References
- D. Davies and W. L. Price, The application of digital signatures based on public key cryptosystems, NPL Report DNACS 39/80, 1980.
- I.B. Damgard, "Collision free hash functions and public key signature schemes," Advances in Cryptology, Proc. Eurocrypt'87, LNCS 304, D. Chaum and W.L. Price, Eds., Springer-Verlag, 1988, pp.203-216.
- C. Mitchell, D. Rush, and M. Walker, "A remark on hash functions for message authentication," Computers & Security, vol8, 1989, pp.517-524. https://doi.org/10.1016/0167-4048(89)90081-3
- M. Naor and M. Yung, "Universal one-way hash functions and their cryptographic applications," Proc. 21st ACM Symposium on the Theory of Computing, 1990, pp.387-394.
- http://www.schneier.com/blog/archives/2005/02/cryptanalysis_o.html
- T. ElGamal , "A public key cryptosystem and a signature scheme based on discrete logarithms". IEEE Transaction of Information Theory, vol.31 (4), 1985, pp.469-472. https://doi.org/10.1109/TIT.1985.1057074
- Accredited Standards Committee X9, American National Standard X9.62-2005, Public Key Cryptography for the Financial Services Industry, The Elliptic Curve Digital Signature Algorithm (ECDSA), 2005.
- Certicom Research, Standards for efficient cryptography, SEC 1: Elliptic Curve Cryptography, Version 2.0, 2009.
- Hassan. M. Elkamchouchi, Mohamed E. Nasr, Roayat Ismail Abdelfatah, "A New Secure and Fast Hashing Algorithm (SFHA-256)", 25th National Radio Science Conference, 2008.
- Dan Boneh, Matthew Franklin, "Identity-Based Encryption from the Weil Pairing", SIAM Journal of Computing, vol32(3), 2001, pp.586-615. https://doi.org/10.1137/S0097539701398521
Cited by
- Enhanced chained and Cuckoo hashing methods for multi-core CPUs vol.17, pp.3, 2014, https://doi.org/10.1007/s10586-013-0343-y
- Distributed Risk Aversion Parameter Estimation for First-Price Auction in Sensor Networks vol.9, pp.12, 2013, https://doi.org/10.1155/2013/795630
- Server-based code obfuscation scheme for APK tamper detection vol.9, pp.6, 2016, https://doi.org/10.1002/sec.936
- Three-Factor Anonymous Authentication and Key Agreement Scheme for Telecare Medicine Information Systems vol.38, pp.12, 2014, https://doi.org/10.1007/s10916-014-0136-8
- Button-based method for the prevention of near field communication relay attacks vol.28, pp.10, 2015, https://doi.org/10.1002/dac.2751