Funder
Dongguan Science and Technology Bureau
Zhongshan Science and Technology Bureau
Reference26 articles.
1. How to share a secret;Shamir;Commun. ACM,1979
2. Safeguarding cryptographic keys;Blakley,1979
3. A modular approach to key safeguarding;Asmuth;IEEE Trans. Inf. Theor.,1983
4. Chinese Remainder Theorem. Applications in Computing, Coding, Cryptography;Ding,1996
5. Cryptanalyzing a class of image encryption schemes based on Chinese remainder theorem;Li;Signal Process. Image Commun.,2014
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献