. BIX Certificates: Cryptographic Tokens for Anonymous Transactions Based on Certificates Public Ledger , 2016, Ledger.
[10] Pascal Paillier,et al. Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log , 2005, ASIACRYPT.
[11] M. Rabin. DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION , 1979 .
[12] Bart Preneel,et al. The State of Cryptographic Hash Functions , 1998, Lectures on Data Security.