메뉴 건너뛰기




Volumn 5746 LNCS, Issue , 2009, Pages 95-111

Performance issues of selective disclosure and blinded issuing protocols on Java card

Author keywords

Blinded issuing; Java card; Performance; Selective disclosure

Indexed keywords

BLINDED ISSUING; CRYPTOGRAPHIC COPROCESSORS; JAVA CARD; KEY SIZES; PERFORMANCE; PERFORMANCE ISSUES; POOR PERFORMANCE; SELECTIVE DISCLOSURE; ZERO KNOWLEDGE PROOF;

EID: 70350605716     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-03944-7_8     Document Type: Conference Paper
Times cited : (19)

References (13)
  • 2
    • 38649094528 scopus 로고    scopus 로고
    • Java card key generation for identity based systems
    • Technical Report NUIM-CS-TR-2005-01, Department of Computer Science, National University of Ireland, Maynooth February
    • Dowling, T., Duffy, A.: Java card key generation for identity based systems. Technical Report NUIM-CS-TR-2005-01, Department of Computer Science, National University of Ireland, Maynooth (February 2005), http://www.cs.nuim.ie/ research/reports/2005
    • (2005)
    • Dowling, T.1    Duffy, A.2
  • 4
    • 57049128814 scopus 로고    scopus 로고
    • Dismantling MIFARE classic
    • Jajodia, S, Lopez, J, eds, ESORICS 2008, Springer, Heidelberg
    • Garcia, F., de Koning Gans, G., Muijrers, R., van Rossum, P., Verdult, R., Schreur, R.W., Jacobs, B.: Dismantling MIFARE classic. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 97-114. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5283 , pp. 97-114
    • Garcia, F.1    de Koning Gans, G.2    Muijrers, R.3    van Rossum, P.4    Verdult, R.5    Schreur, R.W.6    Jacobs, B.7
  • 6
    • 70350608996 scopus 로고    scopus 로고
    • Lenstra, A.: Key lengths. In: Bidgoli, H. (ed.) Handbook of Information Security. Information Warfare, Social, Legal, and International Issues and Security Foundations, II, pp. 617-635. Wiley, Chichester (2006)
    • Lenstra, A.: Key lengths. In: Bidgoli, H. (ed.) Handbook of Information Security. Information Warfare, Social, Legal, and International Issues and Security Foundations, vol. II, pp. 617-635. Wiley, Chichester (2006)
  • 8
    • 70350577486 scopus 로고    scopus 로고
    • SUN Microsystems. Java Card v2.2.1 API (2003), http://java.sun.com/ javacard/specs.html
    • (2003) Java Card v2.2.1 API
  • 9
    • 70350592722 scopus 로고    scopus 로고
    • SUN Microsystems. Java Card v2.2.2 API (2005), http://java.sun.com/ javacard/specs.html
    • (2005) Java Card v2.2.2 API
  • 10
    • 77953771886 scopus 로고    scopus 로고
    • Version 3.0
    • SUN Microsystems. Java Card Specifications Version 3.0 (2008), http://java.sun.com/javacard/downloads/
    • (2008) Java Card Specifications
  • 12
    • 70350598283 scopus 로고    scopus 로고
    • Smart, N.P.: Elliptic curve based protocols. In: Blake, I.F., Seroussi, G., Smart, N.P. (eds.) Advances in Elliptic Curve Cryptography. LMS, 317, pp. 3-19. Cambridge Univ. Press, Cambridge (2005)
    • Smart, N.P.: Elliptic curve based protocols. In: Blake, I.F., Seroussi, G., Smart, N.P. (eds.) Advances in Elliptic Curve Cryptography. LMS, vol. 317, pp. 3-19. Cambridge Univ. Press, Cambridge (2005)
  • 13
    • 84946849368 scopus 로고    scopus 로고
    • Self-blindable credential certificates from the weil pairing
    • Boyd, C, ed, ASIACRYPT 2001, Springer, Heidelberg
    • Verheul, E.R.: Self-blindable credential certificates from the weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 533-550. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2248 , pp. 533-550
    • Verheul, E.R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.