Design and Implementation of the High-Speed Encryption Processing System for the Variable Sized Data in Cryptoki
暂无分享,去创建一个
[1] Chien-Lung Hsu,et al. Efficient nonrepudiable threshold proxy signature scheme with known signers against the collusion attack , 2005, Appl. Math. Comput..
[2] Siu-Ming Yiu,et al. Identity Based Delegation Network , 2005, Mycrypt.
[3] Tzong-Chen Wu,et al. Improvement of threshold proxy signature scheme , 2003, Appl. Math. Comput..
[4] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[5] John Linn,et al. Generic Security Service Application Program Interface , 1993, RFC.
[6] Torben P. Pedersen. Distributed Provers with Applications to Undeniable Signatures , 1991, EUROCRYPT.
[7] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[8] Hung-Min Sun,et al. An efficient nonrepudiable threshold proxy signature scheme with known signers , 1999, Comput. Commun..