吕金刚, 王永杰, 鲜明 . 计算机网络信息安全技术分析[J]. 中国新通信, 2006(15): 21-25. LV J G , WANG Y J , XIAN M , . Analyzing on techniques of computer network information security[J]. China New Telecommunications, 2006(15): 21-25.
[2]
ATREYA M . 数字签名[M]. 北京: 清华大学出版社, 2003: 161-170. ATREYA M . Digital Signature[M]. Beijing: Tsinghua University Press, 2003: 161-170.
[3]
肖凌, 李之棠 . 公开密钥基础设施(PKI)结构[J]. 计算机工程与应用, 2002(10): 137-139. XIAO L , LI Z T . Architecture of PKI[J]. Computer Engineering&Applications, 2002(10): 137-139.
[4]
关振胜 . 公钥基础设施PKI及其应用[M]. 北京: 电子工业出版社, 2008: 216-229. GUAN Z S . Publication Key Infrastructure PKI and the Applications[M]. Beijing: Publishing House of Electronics Industry, 2008: 216-229.
[5]
张锐, 莫平 . PKI/CA技术在电子政务安全体系建设中的应用研究[J]. 中国信息安全, 2014(7): 30-32. ZHANG R , MO P . Application research of PKI/CA technology in e-government security system construction[J]. Computer Security, 2014(7): 30-32.
[6]
赵可 . PKI/CA技术在电子政务信息安全领域的运用探索[J]. 科技传播, 2014(4): 116-123. ZHAO K . Application exploration of PKI/CA technology in the field of e-government information security[J]. Public Communication of Science & Technology, 2014(4): 116-123.
[7]
卢开澄 . 计算机密码学[M]. 北京: 清华大学出版社, 2003: 216-221. LU K C . Cryptography[M]. Beijing: Tsinghua University Press, 2003: 216-221.
[8]
曾福庚 . 公钥密码学的研究与发展[J]. 科技信息, 2010(18): 11. ZENG F G . Research and development of public key cryptography[J]. Science and Technology Information, 2010(18): 11.
[9]
WASHINGTON W T L C . 密码学概论[M]. 许鹏文, 邹红霞, 李勇奇,译. 北京: 人民邮电出版社, 2004: 153-162. WASHINGTON W T L C . Introduction to Cryptography with Coding[M]. Translated byXU P W, ZOU H X, LI Y Q. Beijing: Posts and Telecom Press, 2004: 153-162.
[10]
BELLARE M , POINTCHEVAL D , ROGAWAY P , et al. Authenticated key exchange secure against dictionary attacks[C]// International Conference on the Theory and Application of Cryptographic Techniques, May 14-18, 2000, Bruges,Belgium. Berlin: Springer Berlin Heidelberg, 2000: 139-155.
[11]
SHAMIR A . Identity-based cryptosystems and signature schemes[C]// CRYPTO 84.Berlin:Springer Berlin Heidelberg, 1985: 47-53.
[12]
BONEH D , FRANKLIN M . Identity based Encryption from the Weil pairing[C]// The 21st Annual International Cryptology Conference, August 19-23, 2001, Santa Barbara,California,USA. Berlin: Springer Berlin Heidelberg, 2001: 213-229.
[13]
胡云 . RSA算法研究与实现[D]. 北京:北京邮电大学, 2010: 168-175. HU Y . Research and implementation of RSA algorithm[D]. Beijing:Beijing University of Posts and Telecommunications, 2010: 168-175.
[14]
KMIOKA T , SHIMIZU A . The examination of the security of SAS one-time password authentication[R]. IEICE Tecknical Report, 2001: 156-161.
[15]
NEUKIRCH J . Algebraic Number Theory[M]. Berlin:Springer Berlin Heidelberg, 1999: 267-298.