Computer Science ›› 2014, Vol. 41 ›› Issue (Z6): 369-373.
Previous Articles Next Articles
SUN Ling,TIAN Yuan and HUANG Hou-biao
[1] 郑博,张衡阳,等.航空自组网贪婪地理路由协议研究[J].传感器与微系统,2012,1(5):23-25 [2] Al-Riyami S S,Paterson K.Certificateless public key cryptography [C]∥Asiacrypt’2003(LNCS 2894).Springer-Verlag,2003:452-473 [3] Wu C H,Chen Z X.A new efficient certificateless signcryption scheme[C]∥Preceedings of the ISISE2008.2008:661-664 [4] Yuan Y M,Li D,Tian L W,et al.Certificateless signaturescheme without random oracles[C]∥Park J H,et a1.eds.Proc.of the ISA2009(LNCS5576).Heidelberg:Springer-Verlag,2009:31-40 [5] 张福泰,孙银霞,等.无证书公钥密码体制研究[J].软件学报,2011,2(6):1317-1332 [6] Lippold G,Boyd C,Gonzalez NJM.Strongly secure certificateless key agreement[C]∥Shacham H,Waters B,eds.Proc.of the Pairing-Based Cryptography-Pairing 2009.LNCS5671,Heidelberg:Springer-Verlag,2009:206-230 [7] Gao Meng,Zhang Fu-tai.Key-compromise impersonation at-tacks on some certificateless key agreement protocols and two improved protocols[C]∥Proc.of the 1stInternational Workshop on Education Technology and Computer Science.2009:62-66 [8] MIRACL.Multiprecision integer and rational arithmetic C/C++library.http://indigo.ie/mscott/ [9] 刘文浩,许春香.无证书两方密钥协商方案[J].软件学报,2011,2(11):2843-2852 [10] 候爱琴,高宝建,等.基于椭圆曲线的一种高效率数字签名[J].计算机应用与软件,2009,6(2):58-71 [11] Andrew C,Zhao Y L.Digital signatures from challenge-divided sigma-protocols.Proc.of the IACR Cryptology ePrint Archive,2012 |
No related articles found! |
|