메뉴 건너뛰기




Volumn 3531, Issue , 2005, Pages 138-150

Digital signatures do not guarantee exclusive ownership

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; DATA REDUCTION; PUBLIC KEY CRYPTOGRAPHY;

EID: 26444580274     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/11496137_10     Document Type: Conference Paper
Times cited : (11)

References (13)
  • 1
    • 0011255177 scopus 로고    scopus 로고
    • Internet X.509 public key infrastructure, certificate and Certificate Revocation List (CRL) Profile
    • April
    • Internet X.509 Public Key Infrastructure, Certificate and Certificate Revocation List (CRL) Profile, R. Housley, W. Polk, W. Ford and D. Solo, RFC 3280, April 2002.
    • (2002) RFC , vol.3280
    • Housley, R.1    Polk, W.2    Ford, W.3    Solo, D.4
  • 2
    • 26444510202 scopus 로고    scopus 로고
    • On the soundness of certificate validation in X.509 and PKIX
    • to appear in
    • On the Soundness of Certificate Validation in X.509 and PKIX, T. Pornin and J. P. Stern, to appear in EuroPKI 2005.
    • EuroPKI 2005
    • Pornin, T.1    Stern, J.P.2
  • 3
    • 2442476755 scopus 로고    scopus 로고
    • Public-key Cryptography Standards (PKCS) #1: RSA cryptography specifications version 2.1
    • February
    • Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1, J. Jonsson and B. Kaliski, RFC 3447, February 2003.
    • (2003) RFC , vol.3447
    • Jonsson, J.1    Kaliski, B.2
  • 4
    • 0003508562 scopus 로고    scopus 로고
    • Digital signature standard
    • National Institute of Standards and Technology (NIST)
    • Digital Signature Standard, National Institute of Standards and Technology (NIST), FIPS 186-2, 2000.
    • (2000) FIPS , vol.186 , Issue.2
  • 5
    • 0029323414 scopus 로고
    • Key-spoofing attacks on nested signature blocks
    • Key-spoofing attacks on nested signature blocks, R. Christianson and M. R. Low, Electronics Letters, vol. 31, no. 13, 1995, pp. 1043-1044.
    • (1995) Electronics Letters , vol.31 , Issue.13 , pp. 1043-1044
    • Christianson, R.1    Low, M.R.2
  • 6
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks, S. Goldwasser, S. Micali and R. Rivest, SIAM Journal on Computing, vol. 17, no. 2, 1988, pp. 281-308.
    • (1988) SIAM Journal on Computing , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.3
  • 7
    • 84937411969 scopus 로고    scopus 로고
    • Flaws in applying proof methodologies to signature schemes
    • Lecture Notes in Computer Science
    • Flaws in Applying Proof Methodologies to Signature Schemes, J. Stern, D. Pointcheval, J. Lee and N. Smart, Lecture Notes in Computer Science, Proceedings of Crypto'02, 2002, pp. 93-110.
    • (2002) Proceedings of Crypto'02 , pp. 93-110
    • Stern, J.1    Pointcheval, D.2    Lee, J.3    Smart, N.4
  • 8
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • February
    • A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, R. Rivest, A. Shamir and L. Adleman, Communications of the ACM, February 1978, pp. 120-126.
    • (1978) Communications of the ACM , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 9
    • 0020194569 scopus 로고
    • Fast decipherment algorithm for RSA public-key cryptosystem
    • October
    • Fast decipherment algorithm for RSA public-key cryptosystem, J.-J. Quisquater and C. Couvreur, Electronics Letters, vol. 18, no. 21, October 1982, pp. 905-907.
    • (1982) Electronics Letters , vol.18 , Issue.21 , pp. 905-907
    • Quisquater, J.-J.1    Couvreur, C.2
  • 10
    • 12344258539 scopus 로고
    • Efficient signature generation by smart cards
    • Efficient signature generation by smart cards, G.P. Schnorr, Journal of Cryptology, vol. 4, 1991, pp. 161-174.
    • (1991) Journal of Cryptology , vol.4 , pp. 161-174
    • Schnorr, G.P.1
  • 11
    • 85032883059 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • Lecture Notes in Computer Science
    • A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms, T. El-Gamal, Lecture Notes in Computer Science, Proceedings of Crypto'84, 1985, pp. 10-18.
    • (1985) Proceedings of Crypto'84 , pp. 10-18
    • El-Gamal, T.1
  • 12
    • 0027726717 scopus 로고
    • Random oracles are practical: A paradigm for designing efficient protocols
    • ACM Press
    • Random Oracles Are Practical: a Paradigm for Designing Efficient Protocols, M. Bellare and P. Rogaway, Proceedings of the 1st CCS, ACM Press, 1993, pp. 62-73.
    • (1993) Proceedings of the 1st CCS , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 13
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solutions of identification and signature problems
    • Lecture Notes in Computer Science
    • How to Prove Yourself: Practical Solutions of Identification and Signature Problems, A. Fiat and A. Shamir, Lecture Notes in Computer Science, Proceedings of Crypto'86, 1987, pp. 186-194.
    • (1987) Proceedings of Crypto'86 , pp. 186-194
    • Fiat, A.1    Shamir, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.