相似文献/References:
[1]王龙葛 王天芹 田珂 徐飞.基于椭圆曲线的盲数字签名及其身份识别[J].计算机技术与发展,2008,(06):142.
WANG Long-ge,WANG Tian-qin,TIAN Ke,et al.A Blind Digital Signature Scheme and User Authentication Based on Elliptic Curves Cryptosystem[J].,2008,(12):142.
[2]王平水.零知识数字签名方案中Hash值长度的研究[J].计算机技术与发展,2007,(06):170.
WANG Ping-shui.Study on Length of Hash - Values for Digital Signature Schemes Based on Zero- Knowledge[J].,2007,(12):170.
[3]梁雨平 汤小华.一种前向安全性的可证实代理数字签名方案[J].计算机技术与发展,2007,(07):142.
LIANG Yu-ping,TANG Xiao-hua.A Certifiable Representative Digital Signature Approach Based on Forward Security[J].,2007,(12):142.
[4]王平水.基于独立集问题的零知识证明研究[J].计算机技术与发展,2007,(09):55.
WANG Ping-shui.Study on Zero- Knowledge Proof Based on Independent Set Problem[J].,2007,(12):55.
[5]石润华 仲红.基于椭圆曲线离散对数的组签名方案[J].计算机技术与发展,2007,(11):153.
SHI Run-hua,ZHONG Hong.Group Signature Schemes Based on Elliptic Curve Discrete Logarithm[J].,2007,(12):153.
[6]于雪燕 胡金初 柴春轶.椭圆曲线密码体制及其参数生成的研究[J].计算机技术与发展,2006,(11):160.
YU Xue-yan. HU Jin-chu,CHAI Chun-yi.Research. on Elliptic Curves Cryptosystems and References Generating[J].,2006,(12):160.
[7]张弢,任帅,张德刚[].基于可信计算的Ad Hoc网络直接匿名证明[J].计算机技术与发展,2014,24(04):147.
ZHANG Tao[],REN Shuai[],ZHANG De-gang[].Direct Anonymous Attestation to Ad Hoc Networks Based on Trusted Computing[J].,2014,24(12):147.
[8]蒋华[][],杨磊[] 胡荣磊[]. 基于SIP协议的安全网关设计[J].计算机技术与发展,2015,25(07):120.
JIANG Hua[][],YANG Lei[],HU Rong-lei[]. Design of Security Gateway Based on SIP[J].,2015,25(12):120.
[9]韦性佳,张京花,芦殿军.基于ECC 的具有前向安全性的 VSS 方案[J].计算机技术与发展,2018,28(04):157.[doi:10.3969/ j. issn.1673-629X.2018.04.033]
WEI Xing-jia,ZHANG Jing-hua,LU Dian-jun.A Forward Security Secret Sharing Scheme Based on ECC[J].,2018,28(12):157.[doi:10.3969/ j. issn.1673-629X.2018.04.033]
[10]袁勇[][][],唐刚[],陈辉焱[],等. 基于MOF算法改进的标量乘算法研究[J].计算机技术与发展,2016,26(12):111.
YUAN Yong[][][],TANG Gang[],CHEN Hui-yan[],et al. Research on Improved Scalar Multiplication Algorithm Based on MOF[J].,2016,26(12):111.