Author:
Fujioka Atsushi,Okamoto Tatsuaki,Miyaguchi Shoji
Publisher
Springer Berlin Heidelberg
Reference17 articles.
1. Lect Notes Comput Sci;E. F. Brickell,1990
2. D. W. Davies, “Applying the RSA Digital Signature to Electronic Mail”, Computer, Vol.16, No.2, pp.55–62 (Feb., 1983).
3. D. E. Denning, Cryptography and Data Security, Addison-Wesley, pp.170 (1982).
4. W. Diffie and M. E. Hellman, “New Directions in Cryptography”, IEEE Transactions on Information Theory, Vol.IT-22, No.6, pp.644–654 (Nov., 1976).
5. Lect Notes Comput Sci;S. Even,1990
Cited by
20 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Generalized Attack on the Multi-prime Power RSA;Progress in Cryptology - AFRICACRYPT 2022;2022
2. Diophantine Attack on Prime Power With Modulus $N=p^rq$;Proceedings of International Mathematical Sciences;2020-12-18
3. A new public key cryptosystem based on Edwards curves;Journal of Applied Mathematics and Computing;2019-04-06
4. A new generalization of the KMOV cryptosystem;Journal of Applied Mathematics and Computing;2017-04-22
5. A Family P System of Realizing RSA Algorithm;Bio-inspired Computing – Theories and Applications;2016