Author:
Kothari S.,Lakshmivarahan S.
Subject
Computational Mathematics,Computational Theory and Mathematics,Modelling and Simulation
Reference18 articles.
1. Rivest-Shamir-Adleman public-key cryptosystems do not always conceal messages;Blakley;Comput. Math. Applic,1979
2. Security of number theoretic public-key cryptosystems against random attack, I, II, III;Blakley;Cryptologia,1978
3. Security of number theoretic public-key cryptosystems against random attack, I, II, III;Blakley;Cryptologia,1979
4. Security of number theoretic public-key cryptosystems against random attack, I, II, III;Blakley;Cryptologia,1979
5. A modification of the RSA public-key encryption procedure;Williams;IEEE Trans. Information Theory,1980
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献