共 50 条
- [21] On the Fog of RSA Key Lengths Verifying Public Key Cryptography Strength Recommendations 2017 INTERNATIONAL CONFERENCE ON MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS (ICMCIS), 2017,
- [22] RSA SIGNATURE SCHEMES WITH SUBLIMINAL-FREE PUBLIC KEY TATRACRYPT '07 - 7TH CENTRAL EUROPE CONFERENCE OF CRYPTOLOGY, 2008, 41 : 19 - 32
- [23] Asymmetric public key cryptosystem using digital holographic encryption method PRACTICAL HOLOGRAPHY XXXIV: DISPLAYS, MATERIALS, AND APPLICATIONS, 2020, 11306
- [26] Concurrent factorization of RSA moduli via weak key equations AIMS MATHEMATICS, 2024, 9 (10): : 28211 - 28231
- [27] An Improved Public Key Cryptographic Algorithm Based on Chebyshev Polynomials and RSA SYMMETRY-BASEL, 2024, 16 (03):
- [29] Magnifying the Key Stability of RSA Algorithm in Data Security for Public Cloud INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (06): : 805 - 812
- [30] Why one should also secure RSA public key elements CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2006, PROCEEDINGS, 2006, 4249 : 324 - 338