Voir la notice de l'article provenant de la source Math-Net.Ru
@article{DM_2008_20_3_a13, author = {N. P. Varnovskii}, title = {Provable security of digital signatures in the tamper-proof device model}, journal = {Diskretnaya Matematika}, pages = {147--159}, publisher = {mathdoc}, volume = {20}, number = {3}, year = {2008}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/DM_2008_20_3_a13/} }
N. P. Varnovskii. Provable security of digital signatures in the tamper-proof device model. Diskretnaya Matematika, Tome 20 (2008) no. 3, pp. 147-159. http://geodesic.mathdoc.fr/item/DM_2008_20_3_a13/
[1] Brown D., “On the provable security of ECDSA”, Designs, Codes and Cryptography, 35:1 (2005), 119–152 | DOI | MR
[2] Canetti R., Goldreich O., Halevi S., “The random oracle methodology revisited”, Proc. 30th ACM Symposium on Theory of Computing, ACM, 1998, 209–218 | Zbl
[3] Dent A., “Adapting the weaknesses of the random oracle model to the generic group model”, Lect. Notes Comput. Sci., 2501, 2002, 95–104 | MR
[4] Fiat A., Shamir A., “How to prove yourself: practical solutions to identification and signature problems”, Lect. Notes Comput. Sci., 263, 1987, 186–194 | MR | Zbl
[5] Goldwasser S., Micali S., “Probabilistic encryption”, J. Computer and System Sci., 28:2 (1984), 270–299 | DOI | MR | Zbl
[6] Goldwasser S., Micali S., Rivest R., “A secure digital signature scheme”, SIAM J. Comput., 17:2 (1988), 281–308 | DOI | MR | Zbl
[7] Naor M., Yung M., “Universal one-way hash functions and their cryptographic applications”, Proc. 21st ACM Symposium on Theory of Computing, ACM, 1989, 33–43
[8] Pointcheval D., Stern J., “Security proofs for signature schemes”, Lect. Notes Comput. Sci., 1070, 1996, 387–398 | MR
[9] Rompel J., “One-way functions are necessary and sufficient for secure signatures”, Proc 22nd ACM Symposium on Theory of Computing, ACM, 1990, 387–394
[10] Shain M., “Security in electronic funds transfer: message integrity in money transfer and bond settlements through GE information services global network”, Computers and Security, 8 (1989), 209–221 | DOI