Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computational Theory and Mathematics,Computer Networks and Communications
Reference10 articles.
1. Cocks, C.: An identity based encryption scheme based on quadratic residues. In: Proceeding of 8th IMA International Conference on Cryptography and Coding, London, pp 360–363 (2001)
2. Goldwasser, S., Micali, S.: Probabilistic encryption. J. Comput. Syst. Sci. 28, 270–299 (1984)
3. Ireland, K., Rosen, M.: A Classical Introduction to Modern Number Theory, 2nd edn., pp 34–38. Springer, New York (1990)
4. Knuth, D. E.: The art of computer programming: Semi numerical algorithms, volume 2, chapter 4, second edition (1998)
5. Lenstra, A. K., Lenstra, H. W. Jr (eds.): The Development of the Number Field Sieve. Lecture Notes in Mathematics. Springer, Berlin (1993)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献