|
[1]C. C. Chang, C. C. Wu, and I. C. Lin, “A Secure E-coupon System for Mobile Users,” IJCSNS International Journal of Computer Science and Network Security, Vol. 6, No. 1, January, pp. 273-280, 2006. [2]A. Shamir and Y. Tauman, “Improved online / offline signature schemes,” Advances in Cryptology-CRYPTO’01, LNCS 2139, pp. 355-367, 2001. [3]H. Krawczyk and T. Rabin, “Chameleon signatures,” Symposium on Network and Distributed Systems Security (NDSS’00), pp. 143-154, 2000. [4]F. Y. Yang, S. H. Chiu, and C. M. Liao, “Trapdoor Hash Functions with Efficient Online Computations,” The Proceedings of Multimedia and Networking Systems Conference 2006 (MNSC 2006), Kaohsiung Cuty, Taiwan, Session G1, 2006. [5]F. Y. Yang, “Efficient trapdoor hash function for digital signatures,” Chaoyang Journal, Vol. 12, pp. 351-357, 2007. [6]F. Y. Yang, “Improvement on a trapdoor hash Function,”International Journal of Network Security, Vol. 8, pp. 317-321, 2009. [7]T. Okamoto, M. Tada and A. Miyaji, “Efficient ‘on the fly’ signature schemes based on integer factoring,” Proceedings of the 2nd International Conference on Cryptology in India, INDOCRYPT’01, LNCS 2247, pp. 275-286, 2001. [8]K. Geoffrey, “Performance Analysis of AES candidates on the 6805 CPU core,” Second AES Candidate Conference (AES2),1999. [9]R. Rivest, “The MD5 Message Digest Algoritm,” RFC 1321, 1992. [10]NIST FIPS PUB 180, “Secure Hash Standard,” National Institute of Standards and Technology, U.S. Department of Commerce, DRAFT, 1993. [11]W. Stallings, Cryptography and Network Security: Principles and Practice. Prentice Hall International, Inc., third edition, 2003. [12]NIST FIPS PUB 197, “Announcing the ADVANCED ENCRYPTION STANDARD (AES),” National Institute of Standards and Technology, U.S. Department of Commerce, November, 2001. [13]NIST FIPS PUB 46-3, “Data Encryption Standard (DES),” National Institute of Standards and Technology, U.S. Department of Commerce, October, 1999. [14]X. Lai and J. Massey, “A Proposal for a New Block Encryption Standard,” Advances in Cryptology: Proceedings of EUROCRYPT ''90, Springer-Verlag, 1990, pp. 389-404. [15]J. Dacmen and V. Rijmen, “AES Proposal: Rijndael,” AES Algorithm Submission, September, 1999. [16]NIST FIPS PUB 197, “Announcing the ADVANCED ENCRYPTION STANDARD (AES),” National Institute of Standards and Technology, U.S. Department of Commerce, November, 2001. [17]W.B. Lee, C.C. Wu, and W.J. Tsaur, “A novel deniable authentication protocol using generalized ElGamal signature scheme” Information Science, Vol. 177, No. 6, March, 2007, pp. 1376-1381. [18]T. ElGamal, “A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms,” Advances in Cryptology: Procedings of CRYPOTO ''84, Springer-Verlag, 1984, pp. 10-18. [19]W. Stallings, Cryptography and Network Security: Principles and Practice. Prentice Hall International, Inc., third edition, 2003.
|