Schnorr-Based Implicit Certification: Improving the Security and Efficiency of Vehicular Communications
暂无分享,去创建一个
[1] Daniel J. Bernstein. Multi-user Schnorr security, revisited , 2015, IACR Cryptol. ePrint Arch..
[2] Liqun Chen,et al. Certificateless Public Key Signature Schemes from Standard Algorithms , 2018, IACR Cryptol. ePrint Arch..
[3] Alfred Menezes,et al. Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.
[4] Carl Eklund,et al. National Institute for Standards and Technology , 2009, Encyclopedia of Biometrics.
[5] Frank Kargl,et al. Pseudonym Schemes in Vehicular Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.
[6] Hugo Krawczyk,et al. Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels , 2001, EUROCRYPT.
[7] Yannick Seurin,et al. On the Exact Security of Schnorr-Type Signatures in the Random Oracle Model , 2012, IACR Cryptol. ePrint Arch..
[8] Claus-Peter Schnorr,et al. Efficient signature generation by smart cards , 2004, Journal of Cryptology.
[9] William Whyte,et al. A Security Credential Management System for V2X Communications , 2018, IEEE Transactions on Intelligent Transportation Systems.
[10] L. Popa,et al. Performance Evaluation of Elliptic Curve Libraries on Automotive-Grade Microcontrollers , 2019, ARES.
[11] Jefferson E. Ricardini,et al. The Unified Butterfly Effect: Efficient Security Credential Management System for Vehicular Communications , 2018, 2018 IEEE Vehicular Networking Conference (VNC).
[12] Robert Lambert,et al. Accelerating V2X Cryptography through Batch Operations , 2019, IACR Cryptol. ePrint Arch..
[13] Zhe Liu,et al. Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for 8-bit AVR-Based Sensor Nodes , 2016, IEEE Transactions on Information Forensics and Security.
[14] Kristin E. Lauter,et al. The Elliptic Curve Discrete Logarithm Problem and Equivalent Hard Problems for Elliptic Divisibility Sequences , 2008, Selected Areas in Cryptography.
[15] Hugo Krawczyk,et al. SIGMA: The 'SIGn-and-MAc' Approach to Authenticated Diffie-Hellman and Its Use in the IKE-Protocols , 2003, CRYPTO.
[16] Diego F. Aranha,et al. Curve25519 for the Cortex-M4 and Beyond , 2017, LATINCRYPT.
[17] Scott A. Vanstone,et al. Postal Revenue Collection in the Digital Age , 2000, Financial Cryptography.
[18] Scott A. Vanstone,et al. Security of ECQV-Certified ECDSA Against Passive Adversaries , 2009, IACR Cryptol. ePrint Arch..
[19] Tyler Poling,et al. National Security Credential Management System (SCMS) Deployment Support: SCMS Baseline Summary Report , 2018 .
[20] Marcos A. Simplício,et al. Lightweight and escrow-less authenticated key agreement for the internet of things , 2017, Comput. Commun..