Author:
Nita Stefania Loredana,Mihailescu Marius Iulian
Reference21 articles.
1. Diffie, W., & Hellman, M. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644–654.
2. Rivest, R. L., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120–126.
3. C. M. Kota and C. Aissi, “Implementation of the RSA algorithm and its cryptanalysis,” in 2002 GSW, 2022. [Online]. Available: https://peer.asee.org/38785.pdf
4. G. Shi, G. Wang, and D. Gu, “Further Cryptanalysis of a Type of RSA Variants,” in Information Security, vol. 13640, W. Susilo, X. Chen, F. Guo, Y. Zhang, and R. Intan, Eds., in Lecture Notes in Computer Science, vol. 13640. Cham: Springer International Publishing, 2022, pp. 133–152. doi: 10.1007/978-3-031-22390-7_9.
5. ElGamal, T. (1985). A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31(4), 469–472.