相似文献/References:
[1]王龙葛 王天芹 田珂 徐飞.基于椭圆曲线的盲数字签名及其身份识别[J].计算机技术与发展,2008,(06):142.
WANG Long-ge,WANG Tian-qin,TIAN Ke,et al.A Blind Digital Signature Scheme and User Authentication Based on Elliptic Curves Cryptosystem[J].,2008,(11):142.
[2]田军舰 寇应展 陈财森.RSA公钥密码计时攻击研究及仿真[J].计算机技术与发展,2010,(08):150.
TIAN Jun-jian,KOU Ying-zhan,CHEN Cai-sen.Research and Simulation of Timing Attacks on RSA[J].,2010,(11):150.
[3]梁雨平 汤小华.一种前向安全性的可证实代理数字签名方案[J].计算机技术与发展,2007,(07):142.
LIANG Yu-ping,TANG Xiao-hua.A Certifiable Representative Digital Signature Approach Based on Forward Security[J].,2007,(11):142.
[4]孟彦 侯整风 昂东宇 周循.基于椭圆曲线的单轮零知识证明方案[J].计算机技术与发展,2007,(12):147.
MENG Yan,HOU Zheng-feng,ANG Dong-yu,et al.One- Round Zero- Knowledge Proofs Protocol Based on Elliptic Curve[J].,2007,(11):147.
[5]于雪燕 胡金初 柴春轶.椭圆曲线密码体制及其参数生成的研究[J].计算机技术与发展,2006,(11):160.
YU Xue-yan. HU Jin-chu,CHAI Chun-yi.Research. on Elliptic Curves Cryptosystems and References Generating[J].,2006,(11):160.
[6]蒋华[][],杨磊[] 胡荣磊[]. 基于SIP协议的安全网关设计[J].计算机技术与发展,2015,25(07):120.
JIANG Hua[][],YANG Lei[],HU Rong-lei[]. Design of Security Gateway Based on SIP[J].,2015,25(11):120.
[7]韦性佳,张京花,芦殿军.基于ECC 的具有前向安全性的 VSS 方案[J].计算机技术与发展,2018,28(04):157.[doi:10.3969/ j. issn.1673-629X.2018.04.033]
WEI Xing-jia,ZHANG Jing-hua,LU Dian-jun.A Forward Security Secret Sharing Scheme Based on ECC[J].,2018,28(11):157.[doi:10.3969/ j. issn.1673-629X.2018.04.033]
[8]袁勇[][][],唐刚[],陈辉焱[],等. 基于MOF算法改进的标量乘算法研究[J].计算机技术与发展,2016,26(12):111.
YUAN Yong[][][],TANG Gang[],CHEN Hui-yan[],et al. Research on Improved Scalar Multiplication Algorithm Based on MOF[J].,2016,26(11):111.
[9]孙旭敏,刘彩霞.基于椭圆曲线的识别伪基站垃圾短信改进算法[J].计算机技术与发展,2018,28(07):121.[doi:10.3969/ j. issn.1673-629X.2018.07.026]
SUN Xu-min,LIU Cai-xia.n Improved Algorithm of Identifying Spam Message of Pseudo Base Station Based on Elliptic Curve[J].,2018,28(11):121.[doi:10.3969/ j. issn.1673-629X.2018.07.026]
[10]黄华伟*,李春华.基于热带矩阵密钥交换协议的密码分析[J].计算机技术与发展,2023,33(03):93.[doi:10. 3969 / j. issn. 1673-629X. 2023. 03. 014]
HUANG Hua-wei *,LI Chun-hua.Cryptanalysis of a Key Exchange Protocol Based on Tropical Matrices[J].,2023,33(11):93.[doi:10. 3969 / j. issn. 1673-629X. 2023. 03. 014]