|
參考文獻 [1]Burstein, Jeffrey., “An Implementation of MicroMint,” Master of Engineering in Electrical Engineering and Computer Science at MIT, 1998, http://theory.lcs.mit.edu/~cis/cis-theses.html [2]Chaum, D. and A.Fiat, M.Naor, “Untraceable Electronic Cash,” Advances in Cryptology — CRYPTO’88, Lecture Notes in Computer Science, vol.403, pp.319-327, Springer-Verlag, 1990. [3]Diffie, W. and Hellman, M.,“New Directions in Cryptography,”IEEE Transactions , 1976. [4]ELGamal, T., “A public cryptosystem and signature scheme based on discrete logarithms,” IEEE Trans, IT-31, pp. 469-472, 1985. [5]Elizondo-Guajardo, R., Liu, C., Mobisson, G., Pearah, D., Ponce de Leon, X., Siegel, C.,“Electronic Micropayments,”, 1997. http://rpcp.mit.edu/~ pearah/micropayments/ [6]Goldwasser, S., and Micali, S.,“Probabilistic Encryption,” Journal of Computer and System Sciences ,1984. [7]Grabbe, J. O., "Cryptography and Number Theory for Digital Cash", A While Paper [8]Harn, L., “New digital signature scheme based on discrete logarithm,” Electronics Letters, Vol. 30, Issue: 5, on Pages: 396 — 398, 3 March 1994. [9]Harn, L., Y. Xu, “Design of generalised ElGamal type digital signature schemes based on discrete logarithm,” Electronics Letters, Vol. 30, Issue: 24, on Pages: 2025 — 2026, 24 Nov. 1994. [10]Harn, L., "Batch verifying multiple RSA digital signatures", Electronics Letters, Volume:34, Issue:12, 11 June 1998. [11]IEEE Std, "IEEE Standard Specifications for Public-Key Cryptography" , 29 Aug. 2000. [12]Johnson, D. B., and Matyas, S. M.,“Asymmetric Encryption: Evolution And Enhancements,”CryptoBytes, Vol. 2, no. 1 (Spring 1996), RSA Laboratories, ftp://ftp.rsa.com/pub/cryptobytes/crypto2n1.pdf. [13]Joye, M., and Quisquater, J-J.,“On Rabin-type Signatures”Presented at the Rump Session of CRYPTO’99. Available from http://grouper.ieee.org/groups/1363/. [14]Koblitz, N.“Elliptic Curve Cryptosystems,”Mathematics of Computation, 1987. [15]Kravitz, D. W.,“Digital Signature Algorithm,”U.S. Patent , 1993. [16]Menezes, A., “Elliptic Curve Cryptosystems,” CryptoBytes, Vol. 1, no. 2, RSA Laboratories, ftp://ftp.rsa.com/pub/cryptobytes/crypto1n2.pdf. [17]Mohammed, Elsayed., A. E. Emarah, Kh. El-Shennawy, “A blind signature scheme based on ElGamal signature,” EUROCOMM 2000. Information Systems for Enhanced Public Safety and Security. IEEE/AFCEA, ISBN: 0-7803-6323-X, on Pages: 51 — 53, 17 May 2000. [18]National Institute for Standards and Technology (NIST), Data Encryption Standard (DES), Federal Information Processing Standards Publication 46-2, December 1993, http://www.ncsl.nist.gov/fips/fips46-2.txt [19]Panurach, Patiwat., “Money in electronic commerce: digital cash, electronic fund transfer, and Ecash,” Communications of the ACM, Volume 39, Issue 6, Pages 45-50, 1996. [20]Rivest, R. L. and Shamir, A.“PayWord and MicroMint:Two simple micropayment schemes,”1996. http://theory.lcs.mit.edu/~rivest/RivestShamir -mpay.ps [21]Rivest, R. L., Shamir, A., and Adleman, L. M. “A Method for Obtaining Digital Signatures and Public-key Cryptosystems,” Communications of the ACM, 1978. [22]Rivest, Ron. and Adi Shamir, “Payword and MicroMint:Two simple MicroPayment Scheme,” Format:PowerPoint, MIT, 1996, http://theory.lcs.mit.edu/~cis/cis-publications.html [23]Schirokauer, O.,“Discrete Logarithms and Local Units,”Philosophical Transactions of the Royal Society of London A, 1993. [24]Schnorr, C.P., “Efficient identification and signature for smart cards,” Advances in Cryptology:Crypto’89, Lecture Notes in Computer Science, pp.339-351, 1990. [25]Shao, Zuhua., “Signature scheme based on discrete logarithm without using one-way hash function,” Electronics Letters, Vol. 34, Issue: 11, on Pages: 1079 — 1080, 28 May 1998. [26]Smart, N. P.,“The Discrete Logarithm Problem on Elliptic Curves of Trace One,”J. Cryptology, 1999. [27]Solo, D., Adams, C., Kemp, D., and Myers, M. “Internet X.509 Certificate Request Message Format,” Internet Engineering Task Force (IETF), PKIX Working Group http://www.ietf.org/ids.by.wg/pkix.html. [28]Solo, D., Housley, R., Ford, W., and Polk, T.,“Internet X.509 Public-key Infrastructure Certificate and CRL Profile,”Internet Engineering Task Force (IETF), PKIX Working Group, http://www.ietf.org/ids.by.wg/pkix.html. [29]Stallings, W., "Cryptography and Network Security:Principles and Practices", second Edition, New York:Prentice Hall, 1999. [30]Stinson, Douglas R., “Cryptography Theory and Practice,” 2nd Edition, Prentice-Hall, 1995. [31]賴溪松, 韓亮, 張真誠, “近代密碼學及其應用,” 松崗圖書, Vol. 2, Issue: 10, on Pages: 187 — 193, 1995. [32]賴溪松, 韓亮, 張真誠, “近代密碼學及其應用,” 松崗圖書, Vol. 2, Issue: 12, on Pages: 215 — 227, 1995. [33]張真誠, 林祝興, 江季翰, “電子商務安全,” 松崗圖書, Vol. 1, Issue: 3, on Pages: 3-12 — 3-17, 1995. [34]三民書局, “最新版商事法,” 三民書局, Vol. 1, Issue: 票據法, on Pages: 104 — 148, 1997. [35]閔嗣鶴, 嚴士健, “初等數論,” 凡異出版社, 1982. [36]廖啟泰, “電子商務之數位貨幣,” 松崗電腦圖書, 2000. [37]張真誠, “電腦密碼學與資訊安全,” 松崗電腦圖書, 1999. [38]樊國楨, “電子商務高階安全防護,” 資訊與電腦出版社, 1997.
|