Author:
Loxton J. H.,Khoo David S. P.,Bird Gregory J.,Seberry Jennifer
Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computer Science Applications,Software
Reference7 articles.
1. G. R. Blakley and I. Borosh, Rivest-Shamir-Adelman public key cryptosystem do not always conceal massages, Comput. Math. Appl.
5 (1979), 169–178.
2. K. Ireland and M. Rosen, A Classical Introduction to Modern Number Theory, Springer-Verlag, New York, 1982.
3. S. Kothari and S. Lakshmivarahan, On the concealability of messages by the Williams public-key encryption scheme, Comput. Math. Appl.
10 (1984), 15–24.
4. M. O. Rabin, Digitized signatures and public-key functions as intractable as factorization, Technical Report LCS/TR-212, M.I.T. Laboratory for Computer Science, 1979.
5. B. L. van der Waerden, Algebra, vol. 1, Ungar, New York, 1970.
Cited by
16 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Novel RSA-Like Cryptosystem Based on a Generalization of the Rédei Rational Functions;Number-Theoretic Methods in Cryptology;2018
2. References;Applied Cryptography, Second Edition;2015-10-09
3. Some Properties of Algebraic Structures of RSA-like Systems;2009 WRI World Congress on Software Engineering;2009
4. Generalized Powering Functions and Their Application to Digital Signatures;IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences;2006-01-01
5. Generalized Powering Functions and Their Application to Digital Signatures;Advances in Cryptology - ASIACRYPT 2003;2003