Publisher
Springer Berlin Heidelberg
Reference5 articles.
1. R. A. Demillo et al. “On the Safety of Cryptosystems,” Applied Cryptology, Cryptographic Protocols and Computer Security Models, AMS Short Course Lecture Notes, Vol. 29, Providence, 1983.
2. D. H. Lehmer, Computer technology applied to the theory of numbers, Studies in Number Theory, MAA Studies in Mathematics Vol. 6, 1969, pp. 117–151.
3. M. O. Rabin, “Digitized signatures and public-key functions as intractable as factorization,” M.I.T. Lab. for Computer Science, Tech. Rep. LCS/TR212, 1979.
4. R. L. Rivest, A. Shamir, and L. Adelman, “A method for obtaining digital signatures and public-key cryptosystems,” Comm. ACM, 21 (1978), 120–126.
5. H. C. Williams, “A modification of the RSA public-key encryption procedure,” IEEE Transactions on Information Theory, IT-26 (1980), 726–729.
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A probabilistic public key encryption switching scheme for secure cloud storage;International Journal of Information Technology;2022-09-21
2. Public key authentication scheme over quaternions;Journal of Discrete Mathematical Sciences and Cryptography;2020-11-17
3. RSA, Dickson, LUC and Williams: a study on four polynomial-type public-key cryptosystems;Applicable Algebra in Engineering, Communication and Computing;2012-11-30
4. On Rabin-Type Signatures;Cryptography and Coding;2001
5. New Public-Key Cryptosystem Using Braid Groups;Advances in Cryptology — CRYPTO 2000;2000