共 50 条
- [11] On the security of some variants of the RSA signature scheme COMPUTER SECURITY - ESORICS 98, 1998, 1485 : 85 - 96
- [12] A threshold RSA signature scheme with traceable signers Journal of Computational Information Systems, 2009, 5 (04): : 1143 - 1146
- [13] A New RSA-Based Signature Scheme PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2010, 2010, 6055 : 1 - 15
- [14] Digital Signature Scheme with a (t, l) Threshold Subliminal Channel Based on RSA Signature Scheme 2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 903 - +
- [16] An Improved Threshold Proxy Signature Scheme Based on RSA PROCEEDINGS OF THE 2016 6TH INTERNATIONAL CONFERENCE ON MANAGEMENT, EDUCATION, INFORMATION AND CONTROL (MEICI 2016), 2016, 135 : 629 - 632
- [17] Efficient Group Signature Scheme Based on RSA Cryptosystem 2006 INTERNATIONAL CONFERENCE ON COMPUTING & INFORMATICS (ICOCI 2006), 2006, : 356 - +
- [18] Comparison of ECDSA and RSA Signature Scheme on NLSR Performance 2017 IEEE ASIA PACIFIC CONFERENCE ON WIRELESS AND MOBILE (APWIMOB), 2017, : 7 - 11
- [19] A modification of Jarecki and Saxena proactive RSA signature scheme 2007 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-7, 2007, : 1026 - +
- [20] Improvement of Shoup's threshold RSA signature scheme Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2002, 39 (09): : 1046 - 1050