References
- Asiacrypt '99, LNCS 1716 A signature scheme with message recovery as secure as discrete logarithm M.Abe;T.Okamoto
- Eurocrypt '96, LNCS 1070 The exact security of digital signatures: How to sign with RSA and Rabin M.Bellare;P.Rogaway
- PKC 2002, LNCS 2567 An identity-based signature from gap Diffie-Hellman groups J.C.Cha;J.H.Cheon
- U.S. National Institute of Standards and Technology Digital Signature Standard FIPS PUB 186
- Eurocrypt '91, LNCS 547 ESIGN, an efficient digital signature implementation for smart cards A.Fujioka;T.Okamoto;S.Miyaguchi
- Eurocrypt '91, LNCS 547 Self-certified public keys M.Girault
- Workshop on Cryptography and Coding On-line / off-line RSA-like M.Girault;J.C.Pailles
- Eurocrypt '88, LNCS 330 A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memeory L.C.Guillou;J.J.Quisquater
- Crypto '88, LNCS 403 A paradoxical identity-based signature scheme resulting from zero-knowledge L.C.Guillou;J.J.Quisquater
- Computer Networks Magazine v.36 Cryptographic authentication protocols for smart cards L.C.Guillou;M.Ugon;J.J.Quisquater https://doi.org/10.1016/S1389-1286(01)00165-7
- SAC 2002, LNCS 2595 Efficient identity based signature schemes based on pairings F.Hess
- ISO/IEC JTC1/SC27 Infromation technology - Security techniques - Digital recovery - Part 2: Integer factorization based mechanisms (revision) ISO/IEC IS 9796-2
- ISO/IEC JTC1/SC27 Infromation technology - Security techniques - Digital signature schemes giving message recovery - Part 3: Discrete logarithm based mechanisms ISO/IEC IS 9796-3
- ISO/IEC JTC1/SC27 Infromation technology - Security techniques - Digital signature schemes giving message recovery - Part 3: Discrete logarithm based mechanisms (revision) ISO/IEC 1st WD 9796-3
- ISO/ICE JTC1/SC27 Infromation technology - Security techniques - Digital signatures with appendix - Part 3: General ISO/IEC IS 14888-1
- ISO/ICE JTC1/SC27 Infromation technology - Security techniques - Digital signatures with appendix - Part 2: Identity-based mechanisms ISO/IEC IS 14888-2
- ISO/ICE JTC1/SC27 Infromation technology - Security techniques - Digital signatures with appendix - Part 2: Certificate-based mechanisms ISO/IEC IS 14888-3
- ISO/ICE JTC1/SC27 Infromation technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms (revision) ISO/IEC 1st WD 14888-2
- ISO/ICE JTC1/SC27 Infromation technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms (revision) ISO/IEC 1st WD 14888-3
- ISO/ICE JTC1/SC27 Infromation technology - Security techniques - Cryptographic techniques based on elliptic curves: Part 2 - Digital signatures ISO/IEC IS 15946-2
- ISO/ICE JTC1/SC27 Infromation technology - Security techniques - Cryptographic techniques based on elliptic curves: Part 4 - Digital signatures giving message recovery ISO/IEC FDIS 15946-4
- IEICE Trans. Fundamentals v.E80-A no.11 Another Countermeasure to Forgeries A.Miyaji
- Designs Codes and Cryptography v.7 Message recovery for signature schemes based on the discrete logarithm problem K.Nyberg;R.A.Rueppel
- Eurocrypt '98, LNCS 1403 Security analysis of a practical on the fly authentication and signature generation G.Poupard;J.Stern
- Technical Report MIT/LCS/TR-212, MIT Laboratory for Computer Science Digital signatures and public-key functions as intractable as factorization M.O.Rabin
- Communications of the ACM no.21-2 A method for obtaining digital signatures and public-key cryptosystems R.L.Rivest;A.Shamir;L.Adleman
- 한국정보통신기술협회(TTA) 부가형 전자서명 방식 표준 - 제2부 : 인증서 기반 전자서명 알고리즘 TTAS.KO-12.0001/R1
- 한국정보통신기술협회(TTA) 부가형 전자서명 방식 표준 - 제3부 : 타원곡선을 이용한 인증서 기반 전자서명 알고리즘 TTAS.KO-12.0015