메뉴 건너뛰기




Volumn , Issue , 2006, Pages 37-44

Tamper-evident digital signatures: Protecting certification Authorities against malware

Author keywords

[No Author keywords available]

Indexed keywords

CERTIFICATION AUTHORITIES; SECRET INFORMATION; SIGNING NODES; TAMPER-EVIDENT DIGITAL SIGNATURES;

EID: 36949010773     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DASC.2006.46     Document Type: Conference Paper
Times cited : (19)

References (25)
  • 3
    • 85034660220 scopus 로고
    • Subliminal-free authentication and signature
    • Advances in Cryptology, Eurocrypt '88, Springer-verlag
    • Y. Desmedt. Subliminal-free authentication and signature. In Advances in Cryptology - Eurocrypt '88, LNCS 330. Springer-verlag, 1988. pp. 23-33.
    • (1988) LNCS , vol.330 , pp. 23-33
    • Desmedt, Y.1
  • 4
    • 84990731886 scopus 로고
    • How to prove yourself: Practical Solution to Identification and Signature Problems
    • Advances in Cryptology, Crypto'86, SpringerVerlag
    • A. Fiat and A. Shamir. How to prove yourself: Practical Solution to Identification and Signature Problems. In Advances in Cryptology - Crypto'86, LNCS 26. SpringerVerlag, 1987. pp.186-194
    • (1987) LNCS , vol.26 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 5
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • S. Goldwasser, S. Micali and R. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal of Computing, Vol. 17, No. 2, 1988. pp. 281-308.
    • (1988) SIAM Journal of Computing , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.3
  • 6
    • 0034448545 scopus 로고    scopus 로고
    • J. Håstad, J. Jonsson, A. Juels, and M. Yung. Funkspiel Schemes: An Alternative to Conventional Tamper Resistance. In S. Jajodia, ed., Seventh ACM Conference on Computer and Communications Security, ACM Press, 2000. pp 125-133.
    • J. Håstad, J. Jonsson, A. Juels, and M. Yung. Funkspiel Schemes: An Alternative to Conventional Tamper Resistance. In S. Jajodia, ed., Seventh ACM Conference on Computer and Communications Security, ACM Press, 2000. pp 125-133.
  • 7
    • 36949028531 scopus 로고    scopus 로고
    • J. Jonsson and B. Kaliski. Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1. Internet RFC 3447. pp. 26-42, February 2003.
    • J. Jonsson and B. Kaliski. Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1. Internet RFC 3447. pp. 26-42, February 2003.
  • 8
    • 84957357388 scopus 로고    scopus 로고
    • Distributed "Magic Ink" Signatures
    • Advances in Cryptology, Eurocrypt '97, Springer-Verlag
    • M. Jakobsson and M. Yung. Distributed "Magic Ink" Signatures. In Advances in Cryptology - Eurocrypt '97, LNCS 1233, Springer-Verlag, 1997. pp. 450-464.
    • (1997) LNCS , vol.1233 , pp. 450-464
    • Jakobsson, M.1    Yung, M.2
  • 9
    • 84958981017 scopus 로고    scopus 로고
    • Generation with Verifiable Randomness
    • Public Key Cryptography 2002, Springer-Verlag
    • A. Juels and J. Guajardo. RSA Key Generation with Verifiable Randomness. In Public Key Cryptography 2002, LNCS 2274, Springer-Verlag, 2002. pp. 357-374.
    • (2002) LNCS , vol.2274 , pp. 357-374
    • Juels, A.1    Guajardo, J.2    Key, R.S.A.3
  • 11
    • 36949011205 scopus 로고    scopus 로고
    • A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, Handbook Applied Cryptography. CRC Press, 1997. pp. 447-AA9
    • A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, Handbook Applied Cryptography. CRC Press, 1997. pp. 447-AA9
  • 12
    • 85077591735 scopus 로고    scopus 로고
    • Cryptographic Voting Protocols: A Systems Perspective
    • August
    • C. Karlof, N. Sastry, and D. Wagner, Cryptographic Voting Protocols: A Systems Perspective. In USENIX Security '05, August 2005. pp. 33-50.
    • (2005) USENIX Security '05 , pp. 33-50
    • Karlof, C.1    Sastry, N.2    Wagner, D.3
  • 15
    • 84927727752 scopus 로고    scopus 로고
    • Security proofs for signature schemes
    • Advances in Cryptology, Eurocrypt '96, Springer-Verlag
    • D. Pointcheval and J. Stern. Security proofs for signature schemes. In Advances in Cryptology - Eurocrypt '96, LNCS 1070, Springer-Verlag, 1996. pp. 387-398.
    • (1996) LNCS , vol.1070 , pp. 387-398
    • Pointcheval, D.1    Stern, J.2
  • 16
    • 33750079066 scopus 로고    scopus 로고
    • Electronic Voting Systems - Is Brazil Ahead of its Time?
    • Pedro A.D. Rezende. Electronic Voting Systems - Is Brazil Ahead of its Time? RSA CryptoBytes, Volume 7, No. 2, 2004.
    • (2004) RSA CryptoBytes , vol.7 , Issue.2
    • Rezende, P.A.D.1
  • 17
    • 0000537828 scopus 로고
    • Efficient Signature Generation for Smart Cards
    • C. P. Schnorr. Efficient Signature Generation for Smart Cards. In Proc. of Crypto '89, 1989. pp. 239-252.
    • (1989) Proc. of Crypto '89 , pp. 239-252
    • Schnorr, C.P.1
  • 18
    • 0001217738 scopus 로고
    • The prisoners' problem and the subliminal channel
    • G. J. Simmons. The prisoners' problem and the subliminal channel. In Proc. of Crypto '83, 1983. pp. 51-67.
    • (1983) Proc. of Crypto '83 , pp. 51-67
    • Simmons, G.J.1
  • 19
    • 84985824882 scopus 로고    scopus 로고
    • The subliminal channel and digital signature
    • Proc. of Eurocrypt '84, Springer-Verlag
    • G. J. Simmons. The subliminal channel and digital signature. In Proc. of Eurocrypt '84, LNCS 209, Springer-Verlag, 1996. pp. 364-378.
    • (1996) LNCS , vol.209 , pp. 364-378
    • Simmons, G.J.1
  • 20
    • 85028916857 scopus 로고
    • Response to comments on the NIST proposed Digital Signature Standard
    • Proc. of Crypto '92, Springer-verlag
    • M. E. Smid and D. K. Branstad. Response to comments on the NIST proposed Digital Signature Standard. In Proc. of Crypto '92, LNCS 740, Springer-verlag, 1992. pp. 76-87.
    • (1992) LNCS , vol.740 , pp. 76-87
    • Smid, M.E.1    Branstad, D.K.2
  • 21
    • 84947917119 scopus 로고    scopus 로고
    • Publicly Verifiable Secret Sharing
    • Advances in Cryptology, Eurocrypt '96, Springer-Verlag
    • M. Stadler. Publicly Verifiable Secret Sharing. In Advances in Cryptology - Eurocrypt '96, LNCS 1070, Springer-Verlag, 1996. pp. 190-199.
    • (1996) LNCS , vol.1070 , pp. 190-199
    • Stadler, M.1
  • 22
    • 36949019781 scopus 로고    scopus 로고
    • Mitigating insider threats to RSA key generation
    • Spring
    • A. Young. Mitigating insider threats to RSA key generation. In Cryptobytes, Vol. 7, No 1, Spring 2004.
    • (2004) Cryptobytes , vol.7 , Issue.1
    • Young, A.1
  • 23
    • 84958645678 scopus 로고    scopus 로고
    • The prevalence of Kleptographic attacks on discrete-log based cryptosystems
    • A. Young and M. Yung. The prevalence of Kleptographic attacks on discrete-log based cryptosystems. In Proc. of Crypto '97, 1997. pp. 264-276.
    • (1997) Proc. of Crypto '97 , pp. 264-276
    • Young, A.1    Yung, M.2
  • 24
    • 84957360674 scopus 로고    scopus 로고
    • Kleptography: Using cryptography against cryptography
    • A. Young and M. Yung. Kleptography: using cryptography against cryptography. In Proc. of Eurocrypt '97, 1997. pp. 62-74.
    • (1997) Proc. of Eurocrypt '97 , pp. 62-74
    • Young, A.1    Yung, M.2
  • 25
    • 84937463317 scopus 로고    scopus 로고
    • Auto-Recoverable and AutoCertifiable Cryptosystems
    • Advances in Cryptology, Eurocrypt '98, Springer-Verlag
    • A. Young, M. Yung. Auto-Recoverable and AutoCertifiable Cryptosystems. In Advances in Cryptology - Eurocrypt '98, LNCS 1403, Springer-Verlag, 1998. pp. 119-133.
    • (1998) LNCS , vol.1403 , pp. 119-133
    • Young, A.1    Yung, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.