[1] Oracle developer network. JavaCard technology [S/OL].[2010-08-20].http:∥www.oracle.com/technetwork/java/JavaCard/overview/index.html.
[2] BICHSEL P,CAMENISCH J, GRO T, et al. Anonymous credentials on a standard JavaCard [C]∥ Proceedings of the 16th ACM Conference on Computer and Communications Security. Chicago:ACM,2009:600-610.
[3] LOINIG J, STEGER C, WEISS R, et al. Javacard performance optimization of secure transaction atomicity based on increasing the class field locality [C]∥ Proceedings of 2009 Third IEEE International Conference on Secure Software Integration and Reliability Improvement. Shanghai: IEEE,2009:342-347.
[4] SCHNEIER B. 应用密码学协议、算法与C源程序[M].2版.北京:机械工业出版社,2000:366-367.
[5] 张先红. 数字签名原理及技术[M].北京:机械工业出版社,2004:95-97.
[6] 戴佳筑,杨小虎,董金祥. 一种消息保密的代理签名方案[J].浙江大学学报:工学版,2005,39(5):701-704.
DAI Jiazhu, YANG Xiaohu, DONG Jinxiang. Digital proxy signature scheme with privacy protection [J]. Journal of Zhejiang University: Engineering Science,2005,39(5):701-704.
[7] 张鹏,叶澄清,马雪英,等. 一种改进的门限代理签密协议[J].浙江大学学报:工学版,2006,40(3):392-394.
ZHANG Peng, YE Chengqing, MA Xueying, et al. Improvement of threshold proxy signcryption scheme[J]. Journal of Zhejiang University: Engineering Science, 2006,40(3):392-394.
[8] 吴晓波,辛英,曲慧,等. 一个基于Schnorr算法的可公开验证的加密方案[J].华东交通大学学报,2007, 24(4):144-146.
WU Xiaobo, XIN Ying, QU Hui, et al. A new authenticated encryption scheme with public verifiability based on schnorr algorithm[J]. Journal of East China Jiaotong University, 2007, 24(4):144-146.
[9] POINTCHEVAL D, STERN J. Security proofs for signature schemes[C]∥Proceedings of the 15th Annual International Conference on Theory and Application of Cryptographic Techniques.Berlin: SpringerVerlag,l996:387-398.
[10] 刘景美,王新梅. Schnorr签名方案的一种攻击[J].计算机科学,2006,33(7):141-142.
LIU Jingmei, WANG Xinmei. Cryptanalysis of sclmorr signature scheme[J]. Computer Science, 2006,33(7):141-142.
[11] 胡国政,洪帆. 对Schnorr签名方案几种攻击的分析[J].计算机科学,2009,36(10):98-100.
HU Guozheng, HONG Fan. Analysis of some attacks against the schnorr signature Scheme[J]. Computer Science,2009,36(10):98-100.
[12] ZHANG Huanguo, WANG Yuhua, WANG Bangju, et al. Evolutionary random sequence generators based on LFSR[J]. Wuhan University Journal of NaturaI Sciences,2007,12(1):75-78.
[13] ZHOU Qing, LIAO Xiaofeng, WONG Kwokwo, et al. True random number generator based on mouse movement and chaotic hash function [J]. Information Sciences, 2009,179(19): 3442-3450
[14] MARTIN F, HENNING W, SEBASTIAN N, et al. High speed optical quantum random number generation [J]. Optics Express,2010, 18(12):13029-13037.
[15] 廖永建, SUSILO Willy, 陈抗生. 强指定验证者签名的不可授权性[J]. 浙江大学学报:工学版,2009, 43(2):334-337,343.
LIAO Yongjian, SUSILO Willy, CHEN Kangsheng. On non—delegatability property of strong designated verifier signature [J]. Journal of Zhejiang University:Engineering Science,2009,43(2):334-337,343. |