[1] |
Whitfield D,Martin E H.New direction in cryptography [J].IEEE Transactions on Information Theory,1976,22(6):644654.
|
[2] |
Elgamal T. A public key cryptosystem and a signatrue scheme based on discrete logarithms [J].IEEE Transactions on Information Theory,1985,IT31(4):469472.
|
[3] |
Qu Na, Du Hongjun, Yan Da, et al.Variation of ElGamal digital signature algorithm [J].Journal of Jilin University(Information Science Edition),2009,27(6):590594.(in Chinese)
|
[4] |
Zhang Huiying, Zhang Jun. Research and design of an improved ElGamal digital signature scheme [J].Computer Engineering & Science,2009,31(12):3537.(in Chinese)
|
[5] |
Zhou Keyuan.Attack analysis and improvement on two discrete logarithm digital signature algorithms[J].Science Technology and Engineering,2013,13(32):97259728.(in Chinese)
|
[6] |
Zhang Qingpo,Chen Caiyun,Chen Lusheng,et al.ElGamal cryptosystem and digital signature scheme based on polynomials over finite fields [J].Journal on Communications,2005,26(5):6972.(in Chinese)
|
[7] |
Ou Haiwen,Ye Dingfeng,Yang Junhui,et al.On the digital signature schemes whose secuity based on solving discrete logarithms problem and factoring problem simultaneously[J].Journal on Communications,2004,25(10):143147.(in Chinese)
|
[8] |
Li Xiaofei, Shen Xuanjing, Chen Haipeng. ElGamal digital signature algorithm of adding a random number[C]∥Proc of International Conference on Network Security, Wireless Communications and Trusted Computing,2010:236240.
|
[9] |
Zhu Pinghua,Fu Yangxia .A new cryptosystem and digital signature scheme based on ElGamal cryptosystem[C]∥Proc of International Conference on Science Service System,2011:9981000.
|
[10] |
Poulakis D.A variant of digital signature algorithm [J].Design Codes & Cryptograph,2009,25(1):99104.
|
[11] |
Xia Feng,Feng Jianping,Zhang Yu.Analysis on the security of ElGamal signature scheme[J].Science Technology and Engineering,2010,10(22):54175419.(in Chinese)
|
[12] |
Li Jihong,Gu Dawu,Xiao Guozhen.Study of the security relation between ElGamaltype signature scheme and corresponding MR(P)type scheme[J].Journal on Communications,2000,21(4):5861.(in Chinese)
|
|
附中文参考文献:
|
[3] |
曲娜,杜洪军,颜达,等.ElGamal数字签名算法的一种变形 [J].吉林大学学报(信息科学版),2009,27(6):590594.
|
[4] |
张会影,张军.一种改进的ElGamal数字签名方案的研究与设计 [J].计算机工程与科学,2009,31(12):3537.
|
[5] |
周克元.对两个离散对数数字签名算法的攻击与改进 [J].科学技术与工程,2013,13(32):97259728.
|
[6] |
张青坡,陈彩云,陈鲁生,等.有限域上多项式形式的ElGamal体制及数字签名方案 [J].通信学报,2005,26(5):6972.
|
[7] |
欧海文,叶顶峰,杨君辉,等.关于同时基于因子分解与离散对数问题的签名体制[J].通信学报,2004,25(10):143147.
|
[11] |
夏峰,冯建平,张瑜.一类ElGamal数字签名方案的安全性分析 [J].科学技术与工程,2010,10(22):54175419.
|
[12] |
李继红,谷大武,肖国镇.ElGamal型签名方案与相应MR(P) 型方案的安全性关系研究 [J].通信报,2000,21(4):5861.
|