共 11 条
[1]
Verifiable threshold signature schemes against conspiracy attack[J] . Gan Yuan-ju.  Journal of Zhejiang University Science . 2004 (1)
[2]
Forgery attacks on multi-signature schemes for authenticating mobile code delegates. Chien H Y. IEEE Transactions on Vehicular Technology . 2002
[4]
Authenticated encryption schemes with low communication costs. Horster P,Michel M,Petersen H. Electronics Letters . 1994
[5]
The limited verifier signature and its application. Araki S,Uehara S,Imamura K. ICICE Transactions on Fundamentals . 1999
[6]
Authenticated key agreement protocol without using one-way function. Harn L,Lin H Y. Electronics Letters . 2001
[7]
Authenticated encryption scheme without using a one-way function. Lee W B,Chang C C. Electronics Letters . 1995
[8]
The status of MD5 after a recent attack. Dobbertin H. CryptoBytes . 1996
[9]
Verifiable threshold signature schemes against conspiracy attack. Gan Yuanju. Journal of Zhejiang University . 2004
[10]
通用电子手写签名技术研究及其应用[D]. 甘元驹.中南大学 2003