Author:
Liu Jianghua,Xiang Yang,Zhou Wanlei,Huang Xinyi,Ma Jinhua
Reference42 articles.
1. Diffie, W., & Hellman, M. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22, 644–654.
2. Goldwasser, S., Micali, S., & Rivest, R. L. (1988). A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Computing, 17, 281–308.
3. Miyazaki, K. (2003). Digital documents sanitizing problem. IEICE Technical Report, ISEC2003–20.
4. Johnson, R., Molnar, D., Song, D., & Wagner, D. (2002). Homomorphic signature schemes. In: CT-RSA (Vol. 2271, pp. 244–262). Berlin: Springer.
5. Becker, G. (2008). Merkle signature schemes, merkle trees and their cryptanalysis. Ruhr-University Bochum, Technical Report.
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献