Author:
Cai Nina,Shen Wuqiang,Yang Fan,Cheng Hao,Tang Huiyi,Feng Yihua,Song Jun,Lyu Shanxiang
Publisher
Springer Nature Singapore
Reference17 articles.
1. Becker, D.: LWE-based encryption schemes and their applications in privacy-friendly data aggregation, Ph.D. thesis, Technische Universität Hamburg (2018)
2. Eichenauer, J., Lehn, J.: A nonlinear congruential pseudo random number generator. Statistische Hefte 27(1), 315–326 (1986)
3. H, L.D.: Mathematical methods in large-scale computing units. Annu. Comput. Lab. Harvard Univ. 26, 141–146 (1951), https://cir.nii.ac.jp/crid/1573387451173414912
4. Lecture Notes in Computer Science;Z Kaiwei,2021
5. Kocarev, L., Jakimoski, G.: Logistic map as a block encryption algorithm. Physics Letters A 289(4), 199–206 (2001). https://doi.org/10.1016/S0375-9601(01)00609-0, https://www.sciencedirect.com/science/article/pii/S0375960101006090