共 50 条
- [13] Signature scheme based on the strong RSA assumption Ruan Jian Xue Bao/Journal of Software, 2002, 13 (08): : 1729 - 1734
- [15] A Threshold RSA Signature Scheme with Traceable Signers 2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 647 - 649
- [16] A strong RSA signature scheme and its application SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 1, PROCEEDINGS, 2007, : 111 - +
- [17] An efficient implementation of a threshold RSA signature scheme INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2005, 3574 : 382 - 393
- [18] On the security of some variants of the RSA signature scheme COMPUTER SECURITY - ESORICS 98, 1998, 1485 : 85 - 96
- [19] A threshold RSA signature scheme with traceable signers Journal of Computational Information Systems, 2009, 5 (04): : 1143 - 1146
- [20] A New RSA-Based Signature Scheme PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2010, 2010, 6055 : 1 - 15