M. Bellare and B. S. Yee, Forward-Security in Private-Key Cryptography, Proceedings, pp.1-18, 2003.
DOI : 10.1007/3-540-36563-X_1

URL : http://www.cs.ucsd.edu/~mihir/papers/fspkc.pdf

R. Anderson, Two remarks on public-key cryptology -invited lecture, the fourth ACM Conference on Computer and Communications Security (CCS), 1997.

M. Bellare and S. K. Miner, A forward-secure digital signature scheme Advances in Cryptology -CRYPTO '99, 19th Annual International Cryptology Conference, pp.431-448, 1999.

G. Itkis and L. Reyzin, Forward-secure signatures with optimal signing and verifying Advances in Cryptology -CRYPTO, 21st Annual International Cryptology Conference, pp.332-354, 2001.
DOI : 10.1007/3-540-44647-8_20

T. Malkin, D. Micciancio, and S. K. Miner, Efficient Generic Forward-Secure Signatures with an Unbounded Number of Time Periods, Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, pp.400-417, 2002.
DOI : 10.1007/3-540-46035-7_27

M. Abdalla and L. Reyzin, A New Forward-Secure Digital Signature Scheme, 6th International Conference on the Theory and Application of Cryptology and Information Security, pp.116-129, 2000.
DOI : 10.1007/3-540-44448-3_10

H. Ong and C. Schnorr, Fast signature generation with a fiat shamir-like scheme Advances in Cryptology -EUROCRYPT '90, Workshop on the Theory and Application of of Cryptographic Techniques, Proceedings, pp.432-440, 1990.

L. C. Guillou and J. Quisquater, A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory, Advances in Cryptology -EUROCRYPT '88, Workshop on the Theory and Application of of Cryptographic Techniques, pp.123-128, 1988.
DOI : 10.1007/3-540-45961-8_11

H. Krawczyk, Simple forward-secure signatures from any signature scheme, Proceedings of the 7th ACM conference on Computer and communications security , CCS '00, pp.108-115, 2000.
DOI : 10.1145/352600.352617

URL : http://eprint.iacr.org/2001/042.ps.gz

J. E. Holt, Logcrypt: forward security and public verification for secure audit logs In: The proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop, Network Security), pp.203-211, 2006.

B. Libert, J. Quisquater, and M. Yung, Forward-secure signatures in untrusted update environments, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.266-275, 2007.
DOI : 10.1145/1315245.1315279

URL : http://www.dice.ucl.ac.be/~libert/FS-untrusted-ccs.pdf

A. Kozlov and L. Reyzin, Forward-Secure Signatures with Fast Key Update, Security in Communication Networks, Third International Conference, pp.241-256, 2002.
DOI : 10.1007/3-540-36413-7_18

URL : http://www.cs.bu.edu/~reyzin/papers/kreus.pdf

X. Boyen, H. Shacham, E. Shen, and B. Waters, Forward-secure signatures with untrusted update, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.191-200, 2006.
DOI : 10.1145/1180405.1180430

URL : http://ai.stanford.edu/~xb/ccs06/fsig.ps

D. Boneh, X. Boyen, and E. Goh, Hierarchical Identity Based Encryption with Constant Size Ciphertext, Advances in Cryptology -EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp.440-456, 2005.
DOI : 10.1007/11426639_26

M. Abdalla, B. Hamouda, F. Pointcheval, and D. , Tighter reductions for forwardsecure signature schemes, Public-Key Cryptography -PKC 2013 -16th International Conference on Practice and Theory in Public-Key Cryptography, pp.292-311, 2013.
DOI : 10.1007/978-3-642-36362-7_19

URL : https://hal.archives-ouvertes.fr/hal-01132190