Author:
Bangju Wang,Huanguo Zhang
Publisher
Springer Science and Business Media LLC
Reference19 articles.
1. Diffie W, Hellman M E. New Directions in Cryptography [J].IEEE Transactions on Information Theory, 1976,IT-22(6):644–654.
2. Wiener M J. Cryptanalysis of Short RSA Secret Exponents [J].IEEE Transactions on Information Theory, 1990,36(3):553–558.
3. Proc 11th IEEE Symp Computer Arithmetic;M Shand,1993
4. Rivest R L, Shamir A, Adleman L. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems [J].Communications of the ACM, 1978,21:120–126.
5. ZhangHuanguo, Liu Yuzheng.Introduction of Cryptography [M]. Wuhan: Wuhan University Press, 2003 (Ch).
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Towards a CIA compliant RSA hybrid built on an Artificial Neural Network;2021 3rd International Multidisciplinary Information Technology and Engineering Conference (IMITEC);2021-11-23
2. Efficient Modular Exponentiation with Three-Moduli (2^{n}±1,2^{n}+3);Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007);2007-07