Cryptographic Support for Secure Logs on Untrusted Machines
暂无分享,去创建一个
[1] Clifford Stoll,et al. The Cuckoo's Egg , 1989 .
[2] James H. Burrows,et al. Secure Hash Standard , 1995 .
[3] 염흥렬,et al. [서평]「Applied Cryptography」 , 1997 .
[4] Bruce Schneier,et al. Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish) , 1993, FSE.
[5] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[6] Bruce Schneier,et al. Automatic Event-Stream Notarization Using Digital Signatures , 1996, Security Protocols Workshop.
[7] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[8] Michael K. Reiter,et al. Distributing trust with the Rampart toolkit , 1996, CACM.
[9] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[10] Xuejia Lai,et al. Markov Ciphers and Differential Cryptanalysis , 1991, EUROCRYPT.
[11] Ross J. Anderson,et al. Robustness Principles for Public Key Protocols , 1995, CRYPTO.
[12] Ralph Howard,et al. Data encryption standard , 1987 .
[13] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[14] Bruce Schneier,et al. An authenticated camera , 1996, Proceedings 12th Annual Computer Security Applications Conference.
[15] Bart Preneel,et al. RIPEMD-160: A Strengthened Version of RIPEMD , 1996, FSE.
[16] Bruce Schneier,et al. Protocol Interactions and the Chosen Protocol Attack , 1997, Security Protocols Workshop.
[17] Hugo Krawczyk,et al. Keying Hash Functions for Message Authentication , 1996, CRYPTO.