Publisher
Springer Berlin Heidelberg
Reference14 articles.
1. Chang, C.C., Chang, Y.F.: Signing a digital signature without using one-way hash functions and message rudundancy schemes. IEEE Commun. Lett. 8(8), 485–487 (2004)
2. Fu, X.T., Xu, C.X., Xiao, G.Z.: Forgery attacks on Chang et al.’s signature scheme with message recovery, EB/OL (2004),
http://epring.iac.org/
3. Lecture Notes in Computer Science;K. Nyberg,1995
4. Shih, S.-P., Lin, C.-T., Yang, W.-B., Sun, H.-M.: Digital multisignature schemes for authenticating delegates in mobile code systems. IEEE Trans. Veh. Technol. 49, 1464–1473 (2000)
5. Hwang, S.-J., Li, E.-T.: Cryptanalysis of Shieh-Lin-Yang-Sun signature scheme. IEEE Commun. Lett. 7, 195–196 (2003)