共 61 条
[11]
Tightly-Secure Signatures from Chameleon Hash Functions
[J].
PUBLIC-KEY CRYPTOGRAPHY - PKC 2015,
2015, 9020
:256-279
[13]
Bresson E, 2007, LECT NOTES COMPUT SC, V4450, P217
[14]
Brzuska Christina, 2014, Public Key Infrastructures, Services and Applications. 10th European Workshop, EuroPKI 2013, Revised Selected Papers: LNCS 8341, P12, DOI 10.1007/978-3-642-53997-8_2
[15]
Brzuska Christina, 2013, Public Key Infrastructures, Services and Applications. 9th European Workshop, EuroPKI 2012. Revised Selected Papers: LNCS 7868, P178, DOI 10.1007/978-3-642-40012-4_12
[16]
Brzuska C., 2009, LNI, P117
[17]
Brzuska C, 2010, LECT NOTES COMPUT SC, V6123, P87, DOI 10.1007/978-3-642-13708-2_6
[18]
Brzuska C, 2010, LECT NOTES COMPUT SC, V6056, P444
[19]
Brzuska C, 2009, LECT NOTES COMPUT SC, V5443, P317
[20]
Camenisch J, 1997, LECT NOTES COMPUT SC, V1294, P410