共 49 条
- [31] How to construct sufficient conditions for hash functions PROGRESS IN CRYPTOLOGY - VIETCRYPT 2006, 2006, 4341 : 243 - +
- [33] Subversion in Practice: How to Efficiently Undermine Signatures IEEE ACCESS, 2019, 7 : 68799 - 68811
- [34] How (Not) to design strong-RSA signatures Designs, Codes and Cryptography, 2011, 59 : 169 - 182
- [40] Improved Merkle Hash Tree-Based One-Time Signature Scheme for Capability-Enhanced Security Enforcing Architecture for Named Data Networking Wireless Personal Communications, 2020, 115 : 557 - 574