Author:
Liu Jinhui,Zhang Huanguo,Jia Jianwei
Publisher
Springer Science and Business Media LLC
Reference17 articles.
1. Zhang H G, Han W B, Lai X J, et al. Survey on cyberspace security [J]. Science China Information Sciences, 2015, 58(11): 1–43.
2. Gu L, Wang L, Ota K, et al. New public key cryptosystems based on non-Abelian factorization problems [J]. Security and Communication Networks, 2013, 6(7): 912–922.
3. Armknecht F, Gagliardoni T, Katzenbeisser S, et al. General impossibility of group homomorphic encryption in the quantum world [C] // Public Key Crypto 2014, LNCS 8383. Heidelberg: Springer-Verlag, 2014: 556–573.
4. Mao S W, Zhang H G, Wu W Q, et al. A resistant quantum key exchange protocol and its corresponding encryption scheme [J]. China Communications, 2014,11(9):131–141.
5. Tsaban B. Polynomial-Time solutions of computational problems in noncommutative-algebraic cryptography [J]. Journal of Cryptology, 2015, 28(3): 601–622.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献