Acknowledgement
Supported by : 남서울대학교
References
- CISCO, "Cisco Visual Networking Index: Forecast and Methodology, 2014-2019 White Paper", 2015.
- M. Une, "The Security Evaluation of Time Stamping Schemes: The Present Situation and Studies," IMES Discussion Paper Series, Institute for Monetary and Economic Studies, 2001.
- J. Benaloh, and M. de Mare, "Efficient Broadcast Time- Stamping," Technical Report 1, 1991.
- Lamport, "Constructing Digital Signatures from a One Way Function." Computer Science Laboratory SRI International, 1979.
- Merkle, "SECRECY, AUTHENTICATION, AND PUBLIC KEY SYSTEMS", Technical Report No. 1979-1 , 1979.
- Haber, S, Stornetta, W.S, "How to Time-Stamp a Digital Document", Journal of Cryptology, 3(2): pp. 99-111, 1991. https://doi.org/10.1007/BF00196791
- Haber, S, Stornetta, W.S. "Secure names for bit-strings", Proceedings of the 4th ACM Conference: Computer & Communications Security, pp. 28-35, 1997.
- Dave Bayer. Stuart Haber, W. Scott Stornetta, "Improving the Efficiency and Reliability of Digital Time- Stamping", 1992.
- Ogawa, Mizuhito. Horita, Eiichi.Ono, Satoshi, "Proving properties of incremental Merkle trees.", Automated deduction-CADE-20, pp. 424-440, 2005.
- Buldas, Ahto, Saarepera, Mart, "On provably secure time-stamping schemes", Advances in cryptology-ASIACRYPT 2004, pp. 500-514, 2004.
- Buldas, Kroonmaa, Laanoja, "How to build global distributed hash-trees", 18th Nordic Conference, NordSec 2013, 2013.
- Intel Corporation. "Haswell Cryptographic Performance", http://www.intel.com/content/dam/www/public/us/en/documents/white-papers/haswell-cryptographic-performance-paper.pdf, July 2013.