Author:
Lai Hong,Luo Mingxing,Pieprzyk Josef,Qu Zhiguo,Li Shudong,Orgun Mehmet A.
Publisher
Springer Science and Business Media LLC
Reference34 articles.
1. William S. Cryptography and Network Security: Principles and Practice. 2nd ed. New Jersey: Prentice Hall, 2003. 67–68
2. Rivest R L, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Commun ACM, 1978, 21: 120–126
3. Cramer R, Shoup V. Signature schemes based on the strong RSA assumption. ACM Trans Inf Syst Secur, 2000, 3: 161–185
4. ElGamal T. A public key cryptosystem and a signature scheme based on discrete logarithms. In: Proceedings of Workshop on the Theory and Application of Cryptographic Techniques. Berlin: Springer, 1984. 10–18
5. Shor P W. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev, 1999, 41: 303–332
Cited by
15 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献