참고문헌
- Ahto Buldas, Helger Lipmaa, Berry Schoenmakers, 'Optimally Efficient Accountable Time-Stamping,' PKC 2000, http://home.cyber.ee/helger/papers/bls00.html
- Ahto Buldas, Peeter Laud, Helger Lipmaa, Jan Villemson, 'Time-Stamping With Binary Linking Schemes,' Crypto '98, http://home.cyber.ee/helger/papers/bllv98.html
- Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone, 'Handbook of Applied Cryptography,' July, 1999, CRC Press, http://cacr.math.uwaterloo.ca/hac/
- A. Michael Froomkin, 'The essential role of Trusted Third Parties in Electronic Commerce,' 75 Oregon L. Rev. 49, 1996, http://www.law.miami.edu/~froomkin/articles/trusted1.htm
- Bruce Schneier, 'Applied Cryptography-Protocols, Algorithms and Source Code in C,' John Wiley & Sons, 1994
- Chiara Bulgarelli, 'Tecniche di Time-Stamping,' (in italian), available at http://www.cs.unibo.it/~bulgarel/homepg/critto.html
- Helger Lipmaa, 'Digital Signatures and Authentication,' version 2.0, June, 1999, Cybernetica, available at http://www.cyber.ee/infosecurity/resources/auth/
- Josh Benaloh and Michael de Mare, 'Efficient Broadcast Time-Stamping,' Microsoft Research Lab., http://www.research.microsoft.com/crypto/papers/tss.ps
- Mike Just, 'Techniques for Digital Timestamping,' available at http://www.scs.carleton.ca/~just/papers/CAMS97_slides.ps
- Netscape Communications Corporation, 'Introduction to Public-Key Cryptpgraphy,' available at http://www.iplanet.com/developer/docs/articles/security/pki.thml
- Stuart Haber, Kaliski, W. Scott Stornetta, 'How Do Digital Time-Stamps Support Digital Signatures?,' Cryptobytes ( The RSA security magazine), available at ftp://ftp.rsa.com/pub/cryptobytes/crypto1n3.pdf
- Stuart Haber and Wakefield Scott Stornetta, 'How to Time-Stamp a Digital Document,' Journal of Cryptology, Vol.3, No.2, pp.99-111, 1991 https://doi.org/10.1007/BF00196791