Author:
Kalita Jayanta,Hoque Azizul,Kalita Himashree
Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Control and Optimization,Modeling and Simulation,Numerical Analysis
Reference17 articles.
1. Bach, E.: Discrete Logarithms and Factoring, Technical Report UCB 84/186. Computer Science Division, University of California, Berkeley (1984)
2. Brown, D.R.L.: Breaking RSA may be as difficult as factoring. In: Cryptology. ePrint Archive, Report 205/380 (2006)
3. Castagnos, G.: An efficient probabilistic public-key cryptosystem over quadratic fields quotients. Finite Field Their Appl. 13, 563–576 (2007)
4. Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644–654 (1976)
5. El Gamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31, 469–472 (1985)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献