서명용 개인키 노출 탐지 기법

논문상세정보
' 서명용 개인키 노출 탐지 기법' 의 주제별 논문영향력
논문영향력 선정 방법
논문영향력 요약
주제
  • 전자공학
  • certificate revocation
  • keycompromisedetection
  • public key infrastructure
  • revocationnotification
동일주제 총논문수 논문피인용 총횟수 주제별 논문영향력의 평균
2,302 0

0.0%

' 서명용 개인키 노출 탐지 기법' 의 참고문헌

  • “GeneratingElGamal Signatures Without Knowing the Secret Key,” Advances in Cryptology, Eurocrypt'96
    D. Bleichenbacher LNCS 1070 : 10 ~ 18 [1996]
  • User Interface Specification for the Interoperability between Accredited Certification Authorities
    KISA KCAC.TS.UI [2012]
  • The transport layer security (TLS) protocol version 1.2
    T. Dierks RFC 5246 [2008]
  • Ten risks of PKI: What You're Not Being Told About Public Key Infrastructure
    C. Ellison Computer Security Journal 16 (1) : 1 ~ 7 [2000]
  • Research on the Actual condition of Electronic Signature System usage(in Electronic Signature User)
    KISA [2011]
  • Password-Based Cryptography Standard
    RSA Laboratories PKCS#5 [2012]
  • Password cracking using probabilistic context-free grammars
    M. Weir IEEE Symposium on Security and Privacy : 162 ~ 175 [2009]
  • Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile
    D. Cooper RFC 5280 [2008]
  • Internet X.509 Public Key Infrastructure Certificate Management Protocol CMP
    C. Adams RFC 4210 [2005]
  • Guess again (and again and again): Measuring password strength by simulating password cracking algorithm
    P. Kelley IEEE Symposium on Security and Privacy(S&P) : 523 ~ 537 [2012]
  • GPU-based password cracking
    M. Bakker [2010]
  • Evaluation of Standardized Password-Based Key Derivation against Parallel Processing Platforms
    M. Dürmuth LNCS 7459 : 716 ~ 733 [2012]
  • Digital Signature Certificate Profile
    KISA KCAC.TS.CERTPROF [2009]
  • Certification Request Syntax Standard
    RSA Laboratories PKCS#10 [2000]
  • An Efficient Solution of the Congruence x2+ky2=m(mod n)
    J. Pollard IEEE Transactions on Information Theory 33 (5) : 702 ~ 709 [1987]
  • An Efficient Signature Scheme Based on Quadratic Equations
    H. Ong Proceedings of the 16th Annual ACM Symposium on Theory of Computing : 208 ~ 216 [1984]
  • Addressing the problem of undetected signature key compromise
    Just, M. Van Oorschot, P. C. Proceedings of the Network and Distributed System Security Symposium [1999]
  • Accredited certificate user statistics
  • Accredited Certificate Request Message Format Specification
    KISA KCAC.TS.CRMF [2009]