메뉴 건너뛰기




Volumn , Issue , 1999, Pages

Addressing the Problem of Undetected Signature Key Compromise

Author keywords

digital signatures; key compromise detection; second level authentication; timestamping

Indexed keywords

ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; NETWORK SECURITY;

EID: 33745709845     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (9)

References (22)
  • 2
    • 84947913130 scopus 로고    scopus 로고
    • Generating ElGamal Signatures Without Knowing the Secret Key
    • Springer-Verlag
    • Daniel Bleichenbacher, "Generating ElGamal Signatures Without Knowing the Secret Key", Advances in C'ryptology: Eurocrypi '96, Springer-Verlag, pp. 10-18, 1996.
    • (1996) Advances in C'ryptology: Eurocrypi '96 , pp. 10-18
    • Bleichenbacher, Daniel1
  • 7
    • 0003508562 scopus 로고
    • FIPS 186, Federal Information Processing Standards Publication 185, U.S. Department of Commerce/N.I.S.T., National Technical Information Service, Springfield, Virginia
    • FIPS 186, "Digital Signature Standard", Federal Information Processing Standards Publication 185, U.S. Department of Commerce/N.I.S.T., National Technical Information Service, Springfield, Virginia, 1994.
    • (1994) Digital Signature Standard
  • 9
    • 0025849585 scopus 로고
    • How to Time-Stamp a Digital Document
    • S. Haber, W.S. Stornetta, "How to Time-Stamp a Digital Document", Journal of C'ryptology, Vol. 3, No. 2, pp. 99-111, 1991.
    • (1991) Journal of C'ryptology , vol.3 , Issue.2 , pp. 99-111
    • Haber, S.1    Stornetta, W.S.2
  • 11
    • 0011917214 scopus 로고
    • JTU-T Recommendation X.509, International Telecommunication Union, Geneva, Switzerland, November, (equivalent to ISO/IEC 9594-8:1990&1995)
    • JTU-T Recommendation X.509, "The Directory-Authentication Framework" International Telecommunication Union, Geneva, Switzerland, November, 1993. (equivalent to ISO/IEC 9594-8:1990&1995)
    • (1993) The Directory-Authentication Framework
  • 13
    • 84943632039 scopus 로고    scopus 로고
    • Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
    • Springer-Verlag
    • Paul Kocher, "Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems", Advances in C'ryptology: Crypto '96, pp. 104-113, Springer-Verlag.
    • Advances in C'ryptology: Crypto '96 , pp. 104-113
    • Kocher, Paul1
  • 15
    • 0019634370 scopus 로고
    • Password Authentication with Insecure Communication
    • L. Lamport, "Password Authentication with Insecure Communication", Communications of the A CM, 24, pp. 770-772, 1981.
    • (1981) Communications of the A CM , vol.24 , pp. 770-772
    • Lamport, L.1
  • 17
    • 85180814169 scopus 로고    scopus 로고
    • Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP
    • February (work in progress)
    • M. Myers, R. Ankney, "Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP", IETF PKIX Working Group Internet Draft, February 1998 (work in progress).
    • (1998) IETF PKIX Working Group Internet Draft
    • Myers, M.1    Ankney, R.2
  • 21
    • 0017930809 scopus 로고
    • A Method for Obtaining Digital Signatures and Public-Key C'ryp-tosystems
    • R. Rivest, A. Shamir, L. Adleman, "A Method for Obtaining Digital Signatures and Public-Key C'ryp-tosystems", Communications of the ACM, 21, pp. 120-126, 1978.
    • (1978) Communications of the ACM , vol.21 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.