References
- 이승원, '전자상거래 정책 추진 방향', 정보처리학회지'99, Vol.6. No.1, pp.3-6
- 김홍근, 최영철, '전자상거래 정보보호기술 현황 및 대응 방안', 정보처리학회지99, Vol.6, No.1, 22-34
- Shamir, 'Identity-Based Cryptosysterns and Sig-nature Schemes', Crypto'84, pp.47-53, 1984
- M. Girault, 'Self-certified public keys', Advances in Cryptology EUROCRYPT'91, pp.490-497, 1991
- C. Y. Kwon, D. H. Won, 'A study on self-certified public key scheme', The Review of Korea Institute of Information Security & Cryptology, Vol.3, No.3, 1993. 9
- Seung-joo Kim, Soo-hyun Oh, Sang-joan Park and Dong-ho Won, 'Verifiable self-certified public keys', Daniel AUGOT and Claude CARLET (Eds.) : Proc. of WCC'99, INRlA Workshop on Coding and Cryptography, pp.139-148, 1999
- Y. Zneng, T. Matsumoto and H. Imai, 'Residuosity Problem and its Application to Cryptography', Trans, IEICE, Vol.E71, No.8, pp.759-767, 1988
- S. J. Park, H. K Yang, D. H. Won, 'A class of public key residue cryptosystems', Proc. of CISC'95, Conference on Information Security & Cryptology, Vol.5, No.1, 1995
- S. J. Kim, C. Y. Kwon, S. G. Kang, D. H. Won, 'A study on public key authentication schemes', The Review of Korea Institute of Information Security & Cryptology, Vol.6, No.4, 1996
-
B. Y. Lee, Y. Y. Choi, M. R. Joo, D. H. Won, 'An efficient ID-based authentication scheme based on the
${\gamma}^{th}$ -residuosity problem in wireless environ-ment', Journal of the Korea Institute of Information Security and Cryptology, Vol.9, No.2, 1999. 6 -
M. R. Joo, B. Y. Lee, H. K Yang, D. H. Won, 'Ver-ifiable self-certified schemes based on
${\gamma}^{th}$ -residuosity problem', Journal of the Korea Institute of Information Security and Cryptology, Vol.9, No.4, 1999. 12