Author:
Szőllősi Loránd,Marosits Tamás,Fehér Gábor,Recski András
Publisher
Springer Berlin Heidelberg
Reference29 articles.
1. Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C. John Wiley & Sons, Inc., New York (1993)
2. Rivest, R.L., Shamir, A., Adelman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. Technical Report MIT/LCS/TM-82 (1977)
3. Cooper, D., Santesson, S., Farrell, S., Boeyen, S., Housley, R., Polk, W.: Internet x.509 public key infrastructure certificate and certificate revocation list (crl) profile (internet-draft) (2006), http://www.ietf.org/internet-drafts/draft-ietf-pkix-rfc3280bis-06.txt
4. Courtois, N.T., Goubin, L., Patarin, J.: Sflashv3, a fast asymmetric signature scheme. Cryptology ePrint Archive, Report 2003/211 (2003), http://eprint.iacr.org/
5. Lecture Notes in Computer Science;H. Gilbert,2002
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. How to encrypt a graph;International Journal of Parallel, Emergent and Distributed Systems;2018-11-21