Tài liệu tham khảo |
Loại |
Chi tiết |
1. Adams C. (1999), Understanding Public Key Infrastructures, New Riders Publishing, Indianapolis |
Sách, tạp chí |
Tiêu đề: |
Understanding Public Key Infrastructures |
Tác giả: |
Adams C |
Năm: |
1999 |
|
2. Boeyen S., Howes T. and Richard P. (1999), Internet X.509 Public Key Infrastructure Operational Protocols – LDAP2, RFC 2559 |
Sách, tạp chí |
Tiêu đề: |
Internet X.509 Public Key Infrastructure Operational Protocols – LDAP2 |
Tác giả: |
Boeyen S., Howes T. and Richard P |
Năm: |
1999 |
|
3. Boneh D. (1999), “Twenty Years of Attacks on the RSA Cryptosystem”, Notices of the American Mathematical Society, Vol. 46, No. 2, pp. 203- 213 |
Sách, tạp chí |
Tiêu đề: |
Twenty Years of Attacks on the RSA Cryptosystem"” |
Tác giả: |
Boneh D |
Năm: |
1999 |
|
4. Boyd C. (1989), Digital multisignatures, Proc. IMA Conf. Crypto. Coding, Oxford, pp. 241–246 |
Sách, tạp chí |
Tiêu đề: |
Digital multisignatures |
Tác giả: |
Boyd C |
Năm: |
1989 |
|
5. ElGamal T. (1985), “A public key cryptosystem and a signature scheme based on discrete logarithms”, IEEE Transactions on Information Theory, Vol. IT-31, No. 4, pp. 469 – 472 |
Sách, tạp chí |
Tiêu đề: |
A public key cryptosystem and a signature scheme based on discrete logarithms"” |
Tác giả: |
ElGamal T |
Năm: |
1985 |
|
6. Fegghi, J.(1999), Digital Certificates and Applied Internet Security, Addison-Wesley Longman Inc |
Sách, tạp chí |
Tiêu đề: |
Digital Certificates and Applied Internet Security |
Tác giả: |
Fegghi, J |
Năm: |
1999 |
|
7. Goldwasser S. and Bellare M. (1997), “Digital Signatures”, Lecture Notes on Cryptography 1997, pp. 96-118 |
Sách, tạp chí |
Tiêu đề: |
Digital Signatures”, "Lecture Notes on Cryptography |
Tác giả: |
Goldwasser S. and Bellare M |
Năm: |
1997 |
|
8. Goldwasser S., Micali S. and Rivest R. (1988), “A digital signature scheme secure against adaptive chosen-message attacks”, SIAM Journal of Computing, Vol.17, No. 2, pp. 281-308 |
Sách, tạp chí |
Tiêu đề: |
A digital signature scheme secure against adaptive chosen-message attacks |
Tác giả: |
Goldwasser S., Micali S. and Rivest R |
Năm: |
1988 |
|
9. Gordon D. (1993), “Discrete logarithms in GF(p) using the number field sieve”, SIAM Journal on Discrete Mathematics, (6), pp. 124-138 |
Sách, tạp chí |
Tiêu đề: |
Discrete logarithms in GF(p) using the number field sieve |
Tác giả: |
Gordon D |
Năm: |
1993 |
|
10. GOST R 34.10-94. Russian Federation Standard. Information Technology. Cryptographic data Security. Produce and check procedures of Electronic Digital Signature based on Asymmetric Cryptographic Algorithm.Government Committee of the Russia for Standards, 1994 (in Russian) |
Sách, tạp chí |
Tiêu đề: |
Produce and check procedures of Electronic Digital Signature based on Asymmetric Cryptographic Algorithm |
|
12. Housley R., Polk W., Ford W. and Solo D. (2002), Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile, RFC 3280 |
Sách, tạp chí |
Tiêu đề: |
Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile |
Tác giả: |
Housley R., Polk W., Ford W. and Solo D |
Năm: |
2002 |
|
13. Jonge W.D., Chaum D. (1986), “Attacks on Some RSA Signatures”,Advances in Cryptology, Crypto '85 proceedings, Lectures Notes In Computer Science, Vol. 218, Springer-Verlag, Berlin 1986, pp |
Sách, tạp chí |
Tiêu đề: |
Attacks on Some RSA Signatures"” |
Tác giả: |
Jonge W.D., Chaum D |
Năm: |
1986 |
|
14. Jonsson J., Kaliski B. (2003), Public-Key Cryptography Standards (PKCS)#1: RSA cryptography specifications, Version 2.1. Internet Request for Comments 3447 (RFC 3447), http://www.ietf.org |
Sách, tạp chí |
Tiêu đề: |
Public-Key Cryptography Standards (PKCS)#1: RSA cryptography specifications |
Tác giả: |
Jonsson J., Kaliski B |
Năm: |
2003 |
|
15. Kocher P. (1996), “Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems,” Proceeding of CRYPTO ’96, Springer- Verlag 1996, pp. 104-113 |
Sách, tạp chí |
Tiêu đề: |
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems |
Tác giả: |
Kocher P |
Năm: |
1996 |
|
16. Lenstra A.K. and Verheul E.R. (2000), “Selecting Cryptographic Key Sizes”, The 2000 International Workshop on Practice and Theory in Public Key Cryptography (PKC2000), Melbourne, Australia (January 2000) |
Sách, tạp chí |
Tiêu đề: |
Selecting Cryptographic Key Sizes |
Tác giả: |
Lenstra A.K. and Verheul E.R |
Năm: |
2000 |
|
17. Maurer U.M. (1995), “Fast generation of prime numbers and secure public-key cryptographic parameters”. Journal of Cryptology, 8: 123-155 |
Sách, tạp chí |
Tiêu đề: |
Fast generation of prime numbers and secure public-key cryptographic parameters |
Tác giả: |
Maurer U.M |
Năm: |
1995 |
|
18. Menezes A., Van Oorschot P. and Vanstone S. (1996), Handbook of Applied Cryptography, Boca Raton, Florida: CRC Press |
Sách, tạp chí |
Tiêu đề: |
Handbook of Applied Cryptography |
Tác giả: |
Menezes A., Van Oorschot P. and Vanstone S |
Năm: |
1996 |
|
19. National Institute of Standards and Technology, NIST FIPS PUB 186-3. Digital Signature Standard, U.S. Department of Commerce, 1994 |
Sách, tạp chí |
Tiêu đề: |
Digital Signature Standard |
|
21. Ohta K. and Okamoto T. (1999), “Multisignature schemes secure against active insider attacks”, IEICE Trans. Fundamentals, E82-A(1), pp. 21–31 |
Sách, tạp chí |
Tiêu đề: |
Multisignature schemes secure against active insider attacks |
Tác giả: |
Ohta K. and Okamoto T |
Năm: |
1999 |
|
22. Pollard J. (1978), “Monte Carlo methods for index computation mod p”, Mathematics of Computation, (32), pp. 918-924 |
Sách, tạp chí |
Tiêu đề: |
Monte Carlo methods for index computation mod p |
Tác giả: |
Pollard J |
Năm: |
1978 |
|