|
[1] National Institute of Standard and Technology, http://www.nist.gov [2] RSA Security Inc., http://www.rsasecurity.com [3] National Security Agency, http://www.nsa.gov [4] C. H. Lin and W.C. Wu: “An Undeniable Signature Scheme Against Replay Attacks,” 中華民國電腦學會電腦學刊, 第九卷, 第一期 [5] R. W. K. Odoni, V. Varadharajan, and P. W. Sander: “Public Key Distribution In Matrix Ring,” Electronics Letters, 26th, April 1984, Vol. 20, No. 9 [6] Diffie, W., and Hellman, M. E.: “New directions in cryptography,” IEEE Trans., 1976, IT-22, pp. 644-654 [7] National Bureau of Standards, “Data Encryption Standard,” FIPS Publ. 46, USA, Jan. 1977 [8] Pohlig, S. G., and Hellman, M. E: “An Improved Algorithm for Computing Algorithm over GF (P) and Its Cryptographic Significance,” IEEE Trans., 1979, IT-24, pp. 106-110. [9] C. H. Lin, “On the Group Oriented Secure Communication Schemes,” The Third Conference on Information Security, May 1993. [10] C. H. Lin, and C. C. Chang, “A Method for Constructing a Group-Oriented Cryptosystems,” Computer Communications, Vol. 17, No. 11, Nov. 1994, pp. 805-808. [11] C. H. Lin. And C.T. Wang, “A New Undeniable Signature Scheme and its Application to Group Communication,” Proceeding of National Computer Symposium, 1995, pp. 397-403. [12] Mahdi Abdelguerfi, Burton S. Kaliski, Jr. Wayne Patterson, “Guest Editors’ Introduction: Public-Key Security Systems,” IEEE Micro., 1996 [13] B. S. Adiga, P. Shankar, “Fast Public Key Cryptosystem Based on Matrix Rings,” Electronics Letters 23rd. October 1986, Vol. 22. No. 22 [14] Rivest, R. L., Shamir, A., and Adleman, L.: “A Method for Obtaining Digital Signature and Public-key Cryptosystems,” Commun. Assoc. Comput. Mach., 1978, 21, pp. 120-126 [15] Yang Yi Xian, “Improved (Conference) Public-key Distribution System Based on Matrices,” Electronics Letters, 27th, August 1987, Vol. 23, No. 18
|