1 |
Krawcyzk, H., 'The Order of Encryption and Authentication for Protecting Communications', Proc. Crypto '01, 2001
|
2 |
Chokhani, S., 'Towards a national public-key infrastructure', IEEE Communications Magagine, Vol.32, No.9, pp.70-74, 1994
DOI
ScienceOn
|
3 |
Sarbari and Stephen, 'Public Key Infrastructure: Analysis of Existingand Needed Protocols and Object Formats for Key Recovery,' Computer and Security Vol.19(1), pp.56-68, April 2000
DOI
ScienceOn
|
4 |
Merkle, R., 'A Certified Digital Signature, Advances in Cryptology', CRYPTO
|
5 |
Mambo, M. and K. Usuda, and E. Okamoto, 'Proxy signatures for delegating signing operation,' in Proc. of the Third ACM Conf. on Computer and Communications Security, pp.48-57, 1996
DOI
|
6 |
Lamport, L., 'Constructing digital signatures from oneway functions', SRI intl. CSL-98, October, 1979
|
7 |
Damgard, I. B., 'Collision Free Hash Functions and Public Key Signature Schemes', Eurocrypt, 1987
|
8 |
Rompel, J., 'One-way functions are necessary and sufficient for secure signatures.', In Proceedings of the Twenty Second Annual ACM Symposium on Theory of Computing, pp.387-394, ACM Press, 1990
DOI
|
9 |
Fiat, A. and A. Shamir, 'How to prove yourself: Practical solutions to identification and signature problems', Proc. Crypto'86, pp.186-194, 1986
|
10 |
김영수, 메시지보안시스템의 인증 프로토콜 설계및 검증', 박사학위논문, 국민대학교 대학원, 2003
|
11 |
Whittle, R., Public Key Authentication Framework : Tutorial, 1996. 6
|
12 |
Fujisaki, E. and T. Okamoto, 'Secure integration of asymmetric and symmetric encryption schemes', Proc. Crypto '99 pp.537-554, 1999
|
13 |
Merkle, R. C., 'A digital signature based on a conventional encryption function,' in Advances in Cryptology-Crypto'87, pp.369-378, 1987
|
14 |
Rivest, R., A. Shamir and L. Adleman, 'A Method for Obtaining Digital Signature and Public Key Cryptosystems', Comm. of ACM, 21, pp.120-126, 1978
DOI
ScienceOn
|
15 |
Shamir, A., 'Identity-based cryptosystems and signature schemes,' In Advances in Cryptology, Crypto'84, Volume 196 of LNCS, 2001
|
16 |
Asokan, N. and G. Tsudik, and M. Waidner, 'Serversupported signatures,' Journal of Computer Security, Vol.5, No.1, 1997
|