1 |
A.Shamir, "ID-Based Cryptosystems and Signature Schemes", Crypto'84, pp.47-53, 1985.
|
2 |
A.Fiat and A.Shamir, "How to Prove Yourself: Practical Solution to Identification and Signature Problem", Crypto'86, Vol 263, pp.186-194, 1986
|
3 |
L.C.Guillou and J.J.Quisquater, "A Paradoxical Identity-Based Signature Scheme Resulting from Zero-Knowledge", Crypto'88, p.216-231, 1988
|
4 |
C.P.Schnorr, "Efficient Signature Generation by Smart Card", Journal of Cryptology, pp.161-174, 1991.4
|
5 |
S.H Lim, J.W Jeon, J.I Jin, O.Y Lee, "Study on NFC Security Analysis and UICC Alternative Effect", Korea Information and Communications Society, 2011
과학기술학회마을
DOI
ScienceOn
|
6 |
Ernst Haselsteiner, Klemens Breitfuss, "Security in near field communication(NFC)", Workshop on RFID Security RFIDSec, 2006
|
7 |
"Google Wallet: Security", Google, 2011
|
8 |
"MasterCard PayPass", MasterCard, 2011
|
9 |
J. Hoffstein, J. Pipher, J. H. Silverman, "NTRU : A Ring Based Public Key Cryptosystem", in Algorithmic Number Theory(ANTS III), 1998.
|
10 |
S.Goldwasser, SMicali and C.Rackoff, "The Knowled ge Complexity of Interactive Proof Systems", SIAM Journal on Computing, 18(1989), pp.186-208.
DOI
ScienceOn
|
11 |
R.L. Rivest, A. Shamir, Y. Tauman, "How to Leak a Secret", Advances in Cryptology-ASIACRYPT, 2001.
|
12 |
"A Study on the Development of Cryptosystems for the Next Generation", National Security Research Institute, 2006
|
13 |
S.Goldwasser, SMicali and C.Rackoff, "The Knowled ge Complexity of Interactive Proof Systems", SIAM Journal on Computing, 18(1989), pp.186-208.
DOI
ScienceOn
|