Reference32 articles.
1. Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Ingo. Theor. 31, 644–654 (1976)
2. Desmedt, Y., Frankel, Y.: Shared generation of authenticators and signatures. In: Proceedings of Advances in Cryptology—Crypto 91, pp. 457–469. Springer, New York (1991)
3. Lim, C.H., Lee, P.J.: Security protocol. In: Proceedings of International Workshop, LNCS, vol. 1189. Springer, Cambridge, United Kingdom (1996)
4. Lim, C.H., Lee, P.J.: Modified Maurer-Yacobi, scheme and its applications. In: Advance in Cryptology—Auscrypt, LNCS, vol. 718, pp. 308–323 (1993)
5. Boyar, J., Chaum D., Damgard, I., Pederson, T.: Convertible undeniable signatures. In: Advances in Cryptology—Crypto 90, LNCS, vol. 537, pp. 189–205 (1991)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献