暂无分享,去创建一个
[1] Kurt D. Zeilenga,et al. Lightweight Directory Access Protocol (LDAP) Schema Definitions for X.509 Certificates , 2006, RFC.
[2] Yuliang Zheng,et al. Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.
[3] Alfred Menezes,et al. On the Importance of Public-Key Validation in the MQV and HMQV Key Agreement Protocols , 2006, INDOCRYPT.
[4] Carlisle M. Adams,et al. X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP , 1999, RFC.
[5] Elaine B. Barker,et al. SP 800-56A. Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography (Revised) , 2007 .
[6] Hugo Krawczyk,et al. HMQV: A High-Performance Secure Diffie-Hellman Protocol , 2005, CRYPTO.
[7] Douglas R. Stinson. Cryptography: Theory and Practice, Third Edition , 2005 .
[8] Mohsen Toorani,et al. Cryptanalysis of an efficient signcryption scheme with forward secrecy based on elliptic curve , 2008, 2008 International Conference on Computer and Electrical Engineering.
[9] Kenneth H. Rosen. ELEMENTARY NUMBER THEORY AND ITS APPLICATIONS Third Edition , 2008 .
[10] Robert H. Deng,et al. A Signcryption Scheme with Signature Directly Verifiable by Public Key , 1998, Public Key Cryptography.
[11] Denis Pinkas. Delegated Path Validation and Delegated Path Discovery Protocols , 2001 .
[12] Dan Boneh,et al. Digital Signature Standard , 2005, Encyclopedia of Cryptography and Security.
[13] Mohsen Toorani,et al. Cryptanalysis of an Elliptic Curve-based Signcryption Scheme , 2010, Int. J. Netw. Secur..
[14] Hassan M. Elkamchouchi,et al. An efficient protocol for authenticated key agreement , 2011, 2011 28th National Radio Science Conference (NRSC).
[15] Raylin Tso,et al. An Improved Signcryption Scheme and Its Variation , 2007, Fourth International Conference on Information Technology (ITNG'07).
[16] Hideki Imai,et al. How to Construct Efficient Signcryption Schemes on Elliptic Curves , 1998, Inf. Process. Lett..
[17] Deep Medhi,et al. Performance analysis of IPSec protocol: encryption and authentication , 2002, 2002 IEEE International Conference on Communications. Conference Proceedings. ICC 2002 (Cat. No.02CH37333).
[18] Yupu Hu,et al. Signcryption based on elliptic curve and its multi-party schemes , 2004, InfoSecu '04.
[19] Kenneth H. Rosen. Elementary Number Theory: And Its Applications , 2010 .
[20] Burton S. Kaliski,et al. An unknown key-share attack on the MQV key agreement protocol , 2001, ACM Trans. Inf. Syst. Secur..
[21] Alfred Menezes,et al. Another look at HMQV , 2007, J. Math. Cryptol..
[22] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[23] Ren-Junn Hwang,et al. An efficient signcryption scheme with forward secrecy based on elliptic curve , 2005, Appl. Math. Comput..
[24] Maurizio Adriano Strangio. On the Resilience of Key Agreement Protocols to Key Compromise Impersonation , 2006, EuroPKI.
[25] Yuliang Zheng,et al. Encrypted Message Authentication by Firewalls , 1999, Public Key Cryptography.
[26] Russ Housley,et al. Delegated Path Validation and Delegated Path Discovery Protocol Requirements , 2001, RFC.
[27] Jordi Forné,et al. Reducing the Computational Cost of Certification Path Validation in Mobile Payment , 2007, EuroPKI.
[28] Alfred Menezes,et al. Validation of Elliptic Curve Public Keys , 2003, Public Key Cryptography.