On the Elliptic Curve Digital Signature Algorithm
暂无分享,去创建一个
廖宏梓 | 沈淵源 | H. Liao | Yuanqi Shen | 廖宏梓 | 沈淵源 | Hung-Zih Liao | Yuan-Yuan Shen
[1] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[2] M. Rabin. DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION , 1979 .
[3] S. Goldwasser,et al. A digital signature scheme against adaptive chosen message attack , 1988 .
[4] James H. Burrows,et al. Secure Hash Standard , 1995 .
[5] Alfred Menezes,et al. Entity Authentication and Authenticated Key Transport Protocols Employing Asymmetric Techniques , 1997, Security Protocols Workshop.
[6] Alfred Menezes,et al. The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.
[7] 尚弘 島影. National Institute of Standards and Technologyにおける超伝導研究及び生活 , 2001 .
[8] Claus-Peter Schnorr,et al. Efficient signature generation by smart cards , 2004, Journal of Cryptology.
[9] Jorge Luis Villar,et al. Evaluating elliptic curve based KEMs in the light of pairings , 2004, IACR Cryptol. ePrint Arch..
[10] Elaine B. Barker,et al. Recommendation for key management: , 2019 .