Tài liệu tham khảo |
Loại |
Chi tiết |
[1] M. Bellare and P. Rogaway, Random oracles are practical: a paradigm for designing efficient protocol. In: Proceedings of the first annual conference on Computer and Communications Security, ACM, 1993, pp.62-73 |
Sách, tạp chí |
Tiêu đề: |
Random oracles are practical: a paradigm for designing efficient protocol |
|
[2] M. Bellare and P. Rogaway, Optimal asymmetric encryption - how to encrypt with RSA'. In: A |
Sách, tạp chí |
Tiêu đề: |
Optimal asymmetric encryption - how to encrypt with RSA' |
|
[3] M. Bellare and P. Rogaway, The exact security of digital signatures: How to sign with RSA and Rabin. In: U.M. Maurer (editor), Advances in Cryptology - Eurocrypt '96, Lecture Notes in Computer Science 1070 (1996), Springer-Verlag, pp.399-416 |
Sách, tạp chí |
Tiêu đề: |
The exact security of digital signatures: How to sign with RSA and Rabin |
Tác giả: |
M. Bellare and P. Rogaway, The exact security of digital signatures: How to sign with RSA and Rabin. In: U.M. Maurer (editor), Advances in Cryptology - Eurocrypt '96, Lecture Notes in Computer Science 1070 |
Năm: |
1996 |
|
[4] J.-S. Coron, On the exact security of full domain hashing. In: M. Bellare (editor), Advances in Cryptology - Crypto 2000, Lecture Notes in Computer Science 1880 (2000), Springer-Verlag, pp.229-235 |
Sách, tạp chí |
Tiêu đề: |
On the exact security of full domain hashing |
Tác giả: |
J.-S. Coron, On the exact security of full domain hashing. In: M. Bellare (editor), Advances in Cryptology - Crypto 2000, Lecture Notes in Computer Science 1880 |
Năm: |
2000 |
|
[5] J.-S. Coron, D. Naccache, and J.P. stern, On the security of RSA padding. In: M.J. Wiener (editor), Advances in Cryptology - Crypto '99, Lecture Notes in Computer Science 1666, (1999) , Springer-Verlag, pp.1-18 |
Sách, tạp chí |
Tiêu đề: |
On the security of RSA padding |
|
[6] J.-S. Coron, D. Naccache, M. Tibouchi, and R.-P. Weinmann. Practical Cryptanalysis of ISO 9796-2 and Europay-Mastercard-Visa Signatures. In: S. Halevi (editor), Advances in Cryptology - Crypto 2009, Lecture Notes in Computer Science 5677 (2009), Springer-Verlag, pp.428-444 |
Sách, tạp chí |
Tiêu đề: |
Practical Cryptanalysis of ISO 9796-2 and Europay-Mastercard-Visa Signatures |
Tác giả: |
J.-S. Coron, D. Naccache, M. Tibouchi, and R.-P. Weinmann. Practical Cryptanalysis of ISO 9796-2 and Europay-Mastercard-Visa Signatures. In: S. Halevi (editor), Advances in Cryptology - Crypto 2009, Lecture Notes in Computer Science 5677 |
Năm: |
2009 |
|
[7] M. Girault and J.-F. Misarsky, Cryptanalysis of countermeasures proposed for repairing ISO 9796-1. In: B. Preneel (editor), Advances in Cryptology - Eurocrypt 2000, Lecture Notes in Computer Science 1807 (2000), Springer-Verlag, pp.81-90 |
Sách, tạp chí |
Tiêu đề: |
Cryptanalysis of countermeasures proposed for repairing ISO 9796-1 |
Tác giả: |
M. Girault and J.-F. Misarsky, Cryptanalysis of countermeasures proposed for repairing ISO 9796-1. In: B. Preneel (editor), Advances in Cryptology - Eurocrypt 2000, Lecture Notes in Computer Science 1807 |
Năm: |
2000 |
|
[8] F. Grieu, A chosen messages attack on the ISO/IEC 9796-1 signature scheme. In: B. Preneel (editor), Advances in Cryptology - Eurocrypt 2000, Lecture Notes in Computer Science 1807 (2000) , Springer-Verlag, pp.70-80 |
Sách, tạp chí |
Tiêu đề: |
A chosen messages attack on the ISO/IEC 9796-1 signature scheme |
|
[10] IEEE Std 1363a-2004, Standard specifications for public key cryptography - Amendment 1: Additional techniques |
Sách, tạp chí |
Tiêu đề: |
Standard specifications for public key cryptography - Amendment 1 |
|
[15] J. Jonsson, Security proofs for the RSA-PSS signature scheme and its variants. Proceedings of the 2nd NESS/E Workshop, Royal Holloway, University of London, September 2001. Full version available in IACR cryptology archive 2001/053 |
Sách, tạp chí |
Tiêu đề: |
Security proofs for the RSA-PSS signature scheme and its variants |
|
[16] B. Kaliski, On hash function firewalls in signature schemes. In: B. Preneel (editor) |
Sách, tạp chí |
Tiêu đề: |
On hash function firewalls in signature schemes |
|
[11] ISO/IEC 9796-3:2006, Information technology - Security techniques - Digital signature schemes giving message recovery - Part 3: Discrete logarithm based mechanisms |
Khác |
|
[12] ISO/IEC 9797-2:2002, Information technology - Security techniques - Message Authentication Codes (MACS) - Part 2: Mechanisms using a dedicated hash-function |
Khác |
|
[13] TCVN 11817-1:19971), Information technology - Security techniques - Entity authentication - Part 1: General |
Khác |
|
[14] TCVN 12214 (all parts), Information technology - Security techniques - Digital signatures with appendix |
Khác |
|