Author:
Pursharthi Komal,Mishra Dheerendra
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Software
Reference43 articles.
1. Stallings, W.: Cryptography and Network Security, 4/E. Pearson Education India (2006)
2. Zhao, Z., Ma, S., Qin, P.: Password authentication key exchange based on key consensus for iot security. Clust. Comput. 26(1), 1–12 (2023)
3. Hellman, M.: New directions in cryptography. IEEE Trans. Inform. Theory 22(6), 644–654 (1976)
4. Jing, Z., Gu, C., Yu, Z., Shi, P., Gao, C.: Cryptanalysis of lattice-based key exchange on small integer solution problem and its improvement. Clust. Comput. 22(1), 1717–1727 (2019)
5. Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings 35th annual symposium on foundations of computer science, IEEE, pp. 124–134 (1994)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献